fbpx Skip to main content

Forensics

2023

KEYNOTE: Cameras.ICU

Jonathan Tomek & Cory Kujawski

Needle in the Hay: A Guide to Discovering Plaintext Credentials in Enterprise Environments

Ben Burkhart

ATT&CKing Unicorns

Matthew Lange & Gary Lobermier

Defender Advanced Threat Hunting: More than meets the Eye

Michael "Shecky" Kavka

A “Brazillian” Different Kinds of Malware and Why Your Organization Should Care

Jared Peck

GUR RIBYHGVBA BS PELCGBTENCUL

Mr. Jeff Man

The Call’s Coming from Inside the House: Authentication Proxy Attacks: Detection, Response and Hunting

Chris Merkel

Offensive Security & The Evolution of Attack Path Management

Joe Mondloch

How to save your SOC and what can you (or I) do to help?

Peter Wlodarczyk

Hacking and Defending APIs

Robert Wagner

Hunting Before Day Zero

Ryan LaBouve

Achieving a Threat-Informed Defense with MITRE ATT&CK

Ben Opel

No Longer a No-Go: How to Safely Scan OT Devices in Critical Environments

Chris Kirsch

Learning to Manipulate Safe Dials

Dustin Heywood (Evil_Mog)

Exposing the Threat: Uncovering the Hidden Risks to Your Cable Modem Security

Daniel Walters

Voiding your warranty, a wireless journey.

Eric Escobar

Command & Control: Malware Deobfuscation via Phishing

Robert Lerner

How The Sausage is REALLY Made: CloudOps for Red Teamers

John Ventura

Hot or Not: Offensive Attacks!

Travis Kaun

SQL Injection: A history’ OR 1=1; —

Will McCardell

Patch? We can’t patch! An Introduction to OT/ICS Systems

Luciano Moretti

Secret Handshake: A Mutual TLS Based C2 Communication Channel

John Conwell

Watching the Watchers – Analyzing URL Scanning Solutions at Scale

Nicholas Anastasi

Defending Beyond Defense

Catherine Ullman

AI for Red Team and Malware Development

Kirk Trychel

Evading EDR by DLL sideloading with C#

Gary Lobermier

You’ve Got Mail (and Misdirected Funds): A Demo of Business Email Compromise

Drew Hjelm

PCI DSS v4.0 Is Here – Now What?

Kyle Hinterberg

What’s Right in Cybersecurity

Matteo Rebeschini

Extra description