Presentations
Client-side Vulnerability Assessment and IPS
ToorCon, ShmooCon and NAISG talk by Jay Beale Download Slides
KillerBee: Practical ZigBee Exploitation Framework
Josh Wright debuts KillerBee: an attack framework designed to explore vulnerabilities in ZigBee and wireless sensor networks.In this presentation, Josh examines how ZigBee technology interacts with the kinetic world in scary ways, exploring vulnerabilities in the...
Data Theft in the 21st Century
DataTheft-Educause
Bust-a-Kube CTF: Attacking a Multitenant Kubernetes Cluster
Bust-a-Kube CTF: Attacking a Multitenant Kubernetes Cluster
Kubernetes Hacking and Hardening Episode 2: Bust a Kube (Part of the BeyondTrust webinar series)
Jay Beale returns to Kubernetes hacking, with another in his “Bust A Kube” attack and defense series. In this demo-focused on-demand webinar, Jay will attack a vulnerable Internet-based application, only to discover that the application runs in a Docker container, as...
Attacking and Defending a Linux CTF (Part of the BeyondTrust webinar series)
In this demo-heavy on-demand webinar, Jay Beale continues his history of demonstrating cyber defenses by showing how to attack and defend a real Linux system. Jay will first don his black hat, showing you how to compromise the Rick and Morty-themed “Rickdiculously...
How to Attack a Linux System + Ways to Detect and Respond Swiftly (Part of the BeyondTrust webinar series)
Bad actors will target our Linux systems. With a small amount of effort, we can detect their first access to the system and stop them before they move laterally throughout. But how did they get into our systems in the first place? And what are the procedures for a...
Tackling the Privilege Challenge of Next Generation Technologies (Part of the BeyondTrust webinar series)
https://vimeo.com/287117118
What Keeps CISOs Up at Night: Top Security Challenges (Part of the BrightTalk webinar series)
Tune in for an in-depth look into the key issues at the top of mind for CISOs across industries. This is a Part 2 of 2 CISO panels during Black Hat exploring the ever-changing role of the CISO, and how security professionals are coping with the threats and stress of...
Hacking and Defending a Kubernetes-based Application (Part of the BeyondTrust webinar series)
Container orchestration tools are all the buzz right now. It almost seems like every company in the DevOps modality is either using or moving to Kubernetes, Docker Swarm, or one of their competitors. In this on-demand webinar, InGuardians CTO, Jay Beale, will hack a...