Conference Video – Fantastic OSINT and where to find it

Open-Source security intelligence is bountiful if you know where to look. The goal of my talk is show you where to find this data, how to utilize it, and how the data you find can be enriched through free and/or commercial tools.

Conference Video – OSINT: Oh the places you’ll go

Justin Brown (Spridel) Open Source Intelligence (OSINT) is what many of us do on a daily basis. We may not acknowledge it. We perform research, digital foot printing, competitive intelligence, and reconnaissance, just to name a few. Come find some additional resources for your efforts, listen to what should be collected, how to perform collection, Read More …

Conference Video – Introductory Netflow Analysis

Miles Johnson Introductory Netflow Analysis is a 1 hour presentation on the basic concepts of Netflow and network forensics using netflow logs. All IT Security professionals will need to do network forensics at one time or another. Netflow analysis can empower you to discover and understand past network behavior.

Hacker Video – All Your Devices Can Be Hacked

Avi Rubin is Professor of Computer Science at Johns Hopkins University and Technical Director of the JHU Information Security Institute. Avi’s primary research area is Computer Security, and his latest research focuses on security for electronic medical records. Avi is credited for bringing to light vulnerabilities in electronic voting machines. In 2006 he published a Read More …

Backyard Chicken Jukebox -Day 192 – Greatest Hits of Yes

Backyard Chicken Jukebox -Day 192 – Greatest Hits of Yes We are working our way through the winter with Chickens for the first time.  It has been quite an adventure, and some bitter cold days, have put our little flock to the test.  Stay tuned for more videos about the hows and whats of a Read More …

Hacker Video – Analyzing Meterpreter with Redline

A victim VM has been deliberately infected with Meterpreter via an IE exploit. The video shows copying over a Redline collector to extract forensic artifacts and save them to network share. The artifacts are then imported to an analysis workstation over sftp and opened in Redline. The analysis starts at the highest malicious score to Read More …