1 |
|
The Penetration Testing Execution Standard (Ptes) Panel - Derbycon 2011 |
12 years, 7 months |
Netinfinity |
penetration testing, standard, derbycon 2011, security, execution |
5235 |
2 |
2 |
|
The Details Don’T Matter - Derbycon 2011 |
12 years, 7 months |
Netinfinity |
IT, security, derbycon 2011, business, community, firewall |
4364 |
None |
3 |
|
Compliance: An Assault On Reason - Derbycon 2011 |
12 years, 7 months |
Netinfinity |
derbycon 2011, compilance, PCI, HIPPA, SOX, ISO, FISMA, GLBA, audit, assessments, code, review, security, testing, application |
5339 |
None |
4 |
|
Hook, Line And Syncer: The Liar For Hire’S Ultimate Tacklebox - Derbycon 2011 |
12 years, 7 months |
Netinfinity |
derbycon 2011, presentation, exploration, tools, social engineering, security |
4362 |
None |
5 |
|
Jason Scott’S Shareware Calvacade - Derbycon 2011 |
12 years, 7 months |
Netinfinity |
derbycon 2011, shareware, data, software, security, hacking, discs |
4296 |
None |
6 |
|
Atlas – Sploit Me If You Can - Derbycon 2011 |
12 years, 7 months |
Netinfinity |
derbycon 2011, programming, reversing, randomization, vftsable, security |
4719 |
None |
7 |
|
Mining Sensitive Information From Images Using Command-Line Ocr - Derbycon 2011 |
12 years, 7 months |
Netinfinity |
derbycon 2011, command-line, OCR, programming, tools, security, strings |
4751 |
None |
8 |
|
Beat To 1337: Creating A Successful University Cyber Defense Organization - Derbycon 2011 |
12 years, 7 months |
Netinfinity |
derbycon 2011, information, security, knowledge, technical, organization, students, competitions |
4849 |
1 |
9 |
|
Paul Asadoorian And John Strand:Offensive Countermeasures: Still Trying To Bring Sexy Back - Derbycon 2011 |
12 years, 7 months |
Netinfinity |
derbycon 2011, offensive, security, countermeasures, attacker, hacking, penetration testers, box |
4643 |
None |
10 |
|
When Fuzzers Miss: The No Hanging Fruit - Derbycon 2011 |
12 years, 7 months |
Netinfinity |
derbycon 2011, fuzzing, vulnerablity, discovery, memory, security, code fuzzers |
4596 |
None |
11 |
|
You’Re Going To Need A Bigger Shovel: A Critical Look At Software Security Assurance - Derbycon 2011 |
12 years, 7 months |
Netinfinity |
derbycon 2011, OWASP, software, security, organization, strategy |
4039 |
None |
12 |
|
Osint Beyond The Basics - Derbycon 2011 |
12 years, 7 months |
Netinfinity |
derbycon 2011, OSINT, community, infosec, security, networks, storage, information |
5534 |
1 |
13 |
|
Anti-Forensics For The Louise - Derbycon 2011 |
12 years, 7 months |
Netinfinity |
derbycon 2011, security, anti-forensic, techniques, forensic, hacking |
5477 |
None |
14 |
|
Tomorrow You Can Patch That 0day: But Your Users Will Still Get You P0wn3d - Derbycon 2011 |
12 years, 7 months |
Netinfinity |
derbycon 2011, patch, 0day, vulnerability, networks, corporations, research, linux, debian |
4754 |
None |
15 |
|
Data Mining For (Neuro) Hackers - Derbycon 2011 |
12 years, 7 months |
Netinfinity |
derbycon 2011, hackers, data, mining, track, security, collect, biomining |
5134 |
None |
16 |
|
Collecting Underpants To Win Your Network - Derbycon 2011 |
12 years, 7 months |
Netinfinity |
derbycon 2011, packets, network, security, sniffing, metasploit, traffic, information, hacking |
4587 |
1 |
17 |
|
Infectious Media – Bypassing Autorun Once And For All - Derbycon 2011 |
12 years, 7 months |
Netinfinity |
derbycon 2011, bypass, autorun, hasking, binaries, windows, hex, conversion, execute, emulation, kexboard, drivers |
4312 |
None |
18 |
|
Desktop Betrayal: Exploiting Clients Through The Features They Demand - Derbycon 2011 |
12 years, 7 months |
Netinfinity |
derbycon 2011, javascript, HTML5, pdf, files, firefox, BeFF, metasploit, attack, hacking, security |
5455 |
None |