BSidesDenver 2017 May 12, 2017 to May 13, 2017, denver,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
The Aftermath of a Fuzz Run: What to do about those crashes? David Moore Fuzzing is a highly effective means of finding security vulnerabilities - new, easy to use ...
Threat hunting at scale with decision trees, regressions, and clustering Matt Berninger Threat hunting at scale is a scientific data reduction problem. However, in practice it is ...
Trusted Things That Execute Things Casey Smith As organizations are embracing the new whitelisting model, it becomes imperative to understand what applications ...
Advanced Targeted Attack: Golden Ticket Attack PoC in 6 Minutes. (4 If I weren't so bad at typing) Andy Thompson This talk highlights the risks of kerberos attacks on Active Directory...specifically the Golden Ticket Attack. ...
Active Defense via a Labyrinth of Deception Q A network baseline allows for the identification of malicious activity in real time. However, maintenance ...
Clamdigging: Leveraging ClamAV for Malware Analysis and Detection Jack Mott It's 2017: Weren't signature based technologies supposed to be dead by now? To the chagrin ...
Internet Activism, Research, and Participation: A survey on how to activate, maintain, and wreck your digital citizenship J:neth Ten minutes segments on Participatory and learning Avenues 1) Data Rescue Efforts - Boulder and ...
Your New Red Team Hardware Survival Pack Chris Salerno Social engineering is a crucial aspect of red teaming. Without proper planning and execution, your ...
Cloud Seeding or Finding Weird Machines in the Cloud Crowd Sourced Economy Graeme Our sharing economy is defining many aspects of our lives, how we travel, order food, ...
Burning Down the Haystack: Efficiency Gained with Security Automation & Orchestration Ken Schar Companies are rapidly adopting Security Automation & Orchestration for event triage, investigation, containment, and threat ...
Financial Crime: Past, Present, and Future Marcelo Mansur Starting with my own experience working in what turned out to be a boiler room ...
Toasting the Toasters: Tracking Botnets Using Machine Learning and Automated Verification Jeffrey Bickford , Tom Boatwright Most state of the art botnet tracking techniques today rely on the use of honeypots, ...
Real Intel - Honeypots and Live Threat Intelligence Kat Fitzgerald Honeypots for "Threat Intelligence"? Why yes, of course. Honeypots, tokens and more, when used properly, ...
OPSEC for the Security Practictioner Michael Clayberg As security practitioners we are comfortable providing security advice to companies, software vendors, and the ...
Murder Mystery - How Vulnerability Intelligence is Poisoning your Information Security Program Gordon Mackay Integrating vulnerability scanning results into one’s security ecosystem involves a serious hidden challenge which results ...
Advanced Social Engineering for Red Teams T3ntman Social engineering is a crucial aspect of red teaming. Without proper planning and execution, your ...
Securing The Smart City - (a journey through data handling controls) Kyle Chambers - Smart Meters: what the data is and most definitely is not. - Why you ...
Hunting Methodology: A key to the labyrinth of network forensics Matthew Tharp Proactive hunting is the newest cybersecurity strategy and promises great potential. But where is one ...
Social Tinder-neering with a twist of Kik: How to leverage Mobile Dating Apps to enhance your social engineering attack techniques. X3l4v Mobile dating applications have become the predominant method to meet individuals with similar interests. The ...
Whois Who? Mining Miscreant Registrant Records Kevin Bottomley Whois data is an often undervalued data set for finding nefarious actors across the Internet. ...
The Seven Principles of Leave No Trace (Decoded for the Digital World) Jordan Drysdale This presentation will walk through the process of purchasing cell phones, gift cards, a laptop ...
Windows IR made easier and faster - Find the head of the snake using AutoRuns, Large Registry Keys, Logs, IP/WhoIs and Netflow Michael Gough Windows systems are still king of the desktop and server operating systems, thus the #1 ...
Low Cost, Open Source Spectrum Monitoring Michael Ossmann , Dominic Spill Monitoring the radio spectrum is an important way to keep track of wireless devices within ...