SniffAir An Open Source Framework for Wireless Security Assessments Matthew Eidelberg DerbyCon 7

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=om6ceN-QQu8



Duration: 31:19
1 views
0


DerbyCon 7 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security DerbyCon was a computer security conference based in Louisville, Kentucky. The first DerbyCon took place in 2011 and was founded by Martin Bos, Dave Kennedy, Alex Kah and Adrian Crenshaw. The conference has been held at the Hyatt Regency Louisville typically in late September.

On January 14, 2019, organizers announced that DerbyCon 9.0, to be held in September 2019, would be the last of the series, citing the increasing difficulty of holding conferences in the face of "a small, yet vocal group of people creating negativity, polarization, and disruption".
DerbyCon common activities included:

Presentations from keynote speakers, with topics including software security, social engineering, cyber security, security in the present day and future, and mobile applications.
Preconference training
Vendors and publishers
Lockpick Village
Mental Health & Wellness Village
BourbonCon, a social gathering during DerbyCon focusing on sampling fine Kentucky Bourbon
DerbyCon Party, which has featured The Crystal Method (2013, 2015) and Infected Mushroom (2014)

Conferences

DerbyCon 2013 Attendee Badge
DerbyCon 1.0 2011
DerbyCon 2.0 "Reunion" 2012
DerbyCon 3.0 "All in the Family" 2013
DerbyCon 4.0 "Family Rootz" 2014
DerbyCon 5.0 "Unity" 2015
DerbyCon 6.0 "Recharge" 2016
DerbyCon 7.0 "Legacy" September 20–24, 2017 at the Hyatt Regency in Louisville, Kentucky
DerbyCon 8.0 "Evolution" October 3–7, 2018 at the Marriott in Louisville, Kentucky

https://web.archive.org/web/20191223065559/https://www.derbycon.com/




Other Videos By All Hacking Cons


2022-05-04I want my EIP Mike Saunders AF DerbyCon 7
2022-05-04The Trap House Making your house as paranoid as you are Jonathan Echavarria David E Switzer DerbyC
2022-05-04Peekaboo I Own You Owning Hundreds of Thousands Vulnerable Devices with only two HTTP packets A De
2022-05-04I Survived Ransomware TWICE Matthew Perry DerbyCon 7
2022-05-04The NET Inter Operability Operation James Forshaw DerbyCon 7
2022-05-04Digital Vengeance Exploiting the Most Notorious CandC Toolkits Waylon Grange DerbyCon 7
2022-05-04How to safely conduct shenanigans EvilMog Renderman DerbyCon 7
2022-05-04The Current State of Security an Improv spection Sean Metcalf Nick Carr DerbyCon 7
2022-05-04Not a Security Boundary Bypassing User Account Control Matt Nelson DerbyCon 7
2022-05-04Detect Me If You Can Ben Ten DerbyCon 7
2022-05-04SniffAir An Open Source Framework for Wireless Security Assessments Matthew Eidelberg DerbyCon 7
2022-05-04Modern Evasion Techniques Jason Lang AF DerbyCon 7
2022-05-04How to Hunt for Lateral Movement on Your Network Ryan Nolette DerbyCon 7
2022-05-04Mobile APTs A look at nation state attacks and techniques for gathering intelligence from milita D
2022-05-04Securing Windows with Group Policy Josh Rickard DerbyCon 7
2022-05-04Hidden Treasure Detecting Intrusions with ETW Zac Brown DerbyCon 7
2022-05-04Memory Based Library Loading Someone Did That Already Casey Rosini DerbyCon 7
2022-05-04Derbycon 7 Opening DerbyCon 7
2022-05-04Windows Event Logs Zero 2 Hero Nate Guagenti Adam Swan DerbyCon 7
2022-05-04MacOS host monitoring the open source way Michael George DerbyCon 7
2022-05-04Here Be Dragons The Unexplored Land of Active Directory ACLs Andy Robbins Will Schroeder Rohan Der



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering