Channel Avatar

CarolinaCon @UCTY3Dpz68CyrjwRzqkE4sFw@youtube.com

None subscribers - no pronouns set

CarolinaCon was started in 2005 and has been held every year


38:20
Recon 101: Huge Needles, Small Haystack by Corey Overstreet
45:36
The (hash)Cat Factory by elrey741 (Alex R.)
58:29
Icy bridge project needs your help! by John F. Davis (Math400)
26:30
Deconstructing Firewalls by Trevon
19:30
Kali Ma: Pen-Testing the Connection Between IMDs and HMDs by Dylan Schopmann
42:02
Fuzzing: Finding Your Own Bugs and 0days! by Rodolpho Concurde (ROd0X)
41:22
Dynamic Database Credentials: A Secure and Efficient Approach by Harvey Cary
23:36
Shining a light into the security blackhole of IoT and OT by Huxley Barbee
20:29
Protecting Yourself From People Like Me by Chris Horner
49:05
How to Rob a Bank Over the Phone by Joshua Crumbaugh
20:11
CarolinaCon Online 2 Badge Building Livestream
38:08
Beyond Purple - Fostering Cross-Team Collaboration by Andrew Clinton
19:40
Trifecta of Email Authentication by Denice - CarolinaCon Online 2
46:11
Security is an Awesome Product Feature by Mark Hahn - CarolinaCon Online 2
01:00:15
Cameras, CACs & Clocks: Enterprise IoT Security Sucks by Brian Contos - CarolinaCon Online 2
33:55
Tales from the Usenet by Jason Evans - CarolinaCon Online 2
44:21
Vulnerability Management for Containers by Scott Wilson - CarolinaCon Online 2
20:46
Continuous Integration / Continuous Disaster by 0x57696c6c - CarolinaCon Online 2
50:16
Hacking Humans: Using OSINT to put together Social Engineering Scenarios that Always Work
46:23
Crash Course on Web Application Penetration Testing - Thinking Outside the OWASP 10
53:32
Host-Based Detection, Forensics, and Response with Velociraptor
41:10
Fuzzing by First Principles
41:45
Practical Infrastructure Automation For Red Teams
25:01
Catching the CAN Bus: Car Hacking on a Budget
46:48
Hack in Your Sleep
21:00
DNS tunneling down the rabbit hole
30:02
Your IPv6 is Showing
27:09
Zero-day .NET and Nvidia GFE Vulnerabilities Explained
56:32
Fast Neural Networks... a no brainer! The Actor model as neuron (by Riccardo Terrell)
32:15
HideNSneak - A framework to obfuscate attack traffic (by Mike Hodges)
01:01:39
Blockchain: The New Digital Swiss Army Knife? (by G. Mark Hardy)
31:54
Show the Threat: Data Visualization and InfoSec (by TJ (@reonfleek))
48:13
Writing FreeBSD Malware (by Shawn Webb)
57:03
Honeypots, Deception, and Frankenstein (by Phillip Maddux)
20:13
How playing CTF made me a better hacker... is this your password? (by Jeff Macko)
27:06
Presenting P@cketR@quet: An Auditory IDS/Network Auralizer (by Killian Ditch)
01:11:54
Liverstrong (Deviant Ollam)
42:10
OOM OOM POW (Deserialization) (by Jason Gillam)
57:18
Hardware Hacking Ginsu Chef Style (by Deral Heiland (percent_x))
43:28
OSINT for Everyone: Understanding Risks and Protecting Your Data (by Micah Hoffman and Josh Huff)
40:14
Kernel Mod Rootkits on Modern Linux Systems (by Alex Caceres)
40:46
Master Baiting - Don’t Click Bait, Click Yourself! (by BACE16)
34:34
Getting Access with Spear Phishing (by Kevin Wang)
12:54
The GHS Shoot-house for WiFi (Pat Wylie and Shawn Brown)
26:39
The Unofficial Security Enthusiast's Meme Filled Guide of Breaking Into InfoSec - Josh Huff
28:55
HoneyPy & HoneyDB - Phillip Maddux
54:45
How to Patch Stupid - A modern approach to remediating user risk - Joshua Crumbaugh
45:48
Forgotten History of Cyberwar - Sean Pierce (@secure_sean)
54:56
Getting Started with PowerShell or One Tool to Hack them all - Michael Wharton
57:56
A ROP Primer - Pandatrax
52:38
Hacking The Invasion of Things (or as my wife calls it, what did you spend our money on this time)
47:41
OpSec for InfoSec - Justin Nordine
54:53
How to buy illegal stuff online - QR & Vic
42:00
Testing Phone Systems - "I can come up with something better later" - Owen
01:00:21
So you want to learn Machine Learning - John F. Davis
40:03
CTFs - Not Just for Halo - Ray & Clayton
34:17
A Pentester's Intro to Attacking ICS/SCADA - Tripp Roybal (@GMRoybal_III)
44:32
smrk3r - RFID is dead; long live RFID!
01:20:50
AR Hacking - How to turn One Gun Into Five Guns - Deviant Ollam
32:02
Reporting for Hackers - Jon Molesa @th3mojo