Link: http://www.irongeek.com/i.php?page=videos/nolacon2019/mainlist
Recorded at NolaCon 2019. Thanks to @CurtisLaraque, @mikearbrouet, @openbayou, @takanola, @therealmacjeezy, Jason, Cole & @klulue for the video recording help, and @nola_con, @erikburgess_, @NolaConYvonne & Rob for having me down to record.
One Random Insecure Wep Application Please (ORIWAP)
Nancy Snoke
Understanding XSS
Christina Mitchell
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy
Jim Nitterauer
Automating Hashtopolis
Evil Mog
“It’s Malware Time” – A Bar Crawl from Skunked Homebrew to Rotten Apples
Erika Noerenberg
Breaking into Cyber: How the hell are you supposed to get started?
Josh Millsap
Making an internal Let’s Encrypt relay server
Josh Harvey
Keynote – I PWN thee, I PWN thee not!
Jayson E. Street
Formula for a Bug Bounty Program
Chris Holt
Forensics Phish Tank: Breaking Down Analysis of Advanced Phishing Emails
Joe Gray & Sophia Fadli
Baking Your Anomalous Cookies
Jim Allee
Waiter, there’s a compiler in my shellcode!
Josh Stone
Empathy for the (Devel)oper: Lessons Learned Building An Application Security Module
Yolonda Smith
MORE Tales From the Crypt…Analyst
Jeff Man
IR with Volatility Framework
Evan Wagner
Let’s Talk About WAF (Bypass) Baby
Brett Gravois
Behavioral Security and Offensive Psychology at Scale
Josh Schwartz. Samantha Davison
My making of a Metasploit Module
Aaron Ringo
Don’t Panic! A Beginner’s Guide To Hardware Hacking
Phoenix Snoke
The Jazz Improv of Infosec
Damon J. Small
Elliptic Curve Cryptography: What it is and who needs it
Michele Bousquet