Home
Talks
CFP Guide
What is BSides?
About
Contact
Light
← All talks
Tool
BSides talks featuring Wireshark
344
talks mention this tool across
84
BSides chapters.
Talks featuring Wireshark
39:40
The Dark Side of Wireless Networks: Intro to Wi-Fi Hacking
Megi Bashi
Ryan Dinnan
BSides Prishtina
Technical
Wireless Security
Intro
Red
Technical Deep-dives
Demo
Talk
Open →
2023-05
28:37
Elliptic Curve Cryptography for those who are afraid of maths
Martijn Grooten
BSides London
Technical
Cryptography
Intro
Technical Deep-dives
Talk
Open →
2015-07
28:38
Bluetooth Warwalking: Hacking Devices Around You with Just Your Phone
Matt Miller
BSides SLC
· 2026
Technical
OSINT
Wireless Security
Intermediary
Red
Case Studies and Incidents Analysis
Empirical Research
Demo
+1
Open →
2026-04
28:29
The IoT Hacker's Toolkit
David Tomaschik
BSidesSF
· 2018
Technical
Talk
Open →
2018-04
56:13
Jak zdobyć flagę?
Mateusz Szymaniec
Jarosław Jedynak
BSides Warsaw
· 2016
Open →
2016-10
46:12
BSidesMCR 2019: HTTP Desync Attacks: Smashing Into The Cell Next Door - James Kettle
BSides Manchester
Open →
2019-09
18:23
Forensicating Windows Artifacts: Investigation Without Event Logs!
Renzon Cruz
BSides London
· 2019
Technical
Blue
Talk
Open →
2019-06
36:46
Breaking into Embedded Devices and IoT Security
Andrew Costis
BSides London
· 2018
Technical
Talk
Open →
2018-06
51:37
Security Onion: Peeling Back the Layers of Your Network in Minutes
Doug Burks
BSides Augusta
· 2013
Technical
Tooling
DFIR
Detection Engineering
Network Security
Blue
Demo
Talk
Open →
2013-09
50:00
Intro to Linux System Hardening and Applying it to Your Pentest System
BSides Detroit
Open →
2012-06
29:33
Hacking And Exploit Development For Bluetooth Low Energy (BLE)
Sarah Mader
BSides Munich
· 2022
Technical
Wireless Security
Demo
Talk
Open →
2022-05
28:52
BSidesSF 2017 - Linux Monitoring at Scale with eBPF (Brendan Gregg & Alex Maestretti)
Brendan Gregg
Alex Maestretti
BSidesSF
· 2017
Technical
Detection Engineering
Network Security
Blue
Talk
Open →
2017-03
39:50
2016 - James Kettle - Hunting Asynchronous Vulnerabilities
BSides Manchester
Open →
2016-09
53:47
Oh, the Places Your Packets Will Go!
James Pope
BSides SLC
· 2025
Technical
Talk
Open →
2025-10
3:19:17
Malware Reverse Engineering
Muhammad Irshad
Muhammad Umair
BSides Islamabad
· 2021
Technical
Malware Analysis
Reverse Engineering
Workshop
Open →
2021-02
39:42
BSMaaS 2020 - Hacking a Smart Coffee Machine
Axelle Apvrille
BSides Munich
· 2020
Technical
Demo
Talk
Open →
2020-09
23:07
Time Traveling Exploitation: Remote Code Execution in a 10,000 Day Old Game Protocol
Riley Kidd
BSides Canberra
· 2025
Technical
Reverse Engineering
Vulnerability Research
Advanced
Red
Demo
Talk
Open →
2025-12
31:20
Finding Privilege Escalation with Procmon
Vetle Økland
BSides Oslo
· 2019
Technical
Talk
Open →
2019-06
50:55
Fuzz Smarter, Not Harder: An afl-fuzz Primer
Craig Young
BSidesSF
· 2016
Technical
Red
Talk
Open →
2016-04
26:36
Latest evasion techniques in fileless malware - fl3uryz & Andrew Hay
BSides Las Vegas
Open →
2016-08
22:54
Improve Your Network Security With Opensource IDS/IPS
Andreas Herz
BSides Munich
· 2017
Technical
Network Security
Tooling
Talk
Open →
2017-04
25:06
Adventures & Findings in ISP Hacking
Ian Foster
BSidesSF
· 2025
Technical
Talk
Open →
2025-06
52:03
"Wi-Bear: Intelligent Autonomous Wi-Fi Honeypot Detection" - Vivek Ramachandran
Vivek Ramachandran
BSides Canberra
· 2019
Technical
Wireless Security
Talk
Open →
2019-05
10:54
Using Network Miner To Reconstruct Network Traffic
Matthew Short
BSides London
· 2019
Technical
Intro
Blue
Demo
Talk
Open →
2019-06
4:37:44
Day Two: Malware Reverse Engineering
Umair
Irshad
BSides Islamabad
· 2021
Technical
Advanced
Workshop
Open →
2021-02
45:50
Alissa Torres Security BSides Boston 2013 - Sick Anti-Analysis Mechanisms From The Wild
BSides Boston
Open →
2013-06
41:52
Sanders Diaz | Introduction to Custom Protocol Fuzzing
BSides Orlando
Open →
2016-06
59:07
Malware Analysis 101: N00b to Ninja in 60 Minutes
BSides Las Vegas
· 2014
Technical
Malware Analysis
Intro
Talk
Open →
2016-12
54:52
BSidesIowa 2019 RCEvilNet
BSides Iowa
Open →
2019-04
10:36
Bug Bounty Show
Arman Pathan
BSides Ahmedabad
· 2022
Open →
2023-02
18:50
CTF Walkthrough
Tiago Sintra
BSides Lisbon
· 2015
Technical
Demo
Open →
2015-07
58:01
BG - Network Forensic Analysis in an Encrypted World - William Peteroy & Justin Warner
BSides Las Vegas
Open →
2017-08
42:30
Crash all the Flying Things! — Exploiting and Defending Aircraft Collision Avoidance
Joe Greenwood
BSides London
· 2015
Technical
Hardware Hacking
Threat Modeling
Vulnerability Research
Advanced
Red
Technical Deep-dives
Talk
Open →
2015-07
47:49
Keynote - Jeff Banner
BSides Sydney
Open →
2019-09
54:28
Bugs, tools, pitfalls, methodology – this is how we do it
Marcin Noga
BSides Warsaw
· 2016
Open →
2016-10
39:20
SIEM Slam: Tricking Modern SIEMs With Fake Logs And Confusing Blue Teams - Özgün Kültekin
Özgün Kültekin
BSides Prague
Technical
Talk
Open →
2024-04
49:23
"IoT and the Future of Pentesting" - Jeremy Goldstein
BSides Canberra
Open →
2019-05
45:38
Threat Hunting by Dhruv Majumdar
Dhruv Majumdar
BSides Edmonton
· 2018
Technical
Talk
Open →
2018-09
57:55
Seriously? You Want Me To Believe Cyber-Spies Want My Data
BSides Detroit
Open →
2012-06
24:36
The Security of Emojis
Adrian Justice
BSides Canberra
· 2021
Technical
Technical Deep-dives
Talk
Open →
2021-04
12:44
Web browsing from the car, what's the worse that can happen?
Ian Tabor
BSides London
· 2018
Talk
Open →
2018-06
49:11
Intro to Automotive Security - Ariel Zentner
BSides Knoxville
Open →
2016-06
43:04
How to fuzz?
Kamil Frankowicz
BSides Warsaw
· 2016
Technical
Vulnerability Research
Technical Deep-dives
Talk
Open →
2016-10
28:18
WarBerry: Tactical Network Reconnaissance from a Raspberry Pi
Yiannis Ioannides
BSides Athens
· 2016
Technical
Advanced
Red
Demo
Talk
Open →
2016-07
55:07
Exposing the Neutrino EK: All the Naughty Bits
Ryan Chapman
BSides Las Vegas
· 2016
Technical
Malware Analysis
Reverse Engineering
Advanced
Technical Deep-dives
Demo
Talk
Open →
2016-08
58:44
New Era in Telecom Hacking
Ali Abdollahi
BSides Toronto
· 2020
Technical
Cellular Security
Advanced
Red
Talk
Open →
2021-11
46:57
Adversarial Post-Exploitation: Lessons From The Pros
Justin Warner
Chris Ross
BSides DC
· 2016
Technical
Red
Demo
Talk
Open →
2016-10
14:21
Is Privacy Still A Thing?
Georgi Boiko
BSides London
· 2014
Talk
Open →
2014-05
14:55
Connecting the dots: A beginner's experience of threat actor tracking - Keith Short
Keith Short
BSides London
· 2018
Technical
Malware Analysis
Threat Intel
Intro
Blue
Talk
Open →
2018-06
37:43
Finding Obvious Automotive Security Bugs Using Common Tools & Attacks
Jay Turla
BSides Ahmedabad
· 2025
Technical
Automotive Security
Hardware Hacking
Reverse Engineering
Wireless Security
Intermediary
Red
Technical Deep-dives
+1
Open →
2025-04
22:50
BADPDF: Stealing Windows Credentials via PDF Files
Ido Solomon
Adi Ikan
BSidesSF
· 2019
Technical
Network Security
Vulnerability Research
Web AppSec
Red
Technical Deep-dives
Talk
Open →
2019-03
40:53
Hardware Hacking: DVRs and Dildos
Ken Munro
BSides Scotland 2017
Technical
Hardware Hacking
IoT
Reverse Engineering
Vulnerability Research
Advanced
Red
Keynote
Open →
2017-11
31:40
OpenWRT + Cheap Routers = Cheap, Customized Security Sensors
Ryan Wilson
BSides Augusta
· 2018
Technical
Wireless Security
Talk
Open →
2018-11
22:52
WiFi Pineapple Active Detection via a Raspberry Pi Zero
Jason Bertman
BSides SLC
· 2020
Technical
Wireless Security
Blue
Talk
Open →
2020-03
24:30
Corporations in the Middle
Lee Brotherson
BSides Toronto
· 2014
Technical
Talk
Open →
2014-12
34:16
Decrypting IPTV
Radoslav Gerganov
BSides Sofia
· 2022
Technical
Cryptography
Hardware Hacking
Reverse Engineering
Advanced
Red
Talk
Open →
2022-04
43:11
Offensive Pcap - Stuart McMurray
Stuart McMurray
BSides London
· 2019
Technical
Red
Talk
Open →
2019-06
25:01
Shut the Front Door
Mark Bassegio
BSides Toronto
· 2014
Technical
Wireless Security
Red
Demo
Talk
Open →
2014-12
33:42
Assessing the Embedded Devices On Your Network
David Tomaschik
BSidesSF
· 2017
Technical
Hardware Hacking
IoT
Threat Modeling
Red
Talk
Open →
2017-03
55:50
Practical Serialization Attacks
Nicky Bloor
BSides Manchester
· 2017
Technical
Reverse Engineering
Vulnerability Research
Web AppSec
Advanced
Red
Case Studies and Incidents Analysis
Technical Deep-dives
+1
Open →
2017-08
29:14
Alex Kirk - Incident response and threat hunting using Bro/Zeek data
Alex Kirk
BSides Augusta
· 2019
Technical
DFIR
Detection Engineering
Threat Intel
Intermediary
Blue
Case Studies and Incidents Analysis
Technical Deep-dives
+1
Open →
2019-10
28:29
You Don't See Me: Abusing Whitelists to Hide and Run Malware
Michael Spaling
BSides Las Vegas
· 2016
Technical
Malware Analysis
Vulnerability Research
Red
Talk
Open →
2016-08
30:34
Ethical Hacking: DIY Mobile Security Workstation (For Cheap)
Dale Meredith
BSidesSF
· 2019
Tooling
Blue
Red
Demo
Open →
2019-03
17:33
SniffAir – An Open-Source Framework for Wireless Security Assessments
Steven Darracott
Matthew Eidelberg
BSides Las Vegas
· 2017
Technical
Tooling
Vulnerability Research
Wireless Security
Demo
Talk
Open →
2017-08
48:49
Demystifying Common Active Directory Attacks | Venkatraman K | BSides Delhi 2020
Venkatraman K
BSides Delhi
· 2020
Technical
Active Directory
Kerberos
Red
Talk
Open →
2020-11
45:23
How to Break the Modbus Protocol and Cause a PLC DoS
Omar Morando
BSides Budabest
· 2023
Technical
OT/ICS Security
Intermediary
Red
Demo
Open →
2023-08
22:43
Let's Learn MIPS and Japanese: Reverse Engineering Final Fantasy VII
Philippe Laulheret
BSides PDX
Technical
Hardware Hacking
Reverse Engineering
Talk
Open →
2018-03
46:00
TLS 1.3: Co nowego?
Miłosz Kaniewski
BSides Warsaw
· 2016
Technical
Cryptography
Talk
Open →
2016-10
21:11
Data Exfiltration: Secret Chat Application Using Wi-Fi Covert Channel
Yago Hansen
BSides Munich
· 2017
Technical
Wireless Security
Talk
Open →
2017-04
43:20
There and Back Again: Detecting OT devices across protocol gateways
Rob Kim
BSides CDMX
· 2025
Technical
Network Security
Threat Intel
Talk
Open →
2025-07
49:31
IOT Firmware Analysis by Mr.Vismit Rakhecha
BSides Noida
Open →
2021-06
42:28
How We Reverse-Engineered Multiple Industrial Radio Remote-Control Systems
Stephen Hilt
BSides Knoxville
· 2020
Technical
Hardware Hacking
Reverse Engineering
Vulnerability Research
Wireless Security
Advanced
Red
Talk
Open →
2020-05
40:17
Jakub Kaluzny - Proprietary network protocols - risky business on the wire.
Jakub Kaluzny
BSides London
· 2015
Technical
Advanced
Red
Talk
Open →
2015-07
40:27
Practical Out-of-Band Data Exfiltration in 802.11
João Pena Gil
Luís Gomes
BSides Lisbon
· 2017
Technical
Wireless Security
Purple
Red
Demo
Open →
2017-11
23:56
Medical Records and Default Passwords
Qasim Ijaz
BSides Charleston
· 2019
Technical
Talk
Open →
2019-11
57:39
Discovering C&C in Malicious PDFs with obfuscation, encoding and other techniques
Filipi Pires
BSides Athens
· 2021
Technical
Malware Analysis
Reverse Engineering
Workshop
Open →
2021-06
28:22
Rooting The Cradlepoint IBR600 And Other Stories
Sebastien Leger
BSides Munich
Technical
Talk
Open →
2023-10
1:03:58
BSides Vancouver 2015 - Wesley Wineberg - Analyzing the EMU-2 Zigbee Home Energy Monitor
BSides Vancouver
Open →
2015-04
30:18
Internet of Things Hacking
Jason Davison
BSides Charleston
· 2015
Technical
Talk
Open →
2015-12
36:38
Forensics Impossible: Self-Destructing Thumb Drives
Brandon Wilson
BSides Knoxville
· 2016
Technical
DFIR
Hardware Hacking
Reverse Engineering
Advanced
Red
Talk
Open →
2016-06
1:24:52
February 2016 Software Defined Radios Lab
BSides Peru
Open →
2016-02
43:54
Mechanics of an ICS/SCADA MITM
Jim Gilsinn
BSides Delaware
· 2015
Technical
Talk
Open →
2015-11
47:47
The Hunt For The Red DA by Neil Lines
BSides Scotland
Open →
2017-04
42:18
What Botnet Is This?
Tiago Pereira
BSides Lisbon
· 2015
Technical
Malware Analysis
Reverse Engineering
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2015-07
27:34
Goldilocks and the Three ATM Attacks
David M. N. Bryan
BSidesSF
· 2019
Technical
Physical Security
Reverse Engineering
Vulnerability Research
Red
Case Studies and Incidents Analysis
Talk
Open →
2019-03
51:18
Bluetooth, Bluetooth BLE, and Tracking with Sonar
Rick Mellendick
BSides DC
· 2018
Technical
Wireless Security
Red
Talk
Open →
2018-11
38:25
Matriux Leandros: An Open Source Penetration Testing and Forensic Distribution
Prajwal Panchmahalkar
BSides Las Vegas
· 2013
Technical
DFIR
Tooling
Talk
Open →
2017-01
52:07
Purple View
Haydn Johnson
Laura Rafferty
BSides Toronto
· 2015
Technical
Active Directory
Purple
Talk
Open →
2015-11
46:23
Beyond the Tip of the IceBerg - Fuzzing Binary Protocol for Deeper Code Coverage
BSides Las Vegas
Open →
2016-08
28:31
Exploiting SNI SSRF To Access The AWS IMDSv2 - Oliver Morton
Oliver Morton
BSides Leeds
Technical
Talk
Open →
2024-09
40:32
All Your RFz Are Belong to Me: Software Defined Radio Exploits
Balint Seeber
BSides Las Vegas
· 2015
Technical
Hardware Hacking
Reverse Engineering
Wireless Security
Red
Technical Deep-dives
Demo
Talk
Open →
2016-12
21:24
Vincent Moscatello - Destover: Inside the Malware at Sony Entertainment
BSides Orlando
Open →
2015-11
44:26
Netsec is Dead(?): Modern Network Fingerprinting for Real-World Defense
Vlad Iliushin
BSidesSF
· 2025
Technical
Talk
Open →
2025-06
40:05
Not-So-Secure-Print
Michael Spaling
Zoe Tomkow
BSides Edmonton
· 2018
Technical
Network Security
Physical Security
Red
Talk
Open →
2018-09
39:59
Rogue One: A Wifi Story
Ricardo Gonçalves
BSides Lisbon
· 2018
Technical
Wireless Security
Talk
Open →
2018-12
49:06
Breaking the Payment Points of Interaction (POI) - Nir Valtman, Patrick Watson
BSides Las Vegas
Open →
2016-08
44:37
Malware Analysis for the Masses
Shawn Thomas
BSides Charm
· 2022
Technical
DFIR
Malware Analysis
Intro
Blue
Demo
Talk
Open →
2022-07
40:27
A Practical Approach In Exploit Development For Embedded Devices
BSides Munich
Open →
2017-04
55:26
BSidesIA 2017 Keynote: Exploit Kits and Indicators of Compromise – Brad Duncan
BSides Iowa
Open →
2017-04
29:29
Popping the AU gov & military through DNS (NSEC) — a walkthrough
Harrison Mitchell
BSides Sydney
· 2023
Technical
Network Security
Vulnerability Research
Red
Technical Deep-dives
Talk
Open →
2023-09
43:46
BG - Mainframe Hacking for CICS and Giggles
BSides Las Vegas
Open →
2023-10
44:55
BSides SP 2025 - Atacando Redes LoRaWAN
BSides São Paulo
Open →
2025-06
55:48
Fantastic signals and where to find them
Luís Grangeia
José Moreira
BSides Lisbon
· 2017
Technical
Wireless Security
Intro
Talk
Open →
2017-11
24:42
Neil Roebert - Mi - NFC - TM: How to proxy NFC comms using Android
BSides Cape Town
Open →
2016-12
47:54
Network Reliability Monitoring for ICS – Going beyond NSM and SIEM
Jim Gilsinn
BSides DC
· 2015
Technical
Talk
Open →
2015-12
42:06
Mark Baggett - Free tools for your threat hunting toolbox
Mark Baggett
BSides Augusta
· 2021
Tooling
Talk
Open →
2021-10
53:11
CG - LibreSSL - Moving the Ecosystem Forward - Brent Cook
BSides Las Vegas
Open →
2018-09
42:04
RevEng All the IOTs
Gerald Auger
Tyler Flaagan
Cory Nance
BSides Charleston
· 2017
Technical
Talk
Open →
2017-11
55:17
War-Dining and Stroll-Trolling with a Robot
BSides Detroit
Open →
2012-06
1:34:46
Chris Truncer - Offensive WMI Workshop
BSides Augusta
Open →
2021-10
52:56
How to Get Started in Cybesecurity - john Stoner
BSides Peru
Open →
2019-07
18:06
This is a serious laptop; No games and chatting possible OK?
Yiannis Koukouras
BSides Athens
· 2018
Technical
Red
Talk
Open →
2018-07
38:34
Overview of Python: Flying Made Simple Without the NyQuil Hangover
Keith Dixon
BSides Detroit
· 2012
Technical
Intro
Talk
Open →
2012-06
56:56
What's the Big Deal with Assessing ICS/SCADA?
Jim Gilsinn
BSides DC
· 2016
Technical
Red
Talk
Open →
2016-11
50:00
The Black Art of Wireless Post-Exploitation
Gabriel Ryan
BSides DC
· 2017
Technical
Wireless Security
Advanced
Red
Talk
Open →
2017-10
50:37
Terry D . Smith II - Threat Hunting and Hacking Questions which Get Increasingly Harder
Terry D. Smith II
BSides Augusta
Technical
Blue
Talk
Open →
2023-10
19:30
Intercepting Sensitive Data in Smartphone App Network Connections
Eirini Anthi
BSides Athens
· 2017
Research
Technical
Talk
Open →
2017-10
20:17
BSides Toronto 2019 Anton Ovrutsky
BSides Toronto
Open →
2019-10
16:34
BSides Iowa 2018: "Finding & Exploiting Zerodays (Yes, you can do this!)"
BSides Iowa
Open →
2018-04
35:24
Let's Get Physical: Physical Access Controls Security
Luis Catarino
Pedro Rodrigues
BSides Lisbon
· 2019
Technical
Hardware Hacking
Physical Security
Vulnerability Research
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2019-12
16:29
Location Tracking of Bluetooth Devices
Bjørn Martin Hegnes
BSides Oslo
· 2022
Technical
Wireless Security
Talk
Open →
2023-01
34:02
An Adversarial View of SaaS Malware Sandboxes
Jason Trost
Aaron Shelmire
BSides DC
· 2015
Research
Technical Deep-dives
Talk
Open →
2015-11
58:25
Characteristics of Emotet Infections
Brad Duncan
BSides Augusta
· 2022
Technical
DFIR
Malware Analysis
Threat Intel
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2022-10
37:13
Take Down Cyberthreat Dwell Time With Optimum Security
Eric Payne
BSides Vancouver
· 2021
Technical
Detection Engineering
Threat Intel
Blue
Talk
Open →
2021-06
22:30
Network and Incident Response
BSides Munich
Open →
2017-04
31:17
WCTF Magic as told by a clumsy Magician
Timothy Allmon
BSides DC
· 2016
War Stories
Wireless Security
Red
Talk
Open →
2016-10
41:27
Fundamentals That Time Forgot
Troy Jessup
BSides SLC
· 2015
Technical
Detection Engineering
Network Security
Intro
Talk
Open →
2015-04
31:42
Hacking Furbo: A Pet Project
BSides Toronto
· 2025
Technical
Hardware Hacking
Hardware Security
IoT
Reverse Engineering
Advanced
Red
Case Studies and Incidents Analysis
+2
Open →
2025-10
27:53
Total Flaw: Hacking Flow Computers for Fun and Free Gas
Vera Mens
BSides TLV
· 2022
Technical
IoT
Reverse Engineering
Vulnerability Research
Advanced
Red
Technical Deep-dives
Talk
Open →
2022-07
26:52
BSidesSF 2018 - Supply Chain Attack Through CCleaner (Itai Tevet)
Itai Tevet
BSidesSF
· 2018
Research
Supply Chain Security
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2018-04
32:15
How to collect linux Malware
Sergey Kostov
BSides Sofia
· 2022
Research
Technical
Malware Analysis
Reverse Engineering
Talk
Open →
2022-04
38:59
Fully Automated Luxury Malware Detection
Camilla Montonen
BSides Oslo
· 2019
Technical
Talk
Open →
2019-06
47:55
@ISC2PGHChapter - Hands on Scripting lab with PowerShell and Python
BSides Peru
Open →
2017-09
48:43
Applying Data Science to Identify Malicious Actors in Enterprise Logs
Balaji Balakrishnan
BSides DC
· 2016
Technical
Detection Engineering
Malware Analysis
Threat Intel
Blue
Talk
Open →
2016-10
31:35
Controlling Your Neighbour's Lights: ZigBee Security Analysis and Smart Home Vulnerabilities
André Garrido
BSides Lisbon
· 2017
Technical
Hardware Hacking
IoT
Wireless Security
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2017-11
47:04
MySQL Server Attacks YOU! How We Found CVE-2023-21980 In MySQL
Alexander Rubin
BSides Dublin
Talk
Open →
2024-06
42:43
BSidesIowa 2019 Reviewing PCAPS with Security Onion
BSides Iowa
Open →
2019-04
45:15
Reverse Engineering for Vintage Systems
David Riley
BSides DC
· 2018
Technical
Talk
Open →
2018-11
1:01:32
2016 - Jerome Smith - From CSV to CMD to qwerty
BSides Manchester
Open →
2016-09
34:52
Gal Bitensky - Leveraging Passive Fingerprinting for Link Scanners Evasion
Gal Bitensky
BSides TLV
· 2021
Technical
Red
Talk
Open →
2021-08
21:55
LSA-Reaper: A Remote LSASS Extraction Tool
Daniel Cornett
BSides Augusta
· 2023
Technical
Active Directory
Malware Analysis
Reverse Engineering
Advanced
Red
Talk
Open →
2023-10
32:04
Offensive PCAP
Stuart McMurray
BSides DC
· 2019
Technical
Network Security
Reverse Engineering
Red
Talk
Open →
2019-11
23:31
The Perfect BLEnd: Reverse Engineering a Bluetooth Controlled Blender
Ryan Mast
Edward Farrell
BSides Las Vegas
· 2025
Technical
IoT
Reverse Engineering
Wireless Security
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2025-12
16:07
Disabling Drones: Disruption and Forensic Data Analysis
Paavai Aram
BSides London
· 2025
Technical
DFIR
Vulnerability Research
Wireless Security
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Demo
+1
Open →
2025-02
29:07
SOC Analyst's Arsenal: Essential Tools, Tips & Tricks For Effective Investigations
Samuel Kavaler
BSides Munich
· 2023
Technical
DFIR
Detection Engineering
Tooling
Intermediary
Blue
Talk
Open →
2023-10
41:42
Atomistic IoT Penetration Testing Methodology
Arnau Estebanell Castellví
BSides Barcelona
· 2021
Technical
Hardware Hacking
IoT
Vulnerability Research
Intro
Red
Talk
Open →
2022-01
56:28
BSIDESKyiv 2018 - ALEXANDER OLENYEV CAR HACKING: TODAY AND TOMORROW
BSides Ukraine
Open →
2018-05
35:21
Stack Smashing Protection Bypass via Pthreads - Aleksandar Nikolic
BSides Knoxville
Open →
2019-02
40:30
USB Write Blocking with USBProxy
Dominic Spill
BSides Las Vegas
· 2014
Technical
Hardware Hacking
Reverse Engineering
Advanced
Demo
Talk
Open →
2016-12
32:10
Using Electromagnetic Emissions to Intercept AES-128 Cryptographic Keys from a Raspberry Pi
Ibraheem Frieslaar
BSides Cape Town
· 2017
Research
Technical
Cryptography
Hardware Hacking
Vulnerability Research
Advanced
Talk
Open →
2017-12
33:55
Behavioral Analysis using DNS, Network Traffic and Logs
Josh Pyorre
BSides Amsterdam
· 2017
Technical
Blue
Talk
Open →
2017-09
41:46
Clean Forensics: Analyzing Network Traffic of Vacuum Bots
Karan Dwivedi
BSides Las Vegas
· 2022
Technical
IoT
Network Security
Privacy
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2022-09
24:51
Attacking IPv6 - MitM IPv6 patch for Bettercap
D. Grigoriou
D. Karakostas
BSides Athens
· 2017
Technical
Wireless Security
Red
Demo
Talk
Open →
2017-10
43:31
CTF de BSides Colombia 2025
BSides Colombia
· 2025
Community
Open →
2025-05
38:58
Are your Network Devices Good or Evil? Introducing CHOX
Hans Ismirnioglou
BSides DC
· 2019
Technical
Talk
Open →
2019-10
41:03
Adrien Lasalle - Hardware Hacking Curiosity
Adrien Lasalle
BSides Warsaw
· 2024
Technical
Hardware Hacking
IoT
Reverse Engineering
Intro
Red
Talk
Open →
2024-07
39:41
BG - From EK to DEK: An Analysis of Modern Document Exploit Kits - Joshua Reynolds
BSides Las Vegas
Open →
2019-10
46:48
InfoSec, Just Doing It
Rob Jorgensen
BSides SLC
· 2015
Career
Career & Soft Skills
Intro
Talk
Open →
2015-04
40:25
How I Pwned the ICS Data During My Internship
Shail Patel
BSides Philly
· 2019
Technical
Network Security
Vulnerability Research
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2020-12
21:49
Ducky-in-the-Middle: Injecting Keystrokes into Plaintext Protocols
BSidesROC
· 2018
Technical
Network Security
Reverse Engineering
Red
Talk
Open →
2018-04
45:53
Authentication Proxy Attacks: Detection, Response and Hunting
Chris Merkel
BSides Las Vegas
· 2023
Technical
Detection Engineering
Threat Intel
Blue
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2023-10
49:29
HTTP and De-Sync Attacks
Cary Hooper
BSides Dallas/Fort Worth
· 2021
Technical
Vulnerability Research
Web AppSec
Red
Technical Deep-dives
Talk
Open →
2021-11
6:06:45
BSides Delaware 2017 - Day 2
Alex Rubin
BSides Delaware
· 2017
Technical
Active Directory
Reverse Engineering
Tooling
Red
Talk
Open →
2017-11
48:18
Brace YoSelf: DDoS is Coming
Dima Bekerman
BSides Lisbon
· 2016
Technical
Network Security
Workshop
Open →
2016-11
43:11
Ransomware vs EDR: Inside the Mind of Attackers
Zoziel Pinto Freire
BSides São Paulo
· 2025
Technical
Detection Engineering
Malware Analysis
Advanced
Red
Talk
Open →
2025-06
53:10
VMs All the Way Down: Building an Inexpensive, Advanced Infosec Lab
John Hubbard
BSides Delaware
· 2016
Technical
Tooling
Intermediary
Purple
Talk
Open →
2016-11
37:47
2015 - Jim Slaughter - From Phish To Pwned Dissecting a modern phishing campaign...
BSides Manchester
Open →
2015-09
20:02
LOLS: Low-Level Shells — Weaponizing Ethernet for Command Control
Elysee Franchuk
Mohnish Dhage
BSides Las Vegas
Technical
Network Security
Reverse Engineering
Advanced
Red
Talk
Open →
2024-09
21:23
PG - I’m a hunter! Cyber Intelligence in the New(ish) Frontier - Yasmine Johnston-Ison
BSides Las Vegas
Open →
2019-10
18:11
Owning the Smart Home with Logitech Harmony Hub
Joseph Bingham
BSidesSF
· 2019
Technical
IoT
Reverse Engineering
Vulnerability Research
Red
Technical Deep-dives
Talk
Open →
2019-03
54:43
Curiouser and Curiouser: Cultivating Curiosity in Security Careers
Chris Sanders
BSides Cincinnati
· 2017
Career
Career & Soft Skills
Intro
Keynote
Open →
2017-05
20:11
Entering the Cybersecurity Field as a 17 Year Old
Sully Vickers
BSides Charm
· 2023
Career
CTF
Career & Soft Skills
Intro
Talk
Open →
2023-05
25:35
Low Hanging Blue Fruit: Defending With Open-Source Tools
Yaron King
BSides TLV
· 2019
Technical
Blue
Talk
Open →
2019-11
42:50
Where's Wally? Hands-On Thread Hunting In Elasticsearch Using EE-Outliers
Daan Raman
BSides Luxembourg
· 2019
Technical
Demo
Talk
Open →
2019-11
38:21
Bug Hunting in Firmware and Hardware at Scale: Tools, Tips & Real Vulnerabilities
Jeff Spielberg
BSides Boston
· 2020
Technical
Hardware Hacking
Reverse Engineering
Vulnerability Research
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2020-11
42:26
Sudo Confidence - Learning Cybersecurity the Hard Way & How AI Makes It Easier
Bonnie Martin
BSides Buffalo
Career
Intro
Talk
Open →
2025-06
28:13
A Hitchhackers Guide to the IoT: Security from a FMCG Perspective
Jerome de las Alas
BSides Charleston
· 2022
Technical
Hardware Hacking
IoT
Vulnerability Research
Talk
Open →
2022-11
40:24
Deductive Reasoning: File Analysis Techniques
John Laycock
Chris Rogers
BSides DC
· 2015
Technical
DFIR
Malware Analysis
Intro
Talk
Open →
2015-11
35:49
IoT From An Attacker's Perspective
Venkata Hareesh Peddiraju
BSides Bristol
· 2019
Technical
Hardware Hacking
IoT
Vulnerability Research
Red
Talk
Open →
2019-07
31:46
I Boot when U-Boot
Bernardo Maia Rodrigues
Vincent Ruijter
BSides Amsterdam
· 2017
Technical
Advanced
Red
Technical Deep-dives
Talk
Open →
2017-09
53:49
Using JA3. Asking for a friend?
Justin Warner
BSides DC
· 2019
Technical
Cryptography
Blue
Talk
Open →
2019-10
44:43
Introduction to Software Defined Radio – For Offensive and Defensive Operations
Grey Fox
BSides Las Vegas
· 2024
Technical
Hardware Hacking
OSINT
Wireless Security
Intro
Demo
Talk
Open →
2024-09
21:35
Full Packet Capture for the Masses
Xavier Mertens
BSides Athens
· 2018
Technical
Blue
Talk
Open →
2018-08
41:33
Use What You Have
Corey Bussard
BSides Peru
· 2023
Technical
Active Directory
Detection Engineering
Network Security
Blue
Talk
Open →
2023-08
16:01
How Digital Forensics And A Batch Script Helped Me Understand The Infection Chain - Ataur Rahman
Ataur Rahman
BSides London
· 2025
Technical
DFIR
Malware Analysis
Intermediary
Case Studies and Incidents Analysis
Talk
Open →
2026-03
1:01:12
Insights into Smart Vehicle Security
Srinivas Naik
Venkata Hareesh Peddiraju
BSides SLC
· 2021
Technical
Talk
Open →
2021-12
45:32
Russel Van Tuyl - HTTP/2 Magic with Merlin
BSides Knoxville
Open →
2019-04
31:55
A walkthrough of the CERT Australia BSides 2017 Incident Response challenge
Andrew Clark
BSides Canberra
· 2018
Technical
Talk
Open →
2019-02
53:55
Analyzing Emotet infections
Brad Duncan
BSides Tampa
· 2021
Technical
Intermediary
Talk
Open →
2021-04
32:15
Radio Wave Open Source Intel Using SDR by Abi Waddell
Abi Waddell
BSides Dublin
· 2022
Technical
Wireless Security
Talk
Open →
2022-05
1:48:57
0-day Research Disassembled
Chris Lyne
BSides DC
· 2019
Research
Advanced
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2019-10
37:46
Patient Data and Where to Find It
Stuart Kurutac
BSides Belfast
· 2025
Technical
Red
Technical Deep-dives
Talk
Open →
2025-02
39:01
Atomic Honeypot – A MySQL Honeypot That Fights Back
Alexander Rubin
BSides SLC
· 2025
Technical
Vulnerability Research
Web AppSec
Advanced
Red
Talk
Open →
2025-06
54:58
From SEH Overwrite with Egg Hunter to Get a Shell!
Rodolpho Concurde
BSides Athens
· 2022
Technical
Advanced
Red
Workshop
Open →
2022-06
10:09
Threat Analysis In Minutes And Other AI Super Powers
Bailey Williams
BSides London
· 2025
Technical
DevSecOps
Talk
Open →
2025-02
49:50
Intro to HTTP and De-Sync Attacks
Cary Hooper
BSides SATX
· 2021
Technical
Web AppSec
Intro
Talk
Open →
2021-06
24:28
Buffer Overflows Demystified – Exploits & Patching
Chaitanya Rahalkar
BSides SLC
· 2025
Technical
Blue
Red
Demo
Talk
Open →
2025-06
32:09
BSides DC 2019 - Digital Canaries in Coal Mines: Detecting Adversarial Enumeration with DNS & AD
Stephan Borosh
BSides DC
· 2019
Technical
Active Directory
Talk
Open →
2019-10
50:25
Dear Blue Team: Proactive Steps to Supercharge your IR
Joe Gray
BSides KC
· 2018
Technical
Blue
Talk
Open →
2018-06
14:50
TryHackingMy Way From Cyber Sales to Cyber SOC
R4ck4tt4ck
Michael Rack
BSides London 2025
Career
Career & Soft Skills
Detection Engineering
Intro
Blue
Talk
Open →
2026-03
49:51
Movement After Initial Compromise
Matthew Batten
Collyn Hartley
BSides Augusta
· 2018
Technical
Active Directory
Threat Intel
Red
Talk
Open →
2018-11
38:43
Emergency VPN: Analyzing Mobile Network Traffic To Detect Digital Threats
Jan Fajfer
BSides Liverpool
· 2019
Technical
DFIR
Mobile Security
Network Security
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2019-07
24:52
Intro to CTF
Trion
BSides Canberra
· 2025
Technical
CTF
Intro
Talk
Open →
2025-12
42:09
Who Let the Dogs Out? When PUPs Become BlackCat's Best Friend Ryan Rath & Matthew Boyle
Ryan Rath
Matthew Boyle
BSides Tampa
· 2024
Technical
DFIR
Malware Analysis
Threat Intel
Case Studies and Incidents Analysis
Talk
Open →
2024-05
47:09
Presentation -- Hacking the IoT: A case study
BSides Asheville
Open →
2018-05
27:26
Don't Turn Your Back on Ransomware
BSides Newcastle
· 2022
Technical
Active Directory
DFIR
Malware Analysis
Demo
Talk
Open →
2022-09
42:37
Feeding the Shark
Jeremy Pierson
BSides SLC
· 2015
Technical
Talk
Open →
2015-04
34:48
Exploiting IoT — An Introduction of BLE
libertyunix
BSides Delaware
· 2019
Technical
Wireless Security
Intro
Red
Talk
Open →
2019-11
51:53
BSidesSLC 2015 -- Security Researcher, Security Besmircher -- Kevin Johnson
BSides SLC
Open →
2015-04
29:14
Containers for Pentesters by Rory McCune
Rory McCune
BSides Dublin
· 2023
Technical
Talk
Open →
2023-07
48:05
Mallet — an Intercepting Proxy for Arbitrary Protocols
Rogan Dawes
BSides Cape Town
· 2018
Technical
Tooling
Network Security
Reverse Engineering
Web AppSec
Red
Talk
Open →
2019-02
49:14
Securing the EV Charging Ecosystem
Danielle McGuire
BSidesROC
· 2025
Technical
Technical Deep-dives
Talk
Open →
2025-03
27:08
The Security of Internet-Connected Massage Devices
Katie Bratman
Shane Fonyi
BSides KC
· 2019
Research
Wireless Security
Talk
Open →
2019-06
1:20:35
What is eBPF and Why Should You Care!
