Never Ending Security

It starts all here

Tag Archives: BSides

BSides Tampa 2015 Videos


Track 1

Bug Bounties and Security Research
Kevin Johnson

Securing The Cloud
Alan Zukowski

Hacking
Chris Berberich

Vendor Induced Security Issues
Dave Chronister

Pentest Apocalypse
Beau Bullock

Kippo and Bits and Bits
Chris Teodorski

The Art of Post-infection Response & Mitigation
Caleb Crable

The Need for Pro-active Defense and Threat Hunting Within Organizations
Andrew Case


Track 2

Finding Common Ground within the Industry and Beyond
David Shearer

Ways to Identify Malware on a System
Ryan Irving

Android Malware and Analysis
Shane Hartman

Teaching Kids (and Even Some Adults) Security Through Gaming
Le Grecs

Evaluating Commercial Cyber Threat Intelligence
John Berger


Track 3

Cyber Geography and the Manifest Destiny of the 21st Century
Joe Blankenship

Mitigating Brand Damage From A Cyber Attack
Guy Hagen

What is a security analyst and what job role will they perform
James Risler

Live Forensic Acquisition Techniques
Joe Partlow

Cyber Security Awareness for Healthcare Professionals
Marco Polizzi


Download from: https://archive.org/download/BSidesTampa2015

BSides Las Vegas 2014 Video’s


Video’s from: https://archive.org/details/BSidesLV2014

Movie Files Animated GIF MPEG4 Ogg Video Thumbnail
A&Q-Session-Burnout.mp4 308.4 KB 91.1 MB 50.8 MB 4.8 KB
A&Q-Session-Career-(Beau-Woods)-&-Wrapup-and-Next-Steps-(Josh-Corman).mp4 304.7 KB 120.0 MB 110.7 MB 4.8 KB
A&Q-Session-Communications-Presentation-(Keren-Elazari).mp4 296.9 KB 85.2 MB 102.6 MB 7.8 KB
A&Q-Session-Disclosure-(Katie-Moussouris).mp4 325.2 KB 143.5 MB 122.6 MB 4.7 KB
A&Q-Session-Legal(Andrea-Matwyshyn).mp4 11.8 KB 428.6 KB 381.0 KB
A&Q-Session-Media-(Jen-Ellis).mp4 238.4 KB 104.6 MB 91.5 MB 4.7 KB
A&Q-Session-X-Altruism-(Andrea).mp4 241.8 KB 92.5 MB 78.5 MB 4.8 KB
bg00-opening-keynote-beyond-good-and-evil-towards-effective-security-adam-shostack.mp4 294.0 KB 178.8 MB 224.9 MB 6.5 KB
bg01-usb-write-blocking-with-usbproxy-dominic-spill.mp4 338.0 KB 203.6 MB 171.2 MB 5.4 KB
bg02-allow-myself-to-encrypt-myself-evan-davison.mp4 313.4 KB 216.7 MB 216.9 MB 5.2 KB
bg03-what-reaction-to-packet-loss-reveals-about-a-vpn-anna-shubina-sergey-bratus.mp4 348.0 KB 128.6 MB 152.8 MB 6.2 KB
bg04-untwisting-the-mersenne-twister-how-i-killed-the-prng-moloch.mp4 282.2 KB 164.4 MB 177.9 MB 4.9 KB
