Kerberoasting Revisited Will Schroeder DerbyCon 9

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=w8XGs7bIS6E



Duration: 21:46
17 views
0


DerbyCon 9 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security DerbyCon was a computer security conference based in Louisville, Kentucky. The first DerbyCon took place in 2011 and was founded by Martin Bos, Dave Kennedy, Alex Kah and Adrian Crenshaw. The conference has been held at the Hyatt Regency Louisville typically in late September.

On January 14, 2019, organizers announced that DerbyCon 9.0, to be held in September 2019, would be the last of the series, citing the increasing difficulty of holding conferences in the face of "a small, yet vocal group of people creating negativity, polarization, and disruption".
DerbyCon common activities included:

Presentations from keynote speakers, with topics including software security, social engineering, cyber security, security in the present day and future, and mobile applications.
Preconference training
Vendors and publishers
Lockpick Village
Mental Health & Wellness Village
BourbonCon, a social gathering during DerbyCon focusing on sampling fine Kentucky Bourbon
DerbyCon Party, which has featured The Crystal Method (2013, 2015) and Infected Mushroom (2014)

Conferences

DerbyCon 2013 Attendee Badge
DerbyCon 1.0 2011
DerbyCon 2.0 "Reunion" 2012
DerbyCon 3.0 "All in the Family" 2013
DerbyCon 4.0 "Family Rootz" 2014
DerbyCon 5.0 "Unity" 2015
DerbyCon 6.0 "Recharge" 2016
DerbyCon 7.0 "Legacy" September 20–24, 2017 at the Hyatt Regency in Louisville, Kentucky
DerbyCon 8.0 "Evolution" October 3–7, 2018 at the Marriott in Louisville, Kentucky

https://web.archive.org/web/20191223065559/https://www.derbycon.com/




Other Videos By All Hacking Cons


2022-05-07Hunting Phish Kits Josh Rickard DerbyCon 9
2022-05-07Lying in Wait Discovering and Exploiting Weaknesses in Automated Discovery Actions Timothy Wrig De
2022-05-07Last Minute Offensive Machine Learning James Bower DerbyCon 9
2022-05-07How to Tell the C Level Their Baby is Ugly Heather Smith DerbyCon 9
2022-05-07BloodHound Head to Tail Andy Robbins Rohan Vazarkar DerbyCon 9
2022-05-07How to Give the Gift That Keeps on Giving Your Knowledge Jason Blanchard DerbyCon 9
2022-05-07kubered Recipes for C2 Operations on Kubernetes Larry Suto Jeff Holden DerbyCon 9
2022-05-07How to cook a five star meal from the convenience of your hotel room Micah K Brown DerbyCon 9
2022-05-07DerbyCon 9 0 Metasploit Town Hall Redubbed DerbyCon 9
2022-05-07BloodHound From Red to Blue Mathieu Saulnier DerbyCon 9
2022-05-07Kerberoasting Revisited Will Schroeder DerbyCon 9
2022-05-07It Must Be Fancy Bear Xena Olsen DerbyCon 9
2022-05-07Defeating Next Gen AV and EDR Using Old And New Tricks on New Dogs Nick Lehman Graph X Steve Ei De
2022-05-07How do I detect technique X in Windows Applied Methodology to Definitively Answer this Question De
2022-05-07IPv6 Security Considerations For When Just Turn It Off Isnt Good Enough Jason Lewis DerbyCon 9
2022-05-07Hacking While Blind Joe B TheBlindHacker DerbyCon 9
2022-05-07Invoke GreatBirdOfCommonKnowledge Gathering what is scattered with ATTCK an Atomic Bird an DerbyCo
2022-05-07Hacking Humans Addressing Vulnerabilities in the Advancing Medical Device Landscape Gabrie DerbyCo
2022-05-07Cyber false flags and adversarial counterintelligence oh my Jacob Williams DerbyCon 9
2022-05-07Bad Audio 2 01 I PWN thee I PWN thee not Jayson E Street DerbyCon 9
2022-05-07Getting the most out of your covert physical security assessment A Clients Guide Brent Whi DerbyCo



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering