BSides Las Vegas

  • Rank #
  • Premiered: Jul 2009
  • Episodes: 351
  • Followers: 0
  • Ended
  • Unknown
  • Unknown
  • Special interest

You need to be logged in to mark episodes as watched. Log in or sign up.

Season 2012
2012x1
The State of Security BSides
Episode overview
Air date
Jul 25, 2012
3 years, 5 continents, 9 countries, 34 cities, 53 events. Not a bad start. As an all-volunteer organization, from the central org to every event, we have done amazing things. We have .. show full overview
2012x2
Amubush - Catching Intruders At Any Point
Episode overview
Air date
Jul 25, 2012
Intrusion detection and prevention systems monitor a point or set of points such as a network connection. In response, malware authors hide traffic through these points with encryption, .. show full overview
2012x3
Max Level Web App Security
Episode overview
Air date
Jul 25, 2012
I'm going to cover the topic of web application security from the worlds biggest "honeypot": 1.2+ million domains and one web application firewall. I will review the trends in new and .. show full overview
2012x4
Big Data's Fourth V: Or Why We'll Never Find the Loch Ness Monster
Episode overview
Air date
Jul 25, 2012
Variety, Volume, Velocity and Vulnerability. We know many different types of data is being generated at high speed but how much do we know about the new weakness it introduces? Security .. show full overview
2012x5
Empirical Exploitation
Episode overview
Air date
Jul 25, 2012
This episode has no summary.
2012x6
Puzzle Competitions and You
Episode overview
Air date
Jul 25, 2012
It's a rarity these days to attend a con and not have cipher text jump out of the program at you or find some recreational math hidden on the back of your attendee badge. Just like .. show full overview
2012x7
Introducing Android Security Evaluation Framework (ASEF)
Episode overview
Air date
Jul 25, 2012
First I will provide an introduction to security of Android Apps: we will take a look at them through the eyes of a security engineer, looking at examples of how to reverse engineer them .. show full overview
2012x8
RFID LOL
Episode overview
Air date
Jul 25, 2012
RFID access cards are often used to secure entry points in the corporate enteprise facilities. They are very convenient, relatively inexpensive, and generally assumed to be highly .. show full overview
2012x9
How I managed to break into the InfoSec World with only a tweet and an email
Episode overview
Air date
Jul 25, 2012
The InfoSec field is a hard career field to enter if you have little knowledge of security and no experience, but don’t let that discourage you. I was able to secure a job in the .. show full overview
2012x10
Breaking Microsoft Dynamics Great Plains - an insiders guide
Episode overview
Air date
Jul 25, 2012
In working with Microsoft GP for many years, Microsoft has made improvements to security while ignoring others. I would like to review my findings where GP is lacking in security, how it .. show full overview
2012x11
Lotus Notes Password Hash Redux
Episode overview
Air date
Jul 25, 2012
Despite publication of CVE-2007-0977, CVE-2005-2696, and CVE-2005-2428, enterprises continue expose their users' password hashes through insecure deployments of Lotus Notes and related .. show full overview
2012x12
How I Learned To Stop Worrying and Love the Smart Meter
Episode overview
Air date
Jul 25, 2012
The "Power Grid" is a growing topic in the security industry and Advanced Metering Infrastructure (AMI) is a topic that hasn't been discussed to its full potential. This presentation .. show full overview
2012x13
Shot With Your Own Gun: How Appliances are Used Against You
Episode overview
Air date
Jul 25, 2012
Security and monitoring appliances and applications are introducing all new places for attackers to get in and hide. As enterprise networks mature, they should become more secure. .. show full overview
2012x14
Mirror Mirror - Reflected PDF Attacks Using SQL Injection
Episode overview
Air date
Jul 25, 2012
SQL Injection vulnerabilities are old-hat, but there are many web applications in production that are still prone to this flaw. One subclass of these are websites that serve PDF .. show full overview
2012x15
Introducing the Smartphone Penetration Testing Framework
Episode overview
Air date
Jul 25, 2012
As smartphones enter the workplace, sharing the network and accessing sensitive data, it is crucial to be able to assess the security posture of these devices in much the same way we .. show full overview
2012x16
Arizona Craigslist Hookers (and other dating website shenanigans)
Episode overview
Air date
Jul 25, 2012
You'll laugh and cry as DCFluX remembers his experiences in the world of online dating. Over 3 years in the making. Viewer discretion is advised.
2012x17
When Devices Rat Us Out
Episode overview
Air date
Jul 25, 2012
Over the past 5 years I have been involved in developing advanced tracking technologies to assist in the recovery of stolen laptops, phones, cameras, flash drives and more: .. show full overview
2012x18
Ian Vitek - TBA Day of Conference
Episode overview
Air date
Jul 25, 2012
This episode has no summary.
2012x19
Why have we not fixed the ID problem?
Episode overview
Air date
Jul 25, 2012
This episode has no summary.
2012x20
int0x80 - TBA Day of Conference
Episode overview
Air date
Jul 25, 2012
This episode has no summary.
2012x21
Global Loot
Episode overview
Air date
Jul 25, 2012
This episode has no summary.
2012x22
Sexy Defense
Episode overview
Air date
Jul 25, 2012
Offensive talks are easy, I know. But the goal of offensive security at the end of the day is to make us better defenders. And that's hard. Usually after the pentesters/auditors (or .. show full overview
2012x23
Force Multipliers for Red Team Operations
Episode overview
Air date
Jul 26, 2012
March and April 2012, I worked with ~80 security professionals, in remote and local contexts, to break into systems protected by ~500 active defenders across several events. In this .. show full overview
2012x24
Applications and Cloud and Hackers, Oh My!
Episode overview
Air date
Jul 26, 2012
It would be irresponsible to state that cloud computing is directly responsible for the increased number of vulnerable applications on the Internet. Stating that cloud has likely .. show full overview
2012x25
Reticle: Dropping an Intelligent F-BOMB
Episode overview
Air date
Jul 26, 2012
F-BOMB is a disposable computing project, and Reticle is its software brain: a distributed, leaderless system for transferring data and commands to and from the tiny, distributed, .. show full overview
2012x26
The Magic of Symbiotic Security: Creating an Ecosystem of Security Systems
Episode overview
Air date
Jul 26, 2012
Throw out everything that you know about security tools today. No more six-figure appliances that only do one thing marginally well. No more proprietary protocols. We deserve better and .. show full overview
2012x27
Occupy Burp Suite: Informing the 99% of what the 1%'ers are knowingly taking advantage of
Episode overview
Air date
Jul 26, 2012
Burp Suite has created a name for itself as arguably one of the go-to weapons of choice for web application pentesters, but one of its best features is consistently being ignored: the .. show full overview
2012x28
Stiltwalker, Round 2
Episode overview
Air date
Jul 26, 2012
Stiltwalker is a system we designed to break the audio version of reCAPTCHA. At LayerOne, the original Stiltwalker was released. However reCAPTCHA updated its system to break Stiltwalker .. show full overview
2012x29
The Badmin project: (Na-na-nanana Na-na-nanana BADMIN)
Episode overview
Air date
Jul 26, 2012
Web Application Firewall. Network Access Control. Intrusion Detection Systems/Intrusion Preventions Systems. Intrinsic Heuristic Detectioneering Devices, this presentation can exploit .. show full overview
2012x30
IPv6 Panel / Drinking Game
Episode overview
Air date
Jul 26, 2012
Join HD Moore: CSO of Rapid7, Wolfgang Kandek: CTO of Qualys, Ron Gula: CEO/CTO of Tenable Network Security, and Misha Govshteyn: founder/VP of New Products at Alert Logicto .. show full overview
2012x31
Mainframed - The Forgotten Fortress
Episode overview
Air date
Jul 26, 2012
Mainframes? Unix? TSO (not the chicken)? This talk will try to demystify the mainframe from "that cool big black box"" to "why the hell is NOMIXEDCASE turned on" or "what kind of moron .. show full overview
2012x32
Metrics that Suck even less
Episode overview
Air date
Jul 26, 2012
At B-Sides SF, Dr. Mike Lloyd presented "Metrics that Don't Suck". this presentation aims to improve upon his work, adding the use of bayesian statistical analysis through the use of .. show full overview
2012x33
The Leverage of Language: Or How I Realized Information Theory Could Save Information Security
Episode overview
Air date
Jul 26, 2012
Information Security has an ingrained fear of new technology, which brings with it new complexity. This fear spills over into our own unwillingness to use these 'new-fangled' .. show full overview
2012x34
The Blooming Social Media Economics Built on "Fake" Identities
Episode overview
Air date
Jul 26, 2012
Social media has become a strong point of economic growth in all over the global. We are interested in studying the unethical or even illegal business that are built around several .. show full overview
2012x35
Mobile Snitch - Devices telling the world about you
Episode overview
Air date
Jul 26, 2012
This is more of a privacy talk than a security talk. The nature of mobile WiFi device behavior, combined with a lack of user awareness (or attention), could lead someone not only to know .. show full overview
2012x36
Secret Pentesting Techniques… Shh… …
Episode overview
Air date
Jul 26, 2012
Shh…
2012x37
Panel: Ask The EFF
Episode overview
Air date
Jul 26, 2012
Kurt Opsahl - Sr. Staff Attorney Trevor Timm - Activist Mitch Stoltz - Staff Attorney Hanni Fahoury - Staff Attorney Marcia Hoffman - Sr. Staff Attorney
2012x38
Sex and Breaking Bad: F$cking on the Periodic Table
Episode overview
Air date
Jul 26, 2012
This episode has no summary.
2012x39
Router of Darkness, Techniques for Embedded System Hacking
Episode overview
Air date
Jul 26, 2012
The embedded system market is great! They give us the power to make things happen, and give us shiny unicorns. I'm coming at this with the approach of a service provider, producing .. show full overview
2012x40 Season finale
Making Lockpicks the Legion303 Way
Episode overview
Air date
Jul 26, 2012
This episode has no summary.

If there are missing episodes or banners (and they exist on TheTVDB) you can request an automatic full show update:

Request show update