BSidesDFW 2019 Nov. 2, 2019 to Nov. 2, 2019, Dallas, USA
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Do you even OSINT, bro? How to get started and stay afloat while conducting OSINT | Rick Ragland | Getting started with OSINT reconnaissance can be overwhelming; there are so many tools, so many ... | |
Linksys, I've a feeling we're not in Texas anymore. Homebrew of RaspberryPi bash ssh connect scripts with google spreadsheet. | Rex Tran | A short story about customizing and integrating a Raspberry pi using bash linux scripts for ... | |
Why is no one using these bindings? | Count3rmeasure | gdb has in recent years acquired a pair of extension languages, allowing one to script ... | |
Anti-Dox: Tried and tested methods to keep your address secret in a public world | Michael West | "I'm not paranoid, everyone is just out to get me!" Keeping your personal address private ... | |
Back to the Basics: The Home Lab | Malcolm | Have you ever needed to test something sketchy, so you failed at OPSEC and used ... | |
Hackers and PTSD: Hunting terrorists isn't always roses and sunshine | David Evenden | Over the past few years I've been privately working with my family, friends, and the ... | |
Purple Packets: Effective Network Defense Against Real-World Attacks | Matt Soto | There are two sides to every story. Yin and yang. Day and night. Host and ... | |
Power of Community Hacking | Whiskeyneon & Init_6 | The local hacking community in Dallas is the best there is in the world.As the ... | |
RFCs are Useful | Roxy Dee | RFCs (Request For Comments) are technical documents that explain how the internet (and other technologies) ... | |
The Ethics of Insider Threat Monitoring | Pesto | Interactive presentation of original survey results discussing the dissonance between people's understanding of login banners ... | |
Threat Hunting on a Budget | Joshua Pisano | As security teams and their employers mature their processes many are looking for the next ... | |
How Neurodiversity can be Leveraged for an Excellent ROI | Megan Roddie | While the cybersecurity industry talks about a skills shortage and the struggle to fill the ... | |
Non-Political Security Learnings from the Mueller Report | Arkadiy Tetelman | The Mueller Report was split into 2 volumes, focused on 1) Russian interference in the ... | |
CloudCopy: Stealing secrets from cloud instance volumes | Tanner Barnes | AWS, Azure, and GCP allow Snapshots to be made of the Volumes backing running Instances. ... | |
Drag: Creating a new identity while obscuring your own | Victoria Lloyd | Motivation: to probe into the world of glamours Drag Queens and King’s to understand why ... | |
ATT&CKing Koadic with EQL | Daniel Stepanic | Open-source attack frameworks and tools continue to be leveraged not only by penetration testers and ... | |
Getting Started With Ghidra | Wesley Mcgrew | The open source release of the Ghidra disassembler presents a unique opportunity to those that ... | |
Detecting and Preventing MageCart-esque Attacks | Peter Hefley | MageCart, and others, take advantage of CDNs as watering holes, using JavaScript to directly attack ... | |
Radio hacking 101: a case study in how to DoS the global APRS network | Michael West | Many radio protocols have very little security, as they were designed when equipment to transmit ... |