ShmooCon 2018
Video Item Preview
Share or Embed This Item
- Publication date
- 2018
- Topics
- shmoocon, conference, shmoo, moose, hacker, computer, security, hacker, computer security, conference
- Item Size
- 44102618389
The videos in this collection are from ShmooCon 2018, which occurred on 19-21 January 2018, at the Washington Hilton Hotel.
Friday - 19 January 2018 Talks (One Track Mind):
Opening Remarks, Rumblings, Ruminations, and Rants
Michael Ossmann and Schuyler St. Leger - Pseudo-Doppler Redux
Thomas Fischer - Donât Ignore GDPR; It Matters Now!
Elonka Dunin - The Friedman Tombstone â A Cipher in Arlington National Cemetery
Wendy Knox Everette - Blink for Your Password, Blink Away Your Civil Rights?
Casey Smith - Tap, Tap, Is This Thing On? Testing EDR Capabilities
Mika Devonshire - Running a Marathon Without Breaking a Sweat? Forensic
Manipulation of Fitness App Data.
Donna F. Dodson - Keynote
Various - Firetalks (see subset below):
Beau Woods - Thatâs No Moon(shot)!
Tess Schrodinger - Everything You Wanted to Know About Creating an Insider Threat Program (But Were Afraid To Ask)
Jon Erickson - Stack Cleaning â A Quest in Hunting for FLIRT
Bryson Bort - Your Defense is Flawed (itâs only kinda your fault)
Alexander Romero and Steve Luczynski - The First Thing We Do, Letâs Kill all the [CISOs]
Cheryl Biswas - Patching â Itâs Complicated
Erin Jacobs - Libation Escalation â Scotch and Bubbles
Saturday - 14 January 2017 Talks (Build It!, Belay It! and Bring it On!):
Kate Temkin and Dominic Spill - Opening Closed Systems with GlitchKit
Andrew Morris - The Background Noise of the Internet
Lilith Wyatt - IoT RCE, a Study With Disney (First 3 minutes audio is missing - Moose has been sacked)
Tim Brom and Mitchell Johnson - When CAN CANT
John Althouse and Jeff Atkinson - Profiling and Detecting all Things SSL with JA3
Vyrus - Pages from a Sword-Makerâs Notebook pt. II
Travis Goodspeed - Building a GoodWatch
Mike Flossman, Eva Galperin, and Cooper Quintin - Nation-State Espionage: Hunting
Multi-Platform APTs on a Global Scale
Rob Joyce - Building Absurd Christmas Light Shows
Anthony DeRosa and Bill Davis - ODA: A Collaborative, Open Source Reversing Platform in the Cloud
Alexei Bulazel and Bülent Yener - Catch Me If You Can: A Decade of Evasive Malware Attack and Defense
Matt Blaze, Joe Hall, Margaret MacAlpine, and Harri Hursti - Electronic Voting in 2018: Threat or Menace
Justin Regele - Better Git Hacking: Extracting âDeletedâ Secrets from Git Databases with Grawler
Leah Figueroa - Someone is Lying to You on the InternetâUsing Analytics to Find Bot Submissions in the FCC Net Neutrality Submissions
Aunshul Rege - A Social Science Approach to Cybersecurity Education for all Disciplines
Ian Foster - CertGraph: A Tool to Crawl the Graph of SSL Certificate Alternate Names using Certificate Transparency
Rebecca Shapiro - Bludgeoning Bootloader Bugs: No Write Left Behind
hex waxwing and Daniel Gallagher - Listing the 1337: Adventures in Curating HackerTwitterâs Institutional Knowledge
Nathan Voss - afl-unicorn: Fuzzing the âUnfuzzableâ
Dan Bourke - AWS Honey Tokens with SPACECRAB
Steve Black - Cyberlaw: Year in Review
Richard Seymour - radare2 in Conversation
Lauren Deason - Time Signature Based Matching for Data Fusion and Coordination Detection in Cyber Relevant Logs
Sandra Escandor-OâKeefe - Skill Building By Revisiting Past CVEs
Lisa Chang - OK Google, Tell Me About Myself (First part of talk missing - Another moose sacked)
Brittany Postnikoff - Defending Against Robot Attacks
Sean Gallagher, Steve Ragan, and Paul Wagenseil - Hacking the News: an Infosec Guide to the Media, and How to Talk to Them
Sunday - 15 January 2017 Talks (Build It!, Belay It! and Bring it On!):
Kyle OâMeara and Madison Oliver - Embedded Device Vulnerability Analysis Case Study Using TROMMEL
Domenic Puzio and Kate Highnam - Deep Learning for Realtime Malware Detection
Carson Zimmerman - This Is Not Your Grandfatherâs SIEM
The Shmoo Group - 0wn the Con
Paul McMillan and Matt King - Securing Bare Metal Hardware at Scale
Sarah Zatko, Tim Carstens, Parker Thompson, Peiter âMudgeâ Zatko, and Patrick Stach - CITL â Quantitative, Comparable Software Risk Reporting
Phil Vachon and Andrew Wong - SIGINT on a budget: Listening in, gathering data and watchingâfor less than $100
Patrick Wardle - Getting Cozy with OpenBSM Auditing on MacOS ⦠The Good, the Bad, & the Ugly
Russell Handorf - Do as I Say, Not as I Do: Hacker Self Improvement and You
Wendy Nather, Jack Daniel, Jack Gavigan, Elizabeth Wharton, and Bruce Potter (moderator) - ShmooCon Debates: Crypto Currency â Fad or Future | Consumer IOT Security â Controlling the Climate or Burning Down the House
Closing Remarks
Friday - 19 January 2018 Talks (One Track Mind):
Opening Remarks, Rumblings, Ruminations, and Rants
Michael Ossmann and Schuyler St. Leger - Pseudo-Doppler Redux
Thomas Fischer - Donât Ignore GDPR; It Matters Now!
Elonka Dunin - The Friedman Tombstone â A Cipher in Arlington National Cemetery
Wendy Knox Everette - Blink for Your Password, Blink Away Your Civil Rights?
Casey Smith - Tap, Tap, Is This Thing On? Testing EDR Capabilities
Mika Devonshire - Running a Marathon Without Breaking a Sweat? Forensic
Manipulation of Fitness App Data.
Donna F. Dodson - Keynote
Various - Firetalks (see subset below):
Beau Woods - Thatâs No Moon(shot)!
Tess Schrodinger - Everything You Wanted to Know About Creating an Insider Threat Program (But Were Afraid To Ask)
Jon Erickson - Stack Cleaning â A Quest in Hunting for FLIRT
Bryson Bort - Your Defense is Flawed (itâs only kinda your fault)
Alexander Romero and Steve Luczynski - The First Thing We Do, Letâs Kill all the [CISOs]
Cheryl Biswas - Patching â Itâs Complicated
Erin Jacobs - Libation Escalation â Scotch and Bubbles
Saturday - 14 January 2017 Talks (Build It!, Belay It! and Bring it On!):
Kate Temkin and Dominic Spill - Opening Closed Systems with GlitchKit
Andrew Morris - The Background Noise of the Internet
Lilith Wyatt - IoT RCE, a Study With Disney (First 3 minutes audio is missing - Moose has been sacked)
Tim Brom and Mitchell Johnson - When CAN CANT
John Althouse and Jeff Atkinson - Profiling and Detecting all Things SSL with JA3
Vyrus - Pages from a Sword-Makerâs Notebook pt. II
Travis Goodspeed - Building a GoodWatch
Mike Flossman, Eva Galperin, and Cooper Quintin - Nation-State Espionage: Hunting
Multi-Platform APTs on a Global Scale
Rob Joyce - Building Absurd Christmas Light Shows
Anthony DeRosa and Bill Davis - ODA: A Collaborative, Open Source Reversing Platform in the Cloud
Alexei Bulazel and Bülent Yener - Catch Me If You Can: A Decade of Evasive Malware Attack and Defense
Matt Blaze, Joe Hall, Margaret MacAlpine, and Harri Hursti - Electronic Voting in 2018: Threat or Menace
Justin Regele - Better Git Hacking: Extracting âDeletedâ Secrets from Git Databases with Grawler
Leah Figueroa - Someone is Lying to You on the InternetâUsing Analytics to Find Bot Submissions in the FCC Net Neutrality Submissions
Aunshul Rege - A Social Science Approach to Cybersecurity Education for all Disciplines
Ian Foster - CertGraph: A Tool to Crawl the Graph of SSL Certificate Alternate Names using Certificate Transparency
Rebecca Shapiro - Bludgeoning Bootloader Bugs: No Write Left Behind
hex waxwing and Daniel Gallagher - Listing the 1337: Adventures in Curating HackerTwitterâs Institutional Knowledge
Nathan Voss - afl-unicorn: Fuzzing the âUnfuzzableâ
Dan Bourke - AWS Honey Tokens with SPACECRAB
Steve Black - Cyberlaw: Year in Review
Richard Seymour - radare2 in Conversation
Lauren Deason - Time Signature Based Matching for Data Fusion and Coordination Detection in Cyber Relevant Logs
Sandra Escandor-OâKeefe - Skill Building By Revisiting Past CVEs
Lisa Chang - OK Google, Tell Me About Myself (First part of talk missing - Another moose sacked)
Brittany Postnikoff - Defending Against Robot Attacks
Sean Gallagher, Steve Ragan, and Paul Wagenseil - Hacking the News: an Infosec Guide to the Media, and How to Talk to Them
Sunday - 15 January 2017 Talks (Build It!, Belay It! and Bring it On!):
Kyle OâMeara and Madison Oliver - Embedded Device Vulnerability Analysis Case Study Using TROMMEL
Domenic Puzio and Kate Highnam - Deep Learning for Realtime Malware Detection
Carson Zimmerman - This Is Not Your Grandfatherâs SIEM
The Shmoo Group - 0wn the Con
Paul McMillan and Matt King - Securing Bare Metal Hardware at Scale
Sarah Zatko, Tim Carstens, Parker Thompson, Peiter âMudgeâ Zatko, and Patrick Stach - CITL â Quantitative, Comparable Software Risk Reporting
Phil Vachon and Andrew Wong - SIGINT on a budget: Listening in, gathering data and watchingâfor less than $100
Patrick Wardle - Getting Cozy with OpenBSM Auditing on MacOS ⦠The Good, the Bad, & the Ugly
Russell Handorf - Do as I Say, Not as I Do: Hacker Self Improvement and You
Wendy Nather, Jack Daniel, Jack Gavigan, Elizabeth Wharton, and Bruce Potter (moderator) - ShmooCon Debates: Crypto Currency â Fad or Future | Consumer IOT Security â Controlling the Climate or Burning Down the House
Closing Remarks
comment
Reviews
Reviewer:
nahbruh
-
favorite -
February 20, 2018
Subject: The fuck are the videos?
Subject: The fuck are the videos?
https://www.youtube.com/watch?v=VOUqD8H2ZSs&list=PL7-g2-mnZwSHx68p7dOJ-BvqapFMdEw_u Go here instead bruh
12,636 Views
13 Favorites
DOWNLOAD OPTIONS
MPEG4
Uplevel BACK
IN COLLECTIONS
Conference ProceedingsUploaded by squidly1 on