526 SQL Server Hacking on Scale using PowerShell Scott Sutherland DerbyCon 6

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=MejkeTDcu0o



Duration: 29:01
15 views
0


DerbyCon 6 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security DerbyCon was a computer security conference based in Louisville, Kentucky. The first DerbyCon took place in 2011 and was founded by Martin Bos, Dave Kennedy, Alex Kah and Adrian Crenshaw. The conference has been held at the Hyatt Regency Louisville typically in late September.

On January 14, 2019, organizers announced that DerbyCon 9.0, to be held in September 2019, would be the last of the series, citing the increasing difficulty of holding conferences in the face of "a small, yet vocal group of people creating negativity, polarization, and disruption".
DerbyCon common activities included:

Presentations from keynote speakers, with topics including software security, social engineering, cyber security, security in the present day and future, and mobile applications.
Preconference training
Vendors and publishers
Lockpick Village
Mental Health & Wellness Village
BourbonCon, a social gathering during DerbyCon focusing on sampling fine Kentucky Bourbon
DerbyCon Party, which has featured The Crystal Method (2013, 2015) and Infected Mushroom (2014)

Conferences

DerbyCon 2013 Attendee Badge
DerbyCon 1.0 2011
DerbyCon 2.0 "Reunion" 2012
DerbyCon 3.0 "All in the Family" 2013
DerbyCon 4.0 "Family Rootz" 2014
DerbyCon 5.0 "Unity" 2015
DerbyCon 6.0 "Recharge" 2016
DerbyCon 7.0 "Legacy" September 20–24, 2017 at the Hyatt Regency in Louisville, Kentucky
DerbyCon 8.0 "Evolution" October 3–7, 2018 at the Marriott in Louisville, Kentucky

https://web.archive.org/web/20191223065559/https://www.derbycon.com/




Other Videos By All Hacking Cons


2022-05-04306 Its Never So Bad That It Cant Get Worse Valerie Thomas and Harry Regan DerbyCon 6
2022-05-04509 Project MVP Hacking and Protecting SharePoint Michael Warton DerbyCon 6
2022-05-04409 Managed to Mangled Exploitation of Enterprise Network Management Systems Deral Heiland Matthew K
2022-05-04311 Penetration Testing Trends John Strand DerbyCon 6
2022-05-04121 Invoke Obfuscation PowerShell obFUsk8tion Techniques How To Try To DeTect Them Daniel Bohannon
2022-05-04300 Metasploit Townhall David Maloney James Lee Brent Cook Tod Beardsley Lance Sanchez DerbyCon 6
2022-05-04529 How are tickets paid for Abe Miller DerbyCon 6
2022-05-04528 Making Our Profession More Professional Bill Gardner DerbyCon 6
2022-05-04527 Dive into DSL Digital Response Analysis with Elasticsearch Brian Marks Andrea Sancho Silgado D
2022-05-04540 Ransomware An overview Jamie Murdock DerbyCon 6
2022-05-04526 SQL Server Hacking on Scale using PowerShell Scott Sutherland DerbyCon 6
2022-05-04539 PacketKO Data Exfiltration Via Port Knocking Matthew Lichtenberger DerbyCon 6
2022-05-04525 From Gaming to Hacking The Planet Chris Lopi DerbyCon 6
2022-05-04538 Fire Away Sinking the Next Gen Firewall Russell Butturini DerbyCon 6
2022-05-04524 Security v Ops Bridging the Gap DerbyCon 6
2022-05-04537 Samsung Pay Tokenized Numbers Flaws and Issues Salvador Mendoza DerbyCon 6
2022-05-04523 Overcoming Imposter Syndrome even if youre totally faking it Jesika McEvoy DerbyCon 6
2022-05-04536 Abusing Linux Trust Relationships Authentication Back Alleys and Forgotten Features Ronnie Flath
2022-05-04522 Establishing A Foothold With JavaScript Casey Smith DerbyCon 6
2022-05-04535 Shackles Shims and Shivs Understanding Bypass Techniques Mirovengi DerbyCon 6
2022-05-04521 Hashcat State of the Union EvilMog DerbyCon 6



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering