CarolinaCon15 2019 April 26, 2019 to April 28, 2019, Charlotte, United States

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Comparing Malicious Files Robert Simmons A critical step one must take during the malware analysis process is to attempt to ...
BountyCraft: The Panel Jeff Boothby , Chloe Hunters Every security tester has some sort of methodology and toolset they use. This "secret sauce" ...
RedOps: Automating your Red Team Elrey apt-get update && apt-get upgrade -y && apt-get dist-upgrade -y ...here we go again...and failed...alright ...
Much Ado About Credential Stuffing Maverick My talk focuses on the art of credential stuffing, which uses usernames and credentials from ...
How to fix the Diversity Gap in Cybersecurity Chloé Messdaghi Women make up just 11 percent and minorities are slightly less than 12 percent of ...
Exploit Development for Mere Mortals Joe Mccray This presentation will cover the exploit development for InfoSec professionals with little to no programming ...
Phish Finder: Can Machine Learning Identify a Phishing Attack? Scott Hefner Phishing emails are one of the largest issues Cybersecurity professionals face today. An errant user ...
Breaking into Banks like a Boss James Morris Is your money safe? Are the movies real? Can you dodge lasers, sneak through vents, ...
In and Out the DNS Tunnel Stuart Mcmurray DNS is one of the three protocols which will get C2 out of nearly any ...
Writing Exploit-Resistant Code with OpenBSD Lawrence Teo OpenBSD is renowned for its security innovations and code quality. With its emphasis on code ...
How Underground Vendors Advertise Product in Cybercrime as Service Markets Tom Holt We hear a lot about underground cybercrime as service markets from security vendors and in ...
Getting started with Powershell and One Tool to Hack them All Myprojectexpert Using PowerShell is about building tools to automated tasks. This session is a beginner’s guide ...
Detection and Exploitation of Amplification Attacks in the Wild Smokey Over the next forty-five minutes we will discuss three examples of amplification attacks, how to ...
Was I supposed to mix the security in before baking? Brandon Martin Security practitioners advocate ideals through clichés and analogies to help others understand complex problems. One ...
WhoBuntu: Privacy in a Feature-Rich Environment _hyp3ri0n WhoBuntu is a new distro I've created to allow for all the benefits of Whonix ...
Build it, Buy it, or Both? Taking an Engineered-Focused Approach to Security Tooling Mike Hodges N/A