BSidesDC 2013 Oct. 19, 2013 to Oct. 20, 2013, Washington, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Welcome Mark Boltz , Bill Fisher N/A
Inaugural Keynote: But What Can _I_ Do? Bruce Potter Infosec is a wide landscape. There are pentesters, malware analysts, QSA's, firewall administrators, consultants, and ...
The Homunculus Problem: Why You Will Lose the Battle of BYOD Michele Chubirka BYOD, it's the new enterprise Boogie Man, striking fear into the heart of security professionals ...
Malware Analysis: N00b to Ninja in 60 Minutes Salvador Grec Knowing how to perform basic malware analysis can go a long way in helping infosec ...
Got Spies In Your Wires? Chuck Willis , Evan Peña This talk will cover malware beaconing techniques Mandiant has observed that avoid typical signature-based network ...
Overcoming Objections to Security In Reluctant (and Even Hostile) Environments Mike Landeck Ideas and techniques for improving security programs are frequent topics at security conferences and webinars. ...
Malware Analysis for the Masses Brian Baskin With malware becoming more prevalent, and the pool of capable reversers falling short of overall ...
Cracking Corporate Passwords - Why Your Password Policy Sucks Rick Redman All those leaked MD5s you've been cracking from PasteBin? In most cases, they are from ...
CREAM – Cache Rules Evidently Ambiguous, Misunderstood Jacob Thompson Common wisdom dictates that web applications serving sensitive data must use an encrypted connection (i.e., ...
Minecraft Through a Metasploit Module Rohan Vazarkar In this presentation, I will demonstrate a post module written for the Metasploit Framework which ...
Exploiting SOHO Routers Jacob Holcomb This dynamic presentation gives an overview of the current state of SOHO security, followed by ...
Human Honeypots: Social Engineering, Sexploitation, and Cyber Espionage Kenneth Geers , James C. Foster SEX is the world’s oldest profession. And according to the Bible, ESPIONAGE is the second. ...
Bro-IDS Crash Course Liam Randall Bro is a stateful, protocol aware open source high speed network monitor with applications as ...
20 Security Controls Russell Eubanks Over the years, many security standards and requirements frameworks have been developed in attempts to ...
Wireless Penetration Workshop and Wireless CTF Da Kahuna , Rick Mellendick Whether it’s war-driving or doing penetration testing of wireless networks there are tools, hardware and ...
Stopping Social Engineers In Their Tracks: Introducing The Social Engineering Defense Framework Valerie Thomas Technology will continue to advance, but the greatest vulnerability will always exist in the human ...
How the West was Pwned G Mark Hardy Can you hear it? The giant sucking sound to the East? With it are going ...
Using Open Source Facial Recognition Software In Digital Forensics Brian Lockrey As hard drives get larger and larger, it is not uncommon in digital forensics to ...
Rorschach Plots and Network Performance Analysis Jim Gilsinn N/A
Dynamic Analysis using CobraDroid Jake Valletta “What does this application do?” is a question that analysts often ask themselves when performing ...
Don't Phish Me, Bro- A Behavior Science Architecture for Stopping Phishing Attacks Katrina Rodzon N/A
Lessons From Training Ninjas W. owen Redwood In Spring 2013 at FSU I created from scratch and taught a graduate course on ...
Creating a Successful Security Awareness Architecture Katrina Rodzon N/A
Crypto For Hackers G. Mark Hardy , Bob Weiss Crypto for Hackers is a two-hour workshop that delivers a broad overview of Crypto topics ...
Snort Rules Alex Kirk Alex will provide a course in Snort rules writing best practices, and help answer questions ...
Detecting Reconnaissance in Bro IDS Liam Randall TTP's & IOCs in Bro IDS Classically intrusion detection systems have either been categorized as ...
Organizing Security Intelligence for Effective Detection David J. Bianco This is a great time to be in the detection field! More and more organizations ...