Kev Sheldrake
BSides Athens
· 2022
Technical
Detection Engineering
Reverse Engineering
Tooling
Advanced
Blue
Red
Talk
Open →
2023-06
22:38
Long Range WiFi Magic by Alex Farrant
Alex Farrant
BSides Cheltenham
· 2022
Technical
Wireless Security
Talk
Open →
2022-07
16:31
Malware C2 over x509 Certificate Exchange
Jason Reaves
BSides Springfield
· 2017
Technical
Cryptography
Talk
Open →
2018-02
29:56
Probing Toms: Creepy hackers on your house doorstep
Brice Self
BSides Augusta
· 2017
Technical
Wireless Security
Talk
Open →
2017-09
42:02
GT - Behavioral Analysis from DNS and Network Traffic - Josh Pyorre
BSides Las Vegas
Open →
2017-08
49:26
Sysmon or it Didn't Happen
Gerard Johansen
BSides Charm
· 2024
Technical
DFIR
Detection Engineering
Blue
Talk
Open →
2024-06
50:30
Blackbox Containers: Container Security in the Enterprise
Kenny Parsons
BSides Charm
· 2023
Technical
Container Security
DevSecOps
Supply Chain Security
Intermediary
Talk
Open →
2023-06
26:15
Vigilante: Bringing a nail bat to a gun fight
nobletrout
Bsides CT
· 2019
Technical
Talk
Open →
2019-11
47:41
BSidesIA 2017 Track1: Still Penetrating Your Perimeter – Josh Stroschein & Matt Miller
BSides Iowa
Open →
2017-04
29:19
Hacking Reimaged Retro Computers - David Lodge
BSides Leeds
Open →
2020-07
37:30
Insights on Using a Cloud Telescope to Observe Internet-Wide Botnet Propagation Activity
Fabricio Bortoluzzi
BSides Las Vegas
· 2024
Research
Cloud IAM
Malware Analysis
Threat Intel
Empirical Research
Technical Deep-dives
Talk
Open →
2024-09
32:56
BSides Toronto 2019 Brandon Mesquita
Brandon Mesquita
BSides Toronto
· 2019
Technical
Malware Analysis
Reverse Engineering
Blue
Technical Deep-dives
Talk
Open →
2019-10
39:48
All Your Fleet Are Belong To Us: Vulnerabilities in Fleet Management Systems
BSides Peru
Open →
2017-06
28:55
A guide to discovering plaintext credentials in enterprise environments by Ben Burkhart
Ben Burkhart
BSides Austin
· 2024
Technical
Talk
Open →
2024-02
37:50
Are your Network Devices Good or Evil?
Hans Ismirnioglou
BSides DC
· 2019
Technical
Detection Engineering
Network Security
Threat Intel
Demo
Talk
Open →
2019-10
26:03
Getting At Serial Ports In Embedded Devices by Paul Marsh
Paul Marsh
BSides Basingstoke
Technical
Hardware Hacking
Reverse Engineering
Talk
Open →
2022-07
30:15
How mature is your HTTPS implementation?
Renaud Dubois
BSides Luxembourg
· 2017
Technical
Cryptography
Network Security
Web AppSec
Talk
Open →
2017-10
30:13
Dissecting Carbanak
Hristo Asenov
BSides Delaware
· 2019
Technical
Malware Analysis
Reverse Engineering
Technical Deep-dives
Talk
Open →
2019-11
34:11
Demystifying DNS Security – Practical Steps for Reducing Exposure and Detecting Compromise
Jim Nitterauer
BSidesSF
· 2018
Technical
Talk
Open →
2018-04
48:23
Hacking $100K Gas Chromatograph Without Hardware Vera Mens (Vulnerability Researcher@Claroty/Team82)
BSides São Paulo
Open →
2025-06
23:30
Ciberseguridad en IoT: Analizando ZigBee y Thread
Kevin Hasiel
BSides CDMX
· 2024
Technical
IoT
Wireless Security
Red
Talk
Open →
2024-10
16:50
Unveiling the Hidden: Discovering RDP Vulnerabilities using PDF Files
Dor Dali
BSides Las Vegas
· 2023
Research
Technical
Network Security
Vulnerability Research
Advanced
Empirical Research
Technical Deep-dives
Talk
Open →
2023-10
33:55
Offensive PCAP
Stuart McMurray
BSides DC
· 2019
Technical
Red
Talk
Open →
2019-10
49:05
How To Investigate IOS Devices - Paul Rascagneres
Paul Rascagneres
BSides Belfast
· 2020
Technical
DFIR
Malware Analysis
Mobile Security
Talk
Open →
2020-01
33:29
Joe Gray - Dear Blue Team: Forensics Advice to Supercharge your DFIR Capabilities and Timing
BSides Knoxville
Open →
2019-06
48:47
Human Hunting
Sean Gillespie
BSidesSF
· 2015
Talk
Open →
2023-12
23:28
Securing the Industrial Internet of Things
Brent Shaw
BSides Cape Town
· 2017
Technical
IoT
Vulnerability Research
Talk
Open →
2017-12
48:16
Please Waste My Time
Qasim Ijaz
BSides Buffalo
· 2024
Technical
Blue
Talk
Open →
2024-06
41:39
TLS Private Key Recovery
Johan Loos
BSides Barcelona
· 2021
Technical
Cryptography
Talk
Open →
2022-01
52:03
Two Notify All
David Maynor
Danny Adamitis
BSides Augusta
· 2018
Research
Blue
Case Studies and Incidents Analysis
Talk
Open →
2018-11
27:50
IoT Devices and why they desperately need help
Christian Halbert
Issa Hafiri
BSidesROC
· 2018
Technical
Talk
Open →
2018-04
50:27
Virtualizing Your Ford SYNC3 for Fun and Profit
Junfeng Yang
Bo Wang
BSides Las Vegas
· 2021
Research
Technical
Talk
Open →
2021-08
46:44
Practical Serialization Attacks
Nicky Bloor
BSides Belfast
· 2017
Technical
Talk
Open →
2017-10
23:49
May 2016 Lab Automotive Security Hands On
BSides Peru
Open →
2016-05
49:23
PQC in the Real World: Crypto Agility, Traffic Analysis, and the Road to Quantum
Charlie Goldner
BSides Augusta
· 2025
Technical
Cryptography
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2025-10
36:03
Redis or Not: Argo CD & GitOps from an Attacker's Perspective
Oreen Livni Shein
Elad Pticha
BSides Las Vegas
· 2024
Research
Technical
Container Security
Supply Chain Security
Vulnerability Research
Advanced
Red
Case Studies and Incidents Analysis
+2
Open →
2024-09
38:15
Tony Gee - An Automotive IoT Security Lesson
Tony Gee
BSides Belfast
· 2016
Technical
Talk
Open →
2017-09
20:13
Microcontrollers, Deauthentication, and AI
Lev Milushin
BSides Charlotte
· 2023
Technical
AI Security
Hardware Hacking
Wireless Security
Red
Talk
Open →
2023-09
46:43
Detecting and analyzing fileless malware
Christopher Williams
Evan Wagner
BSides Tampa
· 2021
Technical
Intermediary
Blue
Demo
Open →
2021-04
39:51
Morning Keynote
Craig Smith
Fred Wilmot
BSides KC
· 2018
Keynote
Open →
2018-06
22:54
PG - CTF All the Things: Leveraging Gamification to Up Your Security Game - Matt Pardo
BSides Las Vegas
Open →
2017-08
46:16
An OT Cyber Attack Simulation on a Chemical Plant
Prashant Prashant
Rajat Kundu
BSides Edmonton
· 2025
Technical
Open →
2025-10
37:53
Dynamic Malware Analysis for the Overworked Analyst
Edmund Brunaghin
BSides Belfast
· 2017
Technical
DFIR
Malware Analysis
Threat Intel
Intermediary
Blue
Talk
Open →
2017-10
53:49
ICS/SCADA Defense
Chris Sistrunk
BSides Augusta
· 2014
Technical
Blue
Talk
Open →
2014-09
32:05
Getting Started in ICS – Not just for engineers
Tyler Jansen
BSides Charm
· 2024
Career
Technical
Critical Infrastructure Security
ICS/OT
Intro
Talk
Open →
2024-06
40:14
Ghosts at the Gateway: 0-Days That Blind Routers and Invite APTs
Luke Schmidt
BSides Perth
· 2025
Technical
Hardware Hacking
Reverse Engineering
Vulnerability Research
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2025-10
39:37
Selling Formbook
Borja Rodriguez
Victor Acin
BSides Barcelona
Technical
Malware Analysis
Reverse Engineering
Blue
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2022-01
41:09
Stop Scrolling Through a pcap Looking for Red and Start Analyzing
Shaun Price
BSides SLC
· 2021
Technical
DFIR
Network Security
Talk
Open →
2021-12
21:54
Breaking Down Walls With Windows
Alexander Klepal
BSides SATX
· 2020
Technical
Red
Talk
Open →
2020-08
28:49
Boston BSides Bringing Down the Great Cryptowall - Weston Hecker
BSides Boston
Open →
2016-08
33:22
Hardware Hacking: A Primer on Reverse Engineering Bluetooth Transmissions
Edward Warren
BSidesROC
· 2023
Technical
Hardware Hacking
Reverse Engineering
Wireless Security
Red
Talk
Open →
2024-09
43:37
Leveraging Data Analytics to Tackle Everyday Security Tasks
Ramece Cave
BSides Oklahoma
· 2017
Technical
DFIR
Threat Intel
Case Studies and Incidents Analysis
Talk
Open →
2017-04
37:20
Operation WordDrone: Cyber Threats in the Drone Industry
Ilia Dafchev
BSides Sofia
· 2025
Technical
Malware Analysis
Supply Chain Security
Threat Intel
Advanced
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2025-04
42:47
DNS and Attack Surface Management - Paul Guido
Paul Guido
BSides SATX
· 2024
Technical
Intermediary
Talk
Open →
2024-06
26:57
BsidesRDU 2018 07 - When it rains it pours - Sam Granger
BSides RDU
Open →
2018-10
41:25
GT - Seek out new protocols, and boldly go where no one has gone before
BSides Las Vegas
Open →
2024-09
48:22
Breakdown of Network IDS/IPS Choices
BSides Delaware
· 2016
Technical
Talk
Open →
2016-11
29:06
Hacking Industrial Environments and Securing Them Safely
Tijl Deneut
BSides Limburg
· 2026
Technical
Network Security
OT Security
Vulnerability Research
Intermediary
Blue
Red
Case Studies and Incidents Analysis
+2
Open →
2026-04
56:30
Threat Hunting and the Surfacing of Mexican Threat Actor Greedy Sponge
Laura Stratton
Jacob Ferris
BSides CDMX
· 2025
Research
Technical
Malware Analysis
Threat Intel
Threat Modeling
Blue
Case Studies and Incidents Analysis
Technical Deep-dives
+1
Open →
2025-07
27:59
NMAP 101
Chris Hopkins
BSides SLC
· 2017
Technical
Intro
Talk
Open →
2017-06
45:08
Operational Tech binaries and the tale of deductions
Rushikesh D. Nandedkar
BSides Delhi
· 2020
Research
Technical
Advanced
Talk
Open →
2020-11
51:32
Pulling at the Strand of the Botnet Web
Aaron Riley
BSides KC
· 2019
Technical
Talk
Open →
2019-06
32:23
Exploiting First Hop Protocols to Own the Network - Paul Coggin
BSides Asheville
Open →
2018-06
1:00:24
I thought I saw a |-|4X0.- by Thomas Fischer
BSides Scotland
Open →
2017-04
42:41
Hacking K-12 School Software in a Time of Remote Learning
Sam Quinn
BSides Knoxville
· 2021
Technical
Reverse Engineering
Vulnerability Research
Advanced
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2021-05
49:25
Your Phone Hates You
Mark Loveless
BSides Dallas/Fort Worth
· 2020
Technical
Hardware Security
Mobile Security
Privacy
Talk
Open →
2020-11
54:31
Network Situational Awareness with Flow Data
Jason Smith
BSides Augusta
· 2016
Technical
Detection Engineering
Network Security
Talk
Open →
2016-09
31:31
Building a Virtual Homelab with Cisco Modeling Labs
Melpomeni Doutsis
BSides Buffalo
Technical
Demo
Open →
2025-06
23:26
The NSM Ouroboros: Embracing The Endless Cycle Of Network Security Monitoring
Kim Hendry
BSides Leeds
· 2023
Technical
Talk
Open →
2023-07
50:39
ATGP - Wi-Door - Blind/Reverse Shells for Your Wi-Fi - Vivek Ramachandran
BSides Las Vegas
Open →
2016-12
32:38
0Day to HeroDay: Bringing A Company From Scorched Earth to a Modern Security Organization
BSides Peru
Open →
2019-07
25:05
Is Your Phone Spying on You? An In-Depth Analysis of Vulnerabilities in Cisco VoIP Phones
Balazs Bucsay
BSides Dublin
· 2026
Technical
Network Security
Reverse Engineering
Vulnerability Research
Advanced
Red
Technical Deep-dives
Talk
Open →
2025-10
52:57
Mike Carlson: Becoming more intimate with Exploit Kits
Mike Carlson
BSides Calgary
· 2020
Technical
Talk
Open →
2020-12
49:51
Movement After Initial Compromise
Matt Batten
Collyn Hartley
BSides RDU
· 2018
Technical
Active Directory
Intermediary
Red
Demo
Talk
Open →
2018-10
25:47
Radio Frequencies All Around Us: What Data Are You Leaking and What Is Done With It?
Keya Lea Horiuchi
BSides Las Vegas
· 2017
Technical
IoT
Privacy
Wireless Security
Talk
Open →
2017-08
48:38
Brad Duncan - Exploit Kits and Indicators of Compromise
Brad Duncan
BSides Augusta
· 2016
Technical
Talk
Open →
2016-09
37:38
How Crypto Libraries Affect DoS Attacks via Diffie-Hellman Key Exchange
Szilárd Pfeiffer
BSides Budabest
· 2022
Technical
Cryptography
Network Security
Vulnerability Research
Red
Demo
Talk
Open →
2023-06
26:44
How to Review a Mobile (Android) App
James Kinninger
BSides Greenville
· 2020
Technical
Talk
Open →
2020-06
28:09
Who said that Python was UNIX Best Friend Only?
