GrrCon 2013 Sept. 12, 2013 to Sept. 13, 2013, Michigan,USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Trust but Verify Chris Bissell In this day and age you can’t trust everyone. The one person you do want ...
I am a doctor Jim, not a Doctor: A Guide to Becoming a Security Consultant and What that Means Kevin Johnson In this talk, Kevin Johnson of Secure Ideas will walk attendees through what it means ...
Burning the Enterprise with BYOD Georgia Weidman We’ve got Mobile Device Management, BYOD is not a risk for us!” “Our proxy filters ...
Putting Your Business On the Witness Stand Jim Redd Security In the Age of Due Care Living in this age of APTs when something ...
Hacking Giveaways, Contests, and Polls for Fun and Profit! Matthew ‘mandat0ry’ Bryant This presentation is about the wonders of hacking giveaways and polls and how it might ...
Ghost in the PowerShell: Becoming a Cyborg by Automating Security Nicolas Jacob You have achieved your first goal. Shell on a Windows machine. Good. Now the real ...
Security Counterknowledge Mike Kemp You are all doing it wrong. This efficacious talk will examine why you are all ...
Every time I load your app… God kills a kitten Matthew Sjoerdsma , Alex Chaveriat This talk is for those who want to advance from a builder to a hacker. ...
Defensive OSINT: Getting Pwnd is Personal. Tom Richards , Justin Hohner OSINT has been discussed in terms of offensive security but rarely of defensive. We will ...
Popping the Penguin: a beginner’s look at Linux persistence Mark Kikta Breaking in is half the battle. I’ve talked to so many people whose only objective ...
Cloud Incident Response Wyatt Roersma This talk is focused on presenting incident response (IR) techniques that will help mitigate risk ...
“I’d DAP that…CI style” – Security Reporting Fixed Silk At GrrCon this year, we are releasing our new application. The DAP (Defect Analytics Portal) ...
Hacker History: This Stuff Matters N/a The field of infosec has become increasingly polarized around business profits, national security, privacy, and ...
Core Linux Security: 0-Day Isn’t Everything Mark Stanislav When discussion on hardening Linux systems occurs, usually someone will swear by a single feature ...
BOHICA – Your users, your problem – How to get them to really understand why security is important Joel Cardella This presentation seeks to give tools and techniques to help techs and managers teach users ...
Fuck 0-days, We Will Pwn U with Hardware Mofos Yaniv Miron We gives you the ultimate hardware hacking kit. Wanna pwn some banks? Wanna own big ...
A funny thing happened on the way to Shetland…. Chris Roberts Recently I found myself on a flying tin can for the best part of 11 ...
Three Rivers James Palazzolo An interactive presentation discussion between speaker and audience with regards to architectural gaps in cyber ...
Forenics Challenge Brett Cunningham You spent the last 2 tireless days working your way through the GrrCON DFIR challenge. ...
Hack the Youth/Generations Ninjasl0th In this presentation, I will be bridging the gap between security professionals and script kiddies. ...
Business Adaptation or: How I Learned to Stop Worrying and Love the Internet’s Unclean Conflicts Rockie Brockway The U.S’s last official declaration of war was signed in 1942, yet we have heavily ...
Network Security For Fun and Profit, Is Dead Isaac Jones It seems that every year in the field of network security, the year ahead is ...
Pwnage from the Skies! Philip Polstra This presentation will introduce the AirDeck which is the latest extension to The Deck penetration ...
Zeus C&C for Tech Support David ‘healwhans’ Schwartzberg Inspired by Adam Johnson’s presentation at GrrCON 2011 titled “ZeuS – Inside Command and Control” ...
Modern Malware Review Scott Knapp This report looks at 3 months worth of malware collected by Palo Alto Networks’ WildFire ...
Automated Malware Analysis on the Cheap James Pleger Over the last few years, there has been a great number of tools that have ...
Pwn the Fone: Automated Attacks Through Acoustic Analysis Chris Hansen Computer aided acoustic analysis can help you identify the song you are listening to, but ...
Establishing a Vulnerability and Threat Management Program Chris Banta With an ever evolving threat landscape, how does an organization safeguard and protect critical infrastructure ...
What’s ‘Context’ got to do with it! Arron "finux" Finnon There can be little doubt the world of NIDS/NIPS is a jargon rich world. At ...
Are your security devices secure? Are they defensible? Alexander Muentz Physical security devices (IP cameras, DVRs and access control devices are often attached to the ...
Dancin’ With Dalvik Thomas Richards So you’ve reversed you’re first Android APK; now what? Java pseduocode is nice, but how ...
Beautiful Models J wolfgang Goerlich We need beautiful models. Models attract and hold your attention. They excite you. They prompt ...
Malware Automation Christopher Elisan Automation is key when it comes to production. The same is true for malware. Malware ...
The Cavalry Isn’t Coming Nick Percoco We have some good news and some bad news. The good news is that security ...
50 Shades of Purple(teaming): Getting penetration testing into a conservative company Scott Thomas Getting paid to hack sounds pretty cool right? Unfortunately not all of us are cut ...
CCDC and Industry James ‘wolfflight’ Siegel In today’s business climate, having a certain amount of experience can certainly be more important ...
The Science of Security Automation Paul Cochran , Toni Buhrke Continuous monitoring has become a buzz term that means many different things to many different ...
Weaponized Security Kellman Meghu Imagine having access to an amazing technology, that makes searching patterns of data in the ...
Building Risk Visibility into Your Firewall Management Process Matt Dean Firewall deployments in large organizations can easily get out of control – and become rife ...
Is Auditing C/C++ Different Nowadays Jared Demott C/C++ has been around for a long time. As you may know, it has issues; ...
We Don’t Need no Stinkin’ Status! Chris Silvers A (hypothetical) discussion of techniques to travel like a movie star, well, ok, like someone ...
Enterprise Vulnerability Management (Assessing, Implementing, and Maintaining) Derek Milroy This presentation is a detailed how-to for assessing, implementing, and maintaining a Vulnerability Management Program. ...
Developing Successful InfoSec Professionals from C Students Brad Wilkerson I Hate C’s….as grades. I hated receiving them, I hate giving them. In this talk ...
The Droid Exploitation Saga – All Over Again! Aditya Gupta , Subho Halder A lot has already been talked about Android malwares, botnets, fake legitimate applications and what ...
Threat Defenses: Before, During and After Tom Clare Protection from malware, advanced threats and data theft requires continuous threat defenses before, during and ...
Futurama vs. Roman Gods: Real-World Hostname Popularity Sean Wcisel A quarter-million DNS queries later; what can be learned from brute force hostname discovery. Which ...
Making Attacks Go Backwards Josh ‘fuzzynop’ Schwartz , Matt ‘hastisec’ Hastings Imagine a pentest where there is no scope, no time restraints, and no budget. How ...
Outside the box: A discussion around alternative security approaches Keir Asher Crime pays and is always an economic game. More and more deception strategies are used ...
Bringing Hackers Back Into The Intel Business with OSINT Antitree As hackers, we’re supposed to have a decent background in passive recon – OSINT – ...
Matriux Leandros – An Open Source Penetration Testing and Forensic Distribution Prajwal Panchmahalkar Matriux is the first full-fledged Debian-based security distribution designed for penetration testing and forensic investigations. ...
A criminal’s guide to all things socialy Gavin ‘jac0byterebel’ Ewan Jac0byterebel is not your typical social engineering presenter. Out goes the snake oil sale of ...