Here is a consolidated view of all of our presentation slides available for download. These slide decks come from speaking at various security conferences and gatherings on a multitude of security research topics.
DISCLAIMER: These slides are intended for security training purposes only.
You can also see some of our slides on Slideshare.
- Kaspersky SAS - Ghost in the Browser: Broad-Scale Espionage with Bitsquatting - 10Apr2019 - Slides (992 downloads )
- BSides SF - Twist and Shout: Ferris Bueller’s Guide to Abuse Domain Permutations - 03Mar2019 - Slides (1348 downloads )
- BSides CMH - Check Your Privilege (Escalation) - 01Mar2019 - Slides (1071 downloads )
- Day of Shecurity Boston 2019 - Introduction to Linux Privilege Escalation Methods - 22Feb2019 - Slides (1032 downloads )
- Day of Shecurity Boston 2019 - Network Penetration Testing Toolkit - 22Feb2019 - Slides (1141 downloads )
- OWASP AppSecCali 2019 - How Perceptual Analysis Helps Bug Hunters - 24012019 - Slides (1058 downloads )
- Kiwicon 2038AD - Getting Buzzed on Buzzwords - DeMesy - 16Nov2018 - Slides (1047 downloads )
- Practising Law Institute SFO - Cybersecurity: A Hacker’s Perspective - Evolving Cyber Adversary Simulation - 06Nov2018 - Slides (970 downloads )
- 2018 Cybersecurity Symposium – Breaking Into a Career of Breaking In - 19Oct2018 - Slides (1281 downloads )
- CactusCon 2018 - Anatomy of an AppSec Program - 29Sept2018 - Slides (1674 downloads )
- Empire Hacking NYC Meetup - Server-side Spreadsheet Injections in High Impact Attacks - 12June2018 - Slides (3229 downloads )
- DEF CON 25 (2017) - DeepHack - 30Jul2017 - Slides (2286 downloads )
- DEF CON 25 (2017) - Game of Drones - Brown Latimer - 29July2017 - Slides.PDF (10157 downloads )
- Interop 2017 - Defeating Social Engineering, BECs, and Phishing - 17May2017 - Slides (1613 downloads )
- Interop 2017 - Developing and Testing an Effective Incident Response Program - 16May2017 - Slides (1417 downloads )
- QCon London - Out of the Browser Into the Fire - 08Mar2017 - Slides (1680 downloads )
- Dark Reading Virtual Event - Preparing a Next-Generation IT Security Strategy - 15Nov2016 - Slides (1836 downloads )
- Critical Infrastructure Luncheon 2016 - Laika Boss - 03Nov2016 - Slides (1657 downloads )
- BetterCloud Cloud IT Live - Creating a Security Blueprint - 25Oct2016 - Slides (1815 downloads )
- 2016 Kennesaw State Cyber Security Awareness Day - Exploiting Smart Devices - 06Oct2016 (1815 downloads )
- Black Hat USA 2016 - Highway to the Danger Drone - 03Aug2016 - Slides.pdf (3419 downloads )
- CactusCon 2016 - Telling Lies & Making Friends: Penetrating People's Emotional Barriers - 6May2016 - Slides (2643 downloads )
- CactusCon 2016 - Developing and Testing an Effective Incident Response Program - 6May2016 - Slides (2260 downloads )
- Interop Las Vegas - Social Engineering: The Bad, Better, and Best Incident Response Plans - 4May2016 - Slides (2018 downloads )
- InfoSec World 2016 - RFIDiggity - Pentester Guide to Hacking HF/NFC and UHF RFID - 05Apr2016 - Slides (4624 downloads )
- ITAC 2015 - Putting Your Logs On a Diet - Network Intrusion Detection - Best Practices - 01Oct2015 - Slides (2002 downloads )
- ITAC 2015 - Internet of Things (IoT) - Hacking Smart Devices - 29Sept2015 - Slides (2004 downloads )
- ITAC 2015 - CloudBots - Abusing Free Cloud Services to Build Botnets in the Cloud - 29Sept2015 - Slides (1835 downloads )
- Phoenix Security & Audit Conference - The Active Directory Kill Chain - 10Sept2015 - Slides (3388 downloads )
- ISC(2) Phoenix - Effectively Operating a Bug Bounty Program - 13Aug2015 - Slides (2874 downloads )
- DEF CON 23 (2015) - RFIDiggity - Pentester Guide to Hacking HF/NFC and UHF RFID - 09Aug2015 - Slides (3706 downloads )
- Black Hat USA 2015 - Bypass Surgery - 6Aug2015 - Slides (9220 downloads )
- Converge Detroit - Homebrew Censorship Detection by Analysis of BGP Data - 16July2015 - Slides (4163 downloads )
- OWASP Phoenix - If You Like It, Then You Shouldn't Put a Ring3 On It - 9June2015 - Slides (1825 downloads )
- CactusCon 2015 - Wireless Network Risk and Controls - 13March2015 - Slides (2202 downloads )
- ISACA Phx - Wireless Network Risks and Controls - 22Jan2015 - Slides (2291 downloads )
- CalPoly SLO - So You Wanna Be a Hacker? - 10Nov2014 - Slides (2540 downloads )
- UAT TechTrek - Lessons on Security Consulting - 6Nov2014 - Slides (2345 downloads )
- ISSA Tucson - Untwisting the Mersenne Twister - Slides - 5Nov2014 (1931 downloads )
- Dark Reading University - Monitoring Threats and Measuring Risk - 31Oct2014 - Slides (2425 downloads )
- Dark Reading University - Protecting Backend Systems - 28Oct2014 - Slides (1991 downloads )
- Dark Reading University - Protecting the Customer-Facing Website - 27Oct2014 - Slides (2053 downloads )
- ToorCon 2014 - If You Like It Then You Shouldn't Put a Ring3 On It - 25Oct2014 - Slides (2204 downloads )
- ITAC 2014 - SCADA Hacking - Clear and Present Danger - 02Oct2014 - Slides (2438 downloads )
- ITAC 2014 - Mobile Application Testing and Code Review - 30Sept2014 - Slides (2098 downloads )
- Black Hat USA - CloudBots Harvesting Crypto Coins Like a Botnet Farmer - 6Aug2014 - Slides (2663 downloads )
- BSides LV - Untwisting the Mersenne Twister - 5Aug2014 - Slides (1952 downloads )
- HOPE - Rickrolling your Neighbors with Google Chromecast - 18July2014 - Slides (2414 downloads )
- CCOAITS - Not the Weakest Link - 10Jul2014 - Slides (1856 downloads )
- CCOAITS - Incident Response Preparation - 10Jul2014 - Slides (2144 downloads )
- CactusCon 2014 - Malware and the Syrian Civil War - 4Apr2014 - Slides (2616 downloads )
- RSA 2014 - Cloud Ninja - 27Feb2014 - Slides (4904 downloads )
- ISACA Phx - Protection of Information Assets - 27Feb2014 - Slides (2142 downloads )
- MISTI - Mobile 2013 - Mobile App Testing and Code Review - 19Nov2013 - Slides (5102 downloads )
- Bsides PDX - Resistance Networks - 27Sept2013 - Slides (3055 downloads )
- DEFCON 21 (2013) - RFID Hacking - 03 Aug 2013 - Slides (36990 downloads )
- Black Hat USA 2013 - RFID Hacking - 01 Aug 2013 - Slides (11432 downloads )
- Black Hat USA 2013 - Lets Get Physical - 31July2013 - Slides (10635 downloads )
- InfoSec World 2013 – W4 – Using Google to Find Vulnerabilities in Your IT Environment – 14Apr2013 – Slides (8895 downloads )
- BayThreat 2012 - Securing a Start Up - 07Dec2012 - Slides (2664 downloads )
- DEFCON 20 (2012) – Tenacious Diggity – 29July2012 – Slides (13481 downloads )
- OWASP Atlanta – Attack Chaining Advanced Maneuvers – May 2012 (2705 downloads )
- ISSA LA – 4th Annual InfoSec Summit – Pulp Google Hacking – 15May2012 – Slides (6820 downloads )
- TakeDownCon 2012 – Pulp Google Hacking – 08May2012 - Slides (7196 downloads )
- InfoSec World 2012 – Pulp Google Hacking – 02Apr2012 – Slides (5626 downloads )
- OWASP LA – SharePoint Hacking – 22Feb2012 – Slides (8106 downloads )
- ISSA LA – Pulp Google Hacking – 15Feb2012 – Slides (5760 downloads )
- BayThreat 2011 - Putting Logs on a Diet - 11Dec2011 - Slides (2460 downloads )
- BayThreat 2011 - Pulp Google Hacking - 09Dec2011 - Slides (6330 downloads )
- Hacker Halted USA 2011 – Pulp Google Hacking – 27Oct2011 - Slides (6088 downloads )
- Black Hat USA 2011 – Pulp Google Hacking – 03Aug2011 - Slides (7023 downloads )
- TakeDownCon 2011 – Lord of the Bing – 18May2011 - Slides (6821 downloads )
- InfoSec World 2011 – Google Hacking – To Infinity and Beyond – 21Apr2011 - Slides (6070 downloads )
- HackCon 2011 – SharePoint Hacking - 16Feb2011 - Slides (5783 downloads )
- HackCon 2011 – Lord of the Bing – 16Feb2011 - Slides (5909 downloads )
- Hacker Halted 2010 Singapore – Lord of the Bing – 26Oct2010 - Slides (6102 downloads )
- ToorCon 12 – Lord of the Bing – 24Oct2010 - Slides (2815 downloads )
- Security B-Sides Atlanta 2010 – Lord of the Bing – 08Oct2010 - Slides (6317 downloads )
- ISSA Phoenix Chapter – 05 Oct 2010 Presentation Slides (5076 downloads )
- DEFCON 18 – Lord of the Bing – 30July2010 - Slides (7179 downloads )
- Black Hat USA 2010 – Lord of the Bing – 29July2010 - Slides (8237 downloads )
- The Good, the Bad, and the Ridiculous - SANS Penetration Testing Summit 2010 (2170 downloads )
- InfoSec World 2010 – Google and Beyond – 21Apr2010 - Slides (5519 downloads )
- SANS - Pentest and AppSec Summit 2009 - Realworld Code Review - 02Jun2009 - Slides (2403 downloads )
- Microsoft BlueHat v8 - Real World Code Review - Liu - 17Oct2008 - Slides (4613 downloads )
- SANS - Pentest Security Summit 2008 - Success Stories and Lessons Learned - 02Jun2008 - Slides (2910 downloads )
- SPICON 2007 - Lessons Learned – Implementing an Application Security Program - 17Oct2007 - Slides (2016 downloads )
- SANS - AppSec Summit 2007 - Implementation Lessons Learned - 15Aug2007 - Slides (2130 downloads )
- CEIC 2006 - Defeating Forensic Analysis - 04May2006 - Slides (3096 downloads )
- InfoSec World 2006 - K2 - Bleeding-Edge Anti-Forensics - Brown and Liu - 03April2006 - Slides (5176 downloads )
- Microsoft BlueHat v2 - Introducing the Metasploit Anti-Forensics Project - 13Oct2005 - Slides (3222 downloads )
- Toorcon 7 - Introducing the Metasploit Anti-Forensics Project - 16Sept2005 - Slides (9414 downloads )
- Black Hat USA 2005 - Catch Me If You Can - 27July2005 - Slides (7354 downloads )