BSidesSeattle 2017 Feb. 4, 2017 to Feb. 4, 2017, seattle,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Anonymous Speech on the Internet Sarah Squire Find out how open standards are being developed to allow for anonymous speech on the ...
Cloud basics for pen testers/red teamers Gerald Steere You know the ins and outs of pivoting through your client’s or your employer’s domains. ...
Combat Mindset in the SOC Matthew Romanek Effective cyber defense will always depend on a human's situational awareness and intuition. A combat ...
Extrabacon's Sploit Framework: Or how to break the Ruby bonds of Metasploit Daniel Reilly Sploit is the modular core that runs the EXTRABACON exploit in the ShadowBroker's tool dump. ...
Lock Impressioning Josweyers We've all seen lockpicking explained on several security venues. You might even have tried it ...
More Security != More Secure Matthew Romanek As security professionals, we tend to apply more and more controls until something is considered ...
PixelDust - Breaking the Google Pixel Jon Sawyer The Google Pixel, the successor to the Nexus line of Android phones, was released October ...
Security Monitoring for Startups Eugene Kogan For startups, security is not their top priority - staying in business is. However, wise ...
TCPReplay, Rinse, Repeat: Building a Network Baseline, One Segment at a time Matt Domko You can't detect abnormal traffic if you don't know what normal traffic looks like. This ...
The Evolution of Red Teaming and Assume Breach @ Microsoft Jerry Cochran Red teaming at Microsoft has become an institution and Assume Breach our manta. In this ...
TPM: Trojan Horse or Boat Anchor Vim Iam The Trusted Platform (TPM) hardware chip has been portrayed as "treacherous" by Richard Stallman, a ...
Opening doors with the ESPKey Kenny Mcelroy Facility access control systems are still using archaic, unencrypted protocols for authorizing access badge holders ...