Practical Exploitation Using A Malicious Service Set Identifier Ssid Deral Heiland DerbyCon 3

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=svyPVIgS6LE



Duration: 49:31
1 views
0


DerbyCon 3 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security DerbyCon was a computer security conference based in Louisville, Kentucky. The first DerbyCon took place in 2011 and was founded by Martin Bos, Dave Kennedy, Alex Kah and Adrian Crenshaw. The conference has been held at the Hyatt Regency Louisville typically in late September.

On January 14, 2019, organizers announced that DerbyCon 9.0, to be held in September 2019, would be the last of the series, citing the increasing difficulty of holding conferences in the face of "a small, yet vocal group of people creating negativity, polarization, and disruption".
DerbyCon common activities included:

Presentations from keynote speakers, with topics including software security, social engineering, cyber security, security in the present day and future, and mobile applications.
Preconference training
Vendors and publishers
Lockpick Village
Mental Health & Wellness Village
BourbonCon, a social gathering during DerbyCon focusing on sampling fine Kentucky Bourbon
DerbyCon Party, which has featured The Crystal Method (2013, 2015) and Infected Mushroom (2014)

Conferences

DerbyCon 2013 Attendee Badge
DerbyCon 1.0 2011
DerbyCon 2.0 "Reunion" 2012
DerbyCon 3.0 "All in the Family" 2013
DerbyCon 4.0 "Family Rootz" 2014
DerbyCon 5.0 "Unity" 2015
DerbyCon 6.0 "Recharge" 2016
DerbyCon 7.0 "Legacy" September 20–24, 2017 at the Hyatt Regency in Louisville, Kentucky
DerbyCon 8.0 "Evolution" October 3–7, 2018 at the Marriott in Louisville, Kentucky

https://web.archive.org/web/20191223065559/https://www.derbycon.com/




Other Videos By All Hacking Cons


2022-04-28Ooops Now What The Stolen Data Impact Model Sdim Brent Huston DerbyCon 3
2022-04-28Practical File Format Fuzzing Jared Allar DerbyCon 3
2022-04-28Some Defensive Ideas From Offensive Guys Justin Elze Robert Chuvala DerbyCon 3
2022-04-28Only 4201 Hello Asm World A Painless And Contextual Introduction To X86 Assembly Nicolle Neulist Rog
2022-04-28Diy Command Control For Fun And No Profit David Schwartzberg DerbyCon 3
2022-04-28Gitdigger Creating Useful Wordlists From Public Github Repositories Jaime Filson Wik DerbyCon 3
2022-04-28It's Only A Game Learning Security Through Gaming Bruce Potter DerbyCon 3
2022-04-28So You Want To Be A Pentester Raymond Gabler DerbyCon 3
2022-04-28New Shiny In The Metasploit Framework Egypt DerbyCon 3
2022-04-28Digital Energy Bpt Paul Coggin DerbyCon 3
2022-04-28Practical Exploitation Using A Malicious Service Set Identifier Ssid Deral Heiland DerbyCon 3
2022-04-28n00bies perspective on Pentesting Brandon Edmunds DerbyCon 3
2022-04-28Powershell And Windows Throw The Best Shell Parties Piotr Marszalik DerbyCon 3
2022-04-28Getting The Goods With Smbexec Eric Milam Brav0hax And Martin Bos Purehate DerbyCon 3
2022-04-28It's Okay To Touch Yourself Ben Ten Ben0xa DerbyCon 3
2022-04-28So Hopelessly Broken The Implications Of Pervasive Vulnerabilities In Soho Router Products Jacob Hol
2022-04-28My Security Is A Graph Your Arguement Is Invalid Gabriel Bassett DerbyCon 3
2022-04-28Sixnet Tools For Poking At Sixnet Things Mehdi Sabraoui DerbyCon 3
2022-04-28Decoding Bug Bounty Programs Jon Rose DerbyCon 3
2022-04-28Malware Testing Malware Scenarios On Your Network Tony Huffman Myne Us Juan Cortes Kongo 86 DerbyC
2022-04-28Shattering The Glass Crafting Post Exploitation Tools With Powershell Matt Johnson DerbyCon 3



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering