August TASK – BlackHat, Defcon, BSidesLV Review

Wednesday 30-August-2017 // 6:00 - 9:00 PMMeeting Location: 55 John Street, TorontoRoom: 308/309 (Go up escalator, door is just as you step off)


August TASK

This month we have our popular BlackHat and Defcon review meeting.  Below is a list of talks we hope to cover with something for everyone.  A huge thanks to those TASK members who attended and will be speaking.As always, TASK is free, registration is not required to attend, and we invite you to bring your friends and colleagues.Any questions email info@task.to. We look forward to seeing you there!


Download the presentation here.
  • Jeremy Richards:
    • Android APK unboxing
  • Brian Bourne
    • Intro
    • Defcon and Black Hat Highlights
    • Lies and Damn Lies: Getting Past The Hype Of Endpoint Security Solutions
  • Jamie Gamble
    • MEATPISTOL, A Modular Malware Implant Framework
    • THEY'RE COMING FOR YOUR TOOLS: EXPLOITING DESIGN FLAWS FOR ACTIVE INTRUSION PREVENTION
  • Tom Tran
    • "How We (Google) Created the First SHA-1 Collision and What it means For Hash Security"
  • Cole Stichhaller
    • Exploiting the Most Notorious C&C Toolkits
  • Eldon Sprickerhoff
    • JavaScript obfuscation
    • Safecracking
  • Cheryl Biswas
    • Threat Intel for All: There's More to Your Data than Meets the Eye  Defcon Wall of Sheep
    • Interrogation Techniques for Fun and Profit Besides Proving Ground
  • Laura Payne
    • Icthyology: Phishing as a Science
    • Hacking Serverless Runtimes
  • Stephan Davidson
    • Backdooring the Lottery and Other Security Tales from Gaming
  • Dan Friesh
    • Introducing HUNT: Data driven web hacking & manual testing
    • Bypassing Android password manager apps without root
  • James Arlen
    • Minimum Viable Risk Management Program
  • Matt Dean
    • The Internet Already Knows I’m Pregnant

Meeting Location: 55 John Street, Toronto. Room:  308/309

Previous
Previous

September TASK: Growing Up and Out of the Sandbox: Examining information security beyond the micro-technical lens / Building machine-learning pipelines at scale

Next
Next

July TASK: How to roll your own document tracker using macros and tracking pixels / Threat Intelligence, Debunking Advanced Persistent Threats, and Dealing with Attribution Challenges