fbpx Skip to main content

Red Team

2023

Don’t take me seriously.

Jeremy Bauer

KEYNOTE: Cameras.ICU

Jonathan Tomek & Cory Kujawski

Needle in the Hay: A Guide to Discovering Plaintext Credentials in Enterprise Environments

Ben Burkhart

ATT&CKing Unicorns

Matthew Lange & Gary Lobermier

Defender Advanced Threat Hunting: More than meets the Eye

Michael "Shecky" Kavka

A Hole In The Boat – How APIs Threaten Everything

Richard Bird

A World Without Passwords

Andy Jaw

Dragons Can Fly

Joe Cicero

A “Brazillian” Different Kinds of Malware and Why Your Organization Should Care

Jared Peck

GUR RIBYHGVBA BS PELCGBTENCUL

Mr. Jeff Man

The Call’s Coming from Inside the House: Authentication Proxy Attacks: Detection, Response and Hunting

Chris Merkel

The importance of team-based cybersecurity tournaments

Andrew Paullin

Offensive Security & The Evolution of Attack Path Management

Joe Mondloch

Hacking and Defending APIs

Robert Wagner

Hunting Before Day Zero

Ryan LaBouve

Achieving a Threat-Informed Defense with MITRE ATT&CK

Ben Opel

No Longer a No-Go: How to Safely Scan OT Devices in Critical Environments

Chris Kirsch

Learning to Manipulate Safe Dials

Dustin Heywood (Evil_Mog)

Are they human or scripts? The level of human involvement behind RDP brute-force attacks

Andréanne Bergeron, Ph.D

Exposing the Threat: Uncovering the Hidden Risks to Your Cable Modem Security

Daniel Walters

Voiding your warranty, a wireless journey.

Eric Escobar

Command & Control: Malware Deobfuscation via Phishing

Robert Lerner

Hot or Not: Offensive Attacks!

Travis Kaun

SQL Injection: A history’ OR 1=1; —

Will McCardell

Patch? We can’t patch! An Introduction to OT/ICS Systems

Luciano Moretti

Secret Handshake: A Mutual TLS Based C2 Communication Channel

John Conwell

Watching the Watchers – Analyzing URL Scanning Solutions at Scale

Nicholas Anastasi

Security Does Not Need To Be Fun: Ignoring OWASP To Have A Terrible Time

Dwayne McDaniel

AI for Red Team and Malware Development

Kirk Trychel

Evading EDR by DLL sideloading with C#

Gary Lobermier

You’ve Got Mail (and Misdirected Funds): A Demo of Business Email Compromise

Drew Hjelm

Physical Penetration Testing – Tales From Our Real-life Engagements

Ryan Zagrodnik & Chad Finkenbiner

Extra description