BSidesCHARM 2015 April 11, 2015 to April 12, 2015, Baltimore,USa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Red vs Blue: Modern Active Directory Attacks & Defense Sean Metcalf While Kerberos "Golden Tickets" and "Silver Tickets" received a lot of press in the second ...
Point, Click, Score Rick Forno Cyber Challenges such as CyberPatriot, CCDC, or the local Maryland Cyber Challenge are popular interscholastic ...
When CTFs Attack! Building a better training environment Rock Stevens , Skyler Onken The IT industry utilizes capture-the-flag (CTF) competitions to assess, evaluate and train employees or potential ...
Project KidHack - Teaching Kids (and even some adults) Security through Gaming Grecs Wanna teach your kid to be a hacker but don't know where to start? Security ...
You might be organizing your data wrong, and you know it. Nathan Shanks This talk covers how to better organize your traditional log collection platform. Its focused on ...
Quantum Computing Tess Schrodinger We have all probably heard at one point or another that quantum computing would render ...
Bug Bounty Hunters: Lessons From Darth Vader Jake Kouns Darth Vader was a ruthless leader and considered by many to be one of the ...
Running Away From Security Micah Hoffman Now more than ever people are tracking and quantifying their lives. We wear wristbands that ...
Incident Response Decisions: Make the Right Decisions Beforehand Matt Harvey Good incident response requires smart decisions made in a timely fashion. Yet under the pressure ...
Confessions of a Malware Hunter Tony Robinson I am a Senior Security Analyst for a fortune 1xx company who has been given ...
Hashtag hacking: How to pwn social media Zack Allen , Chris Cullison 1 in 4 people actively use social media today and the number is projected to ...
Exploiting Buffers Overflows 101 Kyle Hanslovan , John Ferrell So you've heard about exploitation but don't know where to start? Well this class is ...
Advanced Web Exploitation Kung Fu Abhishek Sahni There is a lot more in modern day web exploitation than the good old alert("xss") ...
Social Engineering Like a Boss Raymond Gabler The talk will over 2 items - 1. An overview of why social engineering (SE) ...
Mass hunting/exploitation operations with Powershell Jose R Fernandez Jose will explain how Powershell can be used to conduct large scale hunting operations or ...
HardenedBSD Shawn "lattera" Webb HardenedBSD officially launched in August of 2014. The HardenedBSD developers have been working hard to ...
Quick Win Industry Agnostic Dashboards Craig Bowser Dashboards are a critical capability of a Security Information Event Monitor (SIEM) as they are ...
Automating Incident Response Data Gathering Brian J Moran The Live Response Collection is a open-source, freely available set of tools that allows seasoned ...
An Introduction To The Radare2 Reverse Engineering Framework Peter Clemenko This talk will give a brief introduction to the open source Radare2 reverse engineering framework. ...
Evolution of Attacks: Case Study of Targeted Attacks Jared Myers This talk covers a brief overview of the evolution of targeted attacks, and provides a ...
MACE - Malware Analysis in a Controlled Environment Mike Kobett Malware analysis is a skill that is sought after by corporations and government agencies. This ...