1 |
 |
The Penetration Testing Execution Standard (Ptes) Panel - Derbycon 2011 |
11 years, 11 months |
Netinfinity |
penetration testing, standard, derbycon 2011, security, execution |
4868 |
2 |
2 |
 |
The Details Don’T Matter - Derbycon 2011 |
11 years, 11 months |
Netinfinity |
IT, security, derbycon 2011, business, community, firewall |
3998 |
None |
3 |
 |
Compliance: An Assault On Reason - Derbycon 2011 |
11 years, 11 months |
Netinfinity |
derbycon 2011, compilance, PCI, HIPPA, SOX, ISO, FISMA, GLBA, audit, assessments, code, review, security, testing, application |
4953 |
None |
4 |
 |
Hook, Line And Syncer: The Liar For Hire’S Ultimate Tacklebox - Derbycon 2011 |
11 years, 11 months |
Netinfinity |
derbycon 2011, presentation, exploration, tools, social engineering, security |
4009 |
None |
5 |
 |
Jason Scott’S Shareware Calvacade - Derbycon 2011 |
11 years, 11 months |
Netinfinity |
derbycon 2011, shareware, data, software, security, hacking, discs |
3937 |
None |
6 |
 |
Atlas – Sploit Me If You Can - Derbycon 2011 |
11 years, 11 months |
Netinfinity |
derbycon 2011, programming, reversing, randomization, vftsable, security |
4345 |
None |
7 |
 |
Mining Sensitive Information From Images Using Command-Line Ocr - Derbycon 2011 |
11 years, 11 months |
Netinfinity |
derbycon 2011, command-line, OCR, programming, tools, security, strings |
4391 |
None |
8 |
 |
Beat To 1337: Creating A Successful University Cyber Defense Organization - Derbycon 2011 |
11 years, 11 months |
Netinfinity |
derbycon 2011, information, security, knowledge, technical, organization, students, competitions |
4490 |
1 |
9 |
 |
Paul Asadoorian And John Strand:Offensive Countermeasures: Still Trying To Bring Sexy Back - Derbycon 2011 |
11 years, 11 months |
Netinfinity |
derbycon 2011, offensive, security, countermeasures, attacker, hacking, penetration testers, box |
4289 |
None |
10 |
 |
When Fuzzers Miss: The No Hanging Fruit - Derbycon 2011 |
11 years, 11 months |
Netinfinity |
derbycon 2011, fuzzing, vulnerablity, discovery, memory, security, code fuzzers |
4250 |
None |
11 |
 |
You’Re Going To Need A Bigger Shovel: A Critical Look At Software Security Assurance - Derbycon 2011 |
11 years, 11 months |
Netinfinity |
derbycon 2011, OWASP, software, security, organization, strategy |
3685 |
None |
12 |
 |
Osint Beyond The Basics - Derbycon 2011 |
11 years, 11 months |
Netinfinity |
derbycon 2011, OSINT, community, infosec, security, networks, storage, information |
5150 |
1 |
13 |
 |
Anti-Forensics For The Louise - Derbycon 2011 |
11 years, 11 months |
Netinfinity |
derbycon 2011, security, anti-forensic, techniques, forensic, hacking |
5089 |
None |
14 |
 |
Tomorrow You Can Patch That 0day: But Your Users Will Still Get You P0wn3d - Derbycon 2011 |
11 years, 11 months |
Netinfinity |
derbycon 2011, patch, 0day, vulnerability, networks, corporations, research, linux, debian |
4368 |
None |
15 |
 |
Data Mining For (Neuro) Hackers - Derbycon 2011 |
11 years, 11 months |
Netinfinity |
derbycon 2011, hackers, data, mining, track, security, collect, biomining |
4750 |
None |
16 |
 |
Collecting Underpants To Win Your Network - Derbycon 2011 |
11 years, 11 months |
Netinfinity |
derbycon 2011, packets, network, security, sniffing, metasploit, traffic, information, hacking |
4193 |
1 |
17 |
 |
Infectious Media – Bypassing Autorun Once And For All - Derbycon 2011 |
11 years, 11 months |
Netinfinity |
derbycon 2011, bypass, autorun, hasking, binaries, windows, hex, conversion, execute, emulation, kexboard, drivers |
3944 |
None |
18 |
 |
Desktop Betrayal: Exploiting Clients Through The Features They Demand - Derbycon 2011 |
11 years, 11 months |
Netinfinity |
derbycon 2011, javascript, HTML5, pdf, files, firefox, BeFF, metasploit, attack, hacking, security |
5074 |
None |