CircleCityCon 2018 Abuse Case Testing in DevOps Stephen Deck

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=jqDTTePegOI



Duration: 56:56
0 views
0


CircleCityCon - 2018 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security #CircleCityCon
https://circlecitycon.org/

Our “Code of Conduct” is “Be Excellent to Each Other” AKA the Golden Rule.
Failing that, it is “Do not be an Ass* or we will kick your ass out!”.

Asking questions of a speaker during their talk to get clarity or debate a
point is not being an ass – heckling or haranguing the speaker is. If you are
not sure, ask, or err on the side of basic decency and common courtesy. If what
you are doing would not be acceptable to have done to you, your best friend,
your worst enemy, your sister, niece, daughter, brother, nephew, son, mother,
father, or any human being. don’t do it. Also do not let another person treat anyone else that way – whether you know them or not. If someone asks you to stop – stop.

If you are having an issue with a CircleCityCon participant of any badge type,
find a radioed member of our Security Operations Team in the red CircleCityCon t-shirts (or any staff member, in purple shirts) or the moderators on Discord if you are a virtual only participant. They will call our Safety &Medical Response Team (S.M.R.T), who will assist you in determining the next steps for you to feel safe and heard.

“Ham radio isn’t just what your grandpa does in the shed out back. Radios are an important piece of technology we use everyday, and amateur (“ham”) radio has been at the forefront of its development since day one — we are some of the original hardware hackers! DIY, exploration, and sharing has always been a vital part of our community and the goal of Ham Radio Village is to nurture this growth into the next generation of hams.”

The mission of the Open Organization Of Lockpickers is to advance the general public knowledge about locks and lockpicking. By examining locks, safes, and other such hardware and by publicly discussing our findings we hope to strip away the mystery with which so many of these products are imbued.

The more that people know about lock technology, the better they are capable of understanding how and where certain weaknesses are present. This makes them well-equipped to participate in sportpicking endeavors and also helps them simply be better consumers in the marketplace, making decisions based on sound fact and research.

The Open Organisation Of Lockpickers, or TOOOL, is an international group of lockpicking enthusiasts dedicated to advancing the general public knowledge about locks and lockpicking through teaching, research, and competition. TOOOL in the United States is a 501(c)(3) non-profit organization with Chapters in more than 20 states, including affiliated Chapters in Canada.

Welcome to the CircleCityCon Hardware Hacking village

Learn to solder (or up your game) in person with Blenster. Want to bring a kit to learn? Order one from Cyber City Circuits here:

https://shop.cybercitycircuits.com/products/mr-blinky-bling-8-led-round-soldering-kit

These kits were designed by Mr. Blinky Bling to be as beginner-friendly as possible and make a handy flashlight once completed. Batteries included! While you’re there check out their other projects and their amazing subscription

CHV is an interactive village with the goal of teaching, demonstrating, and gamifying car hacking. Visit us this year to see our Car Hacking 3D Simulator that we built for the goal of introducing the fundamentals of vehicle networks, vehicle diagnostic messages, and general vehicle hacking to the masses. The Simulator is also a CTF so whether you are new to car hacking or a seasoned professional, you’ll have a lot of fun competing and learning about this exciting field of hacking.




Other Videos By All Hacking Cons


2022-03-21CircleCityCon 2018 Quick Retooling in Net for Red Teams Dimitry Snezhkov
2022-03-21CircleCityCon 2018 Closing
2022-03-21CircleCityCon 2018 The Never Ending Hack Mental Health in InfoSec Community Danny Akacki
2022-03-21CircleCityCon 2018 The Network Night Watch Eric Rand Lesley Carhart
2022-03-21CircleCityCon 2018 Classic Cons in Cryptocurrency Wolfgang Goerlich Zachary Sarakun
2022-03-21CircleCityCon 2018 Automahack Automate going from zero to domain admin with 2 tools Dan McInerne
2022-03-21CircleCityCon 2018 Carrot vs Stick Motivation Metrics and Awareness Magen Wu
2022-03-21CircleCityCon 2018 Applying Thermodynamic Principles to Threat Intelligence Kyle Ehmke
2022-03-21CircleCityCon 2018 The FaaS and the Curious AWS Lambda Threat Modeling Bryan McAninch
2022-03-21CircleCityCon 2018 Playing Russian Troll Whack a Mole Courtney Falk
2022-03-21CircleCityCon 2018 Abuse Case Testing in DevOps Stephen Deck
2022-03-21CircleCityCon 2018 The consequences of lack of security in the Healthcare and how to handle it J
2022-03-21CircleCityCon 2018 A Very Particular Set of Skills Geolocation Techniques For OSINT and Investig
2022-03-21CircleCityCon 2017 See beyond the veil Automating malicious javascript deobfuscation Chad Robertson
2022-03-21CircleCityCon 2017 Security Training Making Your Weakest Link The Strongest Aaron Hnatiw
2022-03-21CircleCityCon 2017 Phing Phishers JAe
2022-03-21CircleCityCon 2017 Everything is Not Awesome How to Overcome Barriers to Proper Network Segmentation
2022-03-21CircleCityCon 2017 Peakaboo I own you Owning hundreds of thousands of devices with a broken HTTP pac
2022-03-21CircleCityCon 2017 Why is the Internet still working James Troutman
2022-03-21CircleCityCon 2017 Effective Report Writing for Security Practitioners Benjamin Robinson
2022-03-21CircleCityCon 2017 We don't Always Go Lights and Sirens Kendra Cooley



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering