bsideswinnipeg 2017 Nov. 4, 2017 to Nov. 5, 2017, winnipeg,canada

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Zero Day Phishing Emails Aemilianus Kehler This talk will discuss tools that can be used to investigate emails to determine whether ...
Machine Learning and the Cyberz: Separating Fact from Marketing Fiction Brandon Enright The latest marketing fad and hype in our industry is the pushing of machine learning ...
For The Win: Finding WAF Evasions and Verifying Fixes with FTW Christian Peron This talk will discuss some of the core design objectives Fastly had regarding their WAF ...
Winnipeg-Wide Amateur Radio IP Network: VA4WAN Colin Stanners Commercial radio communications have evolved from islands of single-media, low-datarate "dumb" analog repeaters to interconnections ...
Privilege Escalation: Living a New Life Without getsystem Dmitry Balikhin Metasploit's getsystem makes us lazy and hides a very interesting phase of penetration testing. Sometimes ...
Scraping Retailers: or How I Learnt to Stop Worrying and Love the Web Jason Harder , Kevin Cortens Scraping data from the Internet is an old practice, but one that is more and ...
Info Sec for Cheapskates Mark Havens We are inundated with Information about high-cost solutions for info sec problems, but there are ...
More Secure Bootstrap Problems and Solutions Mark Jenkins Mark is still obsessed with what he calls secure bootstrap problems: 1) how do you ...
Avoiding Kyphosis: Security Posture in the Cloud Mike Himbeault With public cloud adoption accelerating by all measures, the task of understanding how to deploy ...
I Want my EIP Mike Saunders When Mike started learning buffer overflows, he thought it was something everybody else already knew. ...
Reverse DNS the World - What do you learn? The how and what Rob Keizer Recent years have seen the scanning the entire IPv4 Internet become more and more commonplace. ...
Do As I Say, Not As I Do: Why Our Security Advice Sucks and How We Can Change That Sarah Lacroix Let's talk about risk assessment and personal security! As technically inclined people, we are at ...
Operating your own BGP Autonomous System on the Internet (AKA: BGP for Fun & Profit) Theodore Baschak Border Gateway Protocol or BGP for short, is the standardized, open protocol that allows ISPs ...
Managing Large Assessments Tim Jensen Conducting assessments against 2500+ machines is very different than conducting smaller 500 or less assessments. ...
The Ins and Outs of NTLM Relaying (and why you should give a damn!) Travis Friesen The Microsoft NTLM authentication protocol has been around since 1993, and remains widely supported 24 ...
An IT Risk Assessment of the Titanic William Kempan If we did a typical IT Risk assessment of the Titanic before its maiden voyage, ...