Inquest
Leonardo DRS
Modern Technology Solutions, Inc.
University of Dayton
Department of
Computer Science
Gluware
Our LinkedIn Group: OISF at LinkedIn
Here are presentations previously done by Ohio Information Security Forum participants. They are organized by year and month, including Anniversary.
Solder-Defined Computers for Provable Immunity Against Hacking and Malware - Marc Abel
Relax: Humanizing Security - Ken Fanger
Differential Privacy for Privacy Protection in Federated Learning - Ahmed El Ouadrhiri
Intro to Reverse Engineering - Aaron Joiner
Network Protocols and Trust - Logan Prough
(All presentations listed, available presentations linked)
Matt Scheurer - Becoming an IR Superstar
Scott Nusbaum - Ransomware Is NOT the problem
Dr. Phu Phung - Hybrid image-based approaches for modern malware classification
Micah Brown - How a 1993 CCG Prepared me for a Life in InfoSec
Jerod Brennen - Rethinking Cybersecurity in the Quantum Age
Deral Heiland - Evaluating the Security of an Enterprise IoT Deployment - From Acquisition to Support
Videos:
Videos
More links TBA
Original Agenda
Link
From the Current Events Presentation
2022 Data Breach Investigations Report(DBIR)
Lumos: Identifying and Localizing Diverse Hidden IoT Devices in an Unfamiliar Environment
Mark Jeanmougin - Save Time with Modern Search Techniques
Mark Jeanmougin - Save Time with Modern Search Techniques
Alternate link
Ward Cunningham’s Txtzyme and Ken Boak’s SIMPL languages
OpenOffice format
Powerpoint format
Playbook for Threat Modeling Medical Devices
Download link
Demo of REMnux (free VM created by SANS for malware analysis)
Presentation
Malware analysis cheat sheet
REMnux malware analysis tips
Recap of SANS Digital Forensics and Incident Response (DFIR) 2021 Conference - John Carls
Presentations from Recap
Reviewing this summer's critical Microsoft vulnerabilities - Jason Kinder
July Anniversary Conference Presentations:
Inside the Mind of a Threat Actor: Beyond Pentesting - Phillip Wylie
I Got 99 Problems but a WAF ain’t one - Micah Brown
Code Hedgehogs - Changing the "S" in SDLC to Secure - Penelope Rozhkova
Lend me your IR's! - Matt Scheurer
July Anniversary Conference Videos:
Opening Remarks - OISF President
Inside the Mind of a Threat Actor: Beyond Pentesting - Phillip Wylie
I Got 99 Problems but a WAF ain’t one - Micah Brown
Code Hedgehogs - Changing the "S" in SDLC to Secure - Penelope Rozhkova
A Look at Cellular Services in IoT technology - Deral Heiland
Chats, Cheats, and Cracks: Abuse of Collaboration Platforms in Malware Campaigns Edmund Brumaghin
Lend me your IR's! - Matt Scheurer
Video Download: Download Link
Infection Monkey and DNStwist - Jason Kinder
Cyberchef Workshop Lab File - Matt Scheurer
Covert Data Exfiltration - John Carls
All Presentations:
Link
Individual Presentations:
Air-Fi
aIR-Jumper
AiR-ViBeR
BitWhisper
Brightness
DiskFiltration
Fansmitter
GSMem
HVACKer
LED-it-GO
Magneto
Mosquito Speaker
Odini
Oops!...I think I scanned a malware
PowerHammer
POWER-SUPPLaY
USBee
xLED
Solarwinds Exploit (Solorigate)
Adaptive Security - Dale Shelinbarger
Links from December Presentation
Understanding and Getting Started with JupyterLab - Dale Shelinbarger
Link to Presentation
Defcon: Safe Mode Recap Links:
Defcon 28 main page (files)
Defcon on YouTube
Hack-A-Sat
Intro to NAND flash memory recovery - Deral Heiland
Reference Image 1
Reference Image 2
Reference Image 3
Free Hacking Resources Discovered during COVID-19 - John Carls
Introduction to Python - Dale Shelinbarger
LibraryBox and PirateBox Presentations - John Roberts
Open-Source Intelligence (OSINT) Reconnaissance - John Carls
Fruity Wi-fi - John Carls
Pi PoE - Raspberry Pi with Power over Ethernet - John Carls
Security Keys: Are they secure? - Dale Shelinbarger
Hacking With Critters - John Carls
A Discussion of Secrets - Robert Stewart
Continuous Skills Improvement for Everyone - Matt Scheurer
DLP Demystified - Micah Brown
Pixel Tracking: How it’s used and abused - Barry Kimball
The path to IAM Maturity - Jerod Brennen
Hacking WordPress with WPScan - Zechary Carls
Catching the Social Engineer - Robert Stewart
Hacking Identity, a PenTester's Guide to IAM - Jerod Brennen
Active Defense: Helping the Threat Actors Hack Themselves - Matt Scheurer
Planning and Executing a Red Team Engagement - Tim Wright
Kali Pi & Recon - John Carls
Making Kali Pi - John Carls
We're Watching You: An analysis of IP cameras through their firmware - Charles Monett
Link to scripts used in Charles' presentation
Simple Network Management Pwnd - Matthew Kienow
An Introduction to Bitcoin & Cryptocurrency - Josh Muller
The materials available here exclusively reflect the opinion of the author(s), and DOES NOT express the opinion or position of the Ohio Information Security Forum, its Board of Directors, and its Sponsors.
This material is available for educational purposes only. The Ohio Information Security Forum, its Board of Directors and sponsors are NOT RESPONSIBLE for its use or misuse. No warranties or guarantees implied or otherwise are in effect. Use of these tools, techniques and technologies are at YOUR OWN RISK.