Xavier Mertens
BSides Athens
Talk
Open →
2024-03
43:23
Remote attacks against IoT
Alex Balan
BSides Philly
· 2017
Technical
Demo
Talk
Open →
2017-08
33:24
Malware: Then, Now and How
Cody J. Winkler
BSides Springfield
· 2017
Technical
IoT
Malware Analysis
Reverse Engineering
Talk
Open →
2018-02
22:15
Gateway To IoT - Rob McLellan
Rob McLellan
BSides Lancashire
· 2026
Talk
Open →
2025-07
1:08:11
BSides Bucharest Online Meetup
BSides Bucharest
· 2022
Research
Technical
Detection Engineering
Malware Analysis
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2022-05
44:04
Playing Games With Chimaras
Jacob Torrey
BSides KC
· 2021
Open →
2021-11
26:43
Mobile App Corporate Espionage
Michael Raggo
BSidesSF
· 2016
Technical
Talk
Open →
2016-04
22:23
A new approach to security
Chandrani Mukherjee
BSides SLC
· 2023
Talk
Open →
2023-06
50:26
Alexander Rymdeko-Harvey - RAT Reusing Adversary Tradecraft
Alexander Rymdeko-Harvey
BSides Augusta
· 2016
Technical
Talk
Open →
2016-09
1:00:30
Stolen Laptops: Modern Physical Access Attacks with DMA and Firmware Exploitation
Pierre Nicolas Allard Coutu
BSides Vancouver Island
· 2025
Technical
Hardware Hacking
Physical Security
Reverse Engineering
Advanced
Blue
Red
Technical Deep-dives
+1
Open →
2026-03
52:25
Securing your company's assets with packets
Mike Motta
BSides Springfield
· 2017
Technical
Talk
Open →
2018-02
47:35
Sharing Open Datasets with the World to Develop Detections from Home | Roberto Rodriguez
Roberto Rodriguez
BSides Delhi 2020
Community
Technical
DFIR
Detection Engineering
Threat Modeling
Talk
Open →
2020-11
28:14
Privacy and Safety of NB-IoT Devices
Ali Abdollahi
BSides Barcelona
· 2021
Technical
Cellular Security
Talk
Open →
2022-01
15:45
BSidesWLG 2017 - Oliver Ewert - Public WiFi isn't that bad, right
BSides Wellington
Open →
2018-02
28:57
Turning Off The Internet: Technical Tactics Of State-Scale Censorship And Shutdowns
Reza Sharifi
BSides Munich 2025
Technical
Network Security
Technical Deep-dives
Talk
Open →
2026-02
20:17
Turbo Tactical Exploitation: 22 Tips for Tricky Targets
HD Moore
BSides Las Vegas 2025
Technical
Network Security
OSINT
Vulnerability Research
Red
Talk
Open →
2025-12
34:27
How one line of Python can bring your network to its knees
Bobby Simpson
BSides Oklahoma
· 2017
Technical
Blue
Demo
Talk
Open →
2017-05
28:46
NTLM Reflection Is Dead, Long Live...: Story Of An Accidental Windows RCE
Guillaume André
Wilfred
BSides Munich
· 2025
Technical
Active Directory
Vulnerability Research
Advanced
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2026-02
24:36
Hunting Before Day Zero
Ryan LaBouve
BSidesROC
· 2023
Technical
DFIR
Detection Engineering
Threat Intel
Talk
Open →
2024-09
47:29
Knock Knock. Who's There? Betta! Betta Who? Betta Check Your Access Control Edge Devices
Dr. Vincenzo Ciancaglini
Philippe Z Lin
BSides Las Vegas
· 2021
Research
Technical
Hardware Security
IoT
Network Security
Physical Security
Vulnerability Research
Advanced
+3
Open →
2021-08
30:51
Hacking ICS & OT Networks - Joseph Foote
Joseph Foote
BSides Basingstoke
· 2025
Technical
Talk
Open →
2025-09
53:55
Analyzing Emotet infections
Brad Duncan
BSides Tampa
· 2021
Technical
Detection Engineering
Malware Analysis
Network Security
Intermediary
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2021-04
28:52
Cyber Zoology: Protecting Your Network from New Breeds of Attacks with a Raspberry Pi
Patrick Kelly
BSides Toronto
· 2018
Technical
Talk
Open →
2018-11
34:04
Open Source Your Incident Response - Donovan Farrow
Donovan Farrow
BSides KC
Technical
Talk
Open →
2025-06
30:07
Unconventional Attack Vectors On IoT Devices
Fraser Wilson
BSides Newcastle
· 2025
Technical
AI Security
Hardware Hacking
IoT
Physical Security
Wireless Security
Red
Demo
+1
Open →
2025-12
40:19
Ransomware, Threat Actors, and the Shifting Enterprise Security Landscape
Marcelle Lee
BSidesROC
· 2024
Technical
Detection Engineering
Malware Analysis
Threat Intel
Blue
Keynote
Open →
2025-03
29:12
Come Together, Right Now, Over Mesh
Vic Harkness
BSides Liverpool
Technical
Network Security
Wireless Security
Talk
Open →
2022-01
40:04
From Spoofing to Tunnelling: New Red Team Networking Techniques
Shu Hao Tung
BSides Vancouver Island
· 2025
Technical
Network Security
Vulnerability Research
Red
Talk
Open →
2026-03
57:03
Grinding Phishing into Detections
BSides Boulder
· 2022
Technical
Blue
Talk
Open →
2022-12
48:08
IoT from an Attacker's Perspective
Venkata Hareesh Peddiraju
BSides Toronto
· 2021
Technical
Hardware Security
IoT
Network Security
Reverse Engineering
Talk
Open →
2021-12
37:29
Intrusion Detection in the Clouds
Josh Pyorre
BSidesSF
· 2015
Technical
Detection Engineering
Network Security
Blue
Talk
Open →
2023-12
42:24
Intelligence-Driven Response to UNC5174 by Alessandra Rizzo
Alessandra Rizzo
BSides Edmonton
· 2025
Technical
Blue
Case Studies and Incidents Analysis
Talk
Open →
2025-10
28:08
Malware Analysis with R2AI
Axelle Apvrille
BSides Kristiansand
· 2026
Technical
AI Security
Malware Analysis
Reverse Engineering
Intermediary
Technical Deep-dives
Talk
Open →
2026-02
55:30
Comparing Malicious Files
Robert Simmons
BSides Charm
· 2019
Technical
Malware Analysis
Reverse Engineering
Technical Deep-dives
Talk
Open →
2021-05
33:58
Industrial Scale Hardware Hacking - Anthony Clark
Anthony Clark
BSides Albuquerque
· 2024
Technical
Hardware Hacking
IoT
Reverse Engineering
Red
Methodology
Talk
Open →
2024-08
35:36
HarshModi
Harsh Modi
BSides Calgary
Technical
IoT
Reverse Engineering
Wireless Security
Intermediary
Red
Case Studies and Incidents Analysis
Technical Deep-dives
+1
Open →
2024-03
37:14
Unity Makes Strength
Xavier Mertens
BSides Athens
· 2017
Talk
Open →
2017-10
42:24
CG - Techniques for Escaping the AppSec Labyrinth - Andrew Hay
BSides Las Vegas
Open →
2017-01
30:17
BSidesWLG 2017 - Dan Wallis - Shining a light on the Internet of Terrible
BSides Wellington
Open →
2018-02
27:42
I Simulated Hacking a Car. Then I Tried to Defend It. Here's What Broke!
Rakesh Elamaran
BSides Exeter
· 2026
Research
Technical
Hardware Security
Vulnerability Research
Talk
Open →
2026-05
19:58
Contribute to Learn: Building DFIR Expertise Through Open Source
Christopher Eng
BSides NYC
· 2025
Community
Technical
DFIR
Vulnerability Research
Talk
Open →
2025-12
39:02
The HMAC Trap: Security or Illusion?
Marluan Cleary
BSides Las Vegas
· 2025
Technical
Cryptography
Red
Talk
Open →
2025-12
45:04
Hunting Defense Against The Dark Arts
Danny Akacki
BSides Philly
· 2017
Technical
Blue
Talk
Open →
2017-08
25:49
Clean up on Aisle APT
Mark Parsons
BSides Charm
· 2017
Research
Malware Analysis
Threat Intel
Case Studies and Incidents Analysis
Talk
Open →
2021-05
45:01
BG - The Savage Curtain 0 Tushar Dalvi & Tony Trummer
BSides Las Vegas
Open →
2016-12
26:01
PG - How I Learnt Hacking in High School - Lokesh Pidawekar
BSides Las Vegas
Open →
2016-12
48:07
DougWarden
Doug Warden
BSides Calgary
Technical
Talk
Open →
2024-03
31:21
Tony Drake Incident Response for the Overwhelmed, Understaffed, and Unprepared
Tony Drake
BSides Boulder
Career
DFIR
Talk
Open →
2021-08
22:50
Kelvin James Extracting Information from common malware
BSides Boise
Open →
2020-02
17:59
PG - Out of Denial: A 12-Step Program for Recovering Admins - Paul Lee
BSides Las Vegas
Open →
2016-12
41:40
Ivan Marchany: How to Build a Cyber Home Lab
Ivan Marchany
BSides St. Pete
· 2025
Career
Detection Engineering
Threat Intel
Vulnerability Research
Intro
Talk
Open →
2026-03
50:25
Cleveland BSides 2011 Talk 5 Steve O
BSides Cleveland
Open →
2016-10
27:34
Cleveland BSides 2011 - Talk6 SteveJ
BSides Cleveland
Open →
2016-10