1 |
![](http://videothumbs.securitytube.net.s3.amazonaws.com/4357.jpg) |
Anti-Forensics: Occult Computing Adrian Crenshaw-Aide 2012 |
12 years, 1 month |
oncee |
AIDE 2012, Irongeek, Anti-forensics, Digital Forensics, data carving, disk wiping, encryption, steganography, timestamps, clearing logs |
3830 |
None |
2 |
![](http://videothumbs.securitytube.net.s3.amazonaws.com/4358.jpg) |
Out Of Character: Use Of Punycode And Homoglyph Attacks To Obfuscate Urls For Phishing Adrian Crenshaw- Aide 2012 |
12 years, 1 month |
oncee |
Punycode and Homoglyph Attacks, phishing attack, AIDE 2012, Marshall University, Marshall University Forensic Science Center |
3411 |
None |
3 |
![](http://videothumbs.securitytube.net.s3.amazonaws.com/4359.jpg) |
An Introduction To Traffic Analysis: A Pragmatic Approach Jon Schipp-Aide 2012 |
12 years, 1 month |
oncee |
AIDE 2012, Jon Schipp, network tools, Marshall University, Marshall University Forensic Science Center |
3523 |
None |
4 |
![](http://videothumbs.securitytube.net.s3.amazonaws.com/4360.jpg) |
Pen Testing Web 2.0: The Client Jeremy Druin-Aide 2012 |
12 years, 1 month |
oncee |
web 2.0, HTML5, AJAX, Mutilidae 2.x, Marshall University, Marshall University Forensic Science Center |
3777 |
None |
5 |
![](http://videothumbs.securitytube.net.s3.amazonaws.com/4361.jpg) |
Breaking Into Security Frank J. Hackett And Justin Brown-Aide 2012 |
12 years, 1 month |
oncee |
mentoring, r00kie, AIDE 2012, Marshall University, Breaking into Security, Marshall University Forensic Science Center |
3358 |
None |
6 |
![](http://videothumbs.securitytube.net.s3.amazonaws.com/4362.jpg) |
Sabu The Hacker: The Capture, The Crimes, The Damage Done, The Slip, The Apprehension, And The Fallout. Dr. Marcus Rogers Jill Mcintyre Boris Sverdlik Ronald Layton, U.S. Secret Service-Aide 2012 |
12 years, 1 month |
oncee |
Sabu, Lulzsec, anon, AIDE 2012, Marshall University Forensic Science Center, Marshall University, FBI |
3226 |
None |
7 |
![](http://videothumbs.securitytube.net.s3.amazonaws.com/4363.jpg) |
Bnat Hijacking: Repairing Broken Communication Channels Jonathan Claudius-Aide 2012 |
12 years, 1 month |
oncee |
bnat, metasploit, routing, layer 3 loop, AIDE 2012, Marshall University, Marshall University Forensic Science Center |
3452 |
None |
8 |
![](http://videothumbs.securitytube.net.s3.amazonaws.com/4364.jpg) |
Setting Up Backtrack And Automating Various Tasks With Bash Scripts- Lee Baird-Aide 2012 |
12 years, 1 month |
oncee |
BackTrack, bash, scripting, automation, Marshall University, AIDE 2012, Marshall University Forensic Science Center |
5095 |
None |
9 |
![](http://videothumbs.securitytube.net.s3.amazonaws.com/4365.jpg) |
Going On The Offensive - Proactive Measures In Securing Your Company Dave Kennedy-Aide 2012 |
12 years, 1 month |
oncee |
Dave Kennedy, AIDE 2012, Marshall University, SET, Marshall University Forensic Science Center |
3642 |
None |