Home
Talks
CFP Guide
What is BSides?
About
Contact
Light
← All talks
Tool
BSides talks featuring Shodan
130
talks mention this tool across
57
BSides chapters.
Talks featuring Shodan
33:53
The Power of Recon
Orwa Atyat
BSides Ahmedabad
Technical
OSINT
Vulnerability Research
Web AppSec
Red
Talk
Open →
2024-05
36:46
Breaking into Embedded Devices and IoT Security
Andrew Costis
BSides London
· 2018
Technical
Talk
Open →
2018-06
27:45
What I learned being an OSINT creeper
Josh Huff
BSides Charleston
· 2016
Talk
Open →
2016-11
26:12
Skiptracer: OSINT for broke ass hackers
illwill
Bsides CT
· 2018
Technical
OSINT
Red
Demo
Open →
2018-11
34:39
A Drop of Jupyter: A Modular Approach to Penetration Testing
Omar Bheda
Nate Kirk
Cody Ruscigno
BSides Dallas/Fort Worth
Technical
Tooling
Red
Demo
Open →
2020-11
37:13
Phishing With Phineas (Again) Hack Recreation On Steroids
George Karantzas
Constantinos Patsakis
BSides Athens
· 2022
Technical
Advanced
Purple
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2022-06
25:10
All Your Containers Are Belong to Us
James Condon
BSidesSF
· 2019
Research
Cloud IAM
Empirical Research
Talk
Open →
2019-03
44:05
Fade from Whitehat… to Black
Beau Bullock
BSides Orlando
· 2016
War Stories
Red
Keynote
Open →
2016-03
54:04
Finding ICS/OT (Industrial Control Systems/Operational Technology) Assets with Shodan
BSides Greenville
· 2023
Technical
IoT
OSINT
Red
Talk
Open →
2023-06
29:30
BSidesSLC 2015 -- Social Engineering: The Good, the Bad, and the Ugly -- Stephanie Carruthers
BSides SLC
Open →
2015-04
41:39
Keith Perry - Roll Your Own Internet of Things Search Engine
BSides Orlando
Open →
2014-04
9:10:48
5th Annual BSides Asheville Information Security Conference Live Stream
BSides Asheville
Open →
2018-06
14:17
My First Program: A Pentesting Tool
Nina Fasel
BSides London
· 2019
Technical
OSINT
Tooling
Intro
Talk
Open →
2019-06
14:38
Visualising TLS Fingerprints With TMAP To Hunt Malicious Domains
Amanda Thomson
BSides London
· 2025
Technical
Cryptography
Talk
Open →
2025-02
7:47:30
BSides Las Vegas 2019 D1 - Ground 1234!
Alvaro Muñoz
Alexander Miros
BSides Las Vegas
· 2019
Technical
Talk
Open →
2019-08
38:06
Como Hackear um Banco sem Sair do seu Quarto?
Arthur Aires
Matheus Wreck
Gustavo Oliveira
BSides São Paulo
· 2025
Technical
War Stories
Reverse Engineering
Vulnerability Research
Web AppSec
Advanced
Red
Talk
Open →
2025-06
8:23:41
Security BSides Delaware 2020 - Day 1
BSides Delaware
· 2020
Open →
2020-11
30:01
2017 - Repairing The Internet With Responsible Disclosures by Victor Gevers
BSides Manchester
Open →
2017-08
1:00:43
Security BSides Athens 2022
BSides Athens
· 2022
Technical
Open →
2022-06
52:09
Speedrun Cybersecurity with AI – Hack Faster
Mike Spicer
BSides SLC
· 2025
Technical
AI Security
Vulnerability Research
Red
Demo
Talk
Open →
2025-06
4:14:50
Hardware Hacking Workshop
Jilles Vandermeulen
BSides Pakistan
· 2020
Technical
Hardware Hacking
IoT
Reverse Engineering
Intro
Workshop
Open →
2020-11
29:56
Offensive RFID/NFC
Shain Lakin
BSides Perth
· 2021
Technical
Wireless Security
Talk
Open →
2021-09
13:17
Automated Dorking for Fun and Pr^wSalary - Filip Reesalu
BSides Las Vegas
Open →
2016-08
23:03
Go With The (Work)flow
Ryan Robinson
Nicole Fishbein
BSidesSF
· 2022
Technical
Cloud IAM
Intermediary
Red
Case Studies and Incidents Analysis
Talk
Open →
2022-07
21:45
Making It Rain: Cryptojacking Attacks In The Cloud
Chris Doman
BSides Bristol
· 2019
Technical
Talk
Open →
2019-07
35:24
Let's Get Physical: Physical Access Controls Security
Luis Catarino
Pedro Rodrigues
BSides Lisbon
· 2019
Technical
Hardware Hacking
Physical Security
Vulnerability Research
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2019-12
37:38
BSides Cairo 2019: Mitigating New Entry Points To The Jewels - Denis Makrushin
BSides Cairo
Open →
2019-02
23:55
IoT on Easy Mode: Reversing Embedded Devices
Elvis Collado
BSidesSF
· 2016
Technical
Hardware Hacking
IoT
Reverse Engineering
Vulnerability Research
Intro
Red
Talk
Open →
2016-04
29:29
Breaking The Ransomware Tool Set: When An Opsec Failure Became A Intel Goldmine
Nicklas Keijser
BSides Munich
· 2023
Technical
Talk
Open →
2023-10
30:53
MQTT: Tiny Protocol, Big Vulnerabilities
Tracie Martin
BSides Seattle
· 2020
Technical
Talk
Open →
2020-12
30:54
Internet dataset combinations for #ThreatHunting
Arian Evans
Steve Ginty
BSidesSF
· 2017
Technical
Advanced
Talk
Open →
2017-03
11:15
BSides Sofia 2022: Keynote
Bozhidar Bozhanov
BSides Sofia
· 2022
Policy
Keynote
Open →
2022-04
18:51
OSINT in Cyber Security & Intelligence Communities
Korab Keqekolla
BSides Prishtina
Technical
Talk
Open →
2024-09
21:56
Now You TCP Me, Now You Don't: The Strengths and Weaknesses of Various Internet Scanning Services
Adi Ben-Israel
BSides TLV
· 2020
Technical
Network Security
OSINT
Talk
Open →
2020-07
34:52
Gal Bitensky - Leveraging Passive Fingerprinting for Link Scanners Evasion
Gal Bitensky
BSides TLV
· 2021
Technical
Red
Talk
Open →
2021-08
48:47
BSidesMCR 2018: Welcome Home: Internet Open Telemetry by Martin Hron
BSides Manchester
Open →
2018-08
29:07
SOC Analyst's Arsenal: Essential Tools, Tips & Tricks For Effective Investigations
Samuel Kavaler
BSides Munich
· 2023
Technical
DFIR
Detection Engineering
Tooling
Intermediary
Blue
Talk
Open →
2023-10
22:21
Cruise Line Security Assessment OR Hacking the High Seas - Chad Dewey (Adam Brand)
BSides Las Vegas
Open →
2016-09
43:19
Ofir Shaty & Sarit Yerushalmi - CrimeOps of the KashmirBlack Botnet
Ofir Shaty
Sarit Yerushalmi
BSides TLV
· 2021
Technical
Malware Analysis
Threat Intel
Advanced
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2021-08
47:22
Manage Your Attack Surface on a Budget
Brittany D Little
Dileep Gurazada
Joshua Danielson
Anchal Raheja
BSides Las Vegas
· 2021
Technical
Tooling
Cloud IAM
Vulnerability Research
Panel
Open →
2021-08
41:46
Clean Forensics: Analyzing Network Traffic of Vacuum Bots
Karan Dwivedi
BSides Las Vegas
· 2022
Technical
IoT
Network Security
Privacy
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2022-09
28:40
Mapping the SaaS Attack Surface
Jaime Blasco
BSidesSF
· 2025
Technical
Talk
Open →
2025-06
19:25
Paravirtualized Honeypot Deployment for the Analysis of Malicious Activity
Andronikos Kyriakou
BSides Athens
· 2018
Technical
Malware Analysis
Threat Intel
Blue
Talk
Open →
2018-08
40:25
How I Pwned the ICS Data During My Internship
Shail Patel
BSides Philly
· 2019
Technical
Network Security
Vulnerability Research
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2020-12
45:53
Authentication Proxy Attacks: Detection, Response and Hunting
Chris Merkel
BSides Las Vegas
· 2023
Technical
Detection Engineering
Threat Intel
Blue
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2023-10
13:48
Fangxiao, A Chinese Phishing Threat Actor by Emily Dennison and Alana Witten
Emily Dennison
Alana Witten
BSides London
· 2023
Talk
Open →
2023-05
38:33
NoSQL Means No Security?
Philipp Krenn
BSides Munich
· 2017
Technical
Vulnerability Research
Web AppSec
Red
Talk
Open →
2017-04
31:23
Please Pick Up: Crafting and Executing Successful Vishing Attacks
Jason Puglisi
BSidesSF
· 2024
Technical
Social Engineering
Intermediary
Red
Talk
Open →
2024-07
36:35
Chris Kubecka on Africa’s Cybersecurity Future | BSides Kano Conference 2025.
Bsides Kano
Open →
2025-10
51:57
Spies, Saboteurs & Scoundrels: How Russia, China & Nefarious Actors Are Hacking IoT
Brian Contos
BSides Augusta
· 2022
Technical
Talk
Open →
2022-10
45:00
Adventures With Internet Telephony Appliances - Darren Martyn
Darren Martyn
BSides Basingstoke
Technical
Talk
Open →
2024-09
46:02
A Look At TR-06FAIL And Other CPE Configuration Disasters by Darren Martyn
BSides Scotland
Open →
2017-04
6:27:25
Managing Misfits: Lessons Learned from a Decade of Leading Penetration Testing Teams
Chrissy Safi
Nick Britton
BSides Dallas/Fort Worth
· 2020
Career
Career & Soft Skills
Red
Talk
Open →
2020-11
48:05
Joe Gray - NetflOSINT: taking an often-overlooked data source and operationalizing it
BSides Knoxville
Open →
2022-05
53:49
Using JA3. Asking for a friend?
Justin Warner
BSides DC
· 2019
Technical
Cryptography
Blue
Talk
Open →
2019-10
28:54
A Talk On IoT Devices Their Vulnerabilities And Potential Exploits
Beverly McKenzie
BSides Leeds
· 2020
Technical
Talk
Open →
2020-07
31:08
Charting the SSH Multiverse
HD Moore
BSidesSF
· 2025
Technical
Network Security
Vulnerability Research
Talk
Open →
2025-10
49:35
OSINT for Incident Investigations
Patterson Cake
BSides Knoxville
· 2024
Technical
DFIR
OSINT
Threat Intel
Case Studies and Incidents Analysis
Talk
Open →
2024-12
22:47
Cameras, CACs & Clocks: A Story of Millions of Interrogated and Hacked xIoT Devices
John Vecchi
BSidesSF
· 2023
Technical
Red
Demo
Talk
Open →
2023-05
43:28
BSides SP 2025 - Ciberinteligência com LLMs
BSides São Paulo
Open →
2025-06
43:54
Zachary Hunsaker - Open Source Intelligence: What Does the Internet Know About You?
BSides Knoxville
Open →
2023-05
53:10
Bsides - RedRocks 2023 - I Thought I Was Secure... Until I Wasn't - Brandon Benson
BSides SLC
Open →
2023-12
30:25
Your security black hole
Huxley Barbee
BSides SLC
· 2023
Talk
Open →
2023-06
40:04
Revenge Is Best Served Over IoT
Chris Kubecka
BSides Newcastle
· 2022
Technical
War Stories
IoT
OSINT
Threat Intel
Talk
Open →
2022-09
45:08
Unmasking Data Leaks: A Guide to Finding, Fixing, and Prevention
Jordan Wright
BSides SATX
· 2019
Technical
Cloud IAM
Demo
Talk
Open →
2019-09
42:13
GF - Who Watches the Watchers?: Understanding the Internet's Background Noise - Curt Barnard
BSides Las Vegas
Open →
2018-09
16:06
We Love Containers: Exploits, Surprises, and Security
Elissa Shevinsky
BSides TLV
· 2018
Technical
Container Security
Vulnerability Research
Talk
Open →
2018-07
37:00
Introduction to Shodan
Aaron Blythe
BSides Springfield
· 2017
Technical
Talk
Open →
2017-12
27:33
China Recon 101: Finding Nation State Infra w/ Almost Free Tools
Jonathan Reiter
BSides PDX
· 2023
Technical
Red
Talk
Open →
2023-10
40:57
Investigating IPv6 via UPnP
Aleks Nicolic
BSides Knoxville
· 2019
Research
IoT
Network Security
Talk
Open →
2019-06
49:48
Nicholas Roy - OSINT and the Hermit Kingdom
BSides Knoxville
Open →
2021-05
37:31
PG - Lotus Notes Password Hash Redux - Willaim Ghote
BSides Las Vegas
Open →
2017-03
31:34
There and Back Again: Discovering OT Devices Across Protocol Gateways
Rob King
BSidesSF
· 2025
Technical
IoT
Network Security
Operational Technology (OT) Security
Vulnerability Research
Intermediary
Red
Technical Deep-dives
+1
Open →
2025-10
32:02
Security Tradeoffs In Elasticsearch - Philipp Krenn
Philipp Krenn
BSides Luxembourg
· 2019
Technical
Intermediary
Talk
Open →
2019-11
13:24
Turning To The Dark Side: Utilizing Offensive Techniques In Incident Response
Archie Essien
BSides London
· 2025
Technical
Active Directory
DFIR
OSINT
Threat Intel
Talk
Open →
2025-02
47:22
How can bad boys or even u rule the world BSidesCO + Eleven Paths Webinar
BSides Colombia
· 2016
Open →
2016-09
53:04
IATC - Real World Security in a Clinical Healthcare Environment: Hacking a Hospital - Paul Dant
BSides Las Vegas
Open →
2019-10
37:55
BSidesROC 2024 - Exploit and Malicious - Olivia Gallucci
BSidesROC
Open →
2025-03
19:24
NoSQL Means No Security?
Philipp Krenn
BSides Athens
· 2020
Technical
Demo
Talk
Open →
2020-06
49:48
CG - All Your Cloud Are Belong To Us - Hunting Compromise in Azure - Nate Warfield
BSides Las Vegas
Open →
2018-09
19:59
BSidesSLC 2019 - Tech Panel
Stephanie Carruthers
Neil Wyler
Mike Spicer
BSides SLC
· 2019
Panel
Open →
2019-02
29:10
The Way From App To Brain: Attack Surfaces Of Smart Medical Infrastructure - Denis Makrushin
Denis Makrushin
BSides Munich
· 2019
Technical
Talk
Open →
2019-03
26:12
OH-SINT: Merging OSINT Into RE Workflows to Simplify Analysis
Nicholas Carroll
BSides Las Vegas
· 2023
Technical
Malware Analysis
OSINT
Reverse Engineering
Threat Intel
Case Studies and Incidents Analysis
Methodology
Talk
Open →
2023-10
35:21
Container Crisis 3: More Containers More Problems
Caprico
BSides Dallas/Fort Worth
· 2022
Technical
War Stories
Container Security
Malware Analysis
OSINT
Threat Intel
Blue
Red
+3
Open →
2022-11
49:20
Finding Your Own Vulnerabilities (Before Attackers & Auditors Do)
Michael Holcomb
BSides Charleston
· 2018
Technical
Talk
Open →
2018-11
13:59
Fun things to do with CTFR
Edward Sabijon
BSides Charleston
· 2018
Technical
Talk
Open →
2018-11
41:45
Unleashing AI and Large Language Models in Offensive Security
Martin Ingesen
BSides Oslo
· 2023
Technical
Red
Talk
Open →
2025-07
42:36
Who are the people in your neighborhood? Tracking 'Shady' CIDR blocks
John Smith
BSides Tampa
· 2021
Technical
Talk
Open →
2021-04
43:02
QuickStart Recon
Michael Holcomb
BSides Greenville
· 2021
Technical
Talk
Open →
2021-10
37:38
Seeing Outside In: Mapping Your External Attack Surface - Arcadio Aguilar
Arcadio Aguilar
BSides SATX
· 2024
Technical
Talk
Open →
2024-06
25:42
Introduction to Shodan
Aaron Blythe
BSides KC
· 2017
Technical
Talk
Open →
2017-07
46:16
An OT Cyber Attack Simulation on a Chemical Plant
Prashant Prashant
Rajat Kundu
BSides Edmonton
· 2025
Technical
Open →
2025-10
26:03
OSINT And You: A Love Story
Michael James
BSides KC
· 2017
Talk
Open →
2017-07
40:14
Ghosts at the Gateway: 0-Days That Blind Routers and Invite APTs
Luke Schmidt
BSides Perth
· 2025
Technical
Hardware Hacking
Reverse Engineering
Vulnerability Research
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2025-10
35:29
G1234! - Give the Dog a Bone - Exploring OSINT Capabilities of Pen-testing Tools - John Brunn
BSides Las Vegas
Open →
2019-10
17:12
Unveiling Hidden Threats: 0-Days, Impact, And Implications
Armend Gashi
BSides Tirana
Talk
Open →
2023-11
59:58
2022 Keynote
Greg Foss
BSides Boulder
· 2022
Keynote
Open →
2022-12
43:39
I Knew You Were Trouble: Unraveling a Lockbit Cobalt Strike Network via OSINT
Jeff Bailey
BSides Dallas/Fort Worth
· 2024
Technical
War Stories
Malware Analysis
OSINT
Threat Intel
Threat Modeling
Talk
Open →
2025-01
29:06
Hacking Industrial Environments and Securing Them Safely
Tijl Deneut
BSides Limburg
· 2026
Technical
Network Security
OT Security
Vulnerability Research
Intermediary
Blue
Red
Case Studies and Incidents Analysis
+2
Open →
2026-04
56:30
Threat Hunting and the Surfacing of Mexican Threat Actor Greedy Sponge
Laura Stratton
Jacob Ferris
BSides CDMX
· 2025
Research
Technical
Malware Analysis
Threat Intel
Threat Modeling
Blue
Case Studies and Incidents Analysis
Technical Deep-dives
+1
Open →
2025-07
51:33
DIY Cyber Threat Intelligence
Mark Hahn
Thomas Hahn
BSides Seattle
· 2025
Technical
Cloud IAM
DevSecOps
Threat Intel
Demo
Open →
2025-06
40:55
Threat Intelligence, And Communicating Risks From Binary To Board Members
Bryan Campbell
BSides Belfast
· 2016
Policy
Technical
Talk
Open →
2017-09
21:35
Anatomy of a Distributed Credential Stuffing Attack
Bryson Loughmiller
BSides SLC
· 2021
Technical
Malware Analysis
Threat Intel
Case Studies and Incidents Analysis
Talk
Open →
2021-12
13:35
A Dashboard of the Internet (or at least some of it) - Harrison R J
BSides Bournemouth
Open →
2025-09
25:47
Radio Frequencies All Around Us: What Data Are You Leaking and What Is Done With It?
Keya Lea Horiuchi
BSides Las Vegas
· 2017
Technical
IoT
Privacy
Wireless Security
Talk
Open →
2017-08
27:28
Christmas Hancitor Campaign - Artem Artemov
Artem Artemov
BSides Munich
· 2021
Technical
Malware Analysis
Threat Intel
Blue
Case Studies and Incidents Analysis
Talk
Open →
2023-10
20:22
Sandbox gems for CTI rookies - Ertugrul Kara
BSides Bournemouth
Open →
2025-09
28:09
Shining a Light into the Security Blackhole of IoT and OT
Huxley Barbee
BSides Las Vegas
· 2023
Technical
IoT
Network Security
Vulnerability Research
Blue
Technical Deep-dives
Talk
Open →
2023-10
19:17
Phish-Back: How to Turn the Problem into a Solution
Gautier Bugeon
BSides Las Vegas
· 2025
Technical
Detection Engineering
Threat Intel
Web AppSec
Advanced
Blue
Talk
Open →
2025-12
34:42
Revenge Is Best Served Over IoT
Chris Kubecka
BSides Newcastle
· 2025
Policy
Technical
IoT
OSINT
Threat Intel
Red
Talk
Open →
2023-12
20:17
Turbo Tactical Exploitation: 22 Tips for Tricky Targets
HD Moore
BSides Las Vegas 2025
Technical
Network Security
OSINT
Vulnerability Research
Red
Talk
Open →
2025-12
20:53
Defensive Counting: How to Quantify ICS Exposure on the Internet When the Data is Out to Get You
Emily Austin
BSides Las Vegas
· 2024
Research
IoT
OSINT
Threat Intel
Empirical Research
Methodology
Talk
Open →
2024-09
55:30
2020 - Red Teaming is Fun! - Donovan Farrow
BSides Denver
Open →
2020-10
22:00
Security Tradeoffs in Elasticsearch
Philipp Krenn
BSides Budabest
· 2020
Technical
Talk
Open →
2021-01
25:10
Offensive Wfuzz for Web Bug Hunters
Xavi Mendez
BSides Barcelona
· 2019
Technical
Tooling
Web AppSec
Red
Demo
Talk
Open →
2022-01
37:21
Russian Nesting Dolls: Turla's Compromise of Pakistani ISI Command & Control
Danny Adamitis
BSides Las Vegas
· 2025
Research
DFIR
Malware Analysis
Threat Intel
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2025-12
28:56
Discovery - What You Look Like To An Attacker
Daniel Lawson
BSides KC
· 2018
Technical
Red
Talk
Open →
2018-06
41:35
How to Find a Companys BreakPoint
BSides Philly
Open →
2017-08
48:08
IoT from an Attacker's Perspective
Venkata Hareesh Peddiraju
BSides Toronto
· 2021
Technical
Hardware Security
IoT
Network Security
Reverse Engineering
Talk
Open →
2021-12
36:55
PW - Harvesting Passwords from Source Code Repositories - Philippe Paquet
BSides Las Vegas
Open →
2016-12
30:31
What Will Go Wrong When ZAP Is Driven By GenAI
Gerald Benischke
BSides Newcastle
· 2025
Technical
AI Security
Tooling
Web AppSec
Technical Deep-dives
Demo
Talk
Open →
2025-11
49:45
ChatGPT for Security Analysts
Greg Leah
BSides Calgary
Technical
Detection Engineering
Malware Analysis
Threat Intel
Talk
Open →
2024-03
40:29
The Ever-shifting Habits of Cloud-focused Malware Campaigns
Matt Muir
BSides Las Vegas
· 2023
Technical
Cloud IAM
Malware Analysis
Threat Intel
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2023-10
42:32
Dave Lewis - Sharks Patrol These Waters
Dave Lewis
BSides Knoxville
· 2026
War Stories
Talk
Open →
2025-07
30:23
Ebury: Public-private partnership unveils the full scale of a sophisticated Linux threat
Pedro Kertzman
BSides Edmonton
· 2025
Technical
Malware Analysis
Threat Intel
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2025-10
23:43
Confessions of a Penetration Tester
Vincent Matteo
BSides Albuquerque
· 2024
Technical
War Stories
Active Directory
Malware Analysis
OSINT
Social Engineering
Supply Chain Security
Red
+2
Open →
2024-08
22:44
What Lurks in the Shadow
Cheryl Biswas
BSides Las Vegas
· 2015
Technical
Talk
Open →
2016-12
30:53
Network Hygiene and DDOS Prevention
John Brown
BSides Albuquerque
Technical
Talk
Open →
2024-08
19:49
Casting Light on Shadow Cloud Deployments
Chapin Bryce
Brittney Argirakis
BSides Las Vegas
· 2025
Technical
Cloud IAM
DFIR
Threat Intel
Blue
Talk
Open →
2025-12
33:34
The Journey of Security Automation
Peter Luo
BSides St. Pete
· 2025
Technical
Detection Engineering
DevSecOps
Threat Intel
Demo
Talk
Open →
2026-03