BSides Las Vegas

  • Rank #
  • Premiered: Jul 2009
  • Episodes: 351
  • Followers: 0
  • Ended
  • Unknown
  • Unknown
  • Special interest

You need to be logged in to mark episodes as watched. Log in or sign up.

Season 2014
2014x1
Opening Keynote -- Beyond Good and Evil: Towards Effective Security
Episode overview
Air date
Aug 05, 2014
The contrast between the enthusiasm which brings together the BSides community and the burnout which impacts our professional lives is so blindingly obvious it's easy to miss. This talk .. show full overview
2014x2
SHA-1 backdooring and exploitation
Episode overview
Air date
Aug 05, 2014
We've heard a lot about crypto backdoors recently (the flawed Dual_EC RNG, NIST curves and their fishy parameters, etc.). This talk presents new results on crypto backdooring, with the .. show full overview
2014x3
#edsec: Hacking for Education
Episode overview
Air date
Aug 05, 2014
Every day, endless consumer and educational technologies provide learning opportunities in classrooms across the planet. We already live in a world where every moment of a child’s life .. show full overview
2014x4
The Power Law of Information
Episode overview
Air date
Aug 05, 2014
Power laws occur widely and irrefutably in economics, physics, biology, and international relations. The root causes of power laws are hard to determine, but a good theory is that .. show full overview
2014x5
USB write blocking with USBProxy
Episode overview
Air date
Aug 05, 2014
USB mass storage devices are some of the most common peripherals in use today. They number in the billions and have become the de-facto standard for offline data transfer. USB drives .. show full overview
2014x6
Skull And Bones (And Warez) - Secret Societies of the Computer Underground (and why you should create one too)
Episode overview
Air date
Aug 05, 2014
Long ago, during the “Great Age of l33t”, the digital oceans were traversed by notorious bands of pseudonymous ne’er-do-wells. These outlaw fleets, festooned with brightly-colored flags, .. show full overview
2014x7
So, you want to be a pentester?
Episode overview
Air date
Aug 05, 2014
So, you've gone to a bunch of conferences, and you've seen the movie Swordfish, and now you think you want to be a super l337 h4x0r, right? This will be a fast-paced, comedy-driven .. show full overview
2014x8
Evading code emulation: Writing ridiculously obvious malware that bypasses AV
Episode overview
Air date
Aug 05, 2014
Code emulation, a technology capable of detecting malware for which no signature exists. It’s a powerful step in the right direction for client security, but it’s a long way from mature. .. show full overview
2014x9
Measuring the IQ of your Threat Intelligence feeds
Episode overview
Air date
Aug 05, 2014
Threat Intelligence feeds are now being touted as the saving grace for SIEM and log management deployments, and as a way to supercharge incident detection and even response practices. We .. show full overview
2014x10
Secure your email – Secure your password
Episode overview
Air date
Aug 05, 2014
This episode has no summary.
2014x11
Allow myself to encrypt...myself!
Episode overview
Air date
Aug 05, 2014
At BSides LV 2013, I shared a dream…of a day when all-the-things would be endowed with…with huge…encryption! YES! BIG ENCRYPTION! Where NSA is spelled with F & U! Of a future where I can .. show full overview
2014x12
Custodiet watches your packets! The Open Source MSSP Framework
Episode overview
Air date
Aug 05, 2014
Our friends lose their jobs. McJobs don't cut it, and unemployment sucks. We decided to make a framework that would allow them to start their own businesses, and to keep their technical .. show full overview
2014x13
Securing Sensitive Data: A Strange Game
Episode overview
Air date
Aug 05, 2014
Information security compliance regulations like PCI, HIPAA, SB1386 have been around for many years now, but we continue to suffer large data breaches. In this talk, an experienced PCI .. show full overview
2014x14
Is Pavlovian Password Management The Answer?
Episode overview
Air date
Aug 05, 2014
This episode has no summary.
2014x15
Highlights of CMU’s Recent Work in Preventing Bad Passwords
Episode overview
Air date
Aug 05, 2014
This episode has no summary.
2014x16
DoCatsLikeLemon? – Advanced phrase attacks and analysis
Episode overview
Air date
Aug 05, 2014
This episode has no summary.
2014x17
Password Hashing Competition: the Candidates
Episode overview
Air date
Aug 05, 2014
This episode has no summary.
2014x18
Brick in the Wall vs Hole in the Wall
Episode overview
Air date
Aug 05, 2014
If (school < hackerspaces) && (textbooks < wikipedia) Then While (self-motivated = true){ experiment; } If knowledge is power, then schools make us dumb and docile. Hackers know that .. show full overview
2014x19
What reaction to packet loss reveals about a VPN
Episode overview
Air date
Aug 05, 2014
Suppose there is a stream of packets coming through your gateway, their contents apparently encrypted. They may be from a standard VPN such as OpenVPN or an IPSec implementation .. show full overview
2014x20
Security Management Without the Suck
Episode overview
Air date
Aug 05, 2014
This talk will discuss real world techniques for implementing and optimizing a security program that we call RADIO(Recon, Analyze, Develop, Implement, Optimize). Conventional wisdom has .. show full overview
2014x21
Master Serial Killer
Episode overview
Air date
Aug 05, 2014
Project Robus is a search for vulnerabilities in ICS/SCADA protocol stack implementations. Most research and commercial tools to date have focused on the PLC/RTU/controller (server). .. show full overview
2014x22
Strategies Without Frontiers
Episode overview
Air date
Aug 05, 2014
Predicting your adversary's behaviour is the holy grail of threat modeling. This talk will explore the problem of adversarial reasoning under uncertainty through the lens of game theory, .. show full overview
2014x23
Tradeoff cryptanalysis of password hashing schemes
Episode overview
Air date
Aug 05, 2014
This episode has no summary.
2014x24
What Microsoft would like from the Password Hashing Competition
Episode overview
Air date
Aug 05, 2014
This episode has no summary.
2014x25
Cut the sh**: How to reign in your IDS
Episode overview
Air date
Aug 05, 2014
Intrusion detection systems, Network Security Monitoring. All too often, these countermeasures are portrayed as the ‘boy who cried wolf’, the magical box with blinking lights that does .. show full overview
2014x26
Using cryptanalysis to speed-up password cracking
Episode overview
Air date
Aug 05, 2014
This episode has no summary.
2014x27
Untwisting the Mersenne Twister: How I killed the PRNG
Episode overview
Air date
Aug 05, 2014
Applications rely on generating random numbers to provide security, and fail catastrophically when these numbers turn out to be not so “random.” For penetration testers, however, the .. show full overview
2014x28
Vulnerability Assessments on SCADA: How i 'owned' the Power Grid
Episode overview
Air date
Aug 05, 2014
Critical Infrastructure security has been on the news and the talk of the town since 2005. While there are many talks and demonstrations about how to penetrate and exploit SCADA systems, .. show full overview
2014x29
501(c)(3) for (un)fun and (non)profit
Episode overview
Air date
Aug 05, 2014
So you want to be a non-profit charitable corporation, eh? Do you understand what that means, the amount of work involved, and the restrictions 501(c)(3) places on your fundraising? In .. show full overview
2014x30
Geek Welfare -- Confessions of a Convention Swag Hoarder
Episode overview
Air date
Aug 05, 2014
Have you ever had to justify to your company why you had to go to that expensive conference and give away all that swag — or why you came back with so much of it? Tired of explaining who .. show full overview
2014x31
ClusterF*ck - Actionable Intelligence from Machine Learning
Episode overview
Air date
Aug 05, 2014
Everybody is aware of the buzzword BINGO wining square of "Machine Learning", but how can we apply this to a real problem? More importantly what output can we drive from doing some .. show full overview
2014x32
Password Security in the PCI DSS
Episode overview
Air date
Aug 05, 2014
This episode has no summary.
2014x33
How Forced Password Expiration Affects Password Choice
Episode overview
Air date
Aug 05, 2014
This episode has no summary.
2014x34
No InfoSec Staff? No Problem
Episode overview
Air date
Aug 05, 2014
Every IT organization accessing sensitive data, regardless of their size, must protect that data. Otherwise, your company is exposed to unacceptable risk. However, since cyber attacks on .. show full overview
2014x35
Anatomy of memory scraping, credit card stealing POS malware
Episode overview
Air date
Aug 05, 2014
Cedit card stealing RAM scraper malware is running amok compromising point-of-sale (POS) systems. Recent breaches have shown that exposure to such attacks is high and there is a lot at .. show full overview
2014x36
Malware Analysis 101 - N00b to Ninja in 60 Minutes
Episode overview
Air date
Aug 05, 2014
Knowing how to perform basic malware analysis can go a long way in helping infosec analysts do some basic triage to either crush the mundane or recognize when its time to pass the more .. show full overview
2014x37
Protecting Data – How Cultural-Political Heritage Shapes Security Approaches
Episode overview
Air date
Aug 05, 2014
In Europe, security systems are built with the end goal to safe-keep the privacy of sensitive data. In the U.S, security systems are architected with the goal of securing sensitive .. show full overview
2014x38
Can I Code Against an API to Learn a Product?
Episode overview
Air date
Aug 05, 2014
“Can I learn how to use the product my company sells by interfacing with its API?” That was the question I asked myself when I started at OpenDNS in the marketing department. Having .. show full overview
2014x39
Know thy operator
Episode overview
Air date
Aug 05, 2014
In real world systems, operators are often inundated with alarms which alert when various anomalous events are detected. A software tool was developed that makes use of machine learning .. show full overview
2014x40
Defense with 2FA
Episode overview
Air date
Aug 05, 2014
This episode has no summary.
2014x41
Security for the People: End-User Authentication Security on the Internet
Episode overview
Air date
Aug 05, 2014
This episode has no summary.
2014x42
Bridging the Air Gap: Cross Domain Solutions
Episode overview
Air date
Aug 05, 2014
For years the government has been using CDS to bridge networks with different classification levels. This talk will focus on what CDS systems are, how they’re built, and what kind of .. show full overview
2014x43
Cluck Cluck: On Intel's Broken Promises
Episode overview
Air date
Aug 05, 2014
Cluck Cluck presents an architectural, OS-independent method for accessing arbitrary physical memory from kernel shell-code or forensics memory acquisition tools where the virtual .. show full overview
2014x44
Travel Hacking With The Telecom Informer
Episode overview
Air date
Aug 05, 2014
People who know that I have visited all seven continents tell me all the time, “I could never travel as much as you do.” Granted, North Korea, Antarctica and Myanmar are not for .. show full overview
2014x45
FAP Fully Automated Pwning Techniques for Automated Reversing
Episode overview
Air date
Aug 05, 2014
Techniques to fully automate finding certain vulnerabilities while reversing have become much easier due to research using XUtools (extended grep and diff). This talk will explore these .. show full overview
2014x46
Improving security by avoiding traffic and still get what you want in data transfers
Episode overview
Air date
Aug 05, 2014
Critical infrastructure systems are frequently constructed with components never designed for use in today's networked environment. While security conscious enterprises have extensive .. show full overview
2014x47
Back Dooring the Digital Home
Episode overview
Air date
Aug 05, 2014
This talk will cover a high level vulnerability analysis of a modern digital home security system, which includes technologies such as an android touch screen, wireless motion sensors, .. show full overview
2014x48
I have the hashcat so I make the rules
Episode overview
Air date
Aug 05, 2014
This episode has no summary.
2014x49
Authentication in the Cloud – Building Service
Episode overview
Air date
Aug 05, 2014
This episode has no summary.
2014x50
The Semantic Age - or - A Young Ontologist's Primer
Episode overview
Air date
Aug 05, 2014
As Big Data and Machine-Learning start to make strides into Infosec, most of the rest of us are still working in SQL databases, CSV files and glueing things together with python and .. show full overview
2014x51
Penetrate your OWA
Episode overview
Air date
Aug 05, 2014
This episode has no summary.
2014x52
How EFF is Making STARTTLS Resistant to Active Attacks
Episode overview
Air date
Aug 05, 2014
This episode has no summary.
2014x53
Offline bruteforce attack on Wifi Protected Setup
Episode overview
Air date
Aug 05, 2014
This episode has no summary.
2014x54
All your SAP P@$$w0ЯdZ belong to us
Episode overview
Air date
Aug 06, 2014
This episode has no summary.
2014x55
Proof of work as an additional factor of authentication
Episode overview
Air date
Aug 06, 2014
This episode has no summary.
2014x56
iOS URL Schemes: omg://
Episode overview
Air date
Aug 06, 2014
Have you ever clicked a phone number in Safari to get the phone app to call that store/car dealership/pizza place you were searching for? In iOS, this interaction between apps .. show full overview
2014x57
A Better Way to Get Intelligent About Threats
Episode overview
Air date
Aug 06, 2014
There is a lot of talk about sharing and the security of our data. A recent Ponemon Report on Exchanging Cyber Threat Intelligence states that current threat sharing mechanisms are .. show full overview
2014x58
The untold story about ATM Malware
Episode overview
Air date
Aug 06, 2014
Everyone talks about ATM Malware, we can see videos in Internet hacking these machines but no one explains HOW an attacker can take control of an ATM and command it to dispense the money .. show full overview
2014x59
A&Q Session - Communications Presentation
Episode overview
Air date
Aug 06, 2014
This episode has no summary.
2014x60
A&Q Session - Disclosure
Episode overview
Air date
Aug 06, 2014
This episode has no summary.
2014x61
A&Q Session - Burnout
Episode overview
Air date
Aug 06, 2014
This episode has no summary.
2014x62
A&Q Session - Legal
Episode overview
Air date
Aug 06, 2014
This episode has no summary.
2014x63
A&Q Session Media
Episode overview
Air date
Aug 06, 2014
This episode has no summary.
2014x64
A&Q Session - X Altruism
Episode overview
Air date
Aug 06, 2014
This episode has no summary.
2014x65
A&Q Session - Career
Episode overview
Air date
Aug 06, 2014
This episode has no summary.
2014x66
Business lessons that made me a better Security Professional
Episode overview
Air date
Aug 06, 2014
Case study of a three year journey of starting and managing a security non-profit. Will talk about lessons learned from the experience and successes and failures. Additionally, will .. show full overview
2014x67
Target specific automated dictionary generation
Episode overview
Air date
Aug 06, 2014
This episode has no summary.
2014x68
The future of mobile authentication is here
Episode overview
Air date
Aug 06, 2014
This episode has no summary.
2014x69
Oops, That Wasn't Suppossed To Happen: Bypassing Internet Explorer's Cross Site Scripting Filter
Episode overview
Air date
Aug 06, 2014
There's a problem with Internet Explorer's anti-Reflective Cross Site Scripting filter. A problem Microsoft knows about, but has decided not to fix. Drop on by and learn a method for bypassing the anti-XSS filter in all versions of Internet Explorer.
2014x70
Bring your own Risky Apps
Episode overview
Air date
Aug 06, 2014
BYOD is a cute and harmless-sounding acronym for a trend that is in reality introducing exponentially more risk to end-users and organizations. The common refrain is to seek out and .. show full overview
2014x71
Using Superpowers for Hardware Reverse Engineering
Episode overview
Air date
Aug 06, 2014
Superpowers, normally used by superheroes in the battle of good versus evil, are also accessible to engineers and hackers in equipment used for failure analysis and verification of PCB .. show full overview
2014x72
Reverse Engineering Mac Malware
Episode overview
Air date
Aug 06, 2014
Dynamic malware reverse engineering helps forensic analysts and reverse engineers gather quick data points such as callout domains, file download URLs or IP addresses, and dropped or .. show full overview
2014x73
What I've Learned As A Con-Man
Episode overview
Air date
Aug 06, 2014
This is a presentation of case studies from past experience and what I have learned from each case in regards to social engineering and the Human Psyche.
2014x74
Bitslice DES with LOP3.LUT
Episode overview
Air date
Aug 06, 2014
This episode has no summary.
2014x75
Password hashing delegation: How to get clients work for you
Episode overview
Air date
Aug 06, 2014
This episode has no summary.
2014x76
Training with Raspberry Pi
Episode overview
Air date
Aug 06, 2014
One of the biggest questions facing people trying to learn how to hack is “How do you practice without committing a felony?” Wi-Fi is one of the easiest things to break, but it still .. show full overview
2014x77
Invasive Roots of Anti-Cheat Software
Episode overview
Air date
Aug 06, 2014
Some of the most sophisticated rootkit behaviors are implemented by today's anti-cheat gaming software, in a constantly evolving game of cat and mouse. Game hackers often look for flaws .. show full overview
2014x78
Why am I surrounded by friggin' idiots?!? (Because you hired them!)
Episode overview
Air date
Aug 06, 2014
Let’s face it… Many people have better luck at the craps table that they do hiring the right candidate for their INFOSEC opening. Making matters worse, most of us have come from a purely .. show full overview
2014x79
Secret Pentesting Techniques Part Duex
Episode overview
Air date
Aug 06, 2014
As pentesters, we all have special techniques and tricks we use that make our jobs a lot easier. A few years back, I presented at BSIDES LV on some of the cool techniques that I use on a .. show full overview
2014x80
Net hashes: A review of many network protocols
Episode overview
Air date
Aug 06, 2014
This episode has no summary.
2014x81
Throw the User ID Down the Well
Episode overview
Air date
Aug 06, 2014
This episode has no summary.
2014x82
Black Magic and Secrets: How Certificates Influence You!
Episode overview
Air date
Aug 06, 2014
Public key certificates are becoming more and more prevalent in software. These certificates are used in more places than just protecting web connections over HTTPS. They are used for .. show full overview
2014x83
Attacking Drupal
Episode overview
Air date
Aug 06, 2014
Drupal is a very popular content management system that has been widely adopted by government agencies, major businesses, social networks, and more -- underscoring why understanding how .. show full overview
2014x84
Vaccinating Android
Episode overview
Air date
Aug 06, 2014
Number of mobile applications is rising and Android still holds large market share. As these numbers of applications grow, we need better tools to understand how applications work and to .. show full overview
2014x85
Demystiphying and Fingerprinting the 802.15.4/ZigBee PHY
Episode overview
Air date
Aug 06, 2014
Producing IEEE 802.15.4 PHY-frames reliably accepted by some digital radio receivers, but rejected by others---depending on the receiver chip's make and model---has strong implications .. show full overview
2014x86
Energy-efficient bcrypt cracking
Episode overview
Air date
Aug 06, 2014
This episode has no summary.
2014x87
Password Generators & Extended Character Set Passwords
Episode overview
Air date
Aug 06, 2014
This episode has no summary.
2014x88
Ripped from the Headlines What the news tells us about Information Security Incidents
Episode overview
Air date
Aug 06, 2014
Take a scientific look at information security incidents reported in the public news sources. This talk introduces the VERIS Community Database (VCDB), a research project aimed at .. show full overview
2014x89
RFID Hacking
Episode overview
Air date
Aug 06, 2014
Learn the basics of RFID hacking, in this workshop you will be guided through building an RFID sniffer using an arduino and any RFID reader to output the card data of a prospective .. show full overview
2014x90
Hackers vs Auditors
Episode overview
Air date
Aug 06, 2014
A view into what hackers are about and what auditors are about, comparison and contrasting.
2014x91
Insider Threat Kill Chain: Human Indicators of Compromise
Episode overview
Air date
Aug 06, 2014
Your organization’s greatest assets are also its greatest threat: People. Your greatest risk are those you trust. The intentions of these insiders can be sabotage, fraud, intellectual .. show full overview
2014x92
Security testing for Smart Metering Infrastructure
Episode overview
Air date
Aug 06, 2014
In July 2010, BC Hydro, the electric utility and grid operator of British Columbia began implementation of its Advanced Metering Infrastructure (AMI) program, formally known as the Smart .. show full overview
2014x93
Fuck These Guys: Practical Countersurveillance
Episode overview
Air date
Aug 06, 2014
We've all seen the steady stream of revelations about the NSA's unconstitutional, illegal mass surveillance. Seems like there's a new transgression revealed every week! I'm getting .. show full overview
2014x94
The problem with the real world
Episode overview
Air date
Aug 06, 2014
This episode has no summary.
2014x95
Encryption and Authentication: Passwords for all reasons
Episode overview
Air date
Aug 06, 2014
This episode has no summary.
2014x96
Third-Party Service Provider Diligence: Why are we doing it all wrong?
Episode overview
Air date
Aug 06, 2014
The demands of Third Party Service Provider vendor due diligence and compliance management are growing rapidly in light of increased emphasis on these programs by regulators as well as .. show full overview
2014x97
A Place to Hang Our Hats: Security Community and Culture
Episode overview
Air date
Aug 06, 2014
Contrary to popular belief and media depictions, hacking is a social endeavor. By examining the evolution of various hacking groups and collectives over the years, we can glean valuable .. show full overview
2014x98
Pwning the hapless or How to Make Your Security Program Not Suck
Episode overview
Air date
Aug 06, 2014
Pwning the hapless or How to Make Your Security Program Not Suck Customer data is our business. Whether within the financial or healthcare industries, the root of our business is to .. show full overview
2014x99
Password Topology Histogram Wear-Leveling, a.k.a. PathWell
Episode overview
Air date
Aug 06, 2014
This episode has no summary.
2014x100
Enhancing Password Based Key Derivation Techniques
Episode overview
Air date
Aug 06, 2014
This episode has no summary.
2014x101
The Savage Curtain
Episode overview
Air date
Aug 06, 2014
Mobile, the Final Frontier. These are the voyages of two researchers. Their 45 minute mission: to explore strange new apps, seek out new mobile SSL bugs and new SSL implementation flaws, .. show full overview
2014x102
Booze, Devil's Advocate, and Hugs: the Best Debates Panel You'll See at BSidesLV 2014
Episode overview
Air date
Aug 06, 2014
Our four intrepid debaters will tackle the most pressing issues facing the security community today, as suggested by you, our insightful audience. See them use their amazing powers of .. show full overview
2014x103
Ask the EFF
Episode overview
Air date
Aug 06, 2014
Once again, the Electronic Frontier Foundation returns to the Underground to answer your toughest Off-the-Record queries. Question some of the greatest minds in the field of internet law, in this annual BSidesLV tradition.
2014x104
Teach a man to Phish...
Episode overview
Air date
Aug 06, 2014
When the world ends, the only things that will be left on earth will be cockroaches, Twinkies, Keith Richards, and Phishing emails. With easy access to free and low cost cloud services, .. show full overview
2014x105
The Lore shows the Way
Episode overview
Air date
Aug 06, 2014
Mistakes have been made, and mistakes will be made again. Those unfamiliar with the history of the situation may end up going through the same thought processes and making the same .. show full overview
2014x106
Beam Me Up Scotty! – Passwords in the Enterprise
Episode overview
Air date
Aug 06, 2014
This episode has no summary.
2014x107
Capturing Passwords into the Secure Desktop
Episode overview
Air date
Aug 06, 2014
This episode has no summary.
2014x108
We Hacked the Gibson! Now what?
Episode overview
Air date
Aug 06, 2014
IBM has been touting the security of the mainframe for over 30 years. So much so, that the cult of mainframers believes that the platform is impenetrable. Just try showing how your new .. show full overview
2014x109
The Only Way to Tell the Truth is in Fiction: The Dynamics of Life in the National Security State
Episode overview
Air date
Aug 06, 2014
Over a decade ago, a friend at the National Security Agency told Richard Thieme that he could address the core issues they discussed in a context of ""ethical considerations for .. show full overview
2014x110 Season finale
Closing Keynote
Episode overview
Air date
Aug 06, 2014
This episode has no summary.

If there are missing episodes or banners (and they exist on TheTVDB) you can request an automatic full show update:

Request show update