BSidesKnoxville 2017 May 5, 2017 to May 5, 2017, knoxville,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Eliminating XSS in PHP: Applying Context-Sensitive Auto-Sanitization to the PHP Programming Language Joseph R. Connor , Jared M. Smith Cross-Site Scripting (XSS) has been a problem in the modern web dating back to the ...
Burning Down the Haystack Tim Frazier How do you find the needle in the haystack? Burn all the hay! In this ...
Put up a CryptoWall and Locky the Key - Stopping the Explosion of Ransomware Erich Kron Ransomware is spreading at an alarming pace and infecting networks across all industries and company ...
MMU Magic in JavaScript: breaking ASLR from a sandbox Ben Gras This talk presents an ASLR-breaking side channel that exploits a fundamental property of the CPU ...
You can't screw up Poptarts Kevin Thomas Implementing an Information Security Program is not a simple process. There's not a simple, one ...
OSINT For the Win: Integrating with Social Engineering for Better Pen Testing Joe Gray Social engineering attacks remain the most effective way to gain a foothold in a targeted ...
Open Source Defense: Building a Security Program with Zero Budget Kyle Bubp Even though large breaches have hit headline news in years past, some companies are still ...
FTFY: The Addictive Game of Mending Malware Misbehavior with flare-qdb and Vivisect Michael Bailey flare-qdb is a Python CLI and library for observing and manipulating native software execution. It ...
Code BROWN in the Air Stephen Hilt The talk is about the paging system, an old technology in the 90's, used in ...
The Luxury of Security Joe Fitzpatrick We're rapidly approaching computational post-scarcity. The history of computing has gone through many phases that ...
Escape And Evade: Fugitive Infosec Lessons from CBS's "HUNTED" Hunted About the Talk We will talk about the ways the people on CBS's "HUNTED" used ...
Hillbilly Storytime - Pentest Fails Adam Len Compton Whether or not you are just starting in InfoSec, it is always important to remember ...
The Details of Forensic Case Studies Bill Dean Digital forensics talks can take various approaches. One angle is the detailed art of digital ...
Weaponizing Splunk: Using Blue Team Tools for Evil Ryan Hays Splunk is a log aggregation and correlation tool that is normally used for defensive analysis ...
Exploit Kits Explained David Vargas Exploit kits (EKs) first appeared in 2006 but their initial growth was limited by the ...
Saving My Car By Hacking It: A Tale of Joy and Woe Brandon Wilson One fine summer day, my 1997 Chevrolet Cavalier decided to die. Desperate to save my ...
How to kick start an application security program Timothy Deblock Management wants a security program setup in the software development life cycle (SDLC). You have ...