BSidesManchester 2014 June 27, 2014 to June 28, 2014, manchester,UK

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
How bleeding edge software can be safer than long term support Jesse Burns Why the future of secure systems is taking the risks of new features, and managing ...
ActiveScan++: Augmenting manual testing with attack proxy plugins James Kettle This presentation will introduce ActiveScan++ and demonstrate how it can be used to easily identify ...
Using a CAT for Fun and .NET Profit Matt Lewis The aim of this talk is to promote the value of automated source code analysis ...
RATS & IOC's The easy way! Kevin Breen RATS are used across all areas of cyber incident. From the 'Script Kiddie' looking to ...
Breaking "Secure" Mobile Applications Dominic Chell This talk examines the security of products in the mobile space that describe themselves as ...
OWASP ZAP: Advanced Features Simon Bennetts The Zed Attack Proxy (ZAP) is an OWASP Flagship project and the largest open source ...
Rookie: When PXE Goes Bad Iain Smart The Preboot eXecution Environtment, or PXE, is a network technology often used in corportate environments. ...
Hardcore photography: How I hacked my DSLR Shodan Own a DSLR? Then you own an extremely advanced piece of portable technology. Problem is ...
What #SOCFail looks like, and how to avoid it: AKA sort your “little" data out before going BIG James Blake This presentation will look at what #SOCFail looks like, focusing on the top 10 mistakes ...
SSL Checklist for Pentesters Jerome Smith This presentation will tackle the subject of SSL/TLS testing from the viewpoint of a penetration ...
Strong passwords and Unicode. Can we use Unicode characters to strengthen our passwords. Yes... er no... er maybe. It depends Pedro Venda Unicode has been around for ages, it has been created as a solution to the ...
A Crack in The Foundations: Overcoming Web Framework Risk Jerry Hoff Frameworks continue to enable developers to innovate faster than ever before, however the popularity of ...
Rookie: How Much Are You Worth? Kurtis Brown A look into how I went from having $440,000 in my bank account to scoping ...
POS Devices: you could…live for free! Gregorios Fragkos Nowadays, very few people carry cash for their everyday transactions. Most of the daily transactions ...
How I rob banks Freaky Clown A lighthearted trek through my daily job of robbing banks (amongst other things) both physically ...
U Plug, we play David Middlehurst Smart devices are just about everywhere. Many of them adopt UPnP to make their operation ...
Who Said the Good Old Days Were Gone? Analysing the Dark Seoul Malware Campaign James Slaughter At the beginning of 2013 some 35,000 systems in the Republic of South Korea were ...
History of PC malware Nikola Milosevic This talk will describe development of malware from it starts with Brain.A virus. We will ...
The doer alone learnth - Building a better understanding of your NIPS/NIDS Arron ‘finux’ Finnon NIDS/NIPS (or whatever 3 letter abbreviation is used) have a very rich and documented history ...
Rookie: I Heard You Say Android Is Insecure Jozef Sov Many people say that Android is insecure and you hear statistics saying that there is ...
Ensuring Password Cracking Ain’t Easy Michael Jack This talk will look at why using traditional hashing algorithms no longer cuts it and ...
Using Configuration Management to Pivot and Persist Rob Wallace While configuration management tools remove the repetition and pain of updating systems, they also provide ...
Two Factor Authentication, Cyber Security Snake Oil? Jamie With more and more sites enabling two factor authentication having a username and password with ...