Gryffindor Pure JavaScript Covert Exploitation Matthew Toussain DerbyCon 8

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=Qo2RNDQLn7M



Duration: 44:40
6 views
1


DerbyCon 8 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security DerbyCon was a computer security conference based in Louisville, Kentucky. The first DerbyCon took place in 2011 and was founded by Martin Bos, Dave Kennedy, Alex Kah and Adrian Crenshaw. The conference has been held at the Hyatt Regency Louisville typically in late September.

On January 14, 2019, organizers announced that DerbyCon 9.0, to be held in September 2019, would be the last of the series, citing the increasing difficulty of holding conferences in the face of "a small, yet vocal group of people creating negativity, polarization, and disruption".
DerbyCon common activities included:

Presentations from keynote speakers, with topics including software security, social engineering, cyber security, security in the present day and future, and mobile applications.
Preconference training
Vendors and publishers
Lockpick Village
Mental Health & Wellness Village
BourbonCon, a social gathering during DerbyCon focusing on sampling fine Kentucky Bourbon
DerbyCon Party, which has featured The Crystal Method (2013, 2015) and Infected Mushroom (2014)

Conferences

DerbyCon 2013 Attendee Badge
DerbyCon 1.0 2011
DerbyCon 2.0 "Reunion" 2012
DerbyCon 3.0 "All in the Family" 2013
DerbyCon 4.0 "Family Rootz" 2014
DerbyCon 5.0 "Unity" 2015
DerbyCon 6.0 "Recharge" 2016
DerbyCon 7.0 "Legacy" September 20–24, 2017 at the Hyatt Regency in Louisville, Kentucky
DerbyCon 8.0 "Evolution" October 3–7, 2018 at the Marriott in Louisville, Kentucky

https://web.archive.org/web/20191223065559/https://www.derbycon.com/




Other Videos By All Hacking Cons


2022-05-05Bypassing Port Security In 2018 Defeating MacSEC and 8021x 2010 Gabriel Ryan DerbyCon 8
2022-05-05Introduction to x86 Assembly DazzleCatDuo DerbyCon 8
2022-05-05Red Mirror Bringing Telemetry to Red Teaming Zach Grace DerbyCon 8
2022-05-05Hackers Hugs Drugs Mental Health in Infosec Amanda Berlin DerbyCon 8
2022-05-05Ninja Looting Like a Pirate Infojanitor DerbyCon 8
2022-05-05Building an Empire with IronPython Jim Shaver DerbyCon 8
2022-05-05Instant Response Making IR faster than you thought possible Mick Douglas Josh Johnson DerbyCon 8
2022-05-05Pwning in the Sandbox OSX Macro Exploitation Beyond Adam Gold Danny Chrastil DerbyCon 8
2022-05-05MS17 010 zerosum0x0 DerbyCon 8
2022-05-05Bug Hunting in RouterOS Jacob Baines DerbyCon 8
2022-05-05Gryffindor Pure JavaScript Covert Exploitation Matthew Toussain DerbyCon 8
2022-05-05I Can Be Apple and So Can You Josh Pitts DerbyCon 8
2022-05-05Brutal Blogging Go for the Jugular Kate Brew DerbyCon 8
2022-05-05Mirai Satori OMG and Owari IoT Botnets Oh My Peter Arzamendi DerbyCon 8
2022-05-05Protect Your Payloads Modern Keying Techniques Leo Loobeek DerbyCon 8
2022-05-05Deploying Deceptive Systems Luring Attackers from the Shadows Kevin Gennuso DerbyCon 8
2022-05-05How to test Network Investigative TechniquesNITs used by the FBI Dr Matthew Miller DerbyCon 8
2022-05-05Goodbye Obfuscation Hello Invisi Shell Hiding Your Powershell Script in Plain Sight Omer DerbyCon
2022-05-05Decision Analysis Applications in Threat Analysis Frameworks Emily Shawgo DerbyCon 8
2022-05-05Metasploit Town Hall 0x4 Brent Cook Aaron Soto Adam Cammack Cody Pierce DerbyCon 8
2022-05-05Breaking Into Your Building A Hackers Guide to Unauthorized Access Tim Roberts Brent Whit DerbyCon



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering