515 Advanced Persistent Thirst APT Patrick DeSantis Joe Marshall Carlos Pacho DerbyCon 6

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=pUAjmnWqPfA



Duration: 19:54
2 views
0


DerbyCon 6 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security DerbyCon was a computer security conference based in Louisville, Kentucky. The first DerbyCon took place in 2011 and was founded by Martin Bos, Dave Kennedy, Alex Kah and Adrian Crenshaw. The conference has been held at the Hyatt Regency Louisville typically in late September.

On January 14, 2019, organizers announced that DerbyCon 9.0, to be held in September 2019, would be the last of the series, citing the increasing difficulty of holding conferences in the face of "a small, yet vocal group of people creating negativity, polarization, and disruption".
DerbyCon common activities included:

Presentations from keynote speakers, with topics including software security, social engineering, cyber security, security in the present day and future, and mobile applications.
Preconference training
Vendors and publishers
Lockpick Village
Mental Health & Wellness Village
BourbonCon, a social gathering during DerbyCon focusing on sampling fine Kentucky Bourbon
DerbyCon Party, which has featured The Crystal Method (2013, 2015) and Infected Mushroom (2014)

Conferences

DerbyCon 2013 Attendee Badge
DerbyCon 1.0 2011
DerbyCon 2.0 "Reunion" 2012
DerbyCon 3.0 "All in the Family" 2013
DerbyCon 4.0 "Family Rootz" 2014
DerbyCon 5.0 "Unity" 2015
DerbyCon 6.0 "Recharge" 2016
DerbyCon 7.0 "Legacy" September 20–24, 2017 at the Hyatt Regency in Louisville, Kentucky
DerbyCon 8.0 "Evolution" October 3–7, 2018 at the Marriott in Louisville, Kentucky

https://web.archive.org/web/20191223065559/https://www.derbycon.com/




Other Videos By All Hacking Cons


2022-05-04118 Attacking ADFS Endpoints with PowerShell Karl Fosaaen DerbyCon 6
2022-05-04413 Need More Sleep REST Could Help Drew Branch DerbyCon 6
2022-05-04308 Business Developement The best non four letter dirty word in infosec Scott Lyons and Joshua Marp
2022-05-04517 Malicious Office Doc Analysis for EVERYONE Doug Burns DerbyCon 6
2022-05-04320 Static PIE How and Why Adam Cammack Brent Cook DerbyCon 6
2022-05-04212 Attackers Hunt Sysadmins Its time to fight back Lee Holmes DerbyCon 6
2022-05-04516 Were a Shooting Gallery Now What Joseph Tegg DerbyCon 6
2022-05-04110 Breaking Credit Card Tokenization Without Cryptanalysis Tim MalcomVetter DerbyCon 6
2022-05-04319 Hashview a new tool aimed to improve your password cracking endeavors Casey Cammilleri Hans Lakh
2022-05-04412 Hacking for Homeschoolers STEM projects for under 20 Branden Miller DerbyCon 6
2022-05-04515 Advanced Persistent Thirst APT Patrick DeSantis Joe Marshall Carlos Pacho DerbyCon 6
2022-05-04109 Defeating The Latest Advances in Script Obfuscation Mark Mager DerbyCon 6
2022-05-04308 Business Developement The best non four letter dirty word in infosec Scott Lyons and Joshua Marp
2022-05-04211 Introducing DeepBlueCLI a PowerShell module for hunt teaming via Windows event logs Eric Conrad
2022-05-04514 BurpSmartBuster A smart way to find hidden treasures DerbyCon 6
2022-05-04318 Java RATS Not even your Macs are safe Anthony Kasza DerbyCon 6
2022-05-04411 Fuzzing basicshow to break software grid aka Scott M DerbyCon 6
2022-05-04108 Exploiting First Hop Protocols to Own the Network Paul Coggin DerbyCon 6
2022-05-04513 Confronting Obesity Infosec Michael Schearer DerbyCon 6
2022-05-04210 What I have learned in 25years of Ham Radio Jay Radcliffe DerbyCon 6
2022-05-04512 Evolving your Offices Security Culture Nancy Snoke DerbyCon 6



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering