CarolinaCon11 2015 March 20, 2015 to March 22, 2015, Raleigh,USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Drilling Deeper with Veils PowerTools Will Schroeder , Justin Warner Devastating breaches caused by sophisticated attackers have become a significant existential threat to many organizations. ...
Electronics Engineering for Pen-Testers Old Gregg Have you ever looked at an rfid card reader and thought "Why cant i just ...
SPAM, Phish and Other Things Good to Eat Joshua Schroeder Have you ever wondered how to design a campaign for your organization to see what ...
How to design your 'You got hacked' page Old Gregg Sometimes Old Gregg has a whipsy too much of the funk's sweet, sweet funk shakes. ...
Social engineering is bullsh*t, call it what it is Surpherdave We continue to use the term "Social Engineer" to make it sexy and make it ...
Cryptocurrency Laundering Theory for Fun and Retirement Old Gregg Sometimes Old Gregg just gets tired of it all. Tired of the shoes. Tired of ...
MassWeb: Web Fuzzing Speed Demon Alejandro Caceres , Chris Koepke MassWeb is extremely fast distributed web application fuzzing framework to scan massive amounts of websites ...
Anatomy of Web Client Attacks Jason Gillam Do you have any idea how many of the 2014 data breaches involved client side ...
Have you ever drunk Bailey's from a shoe? (aka Pen-Testing & Social Engineering Convergence) Old Gregg Pentesting and social engineering often go hand in hand, but sometimes trying to explain this ...
Phony Business - What Goes Around Comes Back Around Unregistered , Snide Exploring the phone system was once the new and exciting realm of “phone phreaks,” some ...
RedneckSec @th3mojo I intend to show how similar hackers are to rednecks. In doing so I hopeto ...
Elevator Obscura: Industry Hacks & Answers to all Your Odd Questions About Those Magical Moving Rooms Deviant Ollam , Howard Payne You may have seen Howard and Deviant talk about Elevator Hacking at events like HOPE ...
Hacker's Practice Ground Lokesh Pidawekar In this presentation I will cover various infrastructures and platforms that are deliberately vulnerable and ...
Cyber War Stories Andrew Shumate Have you ever been involved in an incident response and thought while going through the ...
I live in a van and so can you Mark Rickert I'm Mark and I live in a van. I travel the country and skydive. I'm ...
Art of Post-infection Response and Mitigation Chill In this day and age, we are all [mostly] fully aware how far signature-based antivirus ...
One Step Closer to the Matrix: Machine Learning and Augmented Reality in Networking Rob Weiss , John Eberhardt Network operations are constrained by three fundamental issues: i) shortage of qualified personnel; ii) a ...