bg05-anatomy-of-memory-scraping-credit-card-stealing-pos-malware-amol-sarwate.mp4 321.4 KB 196.9 MB 202.2 MB 5.7 KB
bg06-cluck-cluck-on-intels-broken-promises-jacob-torrey.mp4 358.5 KB 128.4 MB 138.6 MB 6.6 KB
bg07-a-better-way-to-get-intelligent-about-threats-adam-vincent.mp4 339.8 KB 195.8 MB 210.8 MB 6.7 KB
bg08-bring-your-own-risky-apps-michael-raggo-kevin-watkins.mp4 366.7 KB 206.0 MB 199.6 MB 6.2 KB
bg09-invasive-roots-of-anti-cheat-software-alissa-torres.mp4 335.4 KB 237.3 MB 199.9 MB 5.6 KB
bg10-vaccinating-android-milan-gabor-danijel-grah.mp4 357.6 KB 181.9 MB 210.9 MB 7.3 KB
bg11-security-testing-for-smart-metering-infrastructure-steve-vandenberg-robert-hawk.mp4 408.7 KB 204.2 MB 198.1 MB 6.4 KB
bg12-the-savage-curtain-tony-trummer-tushar-dalvi.mp4 368.0 KB 151.7 MB 191.3 MB 10.2 KB
bg13-we-hacked-the-gibson-now-what-philip-young.mp4 356.0 KB 196.4 MB 229.8 MB 6.2 KB
cg00-sha-1-backdooring-and-exploitation-jean-philippe-aumasson.mp4 321.8 KB 96.9 MB 122.7 MB 6.5 KB
cg01-evading-code-emulation-writing-ridiculously-obvious-malware-that-bypasses-av-kyle-adams.mp4 343.2 KB 223.2 MB 251.7 MB 5.8 KB
cg02-security-management-without-the-suck-tony-turner-tim-krabec.mp4 305.1 KB 174.7 MB 189.7 MB 5.9 KB
cg04-malware-analysis-101-n00b-to-ninja-in-60-minutes-grecs.mp4 328.5 KB 189.4 MB 247.9 MB 6.2 KB
cg05-travel-hacking-with-the-telecom-informer-tprophet.mp4 337.6 KB 207.0 MB 228.2 MB 4.5 KB
cg06-the-untold-story-about-atm-malware-daniel-regalado.mp4 346.3 KB 162.1 MB 183.2 MB 5.6 KB
cg08-why-am-i-surrounded-by-friggin-idiots-(because-you-hired-them)-stephen-heath.mp4 327.7 KB 218.8 MB 222.3 MB 4.6 KB
cg09-demystiphying-and-fingerprinting-the-802-15-4-zigbee-phy-ira-ray-jenkins-sergey-bratus.mp4 338.1 KB 163.0 MB 181.5 MB 5.5 KB
cg10-insider-threat-kill-chain-human-indicators-of-compromise-ken-westin.mp4 222.8 KB 71.6 MB 90.0 MB 4.3 KB
cg11-a-place-to-hang-our-hats-security-community-and-culture-domenic-rizzolo.mp4 246.1 KB 67.5 MB 86.7 MB 6.4 KB
cg12-booze-devils-advocate-and-hugs-the-best-debates-panel-youll-see-at-bsideslv-2014-david-mortman-joshua-corman-jay-radcliffe-zach-lanier-david-kennedy.mp4 431.8 KB 461.2 MB 196.9 MB 6.0 KB
gt00-the-power-law-of-information-michael-roytman.mp4 359.7 KB 281.0 MB 190.4 MB 5.8 KB
gt01-measuring-the-iq-of-your-threat-intelligence-feeds-alex-pinto-kyle-maxwell.mp4 381.0 KB 462.5 MB 235.2 MB 5.7 KB
gt02-strategies-without-frontiers-meredith-l-patterson.mp4 312.8 KB 325.4 MB 340.3 MB 5.1 KB
