BSidesDFW 2019 Nov. 2, 2019 to Nov. 2, 2019, Dallas, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Do you even OSINT, bro? How to get started and stay afloat while conducting OSINT Rick Ragland Getting started with OSINT reconnaissance can be overwhelming; there are so many tools, so many ...
Linksys, I've a feeling we're not in Texas anymore. Homebrew of RaspberryPi bash ssh connect scripts with google spreadsheet. Rex Tran A short story about customizing and integrating a Raspberry pi using bash linux scripts for ...
Why is no one using these bindings? Count3rmeasure gdb has in recent years acquired a pair of extension languages, allowing one to script ...
Anti-Dox: Tried and tested methods to keep your address secret in a public world Michael West "I'm not paranoid, everyone is just out to get me!" Keeping your personal address private ...
Back to the Basics: The Home Lab Malcolm Have you ever needed to test something sketchy, so you failed at OPSEC and used ...
Hackers and PTSD: Hunting terrorists isn't always roses and sunshine David Evenden Over the past few years I've been privately working with my family, friends, and the ...
Purple Packets: Effective Network Defense Against Real-World Attacks Matt Soto There are two sides to every story. Yin and yang. Day and night. Host and ...
Power of Community Hacking Whiskeyneon & Init_6 The local hacking community in Dallas is the best there is in the world.As the ...
RFCs are Useful Roxy Dee RFCs (Request For Comments) are technical documents that explain how the internet (and other technologies) ...
The Ethics of Insider Threat Monitoring Pesto Interactive presentation of original survey results discussing the dissonance between people's understanding of login banners ...
Threat Hunting on a Budget Joshua Pisano As security teams and their employers mature their processes many are looking for the next ...
How Neurodiversity can be Leveraged for an Excellent ROI Megan Roddie While the cybersecurity industry talks about a skills shortage and the struggle to fill the ...
Non-Political Security Learnings from the Mueller Report Arkadiy Tetelman The Mueller Report was split into 2 volumes, focused on 1) Russian interference in the ...
CloudCopy: Stealing secrets from cloud instance volumes Tanner Barnes AWS, Azure, and GCP allow Snapshots to be made of the Volumes backing running Instances. ...
Drag: Creating a new identity while obscuring your own Victoria Lloyd Motivation: to probe into the world of glamours Drag Queens and King’s to understand why ...
ATT&CKing Koadic with EQL Daniel Stepanic Open-source attack frameworks and tools continue to be leveraged not only by penetration testers and ...
Getting Started With Ghidra Wesley Mcgrew The open source release of the Ghidra disassembler presents a unique opportunity to those that ...
Detecting and Preventing MageCart-esque Attacks Peter Hefley MageCart, and others, take advantage of CDNs as watering holes, using JavaScript to directly attack ...
Radio hacking 101: a case study in how to DoS the global APRS network Michael West Many radio protocols have very little security, as they were designed when equipment to transmit ...