1 |
 |
Anti-Forensics: Occult Computing Adrian Crenshaw-Aide 2012 |
11 years |
oncee |
AIDE 2012, Irongeek, Anti-forensics, Digital Forensics, data carving, disk wiping, encryption, steganography, timestamps, clearing logs |
3271 |
None |
2 |
 |
Out Of Character: Use Of Punycode And Homoglyph Attacks To Obfuscate Urls For Phishing Adrian Crenshaw- Aide 2012 |
11 years |
oncee |
Punycode and Homoglyph Attacks, phishing attack, AIDE 2012, Marshall University, Marshall University Forensic Science Center |
2869 |
None |
3 |
 |
An Introduction To Traffic Analysis: A Pragmatic Approach Jon Schipp-Aide 2012 |
11 years |
oncee |
AIDE 2012, Jon Schipp, network tools, Marshall University, Marshall University Forensic Science Center |
2984 |
None |
4 |
 |
Breaking Into Security Frank J. Hackett And Justin Brown-Aide 2012 |
11 years |
oncee |
mentoring, r00kie, AIDE 2012, Marshall University, Breaking into Security, Marshall University Forensic Science Center |
2812 |
None |
5 |
 |
Sabu The Hacker: The Capture, The Crimes, The Damage Done, The Slip, The Apprehension, And The Fallout. Dr. Marcus Rogers Jill Mcintyre Boris Sverdlik Ronald Layton, U.S. Secret Service-Aide 2012 |
11 years |
oncee |
Sabu, Lulzsec, anon, AIDE 2012, Marshall University Forensic Science Center, Marshall University, FBI |
2695 |
None |
6 |
 |
Bnat Hijacking: Repairing Broken Communication Channels Jonathan Claudius-Aide 2012 |
11 years |
oncee |
bnat, metasploit, routing, layer 3 loop, AIDE 2012, Marshall University, Marshall University Forensic Science Center |
2910 |
None |
7 |
 |
Setting Up Backtrack And Automating Various Tasks With Bash Scripts- Lee Baird-Aide 2012 |
11 years |
oncee |
BackTrack, bash, scripting, automation, Marshall University, AIDE 2012, Marshall University Forensic Science Center |
4532 |
None |
8 |
 |
Going On The Offensive - Proactive Measures In Securing Your Company Dave Kennedy-Aide 2012 |
11 years |
oncee |
Dave Kennedy, AIDE 2012, Marshall University, SET, Marshall University Forensic Science Center |
3084 |
None |