| SANS Holiday Hack Challenge: Welcome + Orientation |
Ed Skoudis |
|
| Automate security response by creating your own "Naughty Lists" |
Andy Smith |
|
| RFC-3514 Compliant Pentesting: Being Good While You're Being Bad |
Tom Liston |
|
| FPGA Design for Embedded Systems |
Prof. Qwerty Petabyte |
|
| Disclosing Security Vulnerabilities to OS Projects.. Like a Boss! |
Nancy Gariché |
|
| Kubernetes Attack Demo: Hacking a Cheating Casino |
Jay Beale |
|
| The Abominable Snowman's Threat Hunting Adventure |
Xena Olsen |
|
| A CISO's Best Friend: The Pentester!!?! |
Sean Atkinson & Chris Elgee |
|
| How to Build a Free Malware Lab |
Mary Ellen Kennel |
|
| Using Open-Source Tools to Track Elves |
Clay Moody |
|
| HIDden Duckey, Deconstructed Payload |
Kevin Tyers |
|
| Google, Eliminating XSS in Angular Applications |
Bjarki Ágúst Guðmundsson |
|
| Log4j Vulnerability Response |
Prof. Qwerty Petabyte |
|