Dark | Light
# ![@wildwesthackinfest Avatar](https://lunarcrush.com/gi/w:26/cr:youtube::UCef0TWni8ghLcJphdmDBoxw.png) @wildwesthackinfest Wild West Hackin' Fest

Wild West Hackin' Fest posts on YouTube about red, john, ai, discord the most. They currently have [------] followers and [---] posts still getting attention that total [---] engagements in the last [--] hours.

### Engagements: [---] [#](/creator/youtube::UCef0TWni8ghLcJphdmDBoxw/interactions)
![Engagements Line Chart](https://lunarcrush.com/gi/w:600/cr:youtube::UCef0TWni8ghLcJphdmDBoxw/c:line/m:interactions.svg)

- [--] Week [-----] +104%
- [--] Month [-----] -37%
- [--] Months [------] -60%
- [--] Year [------] +196%

### Mentions: [--] [#](/creator/youtube::UCef0TWni8ghLcJphdmDBoxw/posts_active)
![Mentions Line Chart](https://lunarcrush.com/gi/w:600/cr:youtube::UCef0TWni8ghLcJphdmDBoxw/c:line/m:posts_active.svg)

- [--] Week [--] +50%
- [--] Month [--] +31%
- [--] Months [--] -19%
- [--] Year [--] +78%

### Followers: [------] [#](/creator/youtube::UCef0TWni8ghLcJphdmDBoxw/followers)
![Followers Line Chart](https://lunarcrush.com/gi/w:600/cr:youtube::UCef0TWni8ghLcJphdmDBoxw/c:line/m:followers.svg)

- [--] Week [------] no change
- [--] Month [------] +0.36%
- [--] Months [------] +1.40%
- [--] Year [------] +4.10%

### CreatorRank: [---------] [#](/creator/youtube::UCef0TWni8ghLcJphdmDBoxw/influencer_rank)
![CreatorRank Line Chart](https://lunarcrush.com/gi/w:600/cr:youtube::UCef0TWni8ghLcJphdmDBoxw/c:line/m:influencer_rank.svg)

### Social Influence

**Social category influence**
[social networks](/list/social-networks)  [technology brands](/list/technology-brands)  [finance](/list/finance)  [countries](/list/countries)  [luxury brands](/list/luxury-brands) 

**Social topic influence**
[red](/topic/red), [john](/topic/john), [ai](/topic/ai), [discord](/topic/discord), [engineering](/topic/engineering), [social](/topic/social), [how to](/topic/how-to), [virtual](/topic/virtual), [fun](/topic/fun), [has been](/topic/has-been)

**Top accounts mentioned or mentioned by**
[@blackhillsinfosec](/creator/undefined) [@antisytraining](/creator/undefined) [@nd](/creator/undefined) [@k3](/creator/undefined) [@cy](/creator/undefined) [@byt3bl33d3r](/creator/undefined) [@blackhillsi](/creator/undefined) [@antisytrai](/creator/undefined) [@tylerrobinson](/creator/undefined)

**Top assets mentioned**
[CyberConnect (CYBER)](/topic/cyber) [FilesCoins Power Cu (FILECOIN)](/topic/files)
### Top Social Posts
Top posts by engagements in the last [--] hours

"Modern Recon for Red Teams and Pentesters Jason Haddix Modern Recon for Red Teams and Pentesters Speakers: Jason Haddix Modern offensive security work moves fast and having the right tooling makes all the difference. In this talk Jason will walk through the tools workflows and resources that todays offsec professionals rely on to identify hosts accelerate scanning and map organizations with greater speed and precision. Hell cover distributed scanning stealth techniques GitHub enumeration DNS source nuances and several lesser known methods that can dramatically elevate your recon game. If you"  
[YouTube Link](https://youtube.com/watch?v=B1YcflQRvOI)  2026-01-05T16:00Z 56.4K followers, 10.1K engagements


"The Drone Renaissance - The Attack Surface Now Includes the Sky Luke Canfield The Drone Renaissance - The Attack Surface Now Includes the Sky Presenter: Luke Canfield How can off the shelf technology be used to build modern reconnaissance drones Drones are no longer niche or limited to government budgets. What once required nation state resources is now achievable with open-source software consumer hardware and a 3D printer. What does a DIY reconnaissance drone platform look like today In this talk we break down a real DIY reconnaissance drone built on a fixed wing VTOL airframe. This"  
[YouTube Link](https://youtube.com/watch?v=ZufmF_7p8UE)  2026-02-13T16:00Z 56.4K followers, [---] engagements


"Elicitation: Weaponizing Social Engineering for Covert Access Operations Dorota Kozlowska Elicitation: Weaponizing Social Engineering for Covert Access Operations Presenter: Presenter: Dorota Kozlowska Elicitation is one of the most powerful and underrated skills in social engineering and covert access operations and this session breaks down exactly how professionals use it to gather sensitive information without ever asking a direct question. Whether you're in offensive security red teaming physical penetration testing or corporate security understanding elicitation techniques is essential"  
[YouTube Link](https://youtube.com/watch?v=1mWrreMAB8M)  2025-12-12T21:21Z 56.4K followers, [---] engagements


"Strengthening Cybersecurity Potential: Investing in People Instead of Tools Markus Schober The Secret to Strong Cybersecurity Invest in Your People Not Just More Tools In todays fast-paced cybersecurity landscape its easy to believe the solution to every challenge is another tool. But the truth is far simpler: your people are your greatest security asset. In this talk Markus Schober breaks down why security teams strugglenot because they lack technology but because they lack support development and meaningful engagement. When professionals dont receive the right onboarding training or growth"  
[YouTube Link](https://youtube.com/watch?v=3ED4Jkb8BZQ)  2025-11-28T13:00Z 56.4K followers, [---] engagements


"WWHF Creating a Strategic Vulnerability Response Plan - Joe Pierini Daniel Brown Patrick Fussell Chat in Discord: Join the WWHF Community Discord: https://discord.gg/wwhf NOTE: Re-upload to fix a video flicker on some displays. Heartbleed Shellshock Ghost Stagefright Log4j . the vulns that caused massive responses will inevitably happen again. Should your pentest practice or internal team have a defined vulnerability response plan What elements should be in a VR plan How do you allocate resources and protect your clients BEFORE the next big one hits. Our talk features an all-star cast of"  
[YouTube Link](https://youtube.com/watch?v=3fQMB2srLsY)  2022-03-30T22:30Z 56.3K followers, [---] engagements


"Wild West Hackin Fest @ Mile High [----] - In-Person/Virtual Conference - Meet the Community Register now for Wild West Hackin Fest Mile High Denver [----] - In-Person/Virtual Conference: https://wildwesthackinfest.com/register ///Black Hills Infosec Socials Twitter: https://twitter.com/BHinfoSecurity Mastodon: https://infosec.exchange/@blackhillsinfosec LinkedIn: https://www.linkedin.com/company/antisyphon-training Discord: https://discord.gg/ffzdt3WUDe ///Black Hills Infosec Shirts & Hoodies https://spearphish-general-store.myshopify.com/collections/bhis-shirt-collections ///Black Hills Infosec"  
[YouTube Link](https://youtube.com/watch?v=4YG7tBIFiY0)  2026-01-23T21:23Z 56.4K followers, [---] engagements


"Play to Win: Getting Your Dream Cybersecurity Job Kip Boyle [--] Hour Join the WWHF Community Discord: https://discord.gg/wwhf 0:00:00 - PreShow Banter I Am Gort 0:02:19 - PreShow Banter Joff Has a Class (Link below) 0:10:08 - FEATURE PRESENTATION: Getting Your Dream Cybersecurity Job 0:16:05 - The Four Blockers 0:17:04 - [--]. Job Title 0:30:15 - [--]. Lack of Skills 0:42:18 - [--]. Convince Hiring Manager 0:50:30 - [--]. Poor Job Hunting 1:00:04 - Qs & As Kip Show Notes https://www.youtube.com/playlistlist=PLK1Bn1577F9nbrTcYHYKdXtl4aw79HjZn https://www.twitch.tv/banjocrashland You want your first"  
[YouTube Link](https://youtube.com/watch?v=6Qq9WcI_sl0)  2020-12-16T15:18Z 55.7K followers, [----] engagements


"Dungeons & Dragons: The Security Tool You Didnt Know You Needed Dungeons & Dragons: The Security Tool You Didnt Know You Needed Speakers: Klaus Agnoletti & Glen Sorensen Sick of security training that puts everyone to sleep This session dives into why the most effective cybersecurity training tool might already be sitting in your game room. Welcome to game-based learning where the proven power of play transforms how professionals master complex skills and actually retain what they learn. We explore research showing that people learn best together not in isolation. Traditional training forces"  
[YouTube Link](https://youtube.com/watch?v=8_S7n-Obv6Q)  2025-12-15T13:00Z 56.4K followers, [---] engagements


"Augmenting Your Offensiveness With AI for Fun and Job Security Marcello Salvati and Dan McInerney Augmenting Your Offensiveness With AI for Fun and Job Security Speakers: Marcello Salvati and Dan McInerney AI is transforming offensive security defensive operations and everything in between. In this talk we cut through the hype and explore what large language models and AI agents can actually do for you today. We break down the core concepts behind LLMs agent architecture and practical workflows so you can understand how to apply these tools in real world security work. Using concrete examples"  
[YouTube Link](https://youtube.com/watch?v=9BCK5-bGRTE)  2025-12-19T15:35Z 56.4K followers, [---] engagements


"OSINT and the Hermit Kingdom - Nick Roy https://www.wildwesthackinfest.com/ Leveraging online sources to learn more about the worlds most secret nation. Nick Roy is currently a Senior Security Specialist at Splunk focusing on security automation and improving blue team response. Before Splunk Nick was at Phantom Cyber working with partners across the globe build out their security automation practices and delivering them to their customers"  
[YouTube Link](https://youtube.com/watch?v=ARHc_sJBavQ)  2020-02-11T15:19Z 54.3K followers, [----] engagements


".Everything You Need to Know About Moving into a Cybersecurity Leadership Role Naomi Buckwalter 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com In this talk youll hear all about the good the bad and the ugly about being in cybersecurity leadership. Youll learn about what it takes to succeed as a leader on technical teams. Youll also learn about some tried-and-true ways of breaking into management roles. Whether you're itching for a"  
[YouTube Link](https://youtube.com/watch?v=Acw3xVgLoVs)  2025-02-06T05:00Z 54.3K followers, [---] engagements


"CULTivating Growth and Connection Wade Wells 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com In this talk Wade will explore the psychological and social benefits of community involvement and mentorship such as increased belonging mental health and professional growth. We'll discuss how these engagements enhance networking skill development and foster mutual learning and leadership. Additionally practical strategies for effectively"  
[YouTube Link](https://youtube.com/watch?v=BJWx0xxRlBA)  2025-02-14T05:00Z 55.7K followers, [---] engagements


"Death by Dashboards - Moving the Needle on What Actually Matters Tim Medin Death by Dashboards Moving the Needle on What Actually Matters Speaker: Tim Medin Dashboards dominate cybersecurity reportingbut are they helping us focus on what truly matters In this talk Tim Medin CEO and founder of Red Siege Information Security challenges the obsession with metrics that look good but fail to improve real security outcomes. Youll learn why traditional vulnerability dashboards often incentivize the wrong behaviors and how to shift your strategy toward meaningful risk reduction. Tim shares practical"  
[YouTube Link](https://youtube.com/watch?v=BgxWaLUr8aU)  2025-12-05T13:00Z 56.4K followers, [---] engagements


"The Extendables: Exploiting Browser Extensions for PrivEsc and Persistence Fin Hume 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com This talk explores new ways to exploit browser extensions for both privilege escalation and persistence. It will explore the NativeMessaging functionality within all popular browsers (Edge Chrome and Firefox) across all major Operating Systems (Windows Linux MacOS) and how it can be exploited to run"  
[YouTube Link](https://youtube.com/watch?v=BiXGaGX1Zhk)  2025-07-08T04:45Z 56.4K followers, [---] engagements


"From Noise to Knowledge: Demystifying RF Signals Ty Purcell 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com Links mentioned in the talk FCC Website: http://www.fccid.io NASA: https://science.nasa.gov/ems/ Tait Radio Academy: https://www.taitradioacademy.com/ Amateur Radio: https://www.arrl.org/ The expansion of wireless technologies has introduced a diverse range of hardware protocols and radio frequencies. When terms like LoRa"  
[YouTube Link](https://youtube.com/watch?v=CzVyzxRIvJM)  2025-03-18T04:00Z 55.8K followers, [---] engagements


"0wning the network with CrackMapExec v4.0 Wild West Hackin' Fest [----] Ever needed to pentest a network with [--] gazillion hosts with a very limited time frame Ever wanted to Mimikatz entire subnets How about shelling entire subnets How about dumping SAM hashes Share spidering Keeping track of all the credentials you pillaged (The list goes on) And doing all of this in the stealthiest way possible Look no further than CrackMapExec CrackMapExec (a.k.a CME) is a modular post-exploitation tool written in Python that helps automate assessing the security of *large* Active Directory networks. Built"  
[YouTube Link](https://youtube.com/watch?v=Dd4ZAm2mwwA)  2017-12-05T00:50Z 55.7K followers, 12K engagements


"Practical Cybersecurity Control Auditing: From Preparation to Reporting Gerald Auger PhD Practical Cybersecurity Control Auditing: From Preparation to Reporting Speaker: Gerald Auger PhD Auditing business environments against the CIS Controls [--] framework can feel complex but this session breaks it down into a clear repeatable process. In this practical one-hour walkthrough Dr. Auger guides participants through the full audit lifecycle from understanding the fundamentals of CIS Controls to preparing executing and documenting a complete cybersecurity audit. You will learn how to interpret the"  
[YouTube Link](https://youtube.com/watch?v=G0gmRARrtGQ)  2025-12-26T13:00Z 56.4K followers, [---] engagements


"From User to Entra ID Admin Sean Metcalf 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com It only takes minutes for an attacker to compromise an account with access. The account doesn't even need to have obvious privileged rights for the attacker to own the cloud environment. This talk covers methods in Entra ID to go from standard user access to Entra ID Global Admin. 00:00 - Welcome intro 00:05 - Whoami 00:07 - Agenda 00:43 -"  
[YouTube Link](https://youtube.com/watch?v=G7qafyzsKF8)  2025-05-01T04:00Z 56.4K followers, [----] engagements


"Backdoors and Breaches Live Demo Jason Blanchard WWHF Deadwood [----] Join us at the annual information security conference in Deadwood SD (in-person and virtually) Wild West Hackin' Fest: https://wildwesthackinfest.com/ ///Black Hills Infosec Socials Twitter: https://twitter.com/BHinfoSecurity Mastodon: https://infosec.exchange/@blackhillsinfosec LinkedIn: https://www.linkedin.com/company/antisyphon-training Discord: https://discord.gg/ffzdt3WUDe ///Black Hills Infosec Shirts & Hoodies https://spearphish-general-store.myshopify.com/collections/bhis-shirt-collections ///Black Hills Infosec"  
[YouTube Link](https://youtube.com/watch?v=HDPaSKn4OYI)  2023-09-18T11:00Z 55.7K followers, [---] engagements


"Tool Shed Demo: Aleph Corey Ham WWHF [----] 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ Join BHIS's Corey Ham as he teaches about Aleph Aleph is a tool that can be utilized for ingesting and analyzing unstructured data from ransomware leaks or even internal file shares. Corey will demonstrate how to ingest and extract useful data and information using Aleph. ///Black Hills Infosec Socials Twitter: https://twitter.com/BHinfoSecurity Mastodon: https://infosec.exchange/@blackhillsinfosec LinkedIn:"  
[YouTube Link](https://youtube.com/watch?v=IR2f8zreEFM)  2024-04-30T13:00Z 55.7K followers, [---] engagements


"Closing Ceremony John Strand WWHF Deadwood [----] Join us at the annual information security conference in Deadwood SD (in-person and virtually) Wild West Hackin' Fest: https://wildwesthackinfest.com/ ///Black Hills Infosec Socials Twitter: https://twitter.com/BHinfoSecurity Mastodon: https://infosec.exchange/@blackhillsinfosec LinkedIn: https://www.linkedin.com/company/antisyphon-training Discord: https://discord.gg/ffzdt3WUDe ///Black Hills Infosec Shirts & Hoodies https://spearphish-general-store.myshopify.com/collections/bhis-shirt-collections ///Black Hills Infosec Services Active SOC:"  
[YouTube Link](https://youtube.com/watch?v=J4vtfoqlm8M)  2023-09-22T11:00Z 56.3K followers, [---] engagements


"GeoINT Mastery: A Pixel is Worth a Thousand Words Mishaal Khan 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com After this talk you will never see images the same way again. This enlightening session explores the dynamic realm of GeoINT (Geospatial Intelligence) a captivating subset of OSINT (Open Source Intelligence) that unlocks a wealth of hidden insights within images and videos. From identifying objects landscapes and aircrafts"  
[YouTube Link](https://youtube.com/watch?v=JLxA0e5Gja0)  2025-01-24T05:00Z 55.6K followers, [---] engagements


"See Sharper There has been an increase in .NET and specifically C# payloads to carry out adversary objectives. There are many reasons for this. This talk describse the architecture of the .NET CLR how attackers are gaining execution via built in tools and what defenders can do to increase their visibility and detection capabilities. Zac and Joe provide examples from the field and actual intrusion attempts that leverage these techniques. Presenters: Joe Moles & Zac Brown From Wild West Hackin' Fest [----] in Deadwood SD. Follow Wild West Hackin' Fest on Twitter here:"  
[YouTube Link](https://youtube.com/watch?v=K0--DR3XAQ8)  2018-11-08T01:17Z 55.7K followers, [---] engagements


"A New Era of Brute Forcing in Active Directory David Hork A New Era of Brute Forcing in Active Directory Presenter: David Hork Active Directory has been the backbone of enterprise identity for more than [--] years but despite its maturity most environments remain dangerously vulnerable. Misconfigurations overlooked defaults and outdated assumptions make AD one of the most common and valuable targets for attackers. In this session youll learn why securing Active Directory is still far from solved and what you can do about it. This talk breaks down essential but often misunderstood concepts like"  
[YouTube Link](https://youtube.com/watch?v=KneY9UboS9E)  2026-01-23T20:06Z 56.4K followers, [---] engagements


"Wild West Hackin Fest @ Mile High [----] - In-Person/Virtual Conference - Keynote Speakers Announced Register now for Wild West Hackin Fest Mile High Denver [----] - In-Person/Virtual Conference: https://wildwesthackinfest.com/register ///Black Hills Infosec Socials Twitter: https://twitter.com/BHinfoSecurity Mastodon: https://infosec.exchange/@blackhillsinfosec LinkedIn: https://www.linkedin.com/company/antisyphon-training Discord: https://discord.gg/ffzdt3WUDe ///Black Hills Infosec Shirts & Hoodies https://spearphish-general-store.myshopify.com/collections/bhis-shirt-collections ///Black Hills"  
[YouTube Link](https://youtube.com/watch?v=LL0X1y2q3Vw)  2025-12-18T14:30Z 56.4K followers, [---] engagements


"Cyber on a Shoestring: Building Wagyu Career Skills and Experience on a Ramen Budget Evan Kirstein Cyber on a Shoestring: Building Wagyu Career Skills and Experience on a Ramen Budget Speaker: Evan Kirstein Landing a cybersecurity job requires experience but getting that experience can feel impossible when you are trying to break in switch specialties or stretch out a tight budget. This presentation shows you how to build real demonstrable skills without needing expensive gear or paid programs. We will explore free and affordable ways to create meaningful hands-on experience through home labs"  
[YouTube Link](https://youtube.com/watch?v=MFfSUoq9kJo)  2025-12-22T13:00Z 56.4K followers, [---] engagements


"An Invitation to Way West Wild West Hackin' Fest - John Strand John Strand would like to invite you Way West - Wild West Hackin' Fest. Find out more:https://www.wildwesthackinfest.com/"  
[YouTube Link](https://youtube.com/watch?v=OURlDqS_vmw)  2020-01-11T15:51Z 56.3K followers, [----] engagements


"Passive DNS Collection and Analysis -- the dnstap (& fstrm) Approach From Wild West Hackin' Fest [----] in Deadwood SD. Presenter: Paul Vixie Dr. Paul Vixie used to be a programmer (cron bind rtty ncap dnscap) and has contributed to many dns-related RFC documents (1876 [----] [----] and so on). he founded and ran several companies (PAIX MAPS MIBH ISC Farsight) and was a technical executive at others (Abovenet/MFN). he co-invented the RBL and RPZ distributed reputation technologies among others. today his main activity seems to be deleting spam and ranting about things. Follow Wild West Hackin' Fest"  
[YouTube Link](https://youtube.com/watch?v=OxFFTxJv1L4)  2018-11-08T21:58Z 55.7K followers, [----] engagements


"Wild West Hackin Fest @ Mile High [----] - In-Person/Virtual Conference - Register Now Register now for Wild West Hackin Fest Mile High Denver [----] - In-Person/Virtual Conference: https://wildwesthackinfest.com/register ///Black Hills Infosec Socials Twitter: https://twitter.com/BHinfoSecurity Mastodon: https://infosec.exchange/@blackhillsinfosec LinkedIn: https://www.linkedin.com/company/antisyphon-training Discord: https://discord.gg/ffzdt3WUDe ///Black Hills Infosec Shirts & Hoodies https://spearphish-general-store.myshopify.com/collections/bhis-shirt-collections ///Black Hills Infosec"  
[YouTube Link](https://youtube.com/watch?v=QPAXAMSrAPY)  2026-01-23T21:11Z 56.4K followers, [--] engagements


"WWHF [----] (Virtual): Don't Cross The Streams: The Battle Over DNS Control-Plane - Daniel Schwalbe https://www.wildwesthackinfest.com 00:00 - Pay No Attention to the Tiny Green Men Behind the Curtain 00:49 - What We Talking About 02:29 - Why Encrypt DNS Resolutions 04:44 - Encryption Options 10:23 - Performance 13:02 - Security 22:39 - Network Management 26:31 - Privacy 31:24 - Conclusion -- DNS-over-HTTPS and DNS-over-TLS have become charged topics of discussion between network operators browser companies and public recursor operators. It is worth discussing how both of these technologies"  
[YouTube Link](https://youtube.com/watch?v=QbvRWk0y4-0)  2020-07-21T18:56Z 55.7K followers, [---] engagements


"Stochastic Garrotes: A Data Driven Approach to LLM Generated Malware Ryan Ashley Stochastic Garrotes: A Data Driven Approach to LLM Generated Malware Speaker: Ryan Ashley Principal Engineer Applied Research IQT Large Language Models are everywhere now and their role as coding assistants has sparked growing fears about a coming wave of AI generated malware. But this creates a strange sort of Fermi Paradox. If these models are truly as powerful as many claim where is all the malware Threat actors tend to adopt new technology quickly. They follow trends. They capitalize on opportunity fast. In a"  
[YouTube Link](https://youtube.com/watch?v=Qo5D8XhmG0w)  2026-01-02T17:00Z 56.4K followers, [---] engagements


"Too Much JSON Try jq BB King jq Tutorial: Master JSON on the Command Line Unix Philosophy in Action The Unix Philosophy teaches that text streams are a universal interface. Programs should produce plain text output so other programs can use it as input with minimal friction. This made the command line incredibly powerful until JSON became the standard for modern data interchange. Enter jq the ultimate command line JSON processor. With jq you can parse filter extract and transform JSON data as easily as using awk cut or grep. Even a little familiarity will allow you to handle complex JSON"  
[YouTube Link](https://youtube.com/watch?v=RddcuGhtn_8)  2025-11-24T20:08Z 56.4K followers, [---] engagements


"Hiding in Plain Sight: Shellcode Obfuscation Techniques Mike Saunders 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com It doesnt matter how advanced your shellcode loader is if you dont protect your shellcode from prying AV & EDR sensors youre going to have a bad time. From simple encryption schemes like the Caesar cipher to more complex schemes like AES reversing arrays steganography encoding shellcode as other data types and other"  
[YouTube Link](https://youtube.com/watch?v=SG9tO1uCkNM)  2025-02-13T05:00Z 54.3K followers, [---] engagements


"Hardware Hacking Curiosity IoT & Firmware Hacking Adrien Lasalle Hardware Hacking Explained IoT Security Firmware Analysis & Real Attacks In this video we break down the essentials of hardware hacking and why its a critical part of modern cybersecurity. Learn how to perform IoT reconnaissance analyze hardware interfaces like UART JTAG and SPI and extract or reverse engineer firmware to uncover vulnerabilities. Youll also see live demos on real devices including: Wi-Fi Router: firmware extraction secret hunting and security analysis Connected Camera: exploiting a known CVE to achieve remote"  
[YouTube Link](https://youtube.com/watch?v=UpOzUdd7cqM)  2025-11-18T18:49Z 56.4K followers, [---] engagements


"Building a Hacking Lab on Azure Jordan Drysdale and Kent Ickler How to build a cybersecurity lab fast with Azure ARM templates Automate Active Directory setup and common tool installs Rapid testing cleanup and lab lifecycle management Real-world insights from BHIS pentester Jordan Drysdale Who Its For: Pentesters red teamers blue teamers SOC analysts and security researchers who want to automate Azure-based lab environments. Optional: Pre-configure a Pay-As-You-Go Azure account if youd like to follow along. Chapters 00:00 - Intro & Workshop Overview 00:06 - Why Build Labs in Azure 00:28 - ARM"  
[YouTube Link](https://youtube.com/watch?v=WLuO1Izm9uA)  2025-11-14T18:03Z 56.4K followers, [---] engagements


"The Tao and Te of Device Code Phishing Andrew Krug 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com In this session well dive deep on the different ways device code authentication can be exploited and changes that cloud providers are making to mitigate phishing that targets this type of authentication flow. As a bonus youll also get a peek at how a new concept; trusted identity propagation helps companies build chains of trust to"  
[YouTube Link](https://youtube.com/watch?v=Wkqu81NXrI4)  2025-04-08T04:00Z 55.7K followers, [---] engagements


"Ghosts in the Graph: GoPhlare Meets BloodHound Phil Miller Ghosts in the Graph GoPhlare Meets BloodHound Detect AD Attack Paths from Breached Credentials In this talk Phil Miller demonstrates how to leverage GoPhlare an open-source tool alongside BloodHound Community Edition to uncover Active Directory attack paths using breached credentials. Learn how to automate credential correlation streamline breach data analysis and identify high-value targets without noisy password spraying. Youll discover: Why breach credential correlation matters for red teams and pentesters How GoPhlare accelerates"  
[YouTube Link](https://youtube.com/watch?v=WpuPA_rUCyA)  2025-11-21T19:37Z 56.4K followers, [---] engagements


"Hack Dumberly Not Harderer From Wild West Hackin' Fest [----] in Deadwood SD. Presenters: Derek Banks & Tim Medin Tim Medin is the founder and Principal Consultant at Red Siege a company focused to adversary emulation and penetration testing. Tim is also the SANS MSISE Program Director and a course author. Through the course of his career Tim has performed penetration tests on a wide range of organizations and technologies. He gained information security experience in a variety of industries including previous positions in control systems higher education financial services and manufacturing."  
[YouTube Link](https://youtube.com/watch?v=XcVV1A2sC18)  2018-12-04T18:48Z 55.7K followers, 13.9K engagements


"Vulnerability analysis: most likely doing it wrong John Strand & Bryson Bort San Diego [----] Attend Wild West Hackin' Fest (WWHF) in Deadwood In-Person and Virtual https://wildwesthackinfest.com/deadwood/ In this talk John and Bryson will talk about how companies fail to effectively tackle modern vulnerabilities"  
[YouTube Link](https://youtube.com/watch?v=YJoyy3uQKEs)  2022-10-27T10:00Z 56.3K followers, [----] engagements


"Keynote Roundtable Paul Vixie Lesley Carhart Marcus J Carey & John Strand [--] Hour WWHF Virtual Registration https://wildwesthackinfest.com/deadwood/ WWHF Discord https://discord.gg/wwhf 00:00:00 - PreShow Banter One Weird Thing 00:03:51 - PreShow Banter Wild West Hackin Fest Preview 00:07:18 - PreShow Banter Introducing The Roundup 00:09:30 - Feature Presentation: Keynote Roundtable Lesley Carhart Marcus J Carey Dr. Paul Vixie & John Strand Join us for a 1-hour panel discussion hosted by John Strand. It's like PreShow Banter but actually about important stuff. This years Wild West Hackin Fest"  
[YouTube Link](https://youtube.com/watch?v=YLnudA9mido)  2020-09-02T14:13Z 56.3K followers, [---] engagements


"Legally Compliant: An Incident Handlers Take on Cyber Legal in an Incident Ben Renz & Bradford Alt Legally Compliant: An Incident Handlers Take on Cyber Legal in an Incident Presenters: Ben Renz & Bradford Alt Regulations are increasing reporting timelines are tightening and cyber insurance requirements are shifting. The legal landscape around incidents is evolving just as fast as the threats themselves. While we are not lawyers we have worked closely with legal teams across multiple incident responses giving us a practical perspective on how cyber and legal worlds continue to merge. This"  
[YouTube Link](https://youtube.com/watch?v=_bWvehTfS4Y)  2026-01-20T04:58Z 56.4K followers, [---] engagements


"AI-Driven OSINT in the Hands of Cybercriminals James McQuiggan 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com Cybercriminals increasingly leverage Artificial Intelligence (AI) and Generative AI in Open Source Intelligence (OSINT) activities to enhance reconnaissance efforts targeting individuals and organizations. By utilizing AI-driven techniques attackers can efficiently gather analyze and exploit publicly available data"  
[YouTube Link](https://youtube.com/watch?v=bQi8i8GpkMw)  2025-05-06T04:00Z 56.4K followers, 21.1K engagements


"Effectively Detecting Modern Code Injection Techniques with Volatility [--] Andrew Case 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com In this talk attendees will be shown how to use Volatility [--] the latest version of the most widely used open-source memory forensics framework to detect methods that modern stealthy malware uses to inject code such as process hollowing process ghosting module stomping and their many variants that are"  
[YouTube Link](https://youtube.com/watch?v=bZSF4bcOSPc)  2025-04-03T04:00Z 55.7K followers, [---] engagements


"Mapping Your Network to Mitre ATT&CK to Visualize Threats Logging and Detection w/ Wade Wells Find out about upcoming Hackin' Casts training and in-person & virtual infosec conferences at https://www.wildwesthackinfest.com 0:00 - Hotel California 0:42 - The Mitre Attack Map 3:21 - Three Tools 3:52 - OK But Why 4:40 - So Hot Right Now 5:26 - Challenge Accepted 7:00 - Mitre ATT&CK Navigator 9:14 - DeTT&CT 18:23 - My Network's Setup Example 20:34 - Atomic Red Team 23:43 - End Credits 24:12 - Q&A Extended Edition Using open-source tools Wade will describe how to map test and display your network"  
[YouTube Link](https://youtube.com/watch?v=cmOAKLQnybk)  2020-06-22T19:04Z 55.7K followers, [----] engagements


"TRACK [--] Blue Team Summit August [--] [----] /// 📄 Register Now for the the Summit and for Training: https://cvent.me/9OVzwV /// 📄 Live Chat will take place in the Antisyphon Training Discord: https://discord.gg/antisyphon Last March we had theMost Offensive Con that Ever Offensivedonline summit event featuring talks and trainings for Red Teamers. Now were putting together a similar summit event just for the Blue Team Blue Teamers have it rough so were putting together an online summit event just for them featuring talks trainings and lots of fun and frivolity TheAntisyphon Blue Team Summit"  
[YouTube Link](https://youtube.com/watch?v=dYJzEubKaNw)  2023-08-23T20:06Z 55.7K followers, [----] engagements


"DoH DNS over HTTPS: for Attackers and Defenders - Marcus W Tonsmann https://www.wildwesthackinfest.com DoH is coming. This talk will prepare you by covering the basics of the protocol available tools for testers and techniques being leveraged by real adversaries. Proactive defensive measures will also be discussed with an eye towards the future. Marcus works as a Detection Engineer at a national healthcare company. In his role he spends a lot of time researching offensive techniques and how to detect and prevent them. Currently he holds GPEN GDAT and GNFA certifications. When not in front of"  
[YouTube Link](https://youtube.com/watch?v=fG5nQ5Bf_R8)  2020-02-25T16:14Z 55.7K followers, [----] engagements


"Encrypting Buckets for Compliance and Ransom: Using KMS to Ransomware S3 Buckets Bleon Proko 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com A successful ransomware attack is the culmination of numerous steps by a determined attacker: gaining initial access to the victims environment identifying sensitive data exfiltrating sensitive data encrypting original data etc. We can all agree that Ransomware is tough. Its hard on the target"  
[YouTube Link](https://youtube.com/watch?v=g-sHkSj1lIc)  2025-03-13T04:00Z 55.7K followers, [---] engagements


"WWHF24 [--] Y TOOL DarkWidow Soumyanil Biswas 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com Links to higher-resolution versions of the demos used in this presentation: DarkWidow V1 : Evade ( NonAdmin process) Sophos XDR : "Call For Tools" Demo https://www.youtube.com/watchv=YEe3HccdvBk DarkWidow V1: Evade (Admin privilege process) Sophos XDR: "Call For Tools" Demo https://www.youtube.com/watchv=IL-FpKS_LzY DarkWidow V2 - Synthetic"  
[YouTube Link](https://youtube.com/watch?v=jHB34lpyo7I)  2025-02-17T05:00Z 54.3K followers, [--] engagements


"The Art of Lurking: Effective C2 Channels Corey Overstreet 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com Lurking means to wait or move in a secret way so that you cannot be seen. On a red team or assumed breach operation our success hinges on how our implants communicate with us. The way these communications happen - how fast how often and how much data is exchanged - is key to realistically mimicking cyber attackers. In this"  
[YouTube Link](https://youtube.com/watch?v=jf2fLsteIKg)  2024-12-23T05:00Z 55.7K followers, [----] engagements


"ELD Device Security From Wild West Hackin' Fest [----] in Deadwood SD. Presenters: Brian Fehrman and David Fletcher David has extensive experience in a wide array of IT disciplines having worked in the industry for [--] years. His experience includes enterprise system administration application and database development network defense and cyber research and development. He is a graduate of the SANS Technology Institute MSISE program holds many certifications (including GSE) and teaches the SANS SEC504 and SEC560 courses. Brian has been interested in security from the time his family obtained"  
[YouTube Link](https://youtube.com/watch?v=ji9u8BR4jus)  2018-12-17T03:03Z 55.8K followers, [----] engagements


"OSINT Gone Wild: How I Found Drug Traffickers and NarcoTerrorists Online Schuyler Davis 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com In this presentation I'll present my thorough research on how narcotics narcoterrorism and the fentanyl epidemic are new cyber crime issues. I will show you how OSINT can be used to combat illicit narcotic transactions narcoterrorism and uncover valuable information from the dark web. 00:00 -"  
[YouTube Link](https://youtube.com/watch?v=jxTuM9B-Cns)  2025-07-29T09:01Z 56.4K followers, [---] engagements


"Attacking AI - The New Frontier Jason Haddix Attacking AI - The New Frontier Speaker: Jason Haddix Artificial intelligence is now embedded in applications networks SaaS platforms security products and decision-making systems that impact millions of users every day. While many AI security talks stay academic this keynote is built specifically for penetration testers red teamers and offensive security professionals who need real-world methods they can use immediately. In this session you will learn practical AI attack techniques including: AI jailbreaks and prompt injection attacks Bypassing"  
[YouTube Link](https://youtube.com/watch?v=m2ghNay6z5M)  2025-12-01T13:01Z 56.4K followers, [----] engagements


"PWN Free or Die Hard: The YOLO Index and Tactical Risk in Red Team Alethe Denis PWN Free or Die Hard: The YOLO Index and Tactical Risk in Red Team Presenter: Alethe Denis Physical red team operations demand constant judgment calls: when to take bold high-risk actions and when to pull back to protect the team. In this session Alethe Denis introduces the YOLO Index a practical real-world model for evaluating risk reward and operational safety during high-stakes physical penetration tests. Through field stories tactical examples and lessons drawn directly from live engagements youll learn how"  
[YouTube Link](https://youtube.com/watch?v=p4UXDzdsJCM)  2026-01-26T17:01Z 56.4K followers, [---] engagements


"Consent Alignment and Cooperation in the Internet Era - Paul Vixie https://www.wildwesthackinfest.com/ Much of the spectrum of human action and human custom translates more or less obviously from the real world ("meat space") into the Internet ("cyber space"). Yet some pieces of the human puzzle do not have an obvious place in the Internet game board and this has wrought unconsidered change to human society through its digital nervous system the Internet. Is this merely the post-Westphalia era or as many claim the post-national era Let's discuss. Dr. Paul Vixie is an internet pioneer."  
[YouTube Link](https://youtube.com/watch?v=po52EvpUeAI)  2020-02-27T16:01Z 55.8K followers, [---] engagements


"TOOL: Adam and Eve Darryl Baker 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com Adam and Eve is a Remote Access Tool socket (and HTTP) server used to interact with Active Directory Environments across the Internet via a Flask API. It is modular so custom commands (and custom scripts) can be uploaded and invoked on a client machine in real time. ///Black Hills Infosec Socials Twitter: https://twitter.com/BHinfoSecurity Mastodon:"  
[YouTube Link](https://youtube.com/watch?v=quk0EfcBVzU)  2025-02-12T05:00Z 54.3K followers, [---] engagements


"WWHF (Virtual): Backdoors & Breaches - John Strand John Strand teaches and explains how to play the Incident Response card game"  
[YouTube Link](https://youtube.com/watch?v=qyHwbVfWB2k)  2020-07-21T18:52Z 56.3K followers, [---] engagements


"The Human Vulnerability: Social Engineering in a Hyper Connected World David Boyd In a hyperconnected world the most reliable vulnerability is still the human element. Social engineering remains one of the most effective ways attackers bypass security controls and gain access to sensitive information. This talk breaks down real-world social engineering tactics including: Phishing and email-based attacks Vishing and phone-based scams Physical intrusion and tailgating Pretexting and impersonation Youll see real examples of how attackers exploit emotions like urgency trust curiosity and sympathy"  
[YouTube Link](https://youtube.com/watch?v=rNcu-0igvzE)  2025-12-08T13:01Z 56.4K followers, [---] engagements


"I'll Let Myself In: Tactics of Physical Pen Testers Join us at the annual information security conference in Deadwood SD (in-person and virtually) Wild West Hackin' Fest: https://wildwesthackinfest.com/ Wild West Hackin' Fest [----] Presented by Deviant Ollam: https://enterthecore.net/ Description: Many organizations are accustomed to being scared at the results of their network scans and digital penetration tests but seldom do these tests yield outright "surprise" across an entire enterprise. Some servers are unpatched some software is vulnerable and networks are often not properly segmented."  
[YouTube Link](https://youtube.com/watch?v=rnmcRTnTNC8)  2017-12-12T00:47Z 55.8K followers, 3M engagements


"Beyond the Malware: Dissecting Info Stealers' Infection Vectors Stolen Assets and Countermeasures Beyond the Malware: Dissecting Information Stealers' Infection Vectors Stolen Assets and Countermeasures Speakers: Olivier Bilodeau and Eric Boivin Senior Technical Platform Specialist Flare Modern information stealers have grown far beyond basic credential theft and now operate as highly advanced tools capable of capturing full digital fingerprints of their victims. In this technical deep dive the speaker presents new research into how modern stealers are built how their attack chains operate"  
[YouTube Link](https://youtube.com/watch?v=s5M7QqMaacE)  2025-12-29T16:01Z 56.4K followers, [---] engagements


"Web Application Authorization: Taming the Perfect Storm Tim Tomes Web Application Authorization: Taming the Perfect Storm Presenter: Tim Tomes Access control vulnerabilities are everywhere. Across my last [--] web application security assessments I identified [--] access control related findings which means almost every modern application has at least one serious flaw. This aligns with OWASP which ranks Broken Access Control as the number one risk facing web applications today. But why is this problem so persistent The simple answer is that access control is difficult. It is difficult to design"  
[YouTube Link](https://youtube.com/watch?v=vYeJeIuxXaM)  2026-01-17T02:01Z 56.4K followers, [---] engagements


"TOOL: DarkWidow Soumyanil Biswas 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com Links to the demos used in this presentation: DarkWidow V1 : Evade ( NonAdmin process) Sophos XDR : "Call For Tools" Demo https://www.youtube.com/watchv=YEe3HccdvBk DarkWidow V1: Evade (Admin privilege process) Sophos XDR: "Call For Tools" Demo https://www.youtube.com/watchv=IL-FpKS_LzY DarkWidow V2 - Synthetic Frame Thread Stack Spoofing Enabled"  
[YouTube Link](https://youtube.com/watch?v=xsibDZ6BpyA)  2025-02-17T07:24Z 54.3K followers, [---] engagements


"WWHF Post Breach FSOS (False Sense of Survival) Joey Marinello [--] Hour Chapters: 00:00:00 - PreShow Banter 00:29:17 - FEATURE PRESENTATION 01:08:31 - Questions & Answers Join the WWHF Community Discord: https://discord.gg/wwhf Incident Response (IR) is a complex and challenging process. By nature of the trade it is easy to get lost in the active phase of an incident and tune everything else out. Effective post-incident analysis and action are critical to our success as Incident Responders. In this talk we will take a step back and focus on the Lessons Learned phase of IR. We will deep dive"  
[YouTube Link](https://youtube.com/watch?v=-1xO8gjjJaU)  2021-12-15T19:05Z 56.3K followers, [---] engagements


"How To Learn Faster With AI: Sampling Broadly Delving Efficiently Absorbing Fully Jeff McJunkin How To Learn Faster With AI: Sampling Broadly Delving Efficiently Absorbing Fully Presenter: Jeff McJunkin Imagine learning five times more every week and watching that compound over the course of your career. This talk breaks down a practical AI driven workflow that helps you identify high value topics instantly filter out the noise and capture more information with less effort. You will learn how to pull transcripts from online media using Dev Tools and speech to text then turn that content into"  
[YouTube Link](https://youtube.com/watch?v=2kiMEgL0BN4)  2026-02-06T21:53Z 56.4K followers, [---] engagements


"Exploiting AI: A Case Study on Voice Biometric Penetration Testing Exploiting AI: A Case Study on Voice Biometric Penetration Testing Speaker: Skyler Tuter This talk presents a real-world case study examining how AI voice cloning can be used to defeat voice biometric authentication systems. Based on a recent engagement with a major financial institution the session walks through how voice-based identity verification in Interactive Voice Response systems can be manipulated using advanced AI voice synthesis techniques. The presentation breaks down the methodology used during the penetration"  
[YouTube Link](https://youtube.com/watch?v=7OzUAY5xfus)  2026-01-09T17:00Z 56.4K followers, [---] engagements


"AI Agents in Action: Protecting Against Synthetic Media and Human Risk Exploits James McQuiggan AI Agents in Action: Protecting Against Synthetic Media and Human Risk Exploits Presenter: James McQuiggan AI agents and Agentic AI are reshaping the cybersecurity landscape creating a new era where artificial intelligence can act adapt and make decisions at machine speed. This talk explores the dual nature of AI agents: powerful tools for defenders and potent weapons for attackers. Cybercriminals are already using agentic systems deepfakes and synthetic media to launch highly targeted social"  
[YouTube Link](https://youtube.com/watch?v=Gh8PyEMbRj4)  2026-02-02T22:00Z 56.4K followers, [---] engagements


"CTF 101: How to Play and Win Roman Bohuk 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com Capture the Flag (CTF) competitions offer a great way to acquire new technical skills while having fun and meeting new people. If you have never participated in a CTF event before it can feel intimidating to try. This quick talk will walk you through the different types of cybersecurity competitions and go over jeopardy-style CTFs. You will"  
[YouTube Link](https://youtube.com/watch?v=frqcUCSTE_k)  2024-12-17T05:00Z 56.3K followers, [---] engagements


""Everything is a Proxy if You Try Hard Enough"- Old RFCs New Exploits Ken Pyle "Everything is a Proxy if You Try Hard Enough" - Exploiting Old RFCs for New Types of Exploitation Speaker: Ken Pyle The core protocols of the internet are old vague and full of cracks. This session breaks down several new exploitation and exfiltration techniques that take advantage of those gaps in HTTP DNS proxies and CDNs. Well cover: HTTP Status Code Injection for data exfiltration and covert signaling Arbitrary Protocol Injection over HTTP letting attackers bypass firewalls and tunnel traffic through proxies"  
[YouTube Link](https://youtube.com/watch?v=gGDrtN3rtxY)  2026-01-12T23:41Z 56.4K followers, [----] engagements


"Thirteen Steps to Being Unbroken: Infosec for the Underfunded Tarah Wheeler Thirteen Steps to Being Unbroken: Infosec for the Underfunded Presenter: Tarah Wheeler Small and underfunded organizations are being crushed by todays cybersecurity landscape. Theyre expected to meet the same strict regulatory requirements as massive enterprises but with a fraction of the money staffing and influence. CISAs local support efforts have stalled incident responders are burning out and smaller orgs are now stuck in a storm of regulatory confusion and real-world threats. Holidays only make things worse as"  
[YouTube Link](https://youtube.com/watch?v=2AbbdYwY6PE)  2026-02-10T16:34Z 56.4K followers, [---] engagements


"How I Used AI to Crush CTF Challenges and What I Learned Along the Way Tabatha Kossman 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com Participating in Capture The Flag (CTF) competitions is always a thrilling experience but this time I had a secret weapon up my sleeve: AI. From cracking codes to navigating complex cyber challenges AI became my go-to sidekick. Here's how I teamed up with AI to tackle CTF puzzles and what I learned"  
[YouTube Link](https://youtube.com/watch?v=QVN97YMHWhk)  2025-07-15T07:30Z 56.4K followers, [---] engagements


"The Terminator Effect: AI's Role in Fighting Cyber Threats James McQuiggan WWHF [----] 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ To effectively mitigate the risks associated with AI-based cybersecurity systems it is crucial to implement a range of risk mitigation strategies such as developing robust training datasets multi-layered security architectures industry-standard practices into accountability and transparency and continuously monitoring and updating AI models. Additionally organizations must"  
[YouTube Link](https://youtube.com/watch?v=xuo_WIVGdAc)  2024-05-14T11:00Z 56.4K followers, [---] engagements


"Tool Demo BBOT The Techromancer WWHF Deadwood [----] Join us at the annual information security conference in Deadwood SD (in-person and virtually) Wild West Hackin' Fest: https://wildwesthackinfest.com/ BBOT (Bighuge BLS OSINT Tool) is an OSINT framework written in Python. It uses a recursive consumer-event system similar to Spiderfoot but with several improvements including a more powerful threading engine and a versatile tagging system that automatically labels events according to whether theyre in scope resolved/unresolved wildcard etc. It can be used both as a Python library and as a CLI"  
[YouTube Link](https://youtube.com/watch?v=Gni_JpO69Sk)  2023-07-12T11:00Z 56.3K followers, [---] engagements


"Giving Swords to Our Future AI Overlords Matt Lee and Eric Stevens Giving Swords to Our Future AI Overlords Presenters: Matt Lee and Eric Stevens Artificial intelligence is no longer limited to chatbots and copilots. With advances in Model Context Protocols and agentic systems AI can now reason take action and interact across interconnected tools APIs and automated workflows. When misused a single prompt injection can cascade across multiple agents and decision-making systems. In this talk you will see how something as simple as a malicious LinkedIn bio can be used to manipulate an AI-powered"  
[YouTube Link](https://youtube.com/watch?v=yTSAjNZgrcU)  2026-01-30T21:12Z 56.4K followers, [---] engagements


"WWHF AppSec Triage: Finding Needles in the Application Haystack Kevin Johnson & Nathan Sweaney 00:00:00 - PreShow Banter [--] Pounds of Wig Hair 00:32:10 - FEATURE PRESENTATION 01:28:19 - Questions and Closing Join the WWHF Community Discord: https://discord.gg/wwhf In this presentation Nathan Sweaney and Kevin Johnson of Secure Ideas will discuss how penetration testers and security professionals can improve the efficiency of their testing. Working with real applications Nathan and Kevin will show attendees how to determine what parts of the application are important to prioritize during"  
[YouTube Link](https://youtube.com/watch?v=-ZrqGaEJ740)  2022-01-19T19:06Z 55.7K followers, [----] engagements


"Breaking NTLMv1 For Once And For All (w/Bonus Kerberoasting talk) Jeff McJunkin 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ With network authentication protocols the most important thing is to not yell the secret in plain text. It turns out that half of the on-premise Windows challenge/response protocols (LM Challenge/Response and NTLMv1) fail that basic test for about $30 in cloud costs with potentially catastrophic results. Come to this Tool Shed talk demo and tool release to see just how broken it is and"  
[YouTube Link](https://youtube.com/watch?v=1R2SBIR4mTk)  2025-01-13T11:03Z 53.7K followers, [---] engagements


"WWHF Making MITRE ATT&CK Actionable Josh Rickard [--] Hour Join the WWHF Community Discord: https://discord.gg/wwhf 00:00:00 - PreShow Banter 00:21:42 - FEATURE PRESENTATION 01:17:08 - Questions and Closing MITRE ATT&CK provides security teams with a framework to assist with detecting attacks and techniques used by malicious actors. Currently using MITRE ATT&CK generally entails an intensely manual process since MITRE ATT&CK is strictly text-based. In order to build detections or create defense strategies using ATT&CK security practitioners must have deep technical knowledge of attack phases"  
[YouTube Link](https://youtube.com/watch?v=1WBw6ZXiFHQ)  2022-01-12T19:07Z 54.3K followers, [----] engagements


"Threat Hunting with a Chorus of Strings Jonathan Ham 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ Three common real-world scenarios will be presented in which analysis of network-based evidence can be sufficiently done with nothing more sophisticated than captured PCAP data and 'strings'. ///Black Hills Infosec Socials Twitter: https://twitter.com/BHinfoSecurity Mastodon: https://infosec.exchange/@blackhillsinfosec LinkedIn: https://www.linkedin.com/company/antisyphon-training Discord:"  
[YouTube Link](https://youtube.com/watch?v=3B8cEQ52R6o)  2025-01-07T05:00Z 53.7K followers, [---] engagements


"Tool Demo Sirius Scan & Nmap Scripting Engine Matthew Toussain WWHF Deadwood [----] Join us at the annual information security conference in Deadwood SD (in-person and virtually) Wild West Hackin' Fest: https://wildwesthackinfest.com/ Sirius is the first truly open-source general purpose vulnerability scanner. Today the information security community remains the best and most expedient source for cybersecurity intelligence. The community itself regularly outperforms commercial vendors. This is the primary advantage Sirius Scan intends to leverage. The framework is built around four general"  
[YouTube Link](https://youtube.com/watch?v=3lr1gt2gHYw)  2023-09-08T11:10Z 52.5K followers, [---] engagements


"I Want You to Hack AWS: Cloud Penetration Testing for Traditional Hackers Nick Frichette 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com I Want You to Hack AWS: Cloud Penetration Testing for Traditional Hackers Nick Frichette As the world's largest cloud platform Amazon Web Services (AWS) powers millions of applications and deployments making it a common target for offensive security professionals. The complexity of AWS introduces"  
[YouTube Link](https://youtube.com/watch?v=47cjTYtd9yI)  2025-03-06T05:00Z 55.6K followers, [----] engagements


"Gravwell CE for Logs: The Truth Is In There Corey Thuen 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com Whether you're experimenting in your homelab or building "Management Pacification Dashboards" for work logs are crucial. Join Gravwell founder Corey Thuen as he uses the Gravwell CE (free 15gb/day for personal OR commercial use) to teach basic log correlation plus a bit of advanced techniques to show the "art of the possible"."  
[YouTube Link](https://youtube.com/watch?v=4NDGzUk2krs)  2025-01-09T05:00Z 54.2K followers, [---] engagements


"PowerPug a Tool to Help People Use a Single Group Jake Hildreth 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com PowerPUG is a tiny tool built to help Active Directory (AD) admins operators and defenders smoothly transition their most sensitive users (Domain Admins etc.) into the AD Protected Users Group (PUG) with minimal complications. The PUG provides its member multiple non-configurable protections that stop common attacks in"  
[YouTube Link](https://youtube.com/watch?v=5_E_luN1pWk)  2025-01-14T05:00Z 54.2K followers, [---] engagements


"Six Things DevOps Wants from InfoSec Naomi Buckwalter WHF [----] 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ Why does it seem that DevOps and Security are always at odds with each other Why does Security have such a bad reputation among developers In this talk "Six Things DevOps Wants from InfoSec" you'll learn that developers actually WANT to work with Security - they care about writing secure code But we as security professionals need to understand that developers don't want another "Big Brother" telling"  
[YouTube Link](https://youtube.com/watch?v=69ppifzLvrM)  2024-05-27T11:00Z 55.6K followers, [---] engagements


"The Ethics of Digital Surveillance Kathryn Carnell Deadwood [----] Join us at the annual information security conference in Deadwood SD (in-person and virtually) Wild West Hackin' Fest: https://wildwesthackinfest.com/ The Ethics of Digital Surveillance: Making Sense of Our Liberties in a Connected Age With more people transitioning to work-from-home practical technological integrations have reached new heights. This is great More tech in our daily lives means new problems new perspectives new solutions and more creativity: widening the field to include all kind of people and situations is a"  
[YouTube Link](https://youtube.com/watch?v=6Jivs-skCLo)  2023-08-07T11:00Z 54.3K followers, [---] engagements


"Hunting for Windows Features and How To Use Them Chris Spehn WWHF San Diego [----] Attend Wild West Hackin' Fest (WWHF) in Deadwood In-Person and Virtual https://wildwesthackinfest.com/deadwood/ Offensive security professionals have been using Frida for analyzing iOS and Android mobile applications. However there has been minimal usage of Frida for desktop operating systems such as Windows. Frida is described by the author as a Dynamic instrumentation toolkit for developers reverse-engineers and security researchers. From a security research and adversarial simulation perspective Frida can be"  
[YouTube Link](https://youtube.com/watch?v=6vk8ch_7NKk)  2023-10-16T04:16Z 52.5K followers, [---] engagements


"Hacking Through the Weeds Justin Watkins 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com Let's take a deep dive into Nmap and other open source reconnaissance tools These are tools that everyone has access to but they only use about 5% of their capabilities. I have worked with specific open source tools and have explored them thoroughly to learn some of their lesser-known features and I'll showcase them in this talk. 00:00 -"  
[YouTube Link](https://youtube.com/watch?v=7bc1dttItdE)  2025-05-27T05:00Z 56.4K followers, [---] engagements


"I Didn't Waste My Life Gaming I Learned Cyber Security Jenna Lawrence Samantha Peters 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ This presentation offers an exploration into the origins innovations and implications of hacking in the gaming industry. In a virtual world where pixels and code meet human creativity video games have taken off in popularity within the last [--] years. Beginning with a look at the rudimentary hacks of early classics we will explore how the earliest video game hacks shaped the"  
[YouTube Link](https://youtube.com/watch?v=7mW8VVdS5YU)  2024-12-31T05:00Z 53.7K followers, [---] engagements


"Playing Tag With Modern-Day AV and EDR: A Guide to Evading. Aryan Jogia & Chetanya Kunndra 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ From the perspective of a malware developer developing malware is considerably easier than evading it. In this talk we will discuss various techniques employed by malware developers to circumvent detection measure implemented by modern day AVs and EDRs. This talk will solely focus on the Windows ecosystem. We will discuss the nitty gritty of the Windows OS followed by"  
[YouTube Link](https://youtube.com/watch?v=86K0dVqYMqA)  2025-01-08T05:00Z 53.7K followers, [---] engagements


"Dan DeCloss Purple Teaming With Runbooks for Plextrac WWHF Deadwood [----] Join the WWHF Community Discord: https://discord.gg/wwhf https://plextrac.com Everyone knows PlexTrac as The Purple Teaming Platform and our support for purple engagements has been taken to the next level with the creation of Runbooks for PlexTrac. Tune in to Purple Teaming with Runbooks for an engaging demo of the new module in action. See how Runbooks helps you rapidly plan Purple Team engagements through intuitive selection of Tactics Techniques and Procedures. Witness the execution of that plan from both the red and"  
[YouTube Link](https://youtube.com/watch?v=8kuutYNz0I8)  2021-02-11T14:49Z 53.4K followers, [---] engagements


"What I Learned From Building A Tabletop Security Exercise Dwayne McDaniel 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com At DEFCON [--] my team taught over [---] people the limitations of manual code review to solve secrets sprawl. We did not use new tech we did not use computers or anything that needed electricity. We used paper cards. What we learned along the way was eye opening and changed the way I think about security. This talk"  
[YouTube Link](https://youtube.com/watch?v=ALzMmn8s6aw)  2025-05-13T08:00Z 56.4K followers, [---] engagements


"AD (Addie) and DNS (Dennis): A Match Made in Heck Jim Sykora & Jake Hildreth WWHF [----] 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ Since the mid-80s the Domain Name System (DNS) has been instrumental in improving the useability of computer networks and the Internet. In [----] Microsoft released Active Directory (AD) which combined DNS with a Lightweight Directory Access Protocol (LDAP) database and Kerberos authentication to create a unified directory service platform. Since ADs release the fates of AD and"  
[YouTube Link](https://youtube.com/watch?v=BNoUGNNbnR0)  2024-05-12T11:00Z 55.2K followers, [---] engagements


"Hackin' Cast: How to Sell Security to C Levels w Chris Brenton Find out about upcoming Hackin' Casts training and in-person & virtual infosec conferences at https://www.wildwesthackinfest.com 0:00 - Covid Style Haircuts & Other Courses 1:07 - Which C-Level Pitch is Best Pitch 3:59 - Security Leader Requirements 5:58 - Security Management Vs Tech Roles 9:11 - Step [--] Asses Unique Business Need(s) 13:55 - Talk to the Teams 15:56 - Collect Supporting Data 17:21 - Consider Question Tone 19:02 - Roles of Compliance 26:17 - Compliance Vs Security 29:40 - Layered Defense 32:55 - Collect & List"  
[YouTube Link](https://youtube.com/watch?v=BWpulINkzJ8)  2020-06-04T21:18Z 55.5K followers, [----] engagements


"2024: A Cyborg Odyssey Len Noe 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com Transhumans individuals enhanced with technological augmentations have moved beyond science fiction into reality. Historically viewed through medical or cyborg lenses recent advancements like Brain-Computer Interfaces (BCIs) and SMART technologies are blurring the lines between physical and biological entities. This shift is significantly impacting"  
[YouTube Link](https://youtube.com/watch?v=BX3dfkrRf_E)  2025-06-17T04:45Z 56.4K followers, [---] engagements


"Will It Run Fooling EDRs With Command Lines Using Empirical Data Wietze Beukema 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com There is a wealth of system-native programs particularly on Windows operating systems that happily accept unexpected command-line transformations such as character substitutions deletions or insertions. An implication of this is that command-line-based detections can be bypassed with minimal effort and"  
[YouTube Link](https://youtube.com/watch?v=CNeUwrapJiQ)  2025-03-04T05:00Z 54.3K followers, [---] engagements


"Cybersecurity for the "Have-Nots" of the World Jake Williams WWHF [----] 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ The cybersecurity landscape can broadly be broken down into the haves vs the have-nots. The security recommendations offered by so many of just deploy X fall on deaf ears to the *vast majority* of organizations who fall into the latter category. Until the security gap for the have-nots of the world is closed were doomed to continue failing at security overall. Cybersecurity expert Jake Williams"  
[YouTube Link](https://youtube.com/watch?v=Cuw9ks7ohDQ)  2024-05-31T11:00Z 54.1K followers, [---] engagements


"Demystifying Deep Fakes Anmol Agarwal 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com Artificial Intelligence is being used to create deep fakes to manipulate public opinion. I'll show you how AI is used to create deep fakes and discuss current strategies that you can use to spot them including tools used for deep fake detection. After the talk you will have a better understanding of deep fake technology and be armed with some"  
[YouTube Link](https://youtube.com/watch?v=DWEvLVOvSl8)  2025-02-05T05:00Z 54.2K followers, [---] engagements


"Identifying New Attack Paths via Password Analysis Esteban Rodriguez 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com In this talk I will cover how you can enrich BloodHound with different fields and edges to expose previously unidentified attack paths. By combining multiple open source tools it is possible to track password sharing relationships across separate accounts and even across different Active Directory forests. 00:00 -"  
[YouTube Link](https://youtube.com/watch?v=DqCLMuaXhQg)  2025-04-10T04:00Z 54.5K followers, [---] engagements


"From Prototype to Production: Engineering Physical Tools for Offensive Security Travis Weathers 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com Whether youre designing a long-range skimmer an embedded implant or a portable badge cloning rig understanding the full lifecyclefrom design to deploymentis critical. In this talk I will cover the end-to-end development of physical offensive security tooling covering: PCB Design &"  
[YouTube Link](https://youtube.com/watch?v=E3AnNssW_t8)  2025-04-17T04:00Z 54.5K followers, [---] engagements


"Detection Engineering.My Educational Failures That Proved to be Useful After All Olaf Hartog 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com Failure can be a phenomenal teacher in the time-consuming and deeply technical field of Detection Engineering. In this talk Ill share my process for researching and creating detections. This is not always successful. In fact when researching some harder-to-detect techniques we sometimes end up"  
[YouTube Link](https://youtube.com/watch?v=EhpJc4W9-fE)  2025-06-03T04:00Z 56.4K followers, [---] engagements


"That's a Deal and That's a Legally Binding Offer: The Dark Side of Al Brian Mead TJ Toterhi 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com Let's explore the darker side of AI In this talk we'll dissect various attack vectors such as prompt injection (malicious input designed to manipulate AI output) data extraction (siphoning off sensitive information embedded within AI models) and evasion attacks (a nebulous category that"  
[YouTube Link](https://youtube.com/watch?v=Etw4_6rOnvo)  2025-01-28T05:00Z 54.2K followers, [---] engagements


"Dawn of Enlightenment: The Golden Age of Cybersecurity Knowledge and Collaboration Gerald Auger 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com ///Black Hills Infosec Socials Twitter: https://twitter.com/BHinfoSecurity Mastodon: https://infosec.exchange/@blackhillsinfosec LinkedIn: https://www.linkedin.com/company/antisyphon-training Discord: https://discord.gg/ffzdt3WUDe ///Black Hills Infosec Shirts & Hoodies"  
[YouTube Link](https://youtube.com/watch?v=G6rONAQCyUk)  2024-12-16T15:30Z 54.1K followers, [---] engagements


"Getting Started in Entra ID Security Jonathan Rogers 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com ///Black Hills Infosec Socials Twitter: https://twitter.com/BHinfoSecurity Mastodon: https://infosec.exchange/@blackhillsinfosec LinkedIn: https://www.linkedin.com/company/antisyphon-training Discord: https://discord.gg/ffzdt3WUDe ///Black Hills Infosec Shirts & Hoodies"  
[YouTube Link](https://youtube.com/watch?v=H7_DDCF0GWc)  2025-02-11T05:00Z 54.2K followers, [---] engagements


"GraphRunner Beau Bullock Steve Borosh WWHF [----] 🔗 Join us in-person and virtually at our Wild West Hackin' Fest Information security conferences https://wildwesthackinfest.com/ During this presentation I will provide an in-depth exploration of GraphRunner's features showcasing its role in elevating post-exploitation strategies. Designed to empower both red team professionals and defenders this toolset equips users with a means to navigate the intricate Graph API at the heart of M365 and manipulate it for offensive purposes. GraphRunner offers functionalities that aid in lateral movement data"  
[YouTube Link](https://youtube.com/watch?v=IDZzqgniUuw)  2024-04-25T13:00Z 55.6K followers, [---] engagements


"The Invisibility Cloak: Obfuscate C# Tools to Evade Signature Based Detection Brett Hawkins Attend Wild West Hackin' Fest (WWHF) in Deadwood In-Person and Virