Information of news
  • Views: 67
  • Author: downeb
  • Date: 2-12-2012, 03:47
 (Votes #: 0)

DerbyCon Hacking Conference 2012 (Day 1-3) Training

Category: Tutorial

Download Now

DerbyCon Hacking Conference 2012 (Day 1-3) Training

DerbyCon Hacking Conference 2012 (Day 1-3)
English | MP4 | 640x360 | h264, yuv420p, 25.00 fps(r) | aac, 44100 Hz, stereo | 22.53 GB
Genre: eLearning

Hope you enjoyed the con! Here are the videos from Derbycon 2012. We had a few recording SNAFUs, but all in all it went very well.

Day 1-
Opening Ceremony
HD Moore - The Wild West
Dan Kaminsky - Black Ops
Mudge - Cyber Fast Track; from the trenches
Jayson E. Street - Securing the Internet You're doing it wrong (An INFOSEC Intervention)
Rob Fuller Chris Gates - Dirty Little Secrets Part 2
Ian Amit - SexyDefense - the red team tore you a new one. Now what
Carlos Perez - DNS Reconnaissance
Jason Scott - Rescuing The Prince of Persia from the sands of time
Chris Hadnagy - Nonverbal Human Hacking
egyp7 - Privilege Escalation with the Metasploit Framework
Sam Gaudet Pentesting for non-pentesters... through virtual machines
Dave Marcus - 2FA-Enabled Fraud Dissecting Operation High Roller
Rick Farina The Hacker Ethos meets the FOSS ethos
Larry Pesce Darren Wigley - Hacking Survival So. You want to compute post-apocalypse
Ryan Linn - Collecting Underpants To Win Your Network
Rafal Los - House of Cards
Brent Huston - Info overload..Future shock.. IBM & nature of modern crime
James Arlen - Doubt - Deceit -Deficiency and Decency - a Decade of Disillusionment
Jerry Gamblin is it time for another firewall or a security awareness program

Day 2
Skip Duckwall Chris Campbell - Puff Puff Pass - Getting the most out of your hash
Jordan Harbinger - Social Engineering Defense Contractors on LinkedIn and Facebook Who's plugged into your employees
Random Shit Paul Is Going To Talk About
Zack Fasel - Pwned in 60 Seconds -From Network Guest to Windows Domain Admin
Ryan Elkins - Simple Security Defense to thwart an Army of Cyber Ninja Warriors
atlas RfCat-subghz or bust
Georgia Weidman - Introducing the Smartphone Pentest Framework
Gillis Jones - The Badmin Project
Kyle (kos) Osborn - Physical Drive-By Downloads
Johnny Long - The Evolution of HFC
Dual Core (int0x80) - Moar Anti-Forensics - Moar Louise
Bruce Potter - Security Epistemology Beliefs - Truth - and Knowledge in the Infosec Community
Josh More - Pen Testing Security Vendors
Jason Gunnoe & Chris Centore -Building the next generation IDS with OSINT
Babak Javadi Keith Howell 4140 Ways your alarm system can fail
Bart Hopper - Hunting Evil
Doug Burks - Security Onion - Network Security monitoring in minutes
Michael Schearer - Flex your right constituion and political activism in the hacker community
Eric Smith Chris Gates - Penetration testing from a Hot Tub Time Machine
Chris Nickerson (ind303) - Tactical Surveillance Look at me now!
Jamie Murdock - How to create a one man SOC
Branden Miller Bill Gardner - Building an Awareness and training program
Dan Crowley Chris Vinecombe - Vulnerability Spidey Sense
Nathaniel Husted - Everything you always wanted to know about Security Academia But were too afraid too ask
Bill Sempf - What locksport can teach us about security
JP Dunning The Glitch hardware with hacking made easy
Christopher Domas - The future of RE Dynamic Binary Visualization
Tom Eston Kevin Johnson - Social Zombies Rise of the Mobile Dead
KC. Yerrid Matt Jezorek Boris Sverdlik - It's not your perimenter. It's you
Deral Heiland -Format String Vulnerabilities 101
Jack Daniel - How screwed are we
Kellep Charles Security Vulnerablity Assessments. - Process and best practices
John Woods - So you got yourself an infosec manager job. Now what
8 Personal DarkNets - KC Holland
Tony DeLaGrange Jason Wood SH5ARK ATTACK- taking a byte out of HTML5!

Day 3
Matthew Sullivan Cookie Cadger - taking cookie hijacking to a new level
Steven Haywood - Introduction to Metasploit Post Exploitation Modules
Noah Beddome The devils in the Details-A look at bad SE and how to do better
Jay James & Shane MacDougall Usine McAfee secure trustguard as attack tools
Deviant & Roamer - Android Phone Rooting
Laszlo Toth & Ferenc Spala Think differently about database hacking
Closing Ceremonies Part 1
Closing Ceremonies Part 2
Matt Weeks Ambush- Catching Intruders at Any Point
Matt Presson Building a database security program
Patrick Tatro Why isn't everyone pulling security- this is combat
Mick Douglas - Sprinkler IR
Joshua Marpet separating security intelligence from security FUD
Raphael Mudge
Nicolle Neulist Write your own tools with python
Chris Jenks Intro to Linux system hardening
Jason Frisvold Taming stuxnet-using the cloud to automate baseline scanning
Matthew Perry Current trends in computer law
Steve Werby & Randy Todd Building dictionaries and destroying hashes w amazon EC2
David Schuetz (Darth Null) - Slow down cowpoke - When enthusiasm outpaces common sense
David McGuire Maturing the Pen Testing Professional
Eric Milam Becoming Mallory
JP Dunning & Chris Silvers Wielding Katana- A live security suite

DerbyCon Hacking Conference 2012 (Day 1-3) Training

With a Premium account you can download files having Fullspeed !

Lumfile Links

Ryushare Links

Uploaded Links
Direct Download

Tags: DerbyCon, Hacking, Conference, Training

DerbyCon Hacking Conference 2012 (Day 1-3) Training Fast Download via Rapidshare Hotfile Fileserve Filesonic Megaupload, DerbyCon Hacking Conference 2012 (Day 1-3) Training Torrents and Emule Download or anything related.
Dear visitor, you went to website as unregistered user.
We encourage you to Register or Login to website under your name.

Add comments

Enter Code: *