Home
Talks
CFP Guide
What is BSides?
About
Contact
Light
← All talks
Difficulty
Intermediary talks at BSides
308 talks tagged
Intermediary
from 84 chapters of BSides events worldwide.
Related topics
Technical
Case Studies and Incidents Analysis
Blue
Talk
Technical Deep-dives
Red
43:55
Metody pozostania w ukryciu w sieci i w terenie
Dariusz Damian Jakubowski
BSides Warsaw
Technical
Intermediary
Red
Talk
Open →
2017-10
1:06:07
Top-Tier Bug Bounty Hunter Mindset
Yassine Aboukir
BSides Ahmedabad
· 2022
Career
Career & Soft Skills
Vulnerability Research
Intermediary
Red
Keynote
Open →
2023-02
45:24
It's the Little Things
Ben Sadeghipour
BSides PDX
· 2018
Technical
Web AppSec
Intermediary
Red
Technical Deep-dives
Talk
Open →
2019-02
31:02
The Security Vulnerability Assessment Process, Best Practices & Challenges
Kellep Charles
BSides Delaware
· 2012
Technical
Intermediary
Talk
Open →
2012-11
36:12
Recursion is a Harsh Mistress
Joel Moore
BSides Charleston
· 2024
Tooling
Intermediary
Red
Technical Deep-dives
Talk
Open →
2024-11
1:03:19
Bug Bounty on Steroids
Hussein Daher
BSides Ahmedabad
· 2023
Technical
Vulnerability Research
Web AppSec
Intermediary
Red
Talk
Open →
2023-02
28:38
Bluetooth Warwalking: Hacking Devices Around You with Just Your Phone
Matt Miller
BSides SLC
· 2026
Technical
OSINT
Wireless Security
Intermediary
Red
Case Studies and Incidents Analysis
Empirical Research
Demo
+1
Open →
2026-04
42:16
Catching the Catchers: Open Source Stingray Detection in the Wild
Michael Raymond
Bsides CT 2025
Technical
Cellular Security
OSINT
Intermediary
Blue
Talk
Open →
2025-12
25:00
Bug Bounty Recon The Right Way
Khalil A. Lemtaffah
BSides Budabest
· 2022
Technical
OSINT
Web AppSec
Intermediary
Red
Talk
Open →
2023-06
22:47
Passive-ish Recon Techniques
Tom Hudson
BSides Leeds
· 2018
Technical
Web AppSec
Intermediary
Red
Talk
Open →
2018-02
49:41
Open Source Malware Lab
Robert Simmons
BSides London
· 2016
Technical
DFIR
Detection Engineering
Malware Analysis
Intermediary
Blue
Technical Deep-dives
Talk
Open →
2016-07
28:04
Exposing Malicious USB Cables: Hardware Detection of Embedded Implants
Jaynie Shorb
BSides PDX
· 2022
Technical
Intermediary
Blue
Technical Deep-dives
Demo
Talk
Open →
2022-10
51:35
Attacking Kerberos: Kicking the Guard Dog of Hades
Tim Medin
BSides Orlando
· 2015
Technical
Active Directory
Kerberos
Intermediary
Red
Talk
Open →
2015-11
43:49
Shellcoding basics
Max Harley
BSides Charleston
· 2016
Technical
CTF
Reverse Engineering
Vulnerability Research
Intermediary
Red
Talk
Open →
2016-11
10:53
If You're Not Using SSH Certificates You're Doing SSH Wrong
Mike Malone
BSidesSF
· 2020
Technical
Network Security
Intermediary
Talk
Open →
2020-03
2:08:11
Windows Forensics Workshop
Ali Hadi
BSides Amman
· 2021
Technical
DFIR
Intermediary
Workshop
Open →
2021-07
28:58
Introduction to Return Oriented Exploitation on ARM64
Billy Ellis
BSides Manchester
· 2018
Technical
Reverse Engineering
Vulnerability Research
Intermediary
Red
Talk
Open →
2018-08
30:27
David Bianco - The Secret Origins of the Pyramid of Pain
David Bianco
BSides Augusta
· 2022
Technical
Detection Engineering
Threat Intel
Intermediary
Blue
Case Studies and Incidents Analysis
Methodology
Talk
Open →
2022-10
44:04
Inside Magecart: Their Web Skimming Tactics Revealed
Terry Bishop
BSides London
· 2019
Technical
Malware Analysis
Threat Intel
Web AppSec
Intermediary
Talk
Open →
2019-06
1:42:10
Exploiting esoteric Android vulnerability
Sharan
Sanjay
BSides Ahmedabad
· 2021
Technical
Web AppSec
Intermediary
Red
Workshop
Open →
2022-04
28:50
Amazon Cognito (Mis)Configurations
BSides Ahmedabad
· 2021
Technical
Cloud IAM
Intermediary
Red
Talk
Open →
2022-03
44:16
An Introduction To Fault-Injection For Exploiting Bug-Free Code In Embedded Systems
BSides London
· 2025
Technical
Cryptography
Intermediary
Red
Technical Deep-dives
Talk
Open →
2025-02
31:02
Phineas Fisher: A Timeline of Hacktivism
BSides Leeds
· 2020
War Stories
OSINT
Reverse Engineering
Threat Intel
Intermediary
Red
Case Studies and Incidents Analysis
Talk
Open →
2020-07
25:39
Journey to Command Injection: Hacking the Lenovo ix4-300d
Rick Ramgattie
BSidesSF
· 2019
Technical
Hardware Hacking
Vulnerability Research
Web AppSec
Intermediary
Red
Demo
Open →
2019-03
47:39
Mastering Android Security Research: A Guide for the Modern Security Researcher
Hahna Latonick
Jacob Swinsinski
BSides Tampa
· 2024
Technical
Mobile Security
Reverse Engineering
Vulnerability Research
Intermediary
Red
Talk
Open →
2024-05
41:32
The Dark Side of DeFi
Rudra Singh
Arbaz Hussain
BSides Ahmedabad
· 2022
Technical
Smart Contract Security
Vulnerability Research
Web AppSec
Intermediary
Technical Deep-dives
Talk
Open →
2023-02
49:06
Introduction to Software Defined Radio for Offensive and Defensive Operations
Grey Fox
BSides Peru
· 2024
Technical
IoT
OSINT
Wireless Security
Intermediary
Demo
Talk
Open →
2024-08
50:05
Rapid RFID: Live PACS Hacking Demo — Clone Badges & Break Access Control
Evan Cook
BSides SLC
· 2026
Technical
Hardware Hacking
Physical Security
Intermediary
Red
Demo
Open →
2026-04
30:07
GSuite Digital Forensics and Incident Response
Megan Roddie
BSides SATX
· 2018
Technical
Cloud IAM
DFIR
Intermediary
Blue
Case Studies and Incidents Analysis
Talk
Open →
2018-07
20:43
Application Fingerprinting with Kitsune
Peter Vicherek
BSides Toronto
· 2015
Technical
Intermediary
Blue
Case Studies and Incidents Analysis
Talk
Open →
2015-11
26:20
Testing whether your security actually works with Red Teaming
BSides Canberra
· 2024
Technical
Intermediary
Red
Talk
Open →
2024-10
40:56
How to Hack OAuth
Aaron Parecki
BSides PDX
· 2019
Technical
Web AppSec
Intermediary
Case Studies and Incidents Analysis
Talk
Open →
2019-11
58:42
A Tourist's Guide to the ARM Cortex M3
Travis Goodspeed
Ryan Speers
BSides Knoxville
· 2020
Technical
Hardware Security
Reverse Engineering
Intermediary
Talk
Open →
2020-05
25:14
From Firmware to Exploit
Michael Messner
BSides Las Vegas
· 2023
Technical
Tooling
Firmware Security
IoT
Reverse Engineering
Vulnerability Research
Intermediary
Technical Deep-dives
+1
Open →
2023-10
29:35
LSASS - What should we be doing?
Robert Wilson
BSides Augusta
· 2021
Technical
Active Directory
Threat Modeling
Intermediary
Blue
Talk
Open →
2021-10
8:00:21
BSides Oslo 2025 — Live Stream
BSides Oslo 2025
Technical
Malware Analysis
Reverse Engineering
Social Engineering
Threat Intel
Web AppSec
Intermediary
Red
+1
Open →
2025-10
44:54
A Quick, Efficient Yet Not Entirely Sane Introduction to Deception
John Strand
BSides Frankfurt
Technical
Active Directory
Detection Engineering
Intermediary
Blue
Demo
Talk
Open →
2025-03
29:22
Analyzing AutoIt Malware: Tools and Techniques
Chris Neal
Jerome Radcliffe
BSides Las Vegas
· 2021
Technical
Malware Analysis
Reverse Engineering
Intermediary
Blue
Talk
Open →
2021-08
10:18
How to: Actually attack computers at cafes - Felix Ryan
Felix Ryan
BSides London
· 2018
Technical
Network Security
Wireless Security
Intermediary
Red
Demo
Talk
Open →
2018-06
50:58
Threat hunting: Using MITRE ATT&CK against Carbanak malware
Amol Sarwate
BSidesSF
· 2022
Technical
Detection Engineering
Malware Analysis
Threat Intel
Intermediary
Blue
Case Studies and Incidents Analysis
Technical Deep-dives
+1
Open →
2022-07
16:05
X-Com - Editing Save Game Files Is Still Strategy
Paul Williams
BSides London
· 2022
Technical
Reverse Engineering
Intermediary
Talk
Open →
2022-01
31:32
Maersk: The Ransomware Survivors
Endrin Musa
BSides Prishtina
· 2017
Technical
DFIR
Malware Analysis
Supply Chain Security
Intermediary
Case Studies and Incidents Analysis
Talk
Open →
2023-05
22:40
Pensieve: Finding Malicious Artifacts in Container Environments
Yathi Naik
BSidesSF
· 2018
Technical
Container Security
DFIR
Malware Analysis
Intermediary
Blue
Technical Deep-dives
Talk
Open →
2018-04
28:47
Learning from AWS Customer Security Breaches
Rami McCarthy
Bsides CT
· 2020
Technical
Cloud IAM
DFIR
Intermediary
Case Studies and Incidents Analysis
Talk
Open →
2020-11
43:27
Threat Hunting AWS CloudTrail Logs with Microsoft Sentinel: Real-Time Attack Demo
Arijit Paul
BSides Sydney
· 2025
Technical
Cloud IAM
Detection Engineering
Threat Intel
Intermediary
Demo
Open →
2025-02
48:58
Bringing Red vs. Blue to Machine Learning
Bobby Filar
BSides DC
· 2018
Technical
Adversarial Machine Learning
Intermediary
Purple
Red
Technical Deep-dives
Talk
Open →
2018-11
43:40
Diaphora: a new FOSS program diffing tool
Joxean Koret
BSides Lisbon
· 2015
Technical
Reverse Engineering
Vulnerability Research
Intermediary
Blue
Technical Deep-dives
Talk
Open →
2015-07
37:43
Finding Obvious Automotive Security Bugs Using Common Tools & Attacks
Jay Turla
BSides Ahmedabad
· 2025
Technical
Automotive Security
Hardware Hacking
Reverse Engineering
Wireless Security
Intermediary
Red
Technical Deep-dives
+1
Open →
2025-04
36:24
ICS Intrusion KillChain explained with real simulation
Juan Escobar
BSides Athens
· 2021
Technical
ICS Security
Intermediary
Red
Demo
Workshop
Open →
2021-06
20:25
Leveraging Osquery for DFIR at Scale
Sohini Mukherjee
BSidesSF
· 2020
Technical
DFIR
Detection Engineering
Intermediary
Talk
Open →
2020-03
17:09
I've seen you get hacked! (AI Real-Time Attack Simulation)
BSides Joburg
Technical
Intermediary
Blue
Technical Deep-dives
Demo
Open →
2024-12
29:14
Alex Kirk - Incident response and threat hunting using Bro/Zeek data
Alex Kirk
BSides Augusta
· 2019
Technical
DFIR
Detection Engineering
Threat Intel
Intermediary
Blue
Case Studies and Incidents Analysis
Technical Deep-dives
+1
Open →
2019-10
48:34
Using DeTT&CT and the MITRE ATT&CK Framework to Assess Your Security Posture
David Branscome
BSides Knoxville
· 2022
Technical
Detection Engineering
Threat Modeling
Intermediary
Blue
Demo
Talk
Open →
2022-05
41:49
Prioritising your security work using MITRE ATT&CK
Floris Ladan
BSides Tallinn
· 2022
Technical
Detection Engineering
Threat Intel
Threat Modeling
Intermediary
Blue
Talk
Open →
2022-10
28:33
Hook, Line, and Tinker: A Dive into Phishing Campaign Sites
Rick Ramgattie
BSidesSF
· 2024
Technical
OSINT
Threat Intel
Web AppSec
Intermediary
Case Studies and Incidents Analysis
Talk
Open →
2024-07
45:23
How to Break the Modbus Protocol and Cause a PLC DoS
Omar Morando
BSides Budabest
· 2023
Technical
OT/ICS Security
Intermediary
Red
Demo
Open →
2023-08
23:55
A Study on Intrusion Detection Systems with a Practical Experiment on Snort - Vigneshwar Sethuraman
Vigneshwar Sethuraman
BSides Vancouver
· 2021
Technical
Detection Engineering
Network Security
Intermediary
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2021-06
54:52
Protecting the Forest, Starting at the Roots: AD Hardening & Defence using Modern Techniques
James Spencer
BSides Canberra
· 2025
Technical
Active Directory
Kerberos
Intermediary
Blue
Talk
Open →
2025-11
44:08
From Soup To Nuts: Building A Detection-as-Code Pipeline - David French
David French
BSides Dublin
· 2024
Technical
Detection Engineering
Intermediary
Blue
Talk
Open →
2024-06
30:26
Snow Nor Rain Nor Dependency Confusion: How to Deliver the Right Package
Jessica Smith
Justin Engler
BSidesSF
· 2024
Technical
Supply Chain Security
Intermediary
Red
Case Studies and Incidents Analysis
Talk
Open →
2024-07
47:32
Up Is Down Black Is White: SCCM for Offense and Defense
Matt Nelson
Will Schroeder
BSides Boston
· 2016
Technical
Active Directory
Tooling
Intermediary
Purple
Talk
Open →
2016-08
21:18
2017 - How To Obtain 100 Facebook Accounts Per Day Through Internet Searches by Guillermo & Yael
BSides Manchester
· 2017
Technical
Vulnerability Research
Web AppSec
Intermediary
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2017-08
24:50
The Top 5 Ways I Own Your Internal Network
Heath Adams
BSides RDU
· 2019
Technical
Active Directory
Kerberos
Intermediary
Blue
Red
Demo
Talk
Open →
2019-10
41:36
Break Crypto like a Pro!
Alexei Kojenov
BSidesSF
· 2020
Technical
Cryptography
Intermediary
Red
Demo
Talk
Open →
2020-03
40:17
Is Your Approach To Pipeline Security Flawed? Rethinking CI/CD Security
BSides London
· 2025
Technical
DevSecOps
Supply Chain Security
Intermediary
Talk
Open →
2025-02
50:27
Achieving HITRUST on a Budget
Shobhit Mehta
BSidesSF
· 2022
Technical
GRC
Intermediary
Case Studies and Incidents Analysis
Talk
Open →
2022-07
54:20
How To Fit Threat Modelling Into Continuous Security
Irene Michlin
BSides Lisbon
· 2019
Technical
Threat Modeling
Intermediary
Talk
Open →
2019-12
38:14
At Your Service: Abusing the Service Workers Web API
Daniel Abeles
Shay Shavit
BSides Las Vegas
· 2019
Technical
Vulnerability Research
Web AppSec
Intermediary
Red
Technical Deep-dives
Talk
Open →
2019-10
44:29
0xDEAD: Domain Exploitation and Domination
Jon Milkins
Bsides CT
· 2025
Technical
Active Directory
Threat Modeling
Intermediary
Red
Case Studies and Incidents Analysis
Talk
Open →
2025-12
23:03
Go With The (Work)flow
Ryan Robinson
Nicole Fishbein
BSidesSF
· 2022
Technical
Cloud IAM
Intermediary
Red
Case Studies and Incidents Analysis
Talk
Open →
2022-07
25:13
[In]secure Deserialization, and how [not] to do it
Alexei Kojenov
BSides PDX
· 2019
Technical
OWASP
Vulnerability Research
Web AppSec
Intermediary
Demo
Talk
Open →
2019-11
30:56
Into the Vo1d: Hunting a Botnet Hidden in TV Boxes
André Tavares
BSides Lisbon
· 2025
Technical
IoT
Malware Analysis
Threat Intel
Intermediary
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2025-12
35:15
GenAI Application Security: Not Just Prompt Injection
Ahmed Abugharbia
BSidesSF
· 2025
Technical
AI Security
GenAI Security
Vulnerability Research
Intermediary
Technical Deep-dives
Talk
Open →
2025-06
28:59
File Infectors Are (Not) Dead: What's Spreading And How To Detect It Using YARA - Ladislav Zezula
Ladislav Zezula
BSides Prague
· 2024
Technical
Malware
Intermediary
Blue
Talk
Open →
2024-04
23:13
Using machine learning to detect sensitive documents on SharePoint
Wilson Tang
BSidesSF
· 2023
Technical
Cloud IAM
Machine Learning
Threat Intel
Intermediary
Technical Deep-dives
Talk
Open →
2023-05
46:48
The Process of Detection Engineering1
BSides Tampa
Technical
Intermediary
Blue
Talk
Open →
2023-03
18:48
Think You're Stealthy? How to Detect Attacks in AD
Rachit Arora
Sai Sathvik Ruppa
Aakash Raman
BSides Charm
· 2025
Technical
Active Directory
DFIR
Detection Engineering
Intermediary
Blue
Talk
Open →
2025-05
26:31
Physical Security & Cybersecurity Overlap: Radio Waves and RF Attacks
Michael Weiskopff
BSidesROC
· 2024
Technical
Network Security
Physical Security
Wireless Security
Intermediary
Red
Talk
Open →
2025-03
24:59
September 2015 Lab - Password Cracking
BSides Peru
· 2015
Technical
Cryptography
Intermediary
Workshop
Open →
2015-09
24:43
Electronic Hardware Design
Josh Johnson
BSides Canberra
· 2021
Technical
Hardware Hacking
Intermediary
Talk
Open →
2021-04
43:16
Testing Endpoint Security Solutions with Atomic Red Team
BSides Asheville
· 2018
Technical
Detection Engineering
Threat Modeling
Intermediary
Blue
Purple
Methodology
Demo
Open →
2019-03
22:43
The Math Behind Threat Hunting: Find Attacks Hidden in Your Logs
Ekpe Edidiong
BSides SLC
· 2026
Technical
Detection Engineering
Threat Intel
Intermediary
Blue
Talk
Open →
2026-04
33:02
Ransomware-as-a-Service: demystifying a multi-billion dollar industry
Isuf Deliu
BSides Prishtina
· 2022
Technical
Malware Analysis
Threat Intel
Intermediary
Case Studies and Incidents Analysis
Talk
Open →
2022-05
32:16
Breaking Entra: Real-World Cloud Identity Attacks You Can Recreate
Tomer Nahum
Jonathan Elkabas
BSides Frankfurt
· 2025
Technical
Active Directory
Cloud IAM
Intermediary
Blue
Red
Technical Deep-dives
Demo
+1
Open →
2025-12
34:59
Attacks on JSON Web Tokens: A Comprehensive Analysis by Chesleah Kribs
Chesleah Kribs
BSides Tampa
Technical
Web AppSec
Intermediary
Talk
Open →
2024-05
47:22
Secrets of the Second Factor: Threat Hunting with Multi-Factor Authentication
Susan Paskey
BSides Las Vegas
· 2022
Technical
Detection Engineering
Threat Intel
Intermediary
Blue
Case Studies and Incidents Analysis
Talk
Open →
2022-09
43:57
MS SQL Super Quality Logs
Tristan
BSides Perth
· 2023
Technical
Detection Engineering
Threat Intel
Intermediary
Blue
Methodology
Technical Deep-dives
Talk
Open →
2023-08
24:05
Purple is the New Black: Modern Approaches to Application Security
Tanya Janca
BSidesSF
· 2020
Technical
Cloud IAM
DevSecOps
Web AppSec
Intermediary
Purple
Talk
Open →
2020-03
24:08
The Hacker Will See You Now
Jay Radcliffe
BSides SLC
· 2016
Technical
IoT
Medical Device Security
Wireless Security
Intermediary
Red
Case Studies and Incidents Analysis
Talk
Open →
2016-05
30:07
OT Security is Hard
Michael Nee
BSidesROC
· 2025
Technical
OT Security
Intermediary
Talk
Open →
2025-03
45:19
Plunder, Pillage and Print
Deral Heiland
BSides Boston
· 2013
Technical
Hardware Hacking
Network Security
OSINT
Intermediary
Red
Case Studies and Incidents Analysis
Methodology
+1
Open →
2013-06
1:02:44
Weaponizing PDF Files: Advanced Exploitation Techniques
Filipi Pires
BSides Göteborg 2026
Technical
Malware Analysis
Reverse Engineering
Intermediary
Red
Talk
Open →
2026-03
42:19
Securing AI Agents: Exploring Critical Threats and Exploitation Techniques
Naveen Konrajankuppam Mahavishnu
Mohankumar Vengatachalam
BSidesSF
· 2025
Technical
AI Security
Intermediary
Red
Technical Deep-dives
Talk
Open →
2025-06
38:46
You Don't Have to Patch!
Jasvir Nagra
Pedro Fortuna
BSides Lisbon
· 2023
Technical
DevSecOps
Threat Modeling
Web AppSec
Intermediary
Talk
Open →
2024-02
20:02
Falco: runtime security analysis through syscalls
Leonardo Di Donato
BSides Athens
· 2020
Technical
Container Security
Detection Engineering
Intermediary
Blue
Talk
Open →
2020-06
29:07
SOC Analyst's Arsenal: Essential Tools, Tips & Tricks For Effective Investigations
Samuel Kavaler
BSides Munich
· 2023
Technical
DFIR
Detection Engineering
Tooling
Intermediary
Blue
Talk
Open →
2023-10
34:40
Attacking the Front-End: Modern-Day Client-Side Security
Kaif Ahsan
BSides Sydney
· 2023
Technical
Reverse Engineering
Web AppSec
Intermediary
Talk
Open →
2023-09
28:47
We Have C2 at Home - Leveraging Microsoft's C2 Framework
Garrett Foster
BSides PDX
· 2023
Technical
Active Directory
Intermediary
Red
Talk
Open →
2023-11
46:29
The Anatomy of Web Client Attacks
Jason Gillam
BSides Charlotte
· 2015
Technical
Web AppSec
Intermediary
Red
Talk
Open →
2015-06
54:51
Spoofing Commands - Can You Trust Process Creation Logs?
BSides Canberra
· 2024
Technical
Intermediary
Talk
Open →
2024-12
View all 308 talks tagged Intermediary →