32 Intercepting USB Traffic for Attack and Defense Brandon Wilson DerbyCon 5

Subscribers:
6,000
Published on ● Video Link: https://www.youtube.com/watch?v=TzsXKU4lx4I



Duration: 22:50
7 views
0


DerbyCon 5 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security DerbyCon was a computer security conference based in Louisville, Kentucky. The first DerbyCon took place in 2011 and was founded by Martin Bos, Dave Kennedy, Alex Kah and Adrian Crenshaw. The conference has been held at the Hyatt Regency Louisville typically in late September.

On January 14, 2019, organizers announced that DerbyCon 9.0, to be held in September 2019, would be the last of the series, citing the increasing difficulty of holding conferences in the face of "a small, yet vocal group of people creating negativity, polarization, and disruption".
DerbyCon common activities included:

Presentations from keynote speakers, with topics including software security, social engineering, cyber security, security in the present day and future, and mobile applications.
Preconference training
Vendors and publishers
Lockpick Village
Mental Health & Wellness Village
BourbonCon, a social gathering during DerbyCon focusing on sampling fine Kentucky Bourbon
DerbyCon Party, which has featured The Crystal Method (2013, 2015) and Infected Mushroom (2014)

Conferences

DerbyCon 2013 Attendee Badge
DerbyCon 1.0 2011
DerbyCon 2.0 "Reunion" 2012
DerbyCon 3.0 "All in the Family" 2013
DerbyCon 4.0 "Family Rootz" 2014
DerbyCon 5.0 "Unity" 2015
DerbyCon 6.0 "Recharge" 2016
DerbyCon 7.0 "Legacy" September 20–24, 2017 at the Hyatt Regency in Louisville, Kentucky
DerbyCon 8.0 "Evolution" October 3–7, 2018 at the Marriott in Louisville, Kentucky

https://web.archive.org/web/20191223065559/https://www.derbycon.com/




Other Videos By All Hacking Cons


2022-05-0108 Hacking Virtual Appliances Jeremy Brown DerbyCon 5
2022-05-0118 Stealthy and Persistent Back Door for Z Wave Gateways Jonathan Fuller Ben Ramsey DerbyCon 5
2022-05-0121 Crypto 101 An Intro To Real World Crypto Adam Caudill DerbyCon 5
2022-05-0114 Started from the bottom now Im here How to ruin your life by getting everything you ever DerbyC
2022-05-0121 Confessions of a crypto cluster operator Dustin Heywood DerbyCon 5
2022-05-0112 BYPASS SURGERY ABUSING CONTENT DELIVERY NETWORKS WITH SERVER SIDE REQUEST FORGERY SSRF F DerbyC
2022-05-01Keynote01 Information Security Today and in the Future HD Moore Ed Skoudis John Strand Chris Nickers
2022-05-0118 My password cracking brings all the hashes to the yard Larry Pesce DerbyCon 5
2022-05-0114 How to Build Your Own Covert SIGINT Vehicle Drew Redshift Porter DerbyCon 5
2022-05-0108 Hacking for homeschoolers Branden Miller DerbyCon 5
2022-05-0132 Intercepting USB Traffic for Attack and Defense Brandon Wilson DerbyCon 5
2022-05-0111 Unbillable Exploiting Android In App Purchases Alfredo Ramirez DerbyCon 5
2022-05-0131 Learning Mainframe Hacking Where the hell did all my free time go Chad Rikansrud DerbyCon 5
2022-05-0120 Stretching the Sandbox with Malware Feature Vectors Mike Schladt DerbyCon 5
2022-05-0116 InfoSec Big Picture and Some Quick Wins Schuyler Dorsey DerbyCon 5
2022-05-0120 Hunting Unicorns and Jerks Irrational Defensible or Necessary Steve Werby DerbyCon 5
2022-05-0116 HARdy HAR HAR HAR HAR File Collection and Analysis for Malware Robert Simmons DerbyCon 5
2022-05-0109 Stagefright Scary Code in the Heart of Android Joshua jduck Drake DerbyCon 5
2022-05-0116 DNS Miner A semi automatic Incident response and threat intelligence tool for small over wo Der
2022-05-0120 Five Hardware Hacking Projects Under 30 Kevin Bong Michael Vieau DerbyCon 5
2022-05-0113 Sticky Honey Pots Paul J Vann DerbyCon 5



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering