Skip to main content

BSides Rochester 2019



rss RSS

10
RESULTS


Show sorted alphabetically

More right-solid

Show sorted alphabetically

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
SHOW DETAILS
up-solid down-solid
eye
Title
Date Archived
Creator
BSides Rochester 2019
movies

eye 26

favorite 0

comment 0

Talk Description: New privacy laws such as the GDPR and CCPA have greatly advanced individual data rights, although the ability to request access to all personal information held by a company has created new attack vectors for OSINT. These data access requests are usually managed by legal or compliance teams without security review, increasing the potential for phishing, social engineering, and “legal DDoS.” This talk covers regional personal data access options, how most companies respond...
Topics: Youtube, video, Science & Technology, BSides Rochester, BSidesROC, Security B-Sides, Privacy,...
BSides Rochester 2019
movies

eye 17

favorite 0

comment 0

Talk Description: Two easy techniques to make your rootkit stealthier and more robust! Goofkit is a new Linux Kernel Module (LKM) rootkit being released. It uses both inline hooking and trampolining to create a more robust, and stealthy rootkit. This talk will cover how traditional LKM rootkits are made, what can be done better, and why. This talk is aimed at those who are interested in building a rootkit, looking to improve their own, or just learn more about how Linux works. Bio: Hulto is a...
Topics: Youtube, video, Science & Technology, BSides Rochester, BSidesROC, Security B-Sides, Goofkit,...
BSides Rochester 2019
movies

eye 57

favorite 0

comment 0

Talk Description: In this talk, we will discuss our brains and how we label and prejudge, hear experiences of underrepresented people in the space, what can be done to fill the gap, and how to increase and retain the number of qualified candidates in cybersecurity. Bio: Chloe Messdaghi is a Security Researcher Advocate/PM @Bugcrowd. Since entering cybersecurity space, she sees security as a humanitarian issue. Humanitarian work includes advising as a UN Volunteer, serving as a board member for...
Topics: Youtube, video, Science & Technology, BSides Rochester, BSidesROC, Security B-Sides, diversity...
BSides Rochester 2019
movies

eye 17

favorite 0

comment 0

Talk Description: The Jackson JSON processor offers an alternative to Java serialization by providing data binding capabilities to serialize Java objects to JSON and deserialize JSON back to Java objects. Poorly written Java code that deserializes JSON strings from untrusted sources can be vulnerable to a range of exploits including remote command execution (RCE), denial-of-service (DoS), and other attacks. These attacks are enabled by polymorphic type handling and deserialization to overly...
Topics: Youtube, video, Science & Technology, BSides Rochester, BSidesROC, Security B-Sides, Jackson...
BSides Rochester 2019
movies

eye 34

favorite 0

comment 0

Talk Description: “More Tales from the Crypt…analyst” picks up with the speaker’s third “tour of duty” at NSA where he became one of the founding members of NSA’s first penetration testing or Red Team. While the thought of NSA hiring hackers or engaging in cyber warfare might be fairly common today, it was not always the case. Somebody had to be first, and the policies, procedures, methodologies, and rules of engagement had to be developed for not only conducting what we called...
Topics: Youtube, video, Science & Technology, BSides Rochester, BSidesROC, Security B-Sides, NSA,...
BSides Rochester 2019
movies

eye 26

favorite 0

comment 0

Talk Description: Today, large organizations deal with the challenge of running their infrastructure across many networks and namespaces due to the use of cloud and hosting services, legacy environments and acquisitions. This can make it difficult for an organization to maintain visibility of its Internet-facing assets and an ability to track down systems that pose a risk to its security posture. The OWASP Amass Project attempts to help organizations perform network mapping of its attack...
Topics: Youtube, video, Science & Technology, BSides Rochester, BSidesROC, Security B-Sides, OWASP,...
BSides Rochester 2019
movies

eye 34

favorite 0

comment 0

Talk Description: This talk will detail how Francis dove into the hardware of an inexpensive IP camera and explored its inner workings in search of an external exploit. This talk is meant to help inspire inexperienced pen-testers to dig into embedded/hardware pwning and to be more familiar with embedded Linux. Bio: Francis Lee is a software engineer in Central New York that is also a hobbyist that likes to tinker with Linux, explore IoT, participate in the “maker movement,” play with...
Topics: Youtube, video, Science & Technology, BSides Rochester, BSidesROC, Security B-Sides, IP Camera,...
BSides Rochester 2019
by BSidesROC
movies

eye 25

favorite 0

comment 0

Talk Description: Jason Scott of Internet Archive and http://TEXTFILES.COM talks about history, deconstruction, reconstruction and how not everything pieces back together after you pull it apart. Bio: He is the creator, owner and maintainer of textfiles.com, a web site which archives files from historic bulletin board systems. He is the creator of a 2005 documentary film about BBSes, BBS: The Documentary, and a 2010 documentary film about interactive fiction, GET LAMP. Source:...
Topics: Youtube, video, Science & Technology, BSides Rochester, BSidesROC, Security B-Sides, Internet...
BSides Rochester 2019
movies

eye 18

favorite 0

comment 0

Talk Description: Threat hunting is often misunderstood. This talk is meant to dispel some misconceptions as well as build a foundation to perform hunts in any network. It’s not about just tools or just data, you’ll need both and an understanding of the stories they tell. After building the fundamentals, we will walk though some hunt scenarios to find those dark hooded intruders. Happy hunting. Bio: Zach Bevilacqua is just a security guy in a security world, hoping to enlighten the security...
Topics: Youtube, video, Science & Technology, BSides Rochester, BSidesROC, Security B-Sides, Threat...
BSides Rochester 2019
movies

eye 31

favorite 0

comment 0

Talk Description: Website fingerprinting enables a local eavesdropper to determine which websites a user is visiting over an encrypted connection and can even reveal information sent over the Tor anonymity system. In this work, we present Deep Fingerprinting (DF), a new website fingerprinting attack against Tor that leverages a type of deep learning called Convolutional Neural Networks (CNN). The DF attack attains over 98% accuracy on Tor traffic and can even defeat some recently proposed...
Topics: Youtube, video, Science & Technology, BSides Rochester, BSidesROC, Security B-Sides, Tor, deep...