Patching Windows Executables With The Backdoor Factory Joshua Pitts DerbyCon 3

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=KwMufodU40o



Duration: 46:17
6 views
0


DerbyCon 3 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security DerbyCon was a computer security conference based in Louisville, Kentucky. The first DerbyCon took place in 2011 and was founded by Martin Bos, Dave Kennedy, Alex Kah and Adrian Crenshaw. The conference has been held at the Hyatt Regency Louisville typically in late September.

On January 14, 2019, organizers announced that DerbyCon 9.0, to be held in September 2019, would be the last of the series, citing the increasing difficulty of holding conferences in the face of "a small, yet vocal group of people creating negativity, polarization, and disruption".
DerbyCon common activities included:

Presentations from keynote speakers, with topics including software security, social engineering, cyber security, security in the present day and future, and mobile applications.
Preconference training
Vendors and publishers
Lockpick Village
Mental Health & Wellness Village
BourbonCon, a social gathering during DerbyCon focusing on sampling fine Kentucky Bourbon
DerbyCon Party, which has featured The Crystal Method (2013, 2015) and Infected Mushroom (2014)

Conferences

DerbyCon 2013 Attendee Badge
DerbyCon 1.0 2011
DerbyCon 2.0 "Reunion" 2012
DerbyCon 3.0 "All in the Family" 2013
DerbyCon 4.0 "Family Rootz" 2014
DerbyCon 5.0 "Unity" 2015
DerbyCon 6.0 "Recharge" 2016
DerbyCon 7.0 "Legacy" September 20–24, 2017 at the Hyatt Regency in Louisville, Kentucky
DerbyCon 8.0 "Evolution" October 3–7, 2018 at the Marriott in Louisville, Kentucky

https://web.archive.org/web/20191223065559/https://www.derbycon.com/




Other Videos By All Hacking Cons


2022-04-28Your Turn Johnny Long HFC DerbyCon 3
2022-04-28Union Select This Talk As New Exploitation And Obfuscation Techniques 00 Roberto Salgado DerbyCon
2022-04-28Windows Attacks At Is The New Black Rob Fuller And Chris Gates DerbyCon 3
2022-04-28Uncloaking IP Addresses On IRC Derek Callaway DerbyCon 3
2022-04-28Windows 0wn3d By Default Mark Baggett DerbyCon 3
2022-04-28Why Your It Bytes Frank J Hackett DerbyCon 3
2022-04-28Tmi How To Attack Sharepoint Servers And Tools To Make It Easier Kevin Johnson James Jardine Derby
2022-04-28Security Training And Research Cloud Strc Jimmy Murphy DerbyCon 3
2022-04-28Ios Reverse Ipwn Apps Mano Dash4rk Paul DerbyCon 3
2022-04-28Follow The Foolish Zebras Finding Threats In Your Logs Chris Larsen DerbyCon 3
2022-04-28Patching Windows Executables With The Backdoor Factory Joshua Pitts DerbyCon 3
2022-04-28Cracking Corporate Passwords Exploiting Password Policy Weaknesses Minga Rick Redman DerbyCon 3
2022-04-28Love Letters To Frank Abagnale How Do I Pwn Thee Let Me Count The Ways Jayson E Street DerbyCon 3
2022-04-28Finding The Signal In The Noise Quantifying Advanced Malware Dave Marcus DerbyCon 3
2022-04-28Password Intelligence Project Advanced Password Recovery And Modern Mitigation Strategies John Moore
2022-04-28Security Sucks And You Re Wearing A Nursing Bra Paul Asadoorian DerbyCon 3
2022-04-28Iocaware Actively Collect Compromise Indicators And Test Your Entire Enterprise Matt Jezorek Dennis
2022-04-28Collaborative Penetration Testing With Lair Tom Steeledan Kottmann DerbyCon 3
2022-04-28Passive Aggressive Defense Jason Clark DerbyCon 3
2022-04-28Look Ma No Exploits The Recon Ng Framework Tim Lanmaster53 Tomes DerbyCon 3
2022-04-28Intro To Dynamic Access Control In Windows Server 2012 Evan Anderson DerbyCon 3



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering