This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
start [2018/03/30 00:35] darksim905 [Previous Talks, Presentations & Additional Resources] |
start [2018/08/28 04:23] darksim905 [Previous Talks, Presentations & Additional Resources] |
||
---|---|---|---|
Line 16: | Line 16: | ||
|- | |- | ||
- | | 5/2/2018 || Ed Skoudis || Title to be announced || [[05-02-2018-ed-skoudis-unknown|]] | + | | 7/10/2018 || Dark Sim 905 || Protection: defending assets, information & yourself in a modern age || [[07-10-2018-DarkSim905-protection-defending-assets-info-and-you-in-modern-age|Dark Sim 905 - Protection: defending assets, information & yourself in a modern age]] |
|- | |- | ||
| 4/18/2018 || Jeremy Chisamore || Zero to OSCP in 292 days || [[04-18-2018-jeremy-chisamore-zero-to-oscp-292-days|Jeremy Chisamore - Zero to OSCP in 292 Days]] | | 4/18/2018 || Jeremy Chisamore || Zero to OSCP in 292 days || [[04-18-2018-jeremy-chisamore-zero-to-oscp-292-days|Jeremy Chisamore - Zero to OSCP in 292 Days]] | ||
Line 22: | Line 22: | ||
| 3/21/2018 || Rainbow || Everything is fucked & It's All Your Fault || [[03-21-2018-rainbow-everything-is-fucked|Everything is Fucked & It's All Your Fault!]] | | 3/21/2018 || Rainbow || Everything is fucked & It's All Your Fault || [[03-21-2018-rainbow-everything-is-fucked|Everything is Fucked & It's All Your Fault!]] | ||
|- | |- | ||
- | | 2/21/2018 || Ben Smith & Conner Gilsenan || Using Wireshark to dissect protocols / 2FA Primer & How to Fix It || [[02-21-2018-bensmith-using-wireshark-to-dissect-protocols-conner-gilsenan-2fa-primer-how-to-fix|Ben Smith - Using Wireshark to dissect protocols & Connor Gilsenan - 2FA primer & How to Fix It!]] | + | | 2/21/2018 || |
+ | Ben Smith, | ||
+ | Conner Gilsenan || Using Wireshark to dissect protocols / 2FA Primer & How to Fix It || [[02-21-2018-bensmith-using-wireshark-to-dissect-protocols-conner-gilsenan-2fa-primer-how-to-fix| | ||
+ | Ben Smith - Using Wireshark to dissect protocols, | ||
+ | |||
+ | Connor Gilsenan - 2FA primer & How to Fix It!]] | ||
|- | |- | ||
| 1/17/2018 || Dan Sherry || Threat Intelligence & You || [[01-17-2018-dan-sherry-threat-intelligence|Dan Sherry - Threat Intelligence & You]] | | 1/17/2018 || Dan Sherry || Threat Intelligence & You || [[01-17-2018-dan-sherry-threat-intelligence|Dan Sherry - Threat Intelligence & You]] | ||
Line 139: | Line 144: | ||
| [[https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/pdf/Virtualization_Deployment_and_Administration_Guide/Red_Hat_Enterprise_Linux-7-Virtualization_Deployment_and_Administration_Guide-en-US.pdf|RHEL 7 KVM Admin Guide]] || RHEL 7 Virtualization Administration & Deployment Guide | | [[https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/pdf/Virtualization_Deployment_and_Administration_Guide/Red_Hat_Enterprise_Linux-7-Virtualization_Deployment_and_Administration_Guide-en-US.pdf|RHEL 7 KVM Admin Guide]] || RHEL 7 Virtualization Administration & Deployment Guide | ||
|- | |- | ||
- | |[[http://www.amanhardikar.com/mindmaps.html|An amazing external source with many mindmaps & vulnerable VMs!]] || Useful as heck! | + | | [[http://www.amanhardikar.com/mindmaps.html|An amazing external source with many mindmaps & vulnerable VMs!]] || Useful as heck! |
|- | |- | ||
| [[https://www.youtube.com/user/LearnForensics/videos|DFIR Lunch]] || Amazing group of passionate folks! | | [[https://www.youtube.com/user/LearnForensics/videos|DFIR Lunch]] || Amazing group of passionate folks! | ||
Line 150: | Line 155: | ||
|- | |- | ||
| [[https://www.sans.org/reading-room/whitepapers/warfare/tools-standards-cyber-threat-intelligence-projects-34375|Tools and Standards for Cyber Threat Intelligence]] || Threat Intel Gathering. You may also want to read this [[https://www.alienvault.com/docs/SANS-Cyber-Threat-Intelligence-Survey-2015.pdf|related paper]] | | [[https://www.sans.org/reading-room/whitepapers/warfare/tools-standards-cyber-threat-intelligence-projects-34375|Tools and Standards for Cyber Threat Intelligence]] || Threat Intel Gathering. You may also want to read this [[https://www.alienvault.com/docs/SANS-Cyber-Threat-Intelligence-Survey-2015.pdf|related paper]] | ||
+ | |- | ||
+ | | [[https://www.troyhunt.com/understanding-http-strict-transport/|Troy Hunt - Understanding HSTS]] || Good page on what HSTS & why it is important if you're going to use a configuration from [[https://cipherli.st]] | ||
+ | |- | ||
+ | | [[https://github.com/Exa-Networks/exabgp/wiki|ExaBGP Wiki]] || Some really nice links here & information on basics of BGP | ||
+ | |- | ||
+ | | [[http://thomas.mangin.com/data/pdf/UKUUG%20Spring%202011%20-%20Mangin%20-%20BGP.pdf|The Benefits of BGP for every service provider]] || A great talk on BGP that covers quite a bit of knowledge. | ||
+ | |- | ||
+ | | [[http://unix.stackexchange.com/questions/105026/boot-partition-is-almost-full-in-centos#105029|Yum-utils]] || Useful feature here I didn't know about to keep previous kernels from piling up | ||
+ | |- | ||
+ | | [[http://michael.peopleofhonoronly.com/vim/|Vim Cheat Sheet]] || Vim Cheatsheet! :D | ||
+ | |- | ||
+ | | [[https://github.com/Security-Onion-Solutions/security-onion/wiki/Conference|SecurityOnion Conference]] || Some neat videos here on how to best use SecurityOnion | ||
+ | |- | ||
+ | | [[https://bettercrypto.org|BetterCrypto]] || Reference website on how to enable crypto properly on various services | ||
+ | |- | ||
+ | | [[https://superuser.com/questions/622541/what-does-dd-conv-sync-noerror-do|What does dd conv do]] || Useful example explaining some weird issues you may experience with dd & some mismatches that could occur between versions. | ||
+ | |- | ||
+ | | [[http://old.blog.phusion.nl/2012/09/21/the-right-way-to-deal-with-frozen-processes-on-unix/|Dealing with frozen processes]] || This is a great useful post to read for sysadmins & dev! | ||
+ | |- | ||
+ | | [[https://www.gnu.org/software/gawk/manual/gawkinet/gawkinet.html#SEC_Contents|How to TCP IP with Awk]] || some interesting ideas here... | ||
+ | |- | ||
+ | | [[https://unix.stackexchange.com/questions/153585/how-does-the-oom-killer-decide-which-process-to-kill-first|How does OOM killing work in Linux?]] || This is useful because apparently we don't properly know how to set memory usage in Qemu/KVM & seem to think memory is magic! | ||
+ | |- | ||
+ | | [[https://www.youtube.com/watch?v=cEb270L5Q1Y|Why IOPS sucks.]] || This describes IOPS for all the things | ||
|- | |- | ||
|} | |} | ||