ShmooCon 2020
Video Item Preview
Share or Embed This Item
- Topics
- shmoocon, conference, shmoo, moose, hacker, computer, security, hacker, computer security, conference
- Language
- English
- Item Size
- 160272718812
The videos in this collection are from ShmooCon 2020, which occurred on 31 January - 02 February 2020, at the Washington Hilton Hotel. For more information about ShmooCon please visit https://www.shmoocon.org. Please note that the videos listed with [R] next to them were removed (or not recorded) at the request of the presenter.
Friday, January 31, 2020:
- Opening Remarks, Rumblings, Ruminations, and Rants
- Samantha Livingston - "Moose v. Woodchuck"
- Sam Teplov - "Reverse Engineering Apple’s BLE Continuity Protocol for Tracking, OS Fingerprinting, and Behavioral Profiling"
- Cathy Gellis - "Think of the Kitten: The Truth About Section 230, the Law All the Cute Online Cat Pictures (And a Lot of Other Good Stuff) Depends On"
- Jonathan Leitschuh - "Zoom 0-Day: How Not to Handle a Vulnerability Report"
- Kelley Robinson - "What if We Had TLS for Phone Numbers? An Introduction to SHAKEN/STIR"
- Brittany Postnikoff - "Robots and Privacy"
Firetalks:
- Firetalks Opening
- Shannon McHale - "Cybersecurity Clubs and You"
- Billy Trobbiani - "Flipping Bits on NSRL"
- Christine Giglio - "Using Abusing the Freedom of Information Act"
- Jesson Soto Ventura - "Using Android WebViews to Steal All the Files"
- Roy Iversen and Tarah Wheeler - "Do Unto Others: A Red Team Ethical Framework for Offensive Rules Of Engagement"
- James Troutman - "DNS New World Order: QuadX! DoH! DoT! Da Fuq?"
- Firetalks Closing
Saturday, February 01, 2020:
- Chris Lyne and Nick Miles - "Extracting an ELF From an ESP32"
- Ashlee Benge and Zack Allen - "Battling Supermutants in the Phishing Wasteland"
- Roger Piqueras Jover - "5G Protocol Vulnerabilities and Exploits"
- Zac Franken - "Adventures in Hardware Hacking or Building Expensive Tools on a Budget"
- Mark Manning - "Command and KubeCTL: Real-World Kubernetes Security for Pentesters"
- Jen Ellis, Nick Leiserson, Leonard Bailey, and Kurt Opsahl - "The Hacker’s Guide to Cybersecurity Policy in 2020"
- Tony Lambert - "Whitelisting LD_PRELOAD for Fun and No Profit"
- Olivia Stella - "Airplane Mode: Cybersecurity @ 30,000+ Feet"
- J. Zhanna Malekos Smith, J.D. - "The Cyberlous Mrs. Maisel: A Comedic (And Slightly Terrifying) Introduction to Information Warfare"
- Noelle Garrett - "Privacy Scores for iOS Apps"
- Wendy Knox Everette - "Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Review Process From the Ground Up"
- Heather Smith - "Choose Your Own Adventure: Ransomware Response!"
- Zach Pahle - "Chip Decapping on a Budget"
- Russell Mosley and Samantha Mosely - "Teen Hacks for Obfuscating Identity on Social Media"
- Ken Pyle - "Cisco SMB Products — Critical Vulnerablities / 0-day Release"
- Austin Ralls - "Banjo: An Android Disassembler for Binary Ninja"
[R] - Antonio Gomez - "Software Mitigations for Hardware Vulnerabilities"
- Katie Nickels - "Resistance Isn’t Futile: A Practical Approach to Prioritizing Defenses with Threat Modeling"
- Josh Kamdjou - "Voight-Kampff for Email Addresses: Quantifying Email Address Reputation to Identify Spear-Phishing and Fraud"
- Audie and Josh Corman - "SBOM: Screw it, We’ll Do it Live!"
- Elizabeth Wharton and Suchi Pahi - "Face/Off: Action Plan for Perils & Privileges of Facial Recognition"
[R] - Krassimir Tzvetanov - "Security Researcher OPSEC"
- Rae Baker - "Using OSINT for Human Rights and Victim Support"
- The Shmoo Group - 0wn the Con
- Alissa Gilbert - "Anti-Forensics for Fun and Privacy"
- Casey Ellis, Tod Beardsley, Kimber Dowsett, Jack Cable, and Amelie Koran (moderator) - "Hacking Democracy: On Securing an Election"
Sunday, February 02, 2020:
- Russell Handorf - "A Wireless Journeyman’s Experience in Practical SIGINT"
- Xena Olsen - "Adversary Detection Pipelines: Finally Making Your Threat Intel Useful"
- Kurt Opsahl and Bill Budington - "Crossing the Border With Your Electronic Devices"
- Mark Griffin - "Knowing the UnFuzzed and Finding Bugs with Coverage Analysis"
- Mark Loveless - "Real World Zero Trust Implementation"
- Chaim Sanders - "Playing the Short Game: The Effects of Data Breaches on Share Prices"
- Katie Liszewski - "The Verilog to Verilog Decompiler"
- Jonathan Protzenko and Nikhil Swamy - "Project Everest: Fast, Correct, and Secure Software for Deployment Now!"
- Yacko, Wacko, and Dot - "Hack the Stars"
- Kiersten Todt, Matt Blaze, Beetle, and Bruce Potter (interviewer) - "Between Two Moose"
- Closing Remarks
----
--> Oodles of thanks to Archive for helping us keep these videos available and free!!
- Squidly1
Friday, January 31, 2020:
- Opening Remarks, Rumblings, Ruminations, and Rants
- Samantha Livingston - "Moose v. Woodchuck"
- Sam Teplov - "Reverse Engineering Apple’s BLE Continuity Protocol for Tracking, OS Fingerprinting, and Behavioral Profiling"
- Cathy Gellis - "Think of the Kitten: The Truth About Section 230, the Law All the Cute Online Cat Pictures (And a Lot of Other Good Stuff) Depends On"
- Jonathan Leitschuh - "Zoom 0-Day: How Not to Handle a Vulnerability Report"
- Kelley Robinson - "What if We Had TLS for Phone Numbers? An Introduction to SHAKEN/STIR"
- Brittany Postnikoff - "Robots and Privacy"
Firetalks:
- Firetalks Opening
- Shannon McHale - "Cybersecurity Clubs and You"
- Billy Trobbiani - "Flipping Bits on NSRL"
- Christine Giglio - "Using Abusing the Freedom of Information Act"
- Jesson Soto Ventura - "Using Android WebViews to Steal All the Files"
- Roy Iversen and Tarah Wheeler - "Do Unto Others: A Red Team Ethical Framework for Offensive Rules Of Engagement"
- James Troutman - "DNS New World Order: QuadX! DoH! DoT! Da Fuq?"
- Firetalks Closing
Saturday, February 01, 2020:
- Chris Lyne and Nick Miles - "Extracting an ELF From an ESP32"
- Ashlee Benge and Zack Allen - "Battling Supermutants in the Phishing Wasteland"
- Roger Piqueras Jover - "5G Protocol Vulnerabilities and Exploits"
- Zac Franken - "Adventures in Hardware Hacking or Building Expensive Tools on a Budget"
- Mark Manning - "Command and KubeCTL: Real-World Kubernetes Security for Pentesters"
- Jen Ellis, Nick Leiserson, Leonard Bailey, and Kurt Opsahl - "The Hacker’s Guide to Cybersecurity Policy in 2020"
- Tony Lambert - "Whitelisting LD_PRELOAD for Fun and No Profit"
- Olivia Stella - "Airplane Mode: Cybersecurity @ 30,000+ Feet"
- J. Zhanna Malekos Smith, J.D. - "The Cyberlous Mrs. Maisel: A Comedic (And Slightly Terrifying) Introduction to Information Warfare"
- Noelle Garrett - "Privacy Scores for iOS Apps"
- Wendy Knox Everette - "Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Review Process From the Ground Up"
- Heather Smith - "Choose Your Own Adventure: Ransomware Response!"
- Zach Pahle - "Chip Decapping on a Budget"
- Russell Mosley and Samantha Mosely - "Teen Hacks for Obfuscating Identity on Social Media"
- Ken Pyle - "Cisco SMB Products — Critical Vulnerablities / 0-day Release"
- Austin Ralls - "Banjo: An Android Disassembler for Binary Ninja"
[R] - Antonio Gomez - "Software Mitigations for Hardware Vulnerabilities"
- Katie Nickels - "Resistance Isn’t Futile: A Practical Approach to Prioritizing Defenses with Threat Modeling"
- Josh Kamdjou - "Voight-Kampff for Email Addresses: Quantifying Email Address Reputation to Identify Spear-Phishing and Fraud"
- Audie and Josh Corman - "SBOM: Screw it, We’ll Do it Live!"
- Elizabeth Wharton and Suchi Pahi - "Face/Off: Action Plan for Perils & Privileges of Facial Recognition"
[R] - Krassimir Tzvetanov - "Security Researcher OPSEC"
- Rae Baker - "Using OSINT for Human Rights and Victim Support"
- The Shmoo Group - 0wn the Con
- Alissa Gilbert - "Anti-Forensics for Fun and Privacy"
- Casey Ellis, Tod Beardsley, Kimber Dowsett, Jack Cable, and Amelie Koran (moderator) - "Hacking Democracy: On Securing an Election"
Sunday, February 02, 2020:
- Russell Handorf - "A Wireless Journeyman’s Experience in Practical SIGINT"
- Xena Olsen - "Adversary Detection Pipelines: Finally Making Your Threat Intel Useful"
- Kurt Opsahl and Bill Budington - "Crossing the Border With Your Electronic Devices"
- Mark Griffin - "Knowing the UnFuzzed and Finding Bugs with Coverage Analysis"
- Mark Loveless - "Real World Zero Trust Implementation"
- Chaim Sanders - "Playing the Short Game: The Effects of Data Breaches on Share Prices"
- Katie Liszewski - "The Verilog to Verilog Decompiler"
- Jonathan Protzenko and Nikhil Swamy - "Project Everest: Fast, Correct, and Secure Software for Deployment Now!"
- Yacko, Wacko, and Dot - "Hack the Stars"
- Kiersten Todt, Matt Blaze, Beetle, and Bruce Potter (interviewer) - "Between Two Moose"
- Closing Remarks
----
--> Oodles of thanks to Archive for helping us keep these videos available and free!!
- Squidly1
- Addeddate
- 2020-03-06 05:15:23
- Color
- color
- Identifier
- ShmooCon_2020
- Scanner
- Internet Archive HTML5 Uploader 1.6.4
- Sound
- sound
comment
Reviews
There are no reviews yet. Be the first one to
write a review.
3,544 Views
4 Favorites
DOWNLOAD OPTIONS
MPEG4
Uplevel BACK
3.7G
Shmoocon2020-AshleeBenge_and_ZackAllen-Battling_Supermutants_in_the_Phishing_Wasteland.mp4 download
4.0G
Shmoocon2020-MarkGriffin-Knowing_the_UnFuzzed_and_Finding_Bugs_with_Coverage_Analysis.mp4 download
IN COLLECTIONS
Conference ProceedingsUploaded by squidly1 on