Index of /Conferences/BSidesLV_2016

      Name                                                                                                              Last modified      Size  Description
Parent Directory - You_Don't_See_Me_-_Abusing_Whitelists_to_Hide_and_Run_Malware/ 2019-09-13 16:52 - Why_It's_All_Snake_Oil_-_and_That_May_Be_Ok/ 2019-09-13 16:39 - Why_Does_Everyone_Want_to_Kill_My_Passwords/ 2019-09-13 16:16 - What_We've_Learned_with_Two-Secret_Key_Derivation/ 2019-09-13 15:21 - What's_Up_Argon2_The_Password_Hashing_Winner_A_Year_Later/ 2019-09-13 14:38 - Welcome_to_The_World_of_Yesterday_Tomorrow/ 2019-09-13 14:35 - Toward_Better_Password_Requirements/ 2019-09-13 13:30 - The_Future_of_Bsides/ 2019-09-13 12:21 - The_Emerging_Threats_Posed_by_Augmented_Reality_Gaming/ 2019-09-13 11:24 - The_Deal_with_Password_Alternatives/ 2019-09-13 10:08 - There_is_No_Security_without_Privacy/ 2019-09-13 08:55 - Survey_Says_Making_Progress_in_the_Vulnerability_Disclosure/ 2019-09-13 08:38 - Stop_the_Insanity_and_Improve_Humanity_UX_for_the_Win/ 2019-09-13 06:57 - State_Of_Automotive_Cyber_Safety/ 2019-09-13 06:54 - Six_Degrees_of_Domain_Admin_-_Using_BloodHound_to_Automate_Active_Directory_Domain_Privilege_Escalation_Analysis/ 2019-09-13 06:45 - Shall_We_Play_a_Game_30_Years_of_the_CFAA/ 2019-09-13 05:46 - Security_Vulnerabilities_the_Current_State_of_Consumer_Protection_Law_and_How_IOT_Might_Change_It/ 2019-09-13 04:00 - Scalability_Not_as_Easy_as_it_SIEMs/ 2019-09-13 03:47 - Rock_Salt_A_Method_for_Securely_Storing_and_Utilizing_Password_Validation_Data/ 2019-09-13 03:43 - QUESTIONING_42_Where_is_the_Engineering_in_the_Social_Engineering_of_Namespace_Compromises/ 2019-09-13 02:51 - Pushing_Security_from_the_Outside/ 2019-09-13 02:12 - Proactive_Password_Leak_Processing/ 2019-09-13 01:58 - PLC_for_Home_Automation_and_How_It_Is_as_Hackable_as_a_Honeypot/ 2019-09-13 00:47 - Passphrases_for_Humans_A_Cultural_Approach_to_Passphrase_Wordlist_Generation/ 2019-09-13 00:39 - Panel_Progress_On_Cyber_Safety/ 2019-09-12 23:31 - PAL_is_your_PAL_Bootstrapping_Secrets_in_Docker/ 2019-09-12 23:24 - Operation_Escalation_How_Commodity_Programs_Are_Evolving_Into_Advanced_Threats/ 2019-09-12 22:29 - Opening_Keynote_Pt._I_and_II/ 2019-09-12 21:34 - One_Compromise_to_Rule_Them_All/ 2019-09-12 21:27 - No_Silver_Bullet_Multi_Contextual_Threat_Detection_via_Machine_Learning/ 2019-09-12 20:27 - Network_Access_Control_The_Company-Wide_Team_Building_Exercise_That_Only_You_Know_About/ 2019-09-12 20:00 - Modeling_Password_Creation_Habits_with_Probabilistic_Context_Free_Grammars/ 2019-09-12 19:46 - Mapping_the_Human_Attack_Surface/ 2019-09-12 18:42 - Latest_Evasion_Techniques_In_File-less_Malware/ 2019-09-12 18:27 - Labeling_the_VirusShare_Corpus_Lessons_Learned/ 2019-09-12 18:13 - I_Love_My_BFF_(Brute_Force_Framework)/ 2019-09-12 18:08 - Is_That_a_Penguin_in_My_Windows/ 2019-09-12 17:41 - Intro_to_Storage_Security_Looking_Past_the_Server/ 2019-09-12 16:52 - IATC_I_Am_The_Cavalry_Introduction_and_Overview/ 2019-09-12 16:39 - IATC_Day_2_Uncomfortable_Truths_Part_Two/ 2019-09-12 16:35 - IATC_Day_2_Uncomfortable_Solutions/ 2019-09-12 16:13 - IATC_Day_2_I_Am_The_Cavalry_Uncomfortable_Truths/ 2019-09-12 16:06 - Hunting_on_the_Endpoint_with_Powershell/ 2019-09-12 16:04 - Hunting_High-Value_Targets_in_Corporate_Networks/ 2019-09-12 15:32 - How_to_Travel_to_High-Risk_Destinations_as_Safely_as_Possible/ 2019-09-12 14:44 - How_to_Make_Sure_Your_Data_Science_Isn't_Vulnerable_to_Attack/ 2019-09-12 14:01 - How_to_Get_and_Maintain_your_Compliance_without_Ticking_Everyone_Off/ 2019-09-12 13:26 - Hacking_Megatouch_Bartop_Games/ 2019-09-12 13:14 - Ground_Truth_Keynote_Great_Disasters_of_Machine_Learning/ 2019-09-12 12:35 - Flaying_out_the_Blockchain_Ledger_for_Fun_Profit_and_Hip_Hop/ 2019-09-12 12:17 - Exposing_the_Angler_EK_All_The_Naughty_Bits/ 2019-09-12 11:49 - Evaluating_a_Password_Manager/ 2019-09-12 11:39 - Ethical_Implications_of_In-Home_Robots/ 2019-09-12 11:03 - DYODE_Do_Your_Own_DiodE_for_Industrial_Control_Systems/ 2019-09-12 10:37 - Don't_Repeat_Yourself_Automating_Malware_Incident_Response_for_Fun_and_Profit/ 2019-09-12 10:32 - Dominating_the_DBIR_Data/ 2019-09-12 09:58 - Domains_of_Grays/ 2019-09-12 09:25 - DNS_Hardening_-_Proactive_Network_Security_Using_F5_iRules_and_Open_Source_Analysis_Tools/ 2019-09-12 04:55 - Disclosing_Passwords_Hashing_Policies/ 2019-09-12 04:40 - Digging_into_SIEM_Alerts_with_Visual_Graph_Analytics/ 2019-09-12 04:04 - Determining_Normal_Baselining_with_Security_Log_and_Event_Data/ 2019-09-12 04:01 - Defeating_Machine_Learning_Systemic_Deficiencies_for_Detecting_Malware/ 2019-09-12 03:34 - Deep_Adversarial_Architectures_for_Detecting_(and_Generating)_Maliciousness/ 2019-09-12 03:08 - Data_Science_or_Data_Pseudo-Science_Applying_Data_Science_Concepts_to_Info_Sec_without_a_PhD/ 2019-09-12 03:01 - CyPSA_Cyber_Physical_Situational_Awareness/ 2019-09-12 02:54 - Cyber_Safety_Medical_Devices_and_Healthcare/ 2019-09-12 02:33 - Cyber_Safety_And_Public_Policy/ 2019-09-12 02:23 - Cruise_Line_Security_Assessment_OR_Hacking_the_High_Seas/ 2019-09-12 02:14 - Cross-platform_Compatibility_Bringing_InfoSec_Skills_into_the_World_of_Computational_Biology/ 2019-09-12 02:09 - Crafting_Tailored_Wordlists_with_Wordsmith/ 2019-09-12 01:36 - CFPs_101/ 2019-09-12 00:40 - Calling_All_Hacker_Heroes_Go_Above_And_Beyond/ 2019-09-12 00:14 - Building_an_EmPyre_with_Python/ 2019-09-12 00:09 - Breaking_the_Payment_Points_of_Interaction_(POI)/ 2019-09-11 23:12 - Beyond_the_Tip_of_the_IceBerg_-_Fuzzing_Binary_Protocol_for_Deeper_Code_Coverage/ 2019-09-11 22:15 - A_Noobs_Intro_Into_Biohacking_Grinding_DIY_Body_Augmentation/ 2019-09-11 21:28 - Automation_Plumbing/ 2019-09-11 21:15 - Automation_of_Penetration_Testing_and_the_future/ 2019-09-11 21:01 - Automating_Security_with_the_OWASP_Assimilation_Project/ 2019-09-11 20:48 - Automated_Dorking_for_Fun_and_PrwSalary/ 2019-09-11 20:41 - Are_You_a_PenTexter_-_Open-Sourcing_Pentest_Reporting_and_Automation/ 2019-09-11 20:33 - An_Evolving_Era_of_Botnet_Empires/ 2019-09-11 19:44 -