118 Attacking ADFS Endpoints with PowerShell Karl Fosaaen DerbyCon 6

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=HB5Rur4SyGI



Duration: 50:15
17 views
0


DerbyCon 6 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security DerbyCon was a computer security conference based in Louisville, Kentucky. The first DerbyCon took place in 2011 and was founded by Martin Bos, Dave Kennedy, Alex Kah and Adrian Crenshaw. The conference has been held at the Hyatt Regency Louisville typically in late September.

On January 14, 2019, organizers announced that DerbyCon 9.0, to be held in September 2019, would be the last of the series, citing the increasing difficulty of holding conferences in the face of "a small, yet vocal group of people creating negativity, polarization, and disruption".
DerbyCon common activities included:

Presentations from keynote speakers, with topics including software security, social engineering, cyber security, security in the present day and future, and mobile applications.
Preconference training
Vendors and publishers
Lockpick Village
Mental Health & Wellness Village
BourbonCon, a social gathering during DerbyCon focusing on sampling fine Kentucky Bourbon
DerbyCon Party, which has featured The Crystal Method (2013, 2015) and Infected Mushroom (2014)

Conferences

DerbyCon 2013 Attendee Badge
DerbyCon 1.0 2011
DerbyCon 2.0 "Reunion" 2012
DerbyCon 3.0 "All in the Family" 2013
DerbyCon 4.0 "Family Rootz" 2014
DerbyCon 5.0 "Unity" 2015
DerbyCon 6.0 "Recharge" 2016
DerbyCon 7.0 "Legacy" September 20–24, 2017 at the Hyatt Regency in Louisville, Kentucky
DerbyCon 8.0 "Evolution" October 3–7, 2018 at the Marriott in Louisville, Kentucky

https://web.archive.org/web/20191223065559/https://www.derbycon.com/




Other Videos By All Hacking Cons


2022-05-04415 Hack Yourself Building A Pentesting Lab David Boyd DerbyCon 6
2022-05-04215 Recharging Penetration Testing to Maximize Value James Jardine DerbyCon 6
2022-05-04401 Top 10 2015 2016 compromise patterns observed how to use non traditional Internet datasets to de
2022-05-04119 Introducing PowerShell into your Arsenal with PSAttack Jared Haight DerbyCon 6
2022-05-04310 Anti Forensics AF int0x80 of Dual Core DerbyCon 6
2022-05-04214 So Youve Inherited a Security Department Now What Amanda Berlin Lee Brotherston DerbyCon 6
2022-05-04414 Body Hacking 101 or a Healthy Lifestyle for Security Pros Nathan Magniez DerbyCon 6
2022-05-04518 The 1337 Gods of Geek Mythology Justin Herman Anna Jeannine Herman DerbyCon 6
2022-05-04400 Data Obfuscation How to hide data and payloads to make them not exist in a mathematically optima
2022-05-04213 Python 3 Its Time Charles L Yost DerbyCon 6
2022-05-04118 Attacking ADFS Endpoints with PowerShell Karl Fosaaen DerbyCon 6
2022-05-04413 Need More Sleep REST Could Help Drew Branch DerbyCon 6
2022-05-04308 Business Developement The best non four letter dirty word in infosec Scott Lyons and Joshua Marp
2022-05-04517 Malicious Office Doc Analysis for EVERYONE Doug Burns DerbyCon 6
2022-05-04320 Static PIE How and Why Adam Cammack Brent Cook DerbyCon 6
2022-05-04212 Attackers Hunt Sysadmins Its time to fight back Lee Holmes DerbyCon 6
2022-05-04516 Were a Shooting Gallery Now What Joseph Tegg DerbyCon 6
2022-05-04110 Breaking Credit Card Tokenization Without Cryptanalysis Tim MalcomVetter DerbyCon 6
2022-05-04319 Hashview a new tool aimed to improve your password cracking endeavors Casey Cammilleri Hans Lakh
2022-05-04412 Hacking for Homeschoolers STEM projects for under 20 Branden Miller DerbyCon 6
2022-05-04515 Advanced Persistent Thirst APT Patrick DeSantis Joe Marshall Carlos Pacho DerbyCon 6



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering