417 Hardware Hacking the Easyware Way Brian Fehrman DerbyCon 6

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=ze-kSQGugtE



Duration: 50:58
7 views
0


DerbyCon 6 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security DerbyCon was a computer security conference based in Louisville, Kentucky. The first DerbyCon took place in 2011 and was founded by Martin Bos, Dave Kennedy, Alex Kah and Adrian Crenshaw. The conference has been held at the Hyatt Regency Louisville typically in late September.

On January 14, 2019, organizers announced that DerbyCon 9.0, to be held in September 2019, would be the last of the series, citing the increasing difficulty of holding conferences in the face of "a small, yet vocal group of people creating negativity, polarization, and disruption".
DerbyCon common activities included:

Presentations from keynote speakers, with topics including software security, social engineering, cyber security, security in the present day and future, and mobile applications.
Preconference training
Vendors and publishers
Lockpick Village
Mental Health & Wellness Village
BourbonCon, a social gathering during DerbyCon focusing on sampling fine Kentucky Bourbon
DerbyCon Party, which has featured The Crystal Method (2013, 2015) and Infected Mushroom (2014)

Conferences

DerbyCon 2013 Attendee Badge
DerbyCon 1.0 2011
DerbyCon 2.0 "Reunion" 2012
DerbyCon 3.0 "All in the Family" 2013
DerbyCon 4.0 "Family Rootz" 2014
DerbyCon 5.0 "Unity" 2015
DerbyCon 6.0 "Recharge" 2016
DerbyCon 7.0 "Legacy" September 20–24, 2017 at the Hyatt Regency in Louisville, Kentucky
DerbyCon 8.0 "Evolution" October 3–7, 2018 at the Marriott in Louisville, Kentucky

https://web.archive.org/web/20191223065559/https://www.derbycon.com/




Other Videos By All Hacking Cons


2022-05-04500 Go with the Flow Get Started with Flow Analysis Quickly and Cheaply Jason Smith DerbyCon 6
2022-05-04405 Hacking Lync or The Weakest Lync nyxgeek DerbyCon 6
2022-05-04313 Scripting Myself Out of a Job Automating the Penetration Test with APT2 Adam Compton Austin Lane
2022-05-04302 Rotten Potato Privilege Escalation from Service Accounts to SYSTEM Stephen Breen Chris Mallz D
2022-05-04312 Using Binary Ninja for Modern Malware Analysis Dr Jared DeMott Mr Josh Stroschein DerbyCon 6
2022-05-04418 Finding a Weak Link Attacking Windows OEM Kernel Drivers Braden Hollembaek Adam Pond DerbyCon
2022-05-04404 No Easy Breach Challenges and Lessons from an Epic Investigation Matthew Dunwoody Nick Carr De
2022-05-04301 Stagefright An Android Exploitation Case Study Jduck DerbyCon 6
2022-05-04122 MariaDB Lock it down like a chastity belt Ben Stillman DerbyCon 6
2022-05-04311 Penetration Testing Trends John Strand 2 DerbyCon 6
2022-05-04417 Hardware Hacking the Easyware Way Brian Fehrman DerbyCon 6
2022-05-04403 To Catch a Penetration Tester Top SIEM Use Cases Ryan Voloch and Peter Giannoutsos DerbyCon 6
2022-05-04Become the Puppet Master the battle of cognition between man and machine Michael Robinson Josep De
2022-05-04Revoke Obfuscation PowerShell Obfuscation Detection And Evasion Using Science Lee Holmes Daniel De
2022-05-04Architecture at Scale Save time Reduce spend Increase security Ryan Elkins DerbyCon 7
2022-05-04Love is in the Air DFIR and IDS for WiFi Networks Lennart Koopmann DerbyCon 7
2022-05-04CHIRON Home based ML IDS Rod Soto Joseph Zadeh DerbyCon 7
2022-05-04Burping for Joy and Financial Gain Tim lanmaster53 Tomes getting ICED DerbyCon 7
2022-05-04Return From The Underworld The Future Of Red Team Kerberos Jim Shaver Mitchell Hennigan AF DerbyCo
2022-05-04Kinetic to Digital Terrorism in the Digital Age Kyle Wilhoit DerbyCon 7
2022-05-04An ACE in the Hole Stealthy Host Persistence via Security Descriptors Lee Christensen Matt Nels De



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering