DerbyCon 7.0 Legacy
took place Sept. 22, 2017 through Sept. 24, 2017 (7 years, 9 months ago) at Hyatt Regency Hotel in Louisville, Kentucky, USA.
Presentations
Friday, Sept. 22, 2017
-
08:30 - DerbyCon Team
-
09:00 - Subverting Trust in Windows - A Case Study of the "How" and "Why" of Engaging in Security Research
-
10:00 - I had my mom break into a prison, then we had pie.
-
12:00 - So you want to be a Social Engineer
-
12:00 - When to Test, and How to Test It
-
12:00 - Further Adventures in Smart Home Automation: Honey, Please Don't Burn Down Your Office
-
12:00 - Eye on the Prize
-
12:00 - How to Measure Your Security: Holding Security Vendors Accountable
-
12:30 - Building Better Backdoors with WMI
-
13:00 - Here Be Dragons: The Unexplored Land of Active Directory ACLs
-
13:00 - A New Take at Payload Generation: Empty-Nest
-
13:00 - Securing Windows with Group Policy
-
13:00 - How we accidentally created our own RAT/C2/Distributed Computing Network
-
13:00 - Beyond xp_cmdshell
-
13:30 - Bots, Trolls, and Warriors
-
14:00 - TBD
-
14:00 - VMware Escapology: How to Houdini The Hypervisor
-
14:00 - Active Defense for web apps
-
14:00 - Defending against PowerShell Attacks
-
14:00 - DFIR Redefined
-
14:30 - Building Google for Criminal Enterprises
-
15:00 - CredDefense Toolkit
-
15:00 - 3rd Annual Metasploit Townhall
-
15:00 - V!4GR4: Cyber-Crime, Enlarged
-
15:00 - IoT Security - Executing an Effective Security Testing Process
-
15:00 - Invoke-CradleCrafter: Moar PowerShell obFUsk8tion & Detection (@('Tech','niques') -Join'')
-
16:00 - Fileless Malware - The New "Cyber"
-
16:00 - PSAmsi - An offensive PowerShell module for interacting with the Anti-Malware Scan Interface in Windows 10
-
16:00 - The skills gap: how can we fix it?
-
16:00 - Purpose Driven Hunt: What do I do with all this data?
-
16:00 - Steel Sharpens Steel: Using Red Teams to improve Blue Teams
-
16:30 - Extending Burp
-
17:00 - Lateral Movement for the Blue Team
-
17:00 - DanderSpritz: How the Equation Group's 2013 tools pwn in 2017
-
17:00 - An ACE in the Hole: Stealthy Host Persistence via Security Descriptors
-
17:00 - Shellcode Via VBScript/JScript Implications
-
17:00 - Introducing DeepBlueCLI v2, now available in PowerShell and Python
-
17:30 - Retail Store/POS Penetration Testing
-
18:00 - Defending the Cloud: Lessons from Intrusion Detection in SharePoint Online
-
18:00 - Run your security program like a boss / practical governance advice
-
18:00 - Improv Comedy as a Social Engineering Tool
-
18:00 - (Mostly) Free Defenses Against the Phishing Kill Chain
-
18:00 - Introducing Bruiser: A Small and Sneaky Backdoor for Windows
-
18:30 - How to safely conduct shenanigans
-
19:00 - The .NET Inter-Operability Operation
-
19:00 - Digital Vengeance: Exploiting the Most Notorious C&C Toolkits
-
19:00 - War Stories on Embedded Security: Pentesting, IoT, Building Managers, and how to do Better
Saturday, Sept. 23, 2017
Sunday, Sept. 24, 2017