2013
Talks will be posted after the event.
2012
(sadly, our streaming of this event was horribly done, so we don’t have much video)
- Reversing Patches for Exploit Creation, Pen-Testing or Just Fun! - Bharat Jogi
- RFIDLOL – Terry Gold Attacking Apache Reverse Proxy – Prutha Parikh
- Mapping The Penetration Tester’s Mind: 0 to Root In 60 Minutes – Kizz Myanthia
- Anatomy of an Attack – Kevin Flanagan
- Detection of Malware via Side Channel Analysis – Rian Quinn
- App Troller – Joe Testa
- Social Engineering & Special Deliveries
- SCADA Security – Why is it so hard? – Amol Sarwate
- Attacking Apache Reverse Proxy – Prutha Parikh
- OSSEC HIDS: A quick tour – Carl Schmidtman
- Breaking Down Windows Phone 7 – Sid Adukia
- Using Java Reflection to Unhide Android Goods – Corey Benninger
- How I sneaked into the Information Security Industry – Robert Chuvala
2011
- Scada Security – Chris Karr
- With Apologies to Mr. Mockapetris – pee
- Weaponizing the Smartphone – Deploying The Perfect WMD – Kizz Myanthia
- (501 – 1 = 500) The Windows System Equation – Zack Fasel
- How to Protect And Own Your Office Space – Dr. Tran
- Hook, Line and Syncer: A Liar for Hire’s Ultimate Tackle Box - Chris Silvers & Brad Antoniewicz
- NFC for N00bs - Corey Benninger
- Hacking A Mature Security Program…- David Kennedy