Web app testing classroom in a box the good the bad and the ugly Lee Neely Chelle Clement DerbyCon

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=CRgLimDMfYA



Duration: 33:45
0 views
0


DerbyCon 8 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security DerbyCon was a computer security conference based in Louisville, Kentucky. The first DerbyCon took place in 2011 and was founded by Martin Bos, Dave Kennedy, Alex Kah and Adrian Crenshaw. The conference has been held at the Hyatt Regency Louisville typically in late September.

On January 14, 2019, organizers announced that DerbyCon 9.0, to be held in September 2019, would be the last of the series, citing the increasing difficulty of holding conferences in the face of "a small, yet vocal group of people creating negativity, polarization, and disruption".
DerbyCon common activities included:

Presentations from keynote speakers, with topics including software security, social engineering, cyber security, security in the present day and future, and mobile applications.
Preconference training
Vendors and publishers
Lockpick Village
Mental Health & Wellness Village
BourbonCon, a social gathering during DerbyCon focusing on sampling fine Kentucky Bourbon
DerbyCon Party, which has featured The Crystal Method (2013, 2015) and Infected Mushroom (2014)

Conferences

DerbyCon 2013 Attendee Badge
DerbyCon 1.0 2011
DerbyCon 2.0 "Reunion" 2012
DerbyCon 3.0 "All in the Family" 2013
DerbyCon 4.0 "Family Rootz" 2014
DerbyCon 5.0 "Unity" 2015
DerbyCon 6.0 "Recharge" 2016
DerbyCon 7.0 "Legacy" September 20–24, 2017 at the Hyatt Regency in Louisville, Kentucky
DerbyCon 8.0 "Evolution" October 3–7, 2018 at the Marriott in Louisville, Kentucky

https://web.archive.org/web/20191223065559/https://www.derbycon.com/




Other Videos By All Hacking Cons


2022-05-07Victor or Victim Strategies for Avoiding an InfoSec Cold War Jason Lang Stuart McIntosh DerbyCon 8
2022-05-07State of Win32k Security Revisiting Insecure design Vishal Chauhan DerbyCon 8
2022-05-07Social Engineering At Work How to use positive influence to gain management buy in for an DerbyCon
2022-05-07VBA Stomping Advanced Malware Techniques Carrie Roberts Kirk Sayre Harold Ogden DerbyCon 8
2022-05-07So many pentesting tools from a 4 Arduino Kevin Bong Michael Vieau DerbyCon 8
2022-05-07Your Training Data is Bad and You Should Feel Bad Ryan J OGrady DerbyCon 8
2022-05-07Who Watches the Watcher Detecting Hypervisor Introspection from Unprivileged Guests Tomas DerbyCon
2022-05-07Ubiquitous Shells Jon Gorenflo DerbyCon 8
2022-05-07When Macs Come Under ATTCK Richie Cyrus DerbyCon 8
2022-05-07Two Factor Too Furious Evading and Protecting Evolving MFA Schemes Austin Baker Doug Bien DerbyCon
2022-05-07Web app testing classroom in a box the good the bad and the ugly Lee Neely Chelle Clement DerbyCon
2022-05-07Threat Intel On The Fly Tazz DerbyCon 8
2022-05-07Threat Hunting with a Raspberry Pi Jamie Murdock DerbyCon 8
2022-05-07Web App 101 Getting the lay of the land Mike Saunders DerbyCon 8
2022-05-07Early Detection Through Deception Jason Nester DerbyCon 9
2022-05-07Dynamic Risk Taking and Social Engineering Chris Hadnagy DerbyCon 9
2022-05-07Designing building a stealth C2 LDAP channel Rindert Kramer DerbyCon 9
2022-05-07DerbyCon Story Time Panel Dustin Heywood Evil Mog and others DerbyCon 9
2022-05-07I simulate therefore i catch enhancing detection engineering with adversary simulation Mauricio De
2022-05-07Build your own multi user password manager using open source software Michael Vieau Kevin DerbyCon
2022-05-07Hunting Webshells Tracking TwoFace Josh Bryant Robert Falcone DerbyCon 9



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering