Home
Talks
CFP Guide
What is BSides?
About
Contact
Light
← All talks
Tool
BSides talks featuring DNS
33
talks mention this tool across
25
BSides chapters.
Talks featuring DNS
57:24
Cyfrowa Twierdza – Poradnik Rebelianta (Digital Fortress – A Rebel's Guide)
Jakub Mrugalski
BSides Warsaw
· 2016
Technical
Intro
Talk
Open →
2016-10
35:42
Hands-on Writing Malware in Go
Stuart McMurray
Carson Seese
BSides DC
· 2019
Technical
Malware Analysis
Reverse Engineering
Red
Demo
Talk
Open →
2019-10
53:47
Oh, the Places Your Packets Will Go!
James Pope
BSides SLC
· 2025
Technical
Talk
Open →
2025-10
27:53
Why You Should Use Offensive Techniques to Teach Defensive
Michael Kranch
BSides KC
· 2019
Career
Talk
Open →
2019-06
51:33
Artsiom Holub |Deconstructing The Cyber Kill Chain of Angler Exploit Kit
BSides Orlando
Open →
2016-03
45:56
The green padlock of doom, or why no one trusts us anymore
Meadow Ellis
BSides London
· 2018
Technical
Talk
Open →
2018-06
31:52
A Case Study of MacOS Supply Chain Compromise
Jason Craig
Michael George
BSidesSF
· 2018
Technical
Detection Engineering
Malware Analysis
Supply Chain Security
Blue
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2018-04
23:19
Pwning all the Internet of things for fun and profit
Ben Hughes
BSides Toronto
· 2014
Technical
Talk
Open →
2014-12
55:26
Stories from the SOC – vol. 2016
Gaweł Mikołajczyk
Oskar Fusek
Takahiro Sugiyama
BSides Warsaw
· 2016
Talk
Open →
2016-10
26:37
GF - Low & Slow - Techniques for DNS Data Exfiltration - Dimitri Fousekis
BSides Las Vegas
Open →
2019-10
55:44
Fernando Tomlinson - Gaining 20/20 vision during an incident with PowerShell
Fernando Tomlinson
BSides Augusta
· 2019
Technical
DFIR
Detection Engineering
Malware Analysis
Blue
Talk
Open →
2019-10
35:53
Hands-on Writing Malware in Go
Stuart McMurray
BSides DC
· 2019
Technical
Red
Workshop
Open →
2019-10
44:47
Email security with DANE: Empirical Analysis of DANE for SMTP in the wild
Aniketh Girish
BSides Delhi
· 2020
Research
Cryptography
Empirical Research
Technical Deep-dives
Talk
Open →
2020-11
47:50
Passive and Active Defense by Jason Maynard
Jason Maynard
BSides Edmonton
Talk
Open →
2018-09
49:31
Endpoint to Internet: Security Control Validation Using Threat Behavior Emulation
Ken Jenkins
Stuart McMurray
BSides DC
· 2018
Technical
Detection Engineering
Threat Intel
Blue
Red
Talk
Open →
2018-11
45:53
Authentication Proxy Attacks: Detection, Response and Hunting
Chris Merkel
BSides Las Vegas
· 2023
Technical
Detection Engineering
Threat Intel
Blue
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2023-10
26:18
Turning Off The Internet: Technical Tactics Of State-Scale Censorship And Shutdowns - Reza Sharifi
Reza Sharifi
BSides Munich
· 2025
Policy
Technical
Talk
Open →
2026-02
46:03
Why You Need To Be Red Team'ed
Nate McConnell
BSides SLC
· 2015
Technical
Red
Talk
Open →
2015-04
22:37
Pay $2 Shipping to Receive Your Free iPhone! — Subdomain Takeover, Malicious JavaScript, and the Art of Deobfuscation
Andy Vermeulen
BSides Sydney
Technical
Malware Analysis
OSINT
Reverse Engineering
Web AppSec
Talk
Open →
2023-08
37:33
Cybercrime Central: Vextrio Operates Massive Criminal Affiliate Program - Gary Cox
Gary Cox
BSides Exeter
Talk
Open →
2024-09
41:50
How Adversaries Are Abusing Network Blind Spots - Edmund Brumaghin and Earl Carter
Edmund Brumaghin
Earl Carter
BSides Belfast
Talk
Open →
2020-01
46:26
Learn How to Speak Malware: A New Approach to Combat Attacks - Todd O'Boyle
BSides Boston
Open →
2017-05
46:07
AD and DNS: A Match Made in Heck
Jim Sykora
Jake Hildreth
BSides Charm
· 2023
Technical
Active Directory
Kerberos
Talk
Open →
2023-06
26:35
Developers, the weakest link in the supply chain?
David Leadbeater
BSides Canberra
· 2025
Technical
Supply Chain Security
Vulnerability Research
Technical Deep-dives
Talk
Open →
2025-12
25:02
Baited Canaries: Monitoring Attackers With Active Beacons
Gregory Caswell
BSides Las Vegas
· 2019
Technical
Detection Engineering
Threat Intel
Blue
Case Studies and Incidents Analysis
Talk
Open →
2019-10
21:19
Next Generation Solutions for Modern Network Attacks
BSides Charlotte
· 2023
Technical
Talk
Open →
2023-09
51:04
The Hole in Your SOC: How a compromise of your SIEM could be a disaster for your organization
Michael Music
BSides Tampa
· 2021
Technical
Active Directory
Cloud IAM
Detection Engineering
Kerberos
Threat Intel
Talk
Open →
2021-04
47:06
The Cat and Mouse Game! EDR and XDR
Jason Maynard
BSides Calgary
· 2021
Technical
Talk
Open →
2021-12
28:57
Turning Off The Internet: Technical Tactics Of State-Scale Censorship And Shutdowns
Reza Sharifi
BSides Munich 2025
Technical
Network Security
Technical Deep-dives
Talk
Open →
2026-02
27:58
Your Secrets Are Showing: What Hackers Can Find Online
Connor McCasland
BSides Albuquerque
· 2025
Technical
OSINT
Threat Intel
Intro
Talk
Open →
2025-08
26:33
Writing Our Own DNS Tunneling Protocol, And Other AWS Misadventures, All In A Pen Test
Sunny Chau
BSides Basingstoke
Technical
Talk
Open →
2024-09
25:05
Rob Truesdell - How do you find the needle in the haystack? Burn all the hay!
BSides FloodCity
Open →
2019-05
25:24
Effective Monitoring for Operational Security
Russell Mosley
Ryan St. Germain
BSides Charm
Technical
Detection Engineering
Threat Intel
Blue
Talk
Open →
2021-05