User Tools

Site Tools


start

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
start [2017/09/01 14:49]
darksim905 [Previous Talks, Presentations & Additional Resources]
start [2018/08/28 04:23] (current)
darksim905 [Previous Talks, Presentations & Additional Resources]
Line 16: Line 16:
  
 |- |-
-8/31/2017 || Martin & All || CXO Table Top || [[8-31-2017-martin-cxo-table-top|CXO Table Top]]+7/10/2018 || Dark Sim 905 || Protection: defending assets, information & yourself in a modern age  ​|| [[07-10-2018-DarkSim905-protection-defending-assets-info-and-you-in-modern-age|Dark Sim 905 - Protection: defending assets, information & yourself in a modern age]]
 |- |-
-| 5/17/2017 || Steve & All || Whose Incident Is It, Anyway? || [[5-17-2017-steve-infosec-social-whose-incident-is-it-anyway|Whose Incident Is It, Anyway?]]+| 4/18/2018 ||  Jeremy Chisamore || Zero to OSCP in 292 days || [[04-18-2018-jeremy-chisamore-zero-to-oscp-292-days|Jeremy Chisamore - Zero to OSCP in 292 Days]] 
 +|- 
 +| 3/21/2018 ||  Rainbow || Everything is fucked & It's All Your Fault || [[03-21-2018-rainbow-everything-is-fucked|Everything is Fucked & It's All Your Fault!]] 
 +|- 
 +| 2/21/2018 ||   
 +Ben Smith,  
 +Conner Gilsenan || Using Wireshark to dissect protocols / 2FA Primer & How to Fix It || [[02-21-2018-bensmith-using-wireshark-to-dissect-protocols-conner-gilsenan-2fa-primer-how-to-fix| 
 +Ben Smith - Using Wireshark to dissect protocols,​ 
 + 
 +Connor Gilsenan - 2FA primer & How to Fix It!]] 
 +|- 
 +| 1/17/2018 ||  Dan Sherry || Threat Intelligence & You || [[01-17-2018-dan-sherry-threat-intelligence|Dan Sherry - Threat Intelligence & You]] 
 +|- 
 +| 11/14/2017 || Cody Hofstetter || Privacy & Anonymity ​ || [[11-14-2017-cody-hofstetter-privacy-and-anonymity|Privacy & Anonymity]] 
 +|- 
 +| 10/16/2017 || Danny Akacki || Neverending Hack: Mental Health in InfoSec & Beyond || [[10-16-2017-dannyk-mental-health-in-infosec|Mental Health in InfoSec]] 
 +|- 
 +| 9/25/2017 || Danny Akacki || Game of SE: Improv Comedy & Social Engineering || [[9-25-2017-dannyk-improv-comedy-and-social-engineering|Improv Comedy & Social Engineering]] 
 +|- 
 +| 8/31/2017 || Martin || CXO Table Top || [[8-31-2017-martin-cxo-table-top|CXO Table Top]] 
 +|- 
 +| 5/17/2017 || Steve || Whose Incident Is It, Anyway? || [[5-17-2017-steve-infosec-social-whose-incident-is-it-anyway|Whose Incident Is It, Anyway?]]
 |- |-
 | 4/​19/​2017 ​ || Jason || BrickerBot: The PDoS Botnet || | 4/​19/​2017 ​ || Jason || BrickerBot: The PDoS Botnet ||
Line 123: Line 144:
 | [[https://​access.redhat.com/​documentation/​en-US/​Red_Hat_Enterprise_Linux/​7/​pdf/​Virtualization_Deployment_and_Administration_Guide/​Red_Hat_Enterprise_Linux-7-Virtualization_Deployment_and_Administration_Guide-en-US.pdf|RHEL 7 KVM Admin Guide]] || RHEL 7 Virtualization Administration &  Deployment Guide | [[https://​access.redhat.com/​documentation/​en-US/​Red_Hat_Enterprise_Linux/​7/​pdf/​Virtualization_Deployment_and_Administration_Guide/​Red_Hat_Enterprise_Linux-7-Virtualization_Deployment_and_Administration_Guide-en-US.pdf|RHEL 7 KVM Admin Guide]] || RHEL 7 Virtualization Administration &  Deployment Guide
 |- |-
-|[[http://​www.amanhardikar.com/​mindmaps.html|An amazing external source with many mindmaps & vulnerable VMs!]] || Useful as heck! +| [[http://​www.amanhardikar.com/​mindmaps.html|An amazing external source with many mindmaps & vulnerable VMs!]] || Useful as heck! 
 |- |-
 | [[https://​www.youtube.com/​user/​LearnForensics/​videos|DFIR Lunch]] || Amazing group of passionate folks! | [[https://​www.youtube.com/​user/​LearnForensics/​videos|DFIR Lunch]] || Amazing group of passionate folks!
Line 134: Line 155:
 |- |-
 | [[https://​www.sans.org/​reading-room/​whitepapers/​warfare/​tools-standards-cyber-threat-intelligence-projects-34375|Tools and Standards for Cyber Threat Intelligence]] || Threat Intel Gathering. You may also want to read this [[https://​www.alienvault.com/​docs/​SANS-Cyber-Threat-Intelligence-Survey-2015.pdf|related paper]] | [[https://​www.sans.org/​reading-room/​whitepapers/​warfare/​tools-standards-cyber-threat-intelligence-projects-34375|Tools and Standards for Cyber Threat Intelligence]] || Threat Intel Gathering. You may also want to read this [[https://​www.alienvault.com/​docs/​SANS-Cyber-Threat-Intelligence-Survey-2015.pdf|related paper]]
 +|-
 +| [[https://​www.troyhunt.com/​understanding-http-strict-transport/​|Troy Hunt - Understanding HSTS]] || Good page on what HSTS & why it is important if you're going to use a configuration from [[https://​cipherli.st]]
 +|-
 +| [[https://​github.com/​Exa-Networks/​exabgp/​wiki|ExaBGP Wiki]] || Some really nice links here & information on basics of BGP
 +|-
 +| [[http://​thomas.mangin.com/​data/​pdf/​UKUUG%20Spring%202011%20-%20Mangin%20-%20BGP.pdf|The Benefits of BGP for every service provider]] || A great talk on BGP that covers quite a bit of knowledge.
 +|-
 +| [[http://​unix.stackexchange.com/​questions/​105026/​boot-partition-is-almost-full-in-centos#​105029|Yum-utils]] || Useful feature here I didn't know about to keep previous kernels from piling up
 +|-
 +| [[http://​michael.peopleofhonoronly.com/​vim/​|Vim Cheat Sheet]] || Vim Cheatsheet! :D
 +|-
 +| [[https://​github.com/​Security-Onion-Solutions/​security-onion/​wiki/​Conference|SecurityOnion Conference]] || Some neat videos here on how to best use SecurityOnion
 +|-
 +| [[https://​bettercrypto.org|BetterCrypto]] || Reference website on how to enable crypto properly on various services
 +|-
 +| [[https://​superuser.com/​questions/​622541/​what-does-dd-conv-sync-noerror-do|What does dd conv do]] || Useful example explaining some weird issues you may experience with dd & some mismatches that could occur between versions.
 +|-
 +| [[http://​old.blog.phusion.nl/​2012/​09/​21/​the-right-way-to-deal-with-frozen-processes-on-unix/​|Dealing with frozen processes]] || This is a great useful post to read for sysadmins & dev!
 +|-
 +| [[https://​www.gnu.org/​software/​gawk/​manual/​gawkinet/​gawkinet.html#​SEC_Contents|How to TCP IP with Awk]] || some interesting ideas here...
 +|-
 +| [[https://​unix.stackexchange.com/​questions/​153585/​how-does-the-oom-killer-decide-which-process-to-kill-first|How does OOM killing work in Linux?]] || This is useful because apparently we don't properly know how to set memory usage in Qemu/KVM & seem to think memory is magic!
 +|-
 +| [[https://​www.youtube.com/​watch?​v=cEb270L5Q1Y|Why IOPS sucks.]] || This describes IOPS for all the things
 |- |-
 |} |}
  
start.1504277364.txt.gz · Last modified: 2017/09/01 14:49 by darksim905