gt03-clusterf-ck-actionable-intelligence-from-machine-learning-mike-sconzo.mp4 366.4 KB 164.9 MB 171.9 MB 7.2 KB
gt04-know-thy-operator-misty-blowers.mp4 352.5 KB 197.7 MB 154.6 MB 5.7 KB
gt05-improving-security-by-avoiding-traffic-and-still-get-what-you-want-in-data-transfers-art-conklin.mp4 314.8 KB 204.5 MB 170.7 MB 4.5 KB
gt06-the-semantic-age-or-a-young-ontologists-primer.mp4 373.5 KB 203.1 MB 211.7 MB 4.7 KB
pg00-edsec-hacking-for-education-jessy-irwin.mp4 290.2 KB 89.7 MB 122.2 MB 6.2 KB
pg02-securing-sensitive-data-a-strange-game-jeff-elliot.mp4 198.0 KB 65.6 MB 86.4 MB 4.0 KB
pg03-brick-in-the-wall-vs-hole-in-the-wall-caroline-d-hardin.mp4 315.9 KB 81.7 MB 117.0 MB 5.8 KB
pg04-cut-the-shit-how-to-reign-in-your-ids-tony-robinson-da-667.mp4 304.7 KB 92.3 MB 115.1 MB 6.4 KB
pg05-geek-welfare-confessions-of-a-convention-swag-hoarder-rachel-keslensky.mp4 341.2 KB 213.4 MB 138.1 MB 5.2 KB
pg06-no-infosec-staff-no-problem-anthony-czarnik.mp4 278.7 KB 117.9 MB 98.2 MB 5.4 KB
pg07-can-i-code-against-an-api-to-learn-a-product-adrienne-merrick-tagore.mp4 162.6 KB 58.4 MB 71.3 MB 3.3 KB
pg08-bridging-the-air-gap-cross-domain-solutions-patrick-orzechowski.mp4 316.7 KB 127.3 MB 113.8 MB 5.8 KB
pg09-back-dooring-the-digital-home-david-lister.mp4 379.6 KB 135.1 MB 127.2 MB 7.4 KB
pg11-ios-url-schemes-omg-guillaume-k-ross.mp4 328.2 KB 109.4 MB 126.3 MB 5.0 KB
pg12-oops-that-wasnt-suppossed-to-happen-bypassing-internet-explorers-cross-site-scripting-filter-carlos-munoz.mp4 264.9 KB 90.5 MB 105.5 MB 4.7 KB
pg13-what-ive-learned-as-a-con-man-masterchen.mp4 280.3 KB 100.4 MB 132.8 MB 6.2 KB
pg14-training-with-raspberry-pi-nathaniel-davis.mp4 261.3 KB 91.1 MB 94.3 MB 5.7 KB
pg15-black-magic-and-secrets-how-certificates-influence-you-robert-lucero.mp4 293.2 KB 100.9 MB 129.3 MB 4.1 KB
pg16-attacking-drupal-greg-foss.mp4 333.9 KB 132.3 MB 133.2 MB 5.6 KB
pg17-hackers-vs-auditors-dan-anderson.mp4 374.5 KB 135.3 MB 124.8 MB 6.7 KB
pg19-pwning-the-hapless-or-how-to-make-your-security-program-not-suck-casey-dunham-emily-pience.mp4 284.5 KB 97.9 MB 106.5 MB 6.9 KB
pg20-teach-a-man-to-phish-vinny-lariza.mp4 253.5 KB 86.4 MB 94.2 MB 4.6 KB
pg21-the-lore-shows-the-way-eric-rand.mp4 274.6 KB 107.0 MB 118.4 MB 6.2 KB
Information Format Size
BSidesLV2014_files.xml Metadata [file]
BSidesLV2014_meta.sqlite Metadata 104.0 KB
BSidesLV2014_meta.xml Metadata 701.0 B
Other Files Archive BitTorrent
BSidesLV2014_archive.torrent 228.0 KB

BSides Cleveland 2014 Video’s


Video’s from: https://archive.org/details/BSidesCleveland2014

Movie Files Animated GIF MPEG4 Ogg Video Thumbnail
APT2-Building-a-Resiliency-Program-to-Protect-Business-Edward-McCabe.mp4 261.6 KB 144.5 MB 179.9 MB 5.8 KB
Am-I-an-Imposter-Warren-Kopp.mp4 270.1 KB 104.6 MB 97.5 MB 8.0 KB
Attacking-and-Defending-Full-Disk-Encryption-Tom-Kopchak.mp4 370.0 KB 192.9 MB 180.0 MB 7.3 KB
Cleveland-Locksport-Jeff-Moss-Doug-Hiwiller-and-Damon-Ramsey.mp4 276.1 KB 125.2 MB 102.0 MB 4.8 KB
Fun-with-Dr-Brown-Spencer-McIntyre.mp4 328.9 KB 111.0 MB 134.7 MB 5.1 KB
Hacking-Diversity-Gregorie-Thomas.mp4 296.8 KB 129.8 MB 134.3 MB 4.5 KB
Keynote-Dave-Kennedy.mp4 320.2 KB 170.5 MB 208.4 MB 5.5 KB
Lockade-Locksport-Electronic-Games-Adrian-Crenshaw.mp4 321.2 KB 311.9 MB 198.0 MB 5.5 KB
Malware-Evolution-Epidemiology-Adam-Hogan.mp4 303.8 KB 199.9 MB 241.4 MB 6.2 KB
Password-Defense-Controls-your-users-wont-hate-Nathaniel-Maier.mp4 260.3 KB 112.7 MB 104.4 MB 4.7 KB
Pentesting-Layers-2-and-3-Kevin-Gennuso-and-Eric-Mikulas.mp4 336.1 KB 268.5 MB 202.6 MB 5.8 KB
Phishing-Like-a-Monarch-With-King-Phisher-Brandon-Geise-and-Spencer-McIntyre.mp4 300.2 KB 143.9 MB 112.2 MB 3.8 KB
Plunder-Pillage-and-Print-The-art-of-leverage-multifunction-printers-during-penetration-testing-Deral-Heiland).mp4 301.1 KB 180.7 MB 220.2 MB 4.5 KB
PowerShell-cool-$h!t-Zach-Wojton.mp4 318.1 KB 236.6 MB 211.9 MB 4.3 KB
The-importance-of-threat-intel-in-your-information-security-program-Jamie-Murdock.mp4 309.1 KB 127.1 MB 96.5 MB 6.1 KB
Thinking-Outside-the-Bunker-Security-as-a-practice-not-a-target-Steven-Legg.mp4 216.4 KB 84.0 MB 89.7 MB 4.1 KB
Threat-Models-that-Exercise-your-SIEM-and-Incident-Response-J-Wolfgang-Goerlich-and-Nick-Jacob.mp4 294.4 KB 127.0 MB 142.2 MB 4.4 KB
Information Format Size
BSidesCleveland2014_files.xml Metadata [file]
BSidesCleveland2014_meta.sqlite Metadata 39.0 KB
BSidesCleveland2014_meta.xml Metadata 738.0 B
Other Files Archive BitTorrent
BSidesCleveland2014_archive.torrent 69.2 KB

BSides Columbus 2015 Video’s


Video’s from: https://archive.org/details/BSidesColumbus2015

Movie Files Thumbnail Animated GIF MPEG4 Ogg Video
Defense00-Got-software-Need-a-security-test-plan-Got-you-covered-Bill-Sempf.mp4 4.0 KB 304.6 KB 156.6 MB 190.8 MB
Defense01-Corporate-Wide-SSL-Interception-and-Inspection-Frank-Shaw.mp4 6.2 KB 293.2 KB 87.3 MB 122.5 MB
Defense02-How-to-Rapidly-Prototype-Machine-Learning-Solutions-to-Solve-Security-Problems-Jason-Montgomery.mp4 5.8 KB 345.7 KB 246.0 MB 220.9 MB
Defense03-A-Basic-Guide-to-Advanced-Incident-Response-Scott-Roberts.mp4 5.8 KB 282.2 KB 170.7 MB 201.8 MB
Defense04-Supply-and-Demand-Solving-the-InfoSec-Talent-Shortage-Brandon-Allen.mp4 7.2 KB 331.2 KB 151.5 MB 164.7 MB
Jason-Street-Keynote.mp4 6.9 KB 331.1 KB 195.5 MB 210.6 MB
Keynote00-Cloud-and-Virtualization-Theory-Grauben-Guevara.mp4 7.4 KB 300.7 KB 131.7 MB 174.3 MB
Offense00-User-Behavior-Analysis-Matt-Bianco.mp4 3.1 KB 290.3 KB 149.7 MB 182.1 MB
Offense01-Plunder-Pillage-and-Print-The-art-of-leverage-multifunction-printers-during-penetration-testing-Deral-Heiland.mp4 4.9 KB 338.9 KB 221.0 MB 243.7 MB
Offense02-Common-Sense-Security-Framework-Jerod-Brennen.mp4 5.6 KB 313.9 KB 216.9 MB 218.9 MB
Offense04-OWASP-Mobile-Top-Ten-Why-They-Matter-and-What-We-Can-Do-Ricky-Rickard.mp4 4.1 KB 292.6 KB 158.8 MB 201.1 MB
Special-Teams00-Do-We-Still-Need-Pen-Testing-Jeff-Mann.mp4 6.1 KB 355.8 KB 156.2 MB 184.0 MB
Special-Teams01-Trolling-Attackers-for-Fun-Profit-Stephen-Hosom.mp4 4.7 KB 289.9 KB 135.2 MB 162.2 MB
Special-Teams02-Inurlrobotstxt-What-are-YOU-hiding-David-Young.mp4 6.1 KB 232.7 KB 72.9 MB 87.1 MB
Special-Teams03-Malware-Development-as-the-Evolution-of-Parasites-Adam-Hogan.mp4 5.2 KB 313.0 KB 182.9 MB 234.5 MB
Special-Teams04-Snort-Beyond-IDS-Open-Source-Application-and-File-Control-Adam-Hogan.mp4 4.9 KB 362.3 KB 240.1 MB 230.6 MB
Information Format Size
BSidesColumbus2015_files.xml Metadata [file]
BSidesColumbus2015_meta.sqlite Metadata 38.0 KB
BSidesColumbus2015_meta.xml Metadata 767.0 B
Other Files Archive BitTorrent
BSidesColumbus2015_archive.torrent 71.6 KB

BSides Huntsville 2015 Video’s


Video’s from: https://archive.org/details/BSidesHuntsville2015

Movie Files Animated GIF MPEG4 Ogg Video Thumbnail
Active-Cyber-Defense-Cycle-Robert-M-Lee.mp4 371.4 KB 104.7 MB 148.5 MB 5.8 KB
Reverse-Engineering-Network-Device-APIs-Dan-Nagle.mp4 251.0 KB 66.2 MB 82.1 MB 6.0 KB
Track101-Real-World-Threats-Russ-Ward.mp4 325.8 KB 85.5 MB 108.0 MB 6.3 KB
Track102-Lock-picking-but-bypass-is-easier-Adrian-Crenshaw-irongeekadc.mp4 376.1 KB 285.4 MB 193.4 MB 5.3 KB
Track103-The-Dark-Side-Of-PowerShell-Joshua-Smithdeo.mp4 340.5 KB 170.7 MB 162.5 MB 5.8 KB
Track104-Give-me-your-data-Dave-Chronister.mp4 310.3 KB 161.7 MB 207.3 MB 4.3 KB
Track105-Gods-and-Monsters-A-tale-of-the-dark-side-of-the-web-Aamir-Lakhani.mp4 384.0 KB 128.6 MB 138.8 MB 6.3 KB
Track106-Sensory-Perception-A-DIY-approach-to-building-a-sensor-network-Tim-Fowler.mp4 338.0 KB 170.8 MB 192.9 MB 7.0 KB
Track107-Hijacking-Label-Switched-Networks-in-the-Cloud-Paul-Coggin-PaulCoggin.mp4 390.8 KB 133.9 MB 141.7 MB 7.8 KB
Track200-So-Easy-A-High-Schooler-Could-Do-It-Static-malware-analysis-using-function-level-signatures-James-Brahm-Matthew-Rogers-and-Morgan-Wagner.mp4 236.7 KB 102.1 MB 95.1 MB 7.9 KB
Track201-Pragmatic-Cloud-Security-What-InfoSec-Practitioners-Have-Been-Waiting-For-Josh-Danielson-JoshGDanielson-and-Arthur-Andrieu.mp4 285.9 KB 141.1 MB 155.6 MB 4.7 KB
Track202-Developing-an-Open-Source-Threat-Intelligence-Program-Edward-McCabe-edwardmccabe.mp4 316.3 KB 212.3 MB 170.8 MB 4.4 KB
Track203-Applying-User-Centered-Design-Techniques-for-Augmenting-Human-Perception-in-Cyber-Warfare-Frank-Cohee.mp4 372.5 KB 165.2 MB 169.4 MB 5.7 KB
Track204-The-Great-Trojan-Demo-Ben-Miller.mp4 336.7 KB 179.6 MB 144.8 MB 8.2 KB
Track205-A-Virtual-SCADA-Laboratory-for-Cybersecurity-Pedagogy-and-Research-Zach-Thornton.mp4 313.8 KB 111.6 MB 128.8 MB 5.6 KB
Track206-PlagueScanner-An-Open-Source-Multiple-AV-Scanner-Framework-Utkonos.mp4 320.7 KB 129.6 MB 122.7 MB 6.3 KB
Information Format Size
BSidesHuntsville2015_files.xml Metadata [file]
BSidesHuntsville2015_meta.sqlite Metadata 36.0 KB
BSidesHuntsville2015_meta.xml Metadata 710.0 B
Other Files Archive BitTorrent
BSidesHuntsville2015_archive.torrent 62.1 KB