Home
Talks
CFP Guide
What is BSides?
About
Contact
Light
← All talks
Tool
BSides talks featuring Sysinternals
21
talks mention this tool across
15
BSides chapters.
Talks featuring Sysinternals
43:09
Level Up! Practical Windows Privilege Escalation - Andrew Smith
BSides Knoxville
Open →
2016-06
28:25
Post-Exploit Threat Modeling with ATT&CK
Andy Applebaum
BSides Delaware
· 2016
Technical
Talk
Open →
2016-11
27:37
PowerShell-Fu — Hunting on the Endpoint
Chris Gerritz
BSides Las Vegas
· 2016
Technical
DFIR
Malware Analysis
Threat Intel
Blue
Technical Deep-dives
Talk
Open →
2016-08
23:15
APT Attack Techniques in Azure Cloud
Lina Lau
BSides Canberra
· 2023
Technical
Cloud IAM
Talk
Open →
2024-01
48:23
Koadic C3: Windows COM Command & Control Framework
Sean Dillon
Zach Harding
BSides Las Vegas
· 2017
Technical
Malware Analysis
Advanced
Red
Technical Deep-dives
Demo
Talk
Open →
2017-08
45:11
Boston BSides - Ryan Nolette - Protect Against CryptoLocker Ransomware
BSides Boston
Open →
2016-07
35:06
Fiddling with Flash Drive Forensics
Alexander Klepal
BSides SATX
· 2018
Technical
Red
Talk
Open →
2018-07
28:35
BSides Rochester 2018 - Virtualization Based Security Strengths and Weaknesses
BSidesROC
Open →
2018-04
49:09
Rastrea2r: Multi-Platform Threat Hunting and Incident Response
Sudheendra S Bhat
BSides PDX
· 2018
Technical
DFIR
Threat Intel
Talk
Open →
2019-02
47:24
CryptoLocker Ransomware Variants Are Lurking "In the Shadows"
Ryan Nolette
BSides Charlotte
· 2016
Technical
Talk
Open →
2016-05
25:35
Low Hanging Blue Fruit: Defending With Open-Source Tools
Yaron King
BSides TLV
· 2019
Technical
Blue
Talk
Open →
2019-11
36:38
In Your Mems — Windows AV Evasion Using in Memory Techniques
iDigitalFlame
BSides Delaware
· 2016
Technical
Talk
Open →
2016-11
24:56
PG - Messing with Forensic Analysts: Modifying VSS Snapshots - James Clawson
BSides Las Vegas
Open →
2017-08
21:54
Breaking Down Walls With Windows
Alexander Klepal
BSides SATX
· 2020
Technical
Red
Talk
Open →
2020-08
28:57
Assumed Breach: A Better Model for Pen Testing
Mike Saunders
BSides KC
· 2019
Technical
Active Directory
Kerberos
Threat Intel
Red
Talk
Open →
2019-06
54:29
Developing a holistic approach to threat hunting: Welcome to the jungle
Richard Rowlandson
BSides Calgary
· 2020
Talk
Open →
2020-12
33:24
Malware: Then, Now and How
Cody J. Winkler
BSides Springfield
· 2017
Technical
IoT
Malware Analysis
Reverse Engineering
Talk
Open →
2018-02
58:13
Incident Response is HARRRRRD… but it doesn't have to be
Michael Gough
BSides SATX
· 2020
Technical
Blue
Talk
Open →
2020-08
47:21
G1234! - Enterprise Overflow: How Breached Credentials Impact Us All - Robert Paul
BSides Las Vegas
Open →
2019-10
33:25
T1 08 I Thought I Saw a |-|4x0.-, Thomas V. Fischer (@fvt)
Thomas V. Fischer
BSides Athens
· 2017
Open →
2017-10
48:44
You Need a PROcess to Check Your Running Processes and Modules
Michael Goff
BSides Newcastle
· 2020
Technical
DFIR
Malware Analysis
Blue
Technical Deep-dives
Talk
Open →
2020-11