saintcon 2017 Oct. 10, 2017 to Oct. 13, 2017, utah,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Welcome to SAINTCON Troy Jessup This welcome session will be your opportunity to understand what SAINTCON is all about. Troy ...
KEYNOTE: Melanie Ensign Melanie Ensign N/A
KEYNOTE: Neil Wyler "Grifter" Neil Wyler Neil R. Wyler, better known as Grifter, is an Information Security Engineer and Researcher located ...
KEYNOTE: Ryan Clarke "1o57" Ryan Clarke Ryan "1o57" Clarke is a hacker and consultant for the Department of Energy. Mr. Clarke ...
0wn Th3 C0n Seth Johnson All of the things you need to know about SAINTCON and how to get involved ...
Digital hard drive forensics 101 Amanda Walter Amanda will demonstrate how to get a forensic image from a PC and basics of ...
Bypassing NextGen Security: Crazy C&C Channels Bryce Kunz Attackers are innovating their Command and Control (C2) traffic to bypass next-gen security countermeasures and ...
Detecting attackers in AWS Scott Piper This talk will describe the logging options available on Amazon Web Services (AWS) and what ...
NMAP from Zero to Beginner Christopher Hopkins An introduction to the popular network scanner NMAP. We'll go through host and service discovery ...
IT Forensics Fundamentals Jeremy Cox In this class we will cover the basics of forensics procedures: Phases of Computer Evidence ...
Splunk for InfoSec Professionals Aelon Porat Help us protect EquilFacts! The imaginary company, a leading provider of facts, might have been ...
Designing and printing parts for my adventure van Allen Hill Come see how Allen designed and printed parts for his adventure van in Fusion 360 ...
Exploiting RFID-Based Access Controls Kaydan L Inform and educate attendees on how RFID-based access control works and how it is typically ...
Ghosts in the SIEM: Poking the Bear Kevin Lustic Red teams share a common goal: they present scenarios that challenge the *status quo* in ...
Shadowbrokers/NSA? Tools Dump Steve Fink This is another tin foil hat talk where we dive into the world of the ...
How to CTF Mike Weaver Want to win your next CTF? Come learn tips, tricks, tools and strategies from Mike ...
DIY: Web application threat detection Lance Buttars Through the use of event detection monitoring and do it yourself monitoring techniques on a ...
Password Wisdom, Old & New Chris Mather Web applications today still struggle with basic password security. Billions of passwords have been leaked ...
You’re The New Security Guy! (or, I’ve Made A Terrible Mistake) Sean Jackson Ok, you’re the new security person. There is so much to do, where should you ...
All about the SaintCON 2017 badge Luke Jenkins , Klint Holmes , Jonathan Karras , Dustin Woodard This is a breakdown of the SAINTCON 2017 badge!
Cybercriminals Love Remote Access: A Hacking Remote Access Demonstration Jen Stone Is your remote access application secure? If not, you could be losing valuable data and ...
Beginner's guide into memory forensics using Volatility Shelby Peterson An introduction to memory forensics. Come learn how to get started with Volatility! You'll learn ...
Lockpicking: A few ways to pop a Lock Lonnie Bates Environment: I'll machine a cut-a-way lock so that we'll be able to use a live ...
Savage Guide to Disrupting Windows Hacking Operations Bryce Kunz Get savage in the defense of our information systems in this hands-on training where we ...
Breaking Web Application Security Basics (FULL DAY) Jason Wood Have you ever wanted to know more about testing the security of a web application? ...
Cyber Ninjas - Web Application Ethical Hacking Boot Camp Douglas Logan Limited Capacity filling up Track 4 Training room only allows for 45ish students. The first ...
Wireless Penetration Testing Fundamentals Ted Raffle , Robby Stewart Interested in learning how to hack wireless networks? This training workshop will walk you through ...
Application Security Testing in the Real World Seth Law Over the past 20 years, the security industry has defined application security testing tools as ...
Information Security and Privacy: Defending your Organization Jerry Smith Using information security to defend the organization is the classic structural defense using a variety ...
Raspberry Pi media center options Seth Johnson Come learn about the different options available to turn your Raspberry Pi into a media ...
Cuckoo != Insanity Chris Henderson The Cuckoo Sandbox is a open-source automated malware analysis system used by security professionals around ...
Security Doom and Drones! Dave Packham Learn from the great mind of Dave Packham a little of the doom and gloom ...
Packet Capture 101: Caps or Lies Marv White Learn how, where, when and why to perform packet captures. This talk will cover basic ...
Shared Library Vulnerabilities: Under the Surface Threats Todd Keller , Ginger Wright While heartbleed is no longer a new vulnerability, it offers a glimpse into a newer ...
Upsetting the Bad Guys with Data Science and Threat Research John Limb , Aaron Yool Braintrace Labs takes you on a journey exploring financial fraud though time from both sides ...
Ultimate home server Mike Weaver Come learn about Mike's ultimate home server. For under $1500, you can host your media, ...
Practical DevSecOps Brandon Gillespie Is it possible to be secure and have DevOps? Yes. Let's talk about the simple ...
Your Identity: The heart of cyber security! Michael Allred The Threat landscape is changing
Introduction to Software Reverse Engineering Waylon Grange If you were the kid who took things apart to see how they worked this ...
DJ 101 Jeremy Cox Come hang out with with supertechguy. You might even hear some good music or learn ...
Ransomware: Nyetya, blood in the water Dan Daggett This talk will dig into not only the technical aspects of Nyetya but also the ...
Want to see the invisible? It's not as hard as it SIEMs Nate Smith Often times we are inundated with different tasks that we are to accomplish in a ...
The Power of PowerShell and secure automation David Cook You need to learn PowerShell some administrative tasks can only be done using it PowerShell ...
The Surveillance Capitalism Will Continue Until Morale Improves Jon Jarvis Surveillance Capitalism is a form of information monetization that aims to predict and modify human ...
Being Penetration Tested: No pain, no gain! Casey Liljenquist Feeling fairly confident, our networking team decided to have a security audit. We thought we ...
Next Generation Endpoint Performance against Zero-Day file based malware Dean Sapp N/A
In our new world data is the silver bullet (it might be the only bullet…) Michael Fowkes During the last decade there has been a dramatic shift in corporate IT infrastructure and ...
Zero Trust, Zero Infections, and Zero Restrictions Joseph Malinka With the evaporation of the perimeter, Google’s BeyondCorp has been a model for many to ...
Wireshark: A Beginners Inrtoduction Kyle Feuz Have you heard your friends or colleagues talk about "sniffing" network traffic? Do you want ...
Attack and Defend with Powershell: Introduction (FULL DAY) Aelon Porat This class will introduce students to Powershell, showcasing its attractiveness to sysadmins, defenders, and attackers ...
Cyber Ninjas - Web Application Ethical Hacking Boot Camp (REPEAT TRAINING) Douglas Logan Limited Capacity full Adding this to your schedule will put you on the waitlist. Track ...
OWASP Top Ten Critical Application Risks Training (DAY ONE) Dmitry Dessiatnikov The objective of this training is to increase the security awareness and experience with identification ...
Linux Security & Compliance Auditing with Hubblestack Christer Edwards HubbleStack is a modular, open-source security & compliance auditing tool written in Python. Hubble was ...
Using a Security Methodology to Improve your Security Troy Jessup This presentation will focus on improving organizational security by using a security methodology and framework. ...
PCB design 101 Mike Whiteley Like that badge around your neck? Think the minibadges are cool? Make your own! Come ...
FBI Cyber Taskforce: Criminal Trends, Trends, and Tactics Adam Marre The FBI is the lead federal agency for investigating cyber attacks by criminals, overseas adversaries, ...
Splunking Dark Tools - A Pentesters Guide to Pwnage Visualization Bryce Kunz , Nathan Bates A rise in data analytics and machine learning has left the typical pentesters behind in ...
DNSSEC in 10 minutes Josh Galvez Come learn the basics of DNSSEC with Josh's lightning course.
Bots, Bots, everywhere a Bot! Adam Fisher Three Strategies to Stay on Top of Bots & DDoS Attacks on Your Website Half ...
Social Engineering Trends and Tactics Seth Johnson Update on Social Engineering Trends and Tactics.
Pi, SPI, blinking lights and you Mark Buxton Roses are red, Violets are blue, come learn about the APA102. Mark will explain how ...
EFFECTIVE Security Training for your users James Pope James will teach you how to provide good user security training by giving you good ...
Phishing trends are changing: The change from Personal to Organizational Chris Larsen Traditional phishing affects individuals: victims who have disclosed their financial credentials. Our research into "phishing ...
Wireshark Threat Detection Kyle Feuz This training will focus on using Wireshark to spot potentially malicious traffic on your network. ...
Lock pick collar stays Colin Jackson Come see this demo and learn more about Colin's invention of reusable lock pick collar ...
Understanding Multi Factor Authentication Jeremy Cox What is the purpose of multi factor authentication? Understanding types of OTP Time based Event ...
What non-identifying information? Tod Hadley Many security experts and laws are created around the idea of protecting personal privacy by ...
hashcat survival guide Sean Jackson Come learn how to get the most out of hashcat to crack passwords quickly and ...
Developing a Risk Based Security Program Sean Mchenry It is very recent that management has recognized the need to fund cybersecurity. Usually, that ...
Rainbow Tables: How they work Aaron Toponce Everyone seems to know the general idea about rainbow tables, and how they make finding ...
You should turn off bluetooth now. Seriously. Kevin Howard Come see Kevin demo how to take over a device via the bluetooth stack using ...
Attacking AWS: Beyond Security Groups Scott Pack AWS wasn't built by dummies. The premier public cloud platform comes with dozens of security ...
Hackers Challenge Reveal (Walkthroughs and Tutorials) Josh Galvez Come hear all about the SaintCON Hackers Challenge from the mind of Josh Galvez who ...
Digital Privacy & Security Workshop Seth Johnson Privacy: Alive and Kicking Some have suggested that privacy is dead or unimportant. I believe ...
A Deep Dive into the iBoss Platform by iBoss Trainers Wes Furgason N/A
NMAP: Beginner to Intermediate Todd Keller Training Instruction for NMAP for beginners looking to become more proficient with this powerful tool. ...
OWASP Top Ten Critical Application Risks Training (DAY TWO) Dmitry Dessiatnikov The objective of this training is to increase the security awareness and experience with identification ...
Digital Vengeance: Exploiting Notorious C&C Toolkits Waylon Grange Every year thousands of organizations are compromised by targeted attacks. In many cases, the attacks ...
Physical Penetration Testing - So overt it's covert! Ryan Watson Physical penetration testing must be thought of more than someone trying to tailgate employees into ...
Creating a Campus Fabric Clint Sorensen Are you facing some, or all, of these challenges? *Host Mobility (w/o stretching VLANs) *Network ...
The Art of Web Defense – from an HTTP Protocol Ninja Mckell Gomm So you need to defend web apps, do you? This is an intermediate-level #appsec talk ...
False Advertising: How Modern Ad Platforms Can Be Used for Targeted Exploitation Tyler Cook In this presentation I would like to demonstrate how modern ad platforms can be hijacked ...
WiFi Monitoring: The #WiFiCactus Mike Spicer This is year 3 of the wireless monitoring project and its bigger than ever. What ...
KEYNOTE: Troy Jessup "Jup1t3r" Troy Jessup N/A