Gives a framework from which to operate
|
Standards |
15 |
|
Bad Snakes
|
Secure Coding |
20 |
|
Implicit Data Conversion
|
Secure Coding |
50 |
|
Explicit Data Conversion
|
Secure Coding |
55 |
|
John the Ripper Tool Knowledge 1
|
Passwords |
61 |
|
Where are we?
|
OSINT |
20 |
|
There are so many databases...which one are we using?
|
Long live data |
63 |
|
Linux is funny
|
CLI |
59 |
|
User Information
|
CLI |
15 |
|
System monitoring
|
CLI |
15 |
|
Attendees like math
|
Networking |
51 |
|
Famous IP Range
|
Ping You're It |
20 |
|
Rehash the password
|
Passwords |
100 |
|
Intentionally Vulnerable
|
Hardening |
165 |
|
Linux is awesome
|
CLI |
15 |
|
Decode but with what?
|
Cryptography |
95 |
|
Older than you think!
|
Cryptography |
15 |
|
It is the best
|
Conversions |
37 |
|
Good to check yourself before you...
|
Common Websites |
15 |
|
Linux file permissions
|
CLI |
15 |
|
File Manipulation
|
CLI |
15 |
|
File content
|
CLI |
15 |
|
Disk usage
|
CLI |
15 |
|
Balancing Security
|
CIA Triad |
12 |
|
We are in demand
|
certifications |
15 |
|
Breakout of Crime
|
Breakouts |
36 |
|
Attendees like math
|
Attendee Question |
4 |
|
There is so much data
|
Attack Vectors |
12 |
|
What is the domain?
|
Active Directory |
114 |
|
Who's the Boss?
|
Acronyms & Initialisms |
11 |
|
Cincinnati ISSA
|
Acronyms & Initialisms |
10 |
|
It's all mine
|
Acronyms & Initialisms |
9 |
|