Home
Talks
CFP Guide
What is BSides?
About
Contact
Light
← All talks
Tool
BSides talks featuring mimikatz
183
talks mention this tool across
67
BSides chapters.
Talks featuring mimikatz
39:16
Next Gen AV vs My Shitty Code
James Williams
BSides Manchester
· 2018
Technical
Malware
Post-Exploitation
Reverse Engineering
Advanced
Red
Demo
Talk
Open →
2018-08
43:09
Level Up! Practical Windows Privilege Escalation - Andrew Smith
BSides Knoxville
Open →
2016-06
51:35
Attacking Kerberos: Kicking the Guard Dog of Hades
Tim Medin
BSides Orlando
· 2015
Technical
Active Directory
Kerberos
Intermediary
Red
Talk
Open →
2015-11
45:08
Scripting Myself Out of a Job - Automating the Penetration Test with APT2 - Adam Compton
BSides Knoxville
Open →
2016-06
50:25
Bridging the Gap: Lessons in Adversarial Tradecraft
Will Schroeder
Matt Nelson
BSides DC
· 2015
Technical
Red
Talk
Open →
2015-11
43:51
Błędy administratorów w kontekście ostatnich ataków
Mariusz Burdach
BSides Warsaw
· 2017
Open →
2017-10
32:11
Hijacking .NET to Defend PowerShell
Amanda Rousseau
BSidesSF
· 2017
Technical
Blue
Talk
Open →
2017-03
48:21
PowerShell Security: Defending the Enterprise from the Latest Attack Platform
Sean Metcalf
BSides DC
· 2016
Technical
Active Directory
Blue
Talk
Open →
2016-10
1:05:41
Hunting for Credential Dumping Attacks in Modern Windows Environments
Andrew Case
BSides Philly
· 2023
Technical
Active Directory
DFIR
Malware Analysis
Blue
Talk
Open →
2024-01
51:46
Understanding and Attacking Delegations in Active Directory
Venkatraman K
BSides SATX
· 2021
Technical
Active Directory
Kerberos
Red
Demo
Talk
Open →
2021-06
51:02
Powershell for CyberWarriors - Russel Van Tuyl
BSides Knoxville
Open →
2016-06
37:13
Phishing With Phineas (Again) Hack Recreation On Steroids
George Karantzas
Constantinos Patsakis
BSides Athens
· 2022
Technical
Advanced
Purple
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2022-06
22:24
10 tips for Powershell as a hacking tool - Yossi Sassi
Yossi Sassi
BSides TLV
· 2019
Technical
Talk
Open →
2019-11
39:34
What the DLL? Finding and Exploiting DLL Preloading Vulnerabilities
Chris Le Roy
BSides Cape Town
· 2016
Technical
Reverse Engineering
Vulnerability Research
Red
Demo
Talk
Open →
2016-12
48:23
Koadic C3: Windows COM Command & Control Framework
Sean Dillon
Zach Harding
BSides Las Vegas
· 2017
Technical
Malware Analysis
Advanced
Red
Technical Deep-dives
Demo
Talk
Open →
2017-08
20:13
PG - How to Escalate Privileges to Administrator in Latest Windows - Soya Aoyama
BSides Las Vegas
Open →
2017-08
55:18
Windows Credential Attacks and Mitigations
Chad Tilbury
BSides SLC
· 2017
Technical
Active Directory
Purple
Red
Talk
Open →
2017-07
44:05
Fade from Whitehat… to Black
Beau Bullock
BSides Orlando
· 2016
War Stories
Red
Keynote
Open →
2016-03
29:31
Master Of Puppets: How To Tamper The EDR?
Daniel Feichter
BSides Munich
· 2022
Technical
Malware Analysis
Reverse Engineering
Advanced
Red
Technical Deep-dives
Talk
Open →
2022-05
47:48
Get-Help: An intro to PowerShell and how to use it for evil
Jared Haight
BSides Charleston
· 2015
Technical
Intro
Talk
Open →
2015-12
37:51
Building an Effective Intrusion Detection Program
Jason Craig
BSidesSF
· 2017
Technical
DFIR
Detection Engineering
Threat Intel
Blue
Talk
Open →
2017-03
46:16
The Imitation Game: Emulating Attackers with CALDERA
Wietze Beukema
BSides London
· 2019
Technical
Talk
Open →
2019-06
47:16
Karl Fosaaen - Attacking Azure Environments with PowerShell - BSides Portland 2018
Karl Fosaaen
BSides PDX
· 2018
Technical
Cloud IAM
Red
Demo
Talk
Open →
2019-02
29:35
LSASS - What should we be doing?
Robert Wilson
BSides Augusta
· 2021
Technical
Active Directory
Threat Modeling
Intermediary
Blue
Talk
Open →
2021-10
49:52
Abusing Windows with PowerShell and Microsoft debuggers
Pierre-Alexandre Braeken
BSides DC
· 2016
Technical
Active Directory
Advanced
Red
Talk
Open →
2016-10
44:49
Mo' Monero Mo' Problems: An Analysis of Cryptomining Malware
Joshua Reynolds
BSides Edmonton
· 2018
Technical
Talk
Open →
2018-09
25:06
DPAPI - The Spice of Encryption - Jacob Villarreal
Jacob Villarreal
BSides SATX
· 2024
Technical
Cryptography
Talk
Open →
2024-06
50:58
Threat hunting: Using MITRE ATT&CK against Carbanak malware
Amol Sarwate
BSidesSF
· 2022
Technical
Detection Engineering
Malware Analysis
Threat Intel
Intermediary
Blue
Case Studies and Incidents Analysis
Technical Deep-dives
+1
Open →
2022-07
39:07
Hunting high-value targets in corporate networks - Patrick Fussell, Josh Stone
BSides Las Vegas
Open →
2016-08
57:55
Seriously? You Want Me To Believe Cyber-Spies Want My Data
BSides Detroit
Open →
2012-06
57:19
PowerShell post-exploitation, the Empire has fallen
Michael Gough
BSides SATX
· 2018
Technical
Blue
Red
Talk
Open →
2018-07
19:23
Ding Dong The EDR is DEAD
Ayman Sagy
BSides Canberra
· 2025
Technical
Reverse Engineering
Vulnerability Research
Advanced
Red
Technical Deep-dives
Talk
Open →
2025-12
32:28
Forensic artifacts that make you go "Mmm.."
Yossi Sassi
Nir Jacob Saias
BSides TLV
· 2021
Technical
Purple
Talk
Open →
2021-08
36:24
ICS Intrusion KillChain explained with real simulation
Juan Escobar
BSides Athens
· 2021
Technical
ICS Security
Intermediary
Red
Demo
Workshop
Open →
2021-06
51:42
Modern Memory Forensics with Volatility 3
Andrew Case
BSides Seattle
Technical
Talk
Open →
2024-10
38:28
Ryan Hays - Weaponizing Splunk: Using Blue Team Tools for Evil
Ryan Hays
BSides Knoxville
· 2017
Technical
Red
Demo
Talk
Open →
2017-06
32:33
L0ss sans C St0 - PAMdemonium! Privileged Access Management
BSides Perth
· 2023
Technical
Active Directory
Cryptography
Vulnerability Research
Advanced
Red
Talk
Open →
2023-08
48:49
Demystifying Common Active Directory Attacks | Venkatraman K | BSides Delhi 2020
Venkatraman K
BSides Delhi
· 2020
Technical
Active Directory
Kerberos
Red
Talk
Open →
2020-11
22:26
Treat the Problems, Not the Symptoms
Igal Gofman
Yaron Shani
BSidesSF
· 2019
Technical
Active Directory
Talk
Open →
2019-03
47:47
The Hunt For The Red DA by Neil Lines
BSides Scotland
Open →
2017-04
9:17:44
2016 BSides - Breaking Ground - Day Two
BSides Las Vegas
Technical
Active Directory
Vulnerability Research
Red
Talk
Open →
2025-07
24:50
The Top 5 Ways I Own Your Internal Network
Heath Adams
BSides RDU
· 2019
Technical
Active Directory
Kerberos
Intermediary
Blue
Red
Demo
Talk
Open →
2019-10
38:03
Ross Wolf - The Hunter Games: How to find the adversary with EQL
Ross Wolf
BSides SATX
· 2019
Technical
Blue
Talk
Open →
2019-09
44:56
FileLess Malware Infections: Malware Tricks for Pentesters
Ramon Pinuaga
BSides Lisbon
· 2017
Technical
Malware Analysis
Reverse Engineering
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2017-11
20:44
YARA-as-a-Service (YaaS): Real-Time Serverless Malware Detection
Austin Byers
BSides Las Vegas
· 2017
Technical
Malware Analysis
Tooling
Blue
Demo
Talk
Open →
2017-08
44:48
Offensive Azure Security by Sergey Chubarov
Sergey Chubarov
BSides Dublin
· 2021
Technical
Talk
Open →
2021-05
53:26
Bringing Harmony to IIS: Using game mods to protect (or nuke) your web server
Adrian Justice
BSides Canberra
· 2023
Technical
Reverse Engineering
Threat Intel
Web AppSec
Advanced
Demo
Talk
Open →
2023-10
49:54
Life in the Windows Kernel for Red Teams
Andre Lima
BSides Oslo
· 2022
Technical
Advanced
Red
Demo
Talk
Open →
2023-01
44:29
0xDEAD: Domain Exploitation and Domination
Jon Milkins
Bsides CT
· 2025
Technical
Active Directory
Threat Modeling
Intermediary
Red
Case Studies and Incidents Analysis
Talk
Open →
2025-12
29:55
Bad USB Weaponized
Dan Anderson
Steve Fink
BSides SLC
· 2015
Technical
Hardware Hacking
Physical Security
Reverse Engineering
Red
Demo
Talk
Open →
2015-04
31:54
Prospecting Ransomware Tech
Vlad Craciun
BSidesSF
· 2018
Technical
Talk
Open →
2018-04
42:08
The Adversary Mindset: Practical examples from the field
Yossi Sassi
BSides Budabest
· 2024
Technical
Talk
Open →
2024-09
51:14
Living Off the Land: Windows Post-Exploitation with Built-in Tools
Christopher Campbell
Matthew Graeber
BSides Augusta
· 2013
Technical
Malware Analysis
Post-Exploitation
Red
Talk
Open →
2013-09
37:20
BSidesCharm 2023 - It’s all Magic(RAT) – A look into recent North Korean nation-state attacks
BSides Charm
Open →
2023-05
37:28
An Overview in Cloud Penetration Testing
Bleon Proko
BSides Prishtina
· 2022
Technical
Cloud IAM
Vulnerability Research
Red
Talk
Open →
2022-05
46:48
The Process of Detection Engineering1
BSides Tampa
Technical
Intermediary
Blue
Talk
Open →
2023-03
32:47
Domain Persistence in Active Directory: Detection, Triage, and Recovery
Nicolas Shyne
BSides Belfast
· 2025
Technical
Active Directory
Kerberos
Blue
Talk
Open →
2025-02
18:48
Think You're Stealthy? How to Detect Attacks in AD
Rachit Arora
Sai Sathvik Ruppa
Aakash Raman
BSides Charm
· 2025
Technical
Active Directory
DFIR
Detection Engineering
Intermediary
Blue
Talk
Open →
2025-05
37:13
Take Down Cyberthreat Dwell Time With Optimum Security
Eric Payne
BSides Vancouver
· 2021
Technical
Detection Engineering
Threat Intel
Blue
Talk
Open →
2021-06
18:31
Operation PZCHAO
Ivona-Alexandra Chili
BSidesSF
· 2019
Research
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2019-03
49:34
How to Defend Against Penetration Testers And Win - Paul Asadoorian
BSides Boston
Open →
2017-05
47:45
Windows 10 DFIR and InfoSec Challenges
Andrew Case
BSides Las Vegas
· 2019
Technical
DFIR
Malware Analysis
Blue
Technical Deep-dives
Talk
Open →
2019-10
35:12
Using BloodHound as a Defender: Tips from the Red Team
Andrew McNicol
BSides Charm
· 2024
Technical
Active Directory
Detection Engineering
Threat Modeling
Blue
Talk
Open →
2024-06
47:19
Bypassing Anti-Virus Using BadUSB by Cristian Cornea
Cristian Cornea
BSides Cheltenham
· 2023
Technical
Talk
Open →
2023-06
52:15
Exercícios de Red Team: Não simule a ameaça, seja a ameaça
Oliveira Lima
BSides São Paulo
· 2025
Technical
Advanced
Red
Talk
Open →
2025-06
18:50
The Top 5 Ways I Own Your Internal Network
Heath Adams
BSides Charleston
· 2019
Technical
Active Directory
Kerberos
Network Security
Red
Talk
Open →
2019-11
43:36
The Count's A-to-Z of Windows Privilege Escalation
Lukasz Gogolkiewicz
BSides Canberra
· 2018
Technical
Active Directory
Red
Talk
Open →
2018-08
25:40
Red and Blue Ping Pong: Living Off the Land in Windows Attack and Defense
Lee Kagan
Anton Ovrutsky
BSides Toronto
· 2017
Technical
Active Directory
Malware Analysis
Purple
Demo
Talk
Open →
2018-01
57:04
Network Segmentation without a Network Engineer
Mike Burns
BSides Charm
· 2024
Technical
Active Directory
Detection Engineering
Network Security
Talk
Open →
2024-06
45:25
How occult ransomware gangs will sacrifice your domain admin
Nikos Mantas
BSides Tallinn
· 2021
Technical
Active Directory
Case Studies and Incidents Analysis
Talk
Open →
2021-11
24:50
PG - The SOC Counter ATT&CK - Mathieu Saulnier
BSides Las Vegas
Open →
2019-10
1:02:12
Pentesting: Tips, Tricks and Stories
Patrick Laverty
Aaron Herndon
Bsides CT
· 2018
Technical
Active Directory
OSINT
Social Engineering
Threat Intel
Red
Talk
Open →
2018-11
27:06
Automating security with PowerShell
Jaap Brasser
BSides Amsterdam
· 2017
Technical
Blue
Red
Demo
Talk
Open →
2017-09
55:34
Adding PowerShell to your Arsenal with PSAttack
Jared Haight
BSides Charleston
· 2016
Technical
Talk
Open →
2016-11
21:55
LSA-Reaper: A Remote LSASS Extraction Tool
Daniel Cornett
BSides Augusta
· 2023
Technical
Active Directory
Malware Analysis
Reverse Engineering
Advanced
Red
Talk
Open →
2023-10
27:15
Abusing Azure Arc: From Service Principal Exposed To Reverse Shell
Christian Bortone
BSides Leeds
· 2024
Technical
Active Directory
Cloud IAM
Advanced
Red
Technical Deep-dives
Talk
Open →
2024-07
47:46
BSidesSLC 2016 -- Preparing 4 PowerShellmageddon -- Chad Tilbury
BSides SLC
Open →
2016-05
50:01
Grapl — A Graph Platform for Detection and Response
Colin O'Brien
BSides Las Vegas
· 2019
Technical
DFIR
Detection Engineering
Threat Intel
Blue
Talk
Open →
2019-10
28:35
BSides Rochester 2018 - Virtualization Based Security Strengths and Weaknesses
BSidesROC
Open →
2018-04
44:04
Pwned Cloud Society
Bryce Kunz
BSides SLC
· 2017
Technical
Cloud IAM
Red
Talk
Open →
2017-06
44:59
Tony Lambert - Spotting Lateral Movement with Endpoint Data
Tony Lambert
BSides Augusta
· 2019
Technical
Talk
Open →
2019-10
49:40
Top 10 AD Mistakes that can lead to being Pwned
Adam Steed
BSides San Diego
· 2017
Technical
Active Directory
Kerberos
Blue
Talk
Open →
2017-01
46:05
From NTLM to Kerberos: The Evolution of Authentication Relaying Attacks
Alberto Rodriguez
BSides Augusta
· 2025
Technical
Active Directory
Kerberos
Red
Talk
Open →
2025-10
25:01
Windows 11 At Your Service
Michael Bargury
BSidesSF
· 2023
Technical
Cloud IAM
Malware Analysis
Red
Talk
Open →
2023-05
30:17
Evasion On Aisle Five: From Bacon To Beacon
Brad Storan
BSides Leeds
· 2023
Talk
Open →
2023-07
26:33
Don't turn your back on Ransomware!
Erik Heskes
BSidesSF
· 2022
Technical
Talk
Open →
2022-07
36:34
Bypassing Anti-Virus Using BadUSB
Cristian Cornea
BSides Dublin
· 2023
Technical
Hardware Hacking
Malware Analysis
Reverse Engineering
Advanced
Red
Demo
Talk
Open →
2023-07
47:12
BSidesMCR 2018: APT15: Live And Kicking by Ahmed Zaki
BSides Manchester
Open →
2018-08
40:48
Angela Hennessy - Detecting DNS Tunneling
Angela Hennessy
BSides Boulder
· 2021
Technical
Blue
Talk
Open →
2021-01
38:58
Windows Management Instrumentation for Good and Evil
Jaime Geiger
BSides Delaware
· 2017
Technical
Talk
Open →
2017-11
34:01
Detect the Undetectable with Sysmon and PowerShell Logs
Dimitrios Margaritis
BSides Athens
· 2017
Technical
Detection Engineering
Malware Analysis
Threat Intel
Blue
Talk
Open →
2017-10
51:24
How to Frustrate a Penetration Tester - Justin Forbes
BSides Peru
Open →
2019-07
46:34
Save the Env (Variable): Hijacking Legit Apps w/ Minimal Footprint
Wietze Beukema
BSides NYC
· 2023
Technical
Malware Analysis
Reverse Engineering
Red
Technical Deep-dives
Talk
Open →
2023-06
48:51
PowerShell pew pew pew: Skillz 4 blue team
Ashley McGlone
BSides Columbus
· 2020
Technical
Detection Engineering
Blue
Talk
Open →
2020-08
43:03
Using Deception Tools To Protect Your Enterprise
Abdulrahman Al-Nimari
BSides Cairo
· 2020
Technical
Detection Engineering
Threat Intel
Blue
Talk
Open →
2023-02
25:35
Low Hanging Blue Fruit: Defending With Open-Source Tools
Yaron King
BSides TLV
· 2019
Technical
Blue
Talk
Open →
2019-11
45:49
Scan Pwn Next! – exploiting service accounts in Windows
Andrey Dulkin
Matan Hart
BSidesSF
· 2016
Technical
Active Directory
Kerberos
Vulnerability Research
Red
Talk
Open →
2016-04
31:41
Evil Mog: From Print Spooler to Kerberos Silver Tickets
BSides Calgary
· 2020
Technical
Kerberos
Intermediary
Red
Talk
Open →
2020-12
29:51
Stories from the Trenches: Initial Access to Exfiltration... by Tristan Luikey & Jonny Elrod
Tristan Luikey
Jonny Elrod
BSides Tampa
· 2025
Technical
Blue
Case Studies and Incidents Analysis
Talk
Open →
2025-06
34:43
Kevin Sistrunk - Automating Security Operations Around the Clock
Kevin Sistrunk
BSides Knoxville
Technical
AI Security
Detection Engineering
Demo
Talk
Open →
2025-06
47:02
BSidesSLC 2017 -- Dave Kennedy -- A Continually Changing Industry: INFOSEC
BSides SLC
Open →
2017-06
24:33
Testing Defensive Controls w/ atomic-operator - Josh Rickard
Josh Rickard
BSides KC
· 2022
Technical
DevSecOps
Blue
Talk
Open →
2022-10
31:19
Modern Adversary Tradecraft
Sajal Thomas
BSides Munich
· 2021
Technical
Detection Engineering
Malware Analysis
Threat Intel
Blue
Talk
Open →
2021-06
29:50
Harvesting Low-Hanging Fruit in Red Teaming Exercises
Nick Kapellos
BSides Athens
· 2024
Technical
Active Directory
Kerberos
Vulnerability Research
Red
Talk
Open →
2024-03
36:38
In Your Mems — Windows AV Evasion Using in Memory Techniques
iDigitalFlame
BSides Delaware
· 2016
Technical
Talk
Open →
2016-11
37:13
Wild Wild Web App to Domain Admin: A Case Study
Nacho Sorribas
BSides Lisbon
· 2017
Technical
Active Directory
Web AppSec
Case Studies and Incidents Analysis
Talk
Open →
2017-11
35:08
BSidesIA 2017 Track1: Protecting Against Advanced Attacks – Andy Thompson
BSides Iowa
Open →
2017-04
27:28
Profiling "VIP Accounts" Access Patterns in User-Centric Data Streams
Rod Soto
Joseph Zadeh
Xiodan Li
BSidesSF
· 2019
Technical
Active Directory
Detection Engineering
Kerberos
Threat Intel
Talk
Open →
2019-03
22:11
Screaming About Detection Coverage in ALLCAPS
Evan Perotti
BSides Philly
· 2025
Technical
Detection Engineering
Threat Modeling
Purple
Empirical Research
Methodology
Talk
Open →
2026-02
27:26
Don't Turn Your Back on Ransomware
BSides Newcastle
· 2022
Technical
Active Directory
DFIR
Malware Analysis
Demo
Talk
Open →
2022-09
34:49
Tom Maddock - Splunking AD - BSides San Diego 2017
BSides San Diego
Open →
2017-01
26:59
The Katz Out Of The Bag
Sándor Fehér
BSides Budabest
· 2019
Technical
Active Directory
Kerberos
Malware Analysis
Intermediary
Blue
Technical Deep-dives
Talk
Open →
2019-06
39:41
Catch Me if You Can
Michael Bryant
BSides Asheville
· 2016
Technical
Active Directory
Detection Engineering
Threat Intel
Red
Talk
Open →
2018-06
49:26
Sysmon or it Didn't Happen
Gerard Johansen
BSides Charm
· 2024
Technical
DFIR
Detection Engineering
Blue
Talk
Open →
2024-06
43:38
Passwords: Policies, Securing, Cracking, and More
Derek Melber
BSides Las Vegas
· 2023
Technical
Active Directory
Kerberos
Talk
Open →
2023-10
27:04
BSides Toronto 2019 Harish Ramadoss
BSides Toronto
Open →
2019-10
43:49
The Monica Bellucci Fanclub - Detection and Defense Lessons Learned from the Trickbot Forum
Jason Killam
BSides KC
· 2022
Technical
Blue
Talk
Open →
2022-10
13:24
Turning To The Dark Side: Utilizing Offensive Techniques In Incident Response
Archie Essien
BSides London
· 2025
Technical
Active Directory
DFIR
OSINT
Threat Intel
Talk
Open →
2025-02
18:17
Top Ways I Still Hack Your Company (and How to Defend Against Them)
Bennett Warner
BSides Charm
· 2024
Technical
Active Directory
Network Security
Vulnerability Research
Web AppSec
Red
Talk
Open →
2024-06
35:38
I Know What You Did Last Summer… I'm Still Hacking Your Small Business
Vincent Matteo
BSides SATX
· 2022
Technical
War Stories
Red
Talk
Open →
2023-03
58:25
BSidesAugusta 2018 - Tim Crothers - Leveraging Deception Techniques for Strong Detection
BSides Augusta
Open →
2018-11
16:09
Visualize Windows Events using Python3 & Neo4j
Tasos Chatziefstratiou
BSides Athens
· 2020
Technical
Blue
Demo
Talk
Open →
2020-06
20:36
Nicholas Gobern - Good Behavior is it's own reward
Nicholas Gobern
BSides Augusta
Technical
Talk
Open →
2023-10
21:52
BSidesCLT 2021: PowerShell’s Return to Power - Dahvid Schloss
Dahvid Schloss
BSides Charlotte
· 2021
Technical
Red
Talk
Open →
2021-09
2:56:32
BSides Knoxville 2018 (Third Track, Pres Pub)
Michael Hague
BSides Knoxville
· 2018
Technical
Detection Engineering
Threat Modeling
Talk
Open →
2018-05
41:51
Keeping up with the Jones's and other APT threats
Kenneth Inkster
BSides Calgary
Technical
DFIR
Detection Engineering
Malware Analysis
Threat Intel
Blue
Talk
Open →
2020-12
34:24
PowerShell's Return to Power
Dahvid Schloss
BSides Greenville
· 2021
Technical
Malware Analysis
Reverse Engineering
Vulnerability Research
Advanced
Red
Talk
Open →
2021-10
1:01:16
Why Hackers Keep Winning
BSides KC
· 2019
Technical
Web AppSec
Red
Talk
Open →
2019-06
49:39
Keynote: Knowledge is Power
Jessica Payne
BSides Charm
· 2018
Community
Intro
Keynote
Open →
2021-05
52:34
G1234! - Protecting Windows Credentials: An Excessive Guide for Security Professionals - Mark Burnet
BSides Las Vegas
Open →
2017-08
51:28
BG - Building an Empire with PowerShell Will Schroeder & Justin Warner
BSides Las Vegas
Open →
2016-12
27:50
Cats, Cats & Moar Katz: Windows Post Exploitation
Alex Reuben
BSides Delaware
· 2017
Technical
Talk
Open →
2017-11
25:53
PowerShell's Return to Power
Dahvid Schloss
BSides RDU
· 2021
Technical
Malware Analysis
Reverse Engineering
Vulnerability Research
Advanced
Red
Technical Deep-dives
Talk
Open →
2021-10
23:04
Steganography and OT Cyber Campaigns
Jacob Benjamin
BSides Boise
· 2020
Technical
Red
Talk
Open →
2020-10
28:09
Watching Kittens at Play: Dissecting an Iranian Nation State Interactive Intrusion
Ryan Thompson
BSides SATX
· 2022
Technical
Blue
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2023-03
39:38
I Know What You Did Last Summer… I'm Still Hacking Your Small Business
Vincent Matteo
BSides KC
· 2022
Technical
Red
Case Studies and Incidents Analysis
Talk
Open →
2022-10
50:26
Shelly Giesbrecht: The Trouble With Ransomware
Shelly Giesbrecht
BSides Calgary
· 2020
Technical
Talk
Open →
2020-12
21:54
Breaking Down Walls With Windows
Alexander Klepal
BSides SATX
· 2020
Technical
Red
Talk
Open →
2020-08
37:20
Operation WordDrone: Cyber Threats in the Drone Industry
Ilia Dafchev
BSides Sofia
· 2025
Technical
Malware Analysis
Supply Chain Security
Threat Intel
Advanced
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2025-04
30:58
Setting up a lab
William Price
Bill Price
BSides Charlotte
· 2019
Open →
2019-11
41:45
Every Step Counts: Strategic Defense for the Modern Blue Team
Jarkko Kinnunen
BSides Tallinn
· 2025
Technical
Blue
Talk
Open →
2025-10
21:37
Threat Actors Do the Funniest Things - Peter Mackenzie
Peter Mackenzie
BSides Bournemouth
· 2025
War Stories
DFIR
Malware Analysis
Intro
Blue
Talk
Open →
2025-09
40:44
Simulation Hacking, the Good, Bad and the Ugly - Jacques van zijl
BSides Vancouver
Open →
2021-06
2:56:33
BSides Knoxville 2018 (Third Track, Pres Pub)
BSides Knoxville
Open →
2018-05
46:03
Defending Beyond Defense
Dr. Catherine J. Ullman
BSides 312
· 2025
Career
Technical
Detection Engineering
Malware Analysis
Threat Intel
Talk
Open →
2025-11
29:24
Managed Service Accounts: Defense Against Kerberoasting or Gateway to Golden GMSA Attack?
Jessé Neto
BSides Joao Pessoa
· 2025
Technical
Active Directory
Kerberos
Threat Modeling
Intermediary
Technical Deep-dives
Talk
Open →
2025-10
19:03
How to Prioritize Red Team Findings: Presenting CRTFSS (Common Red Team Findings Score System)
Guillermo Buendia
BSides Las Vegas
· 2023
Technical
Threat Intel
Threat Modeling
Red
Methodology
Talk
Open →
2023-10
21:17
PW - How to Handle Getting Dumped: Compromised Passwords
BSides Las Vegas
Open →
2023-10
38:19
Defending Advanced Attacks with IAM Best Practices
Andy Thompson
BSides Cincinnati
· 2017
Technical
Talk
Open →
2017-05
46:42
Patrick Curtin - The Ireland HSE Ransomware Attack: A Cautionary Tale for All Organizations
BSides St. John's
Open →
2025-05
42:14
Came for the Ransomware, Stayed for the APT - John Dwyer
BSides Peru
Open →
2022-09
28:57
Assumed Breach: A Better Model for Pen Testing
Mike Saunders
BSides KC
· 2019
Technical
Active Directory
Kerberos
Threat Intel
Red
Talk
Open →
2019-06
32:28
Server 2016 and the End of Lateral Movement (Or is it?)
Ryan Preston
BSides KC
· 2017
Technical
Talk
Open →
2017-07
44:38
Breaking the Illusion: Bypassing Endpoint Security Controls with Simple Tactics
Blake Hudson
Caleb Sargent
BSides Las Vegas
· 2025
Technical
Detection Engineering
Malware Analysis
Red
Talk
Open →
2025-12
27:28
Christmas Hancitor Campaign - Artem Artemov
Artem Artemov
BSides Munich
· 2021
Technical
Malware Analysis
Threat Intel
Blue
Case Studies and Incidents Analysis
Talk
Open →
2023-10
45:05
Detecting the Elusive: Active Directory Threat Hunting
Sean Metcalf
BSides Charm
· 2017
Technical
Active Directory
Detection Engineering
Kerberos
Blue
Technical Deep-dives
Talk
Open →
2021-05
48:06
John Helt - The Many Faces of Emotet: Annoyance or Threat?
BSides Knoxville
Open →
2019-06
49:39
The Quest for Identity and Internal Threats
Nir Yosha
BSides Charleston
· 2018
Talk
Open →
2018-11
24:18
Building Your MS Sentinel Attacks: Simulating MITRE ATT&CK Techniques In Azure
Albert Timileyin
BSides Leeds
Technical
Demo
Talk
Open →
2025-08
27:09
From Red to Blue: Security Strategies in Azure
Anthony Hendricks
BSides SLC
· 2023
Technical
Active Directory
Cloud IAM
Talk
Open →
2023-12
47:06
The Cat and Mouse Game! EDR and XDR
Jason Maynard
BSides Calgary
· 2021
Technical
Talk
Open →
2021-12
31:00
Ryuk Ransomware in Industrial Control System Networks
Camille Jackson Singleton
BSides SLC
· 2021
Technical
Talk
Open →
2021-12
36:13
Top 10 Mistakes Made In Active Directory That Can Lead To Being Compromised
Adam Steed
BSides Philly
· 2017
Technical
Active Directory
Talk
Open →
2017-08
58:13
Incident Response is HARRRRRD… but it doesn't have to be
Michael Gough
BSides SATX
· 2020
Technical
Blue
Talk
Open →
2020-08
52:08
G1234! - My quest for (privileged) identity to own your domain - Nir Yosha
BSides Las Vegas
Open →
2019-10
22:49
Top 5 Ways I Own You Internal Network
Heath Adams
BSides Charlotte
· 2019
Technical
Talk
Open →
2019-11
28:52
Cyber Zoology: Protecting Your Network from New Breeds of Attacks with a Raspberry Pi
Patrick Kelly
BSides Toronto
· 2018
Technical
Talk
Open →
2018-11
42:09
BSidesPGH 2024 Track 2 ch3f The Whole is More Dangerous than the Sum of its Parts
BSides Peru
Open →
2024-08
25:01
Wrangle Your Defense Using Offensive Tactics
Matt Dunn
Bsides CT
· 2019
Technical
Blue
Talk
Open →
2019-11
45:36
Agentic AI Malware: Why the Cybersecurity Battle Isn’t Over
Candid Wuest
BSides Las Vegas
· 2025
Technical
AI Security
Malware Analysis
Advanced
Red
Talk
Open →
2025-12
27:50
Wild Blue Yonder: Dissecting the BlueKeep Window's Exploit
Taree Reardon
Adan Valencia
BSides Boulder
· 2021
Technical
DFIR
Malware Analysis
Threat Intel
Blue
Talk
Open →
2021-01
41:43
Red and Blue Teaming and the Powers Gained! Adversarial Emulation: Jason Maynard
Jason Maynard
BSides Edmonton 2023
Technical
Blue
Red
Demo
Talk
Open →
2023-10
21:38
Abusing Normality: Data Exfiltration in Plain Sight
Aelon Porat
BSides Philly
· 2018
Technical
Talk
Open →
2018-11
17:10
Crit Get Hit: Chaining Vulnerability Scanner Findings to Achieve Domain Admin
Nicholas Doerner
BSidesROC
· 2023
Technical
Active Directory
Vulnerability Research
Red
Talk
Open →
2024-09
47:45
Cracking the Vault: Defending Against Modern Active Directory Exploits
Peter Morin
BSides Fredericton
· 2024
Technical
Active Directory
Kerberos
Intermediary
Red
Talk
Open →
2024-11
20:36
Ransom cartel: Possible connection with REvil by Amer Elsad and Daniel Bunce
Amer Elsad
Daniel Bunce
BSides Austin
Talk
Open →
2024-02
24:26
Technical Deep-Dive: Red Canary
BSides Calgary
Open →
2021-12
42:40
The Declarative Future
Liam Randall
BSides Charm
Technical
Container Security
Detection Engineering
Web AppSec
Keynote
Open →
2021-05
50:59
JasonMaynard
Jason Maynard
BSides Calgary
· 2026
Technical
Detection Engineering
Threat Modeling
Demo
Talk
Open →
2024-03
36:30
What You Don't Know Will Cost You: Modern AD Attack Paths & Toxic Combinations
Craig Birch
BSides Charlotte
· 2026
Technical
Active Directory
Threat Modeling
Intermediary
Red
Technical Deep-dives
Demo
Open →
2026-04
38:21
Quantifying Breach Impact Mitigation by ZTA
Alexey Malashev
BSides SATX
· 2025
Technical
Talk
Open →
2025-09
31:26
There's No Place Like (Dual)Homed
David E. Young Jr.
BSides Columbus
· 2020
Technical
Active Directory
Network Security
Intermediary
Red
Talk
Open →
2020-08
52:22
BSidesCharm - 2018 - Devon Kerr - Quantify your hunt: not your parents’ red teaming
BSides Charm
Open →
2021-05