SANS Holiday Hack Challenge: Welcome + Orientation |
Ed Skoudis |
|
Automate security response by creating your own "Naughty Lists" |
Andy Smith |
|
RFC-3514 Compliant Pentesting: Being Good While You're Being Bad |
Tom Liston |
|
FPGA Design for Embedded Systems |
Prof. Qwerty Petabyte |
|
Disclosing Security Vulnerabilities to OS Projects.. Like a Boss! |
Nancy Gariché |
|
Kubernetes Attack Demo: Hacking a Cheating Casino |
Jay Beale |
|
The Abominable Snowman's Threat Hunting Adventure |
Xena Olsen |
|
A CISO's Best Friend: The Pentester!!?! |
Sean Atkinson & Chris Elgee |
|
How to Build a Free Malware Lab |
Mary Ellen Kennel |
|
Using Open-Source Tools to Track Elves |
Clay Moody |
|
HIDden Duckey, Deconstructed Payload |
Kevin Tyers |
|
Google, Eliminating XSS in Angular Applications |
Bjarki Ágúst Guðmundsson |
|
Log4j Vulnerability Response |
Prof. Qwerty Petabyte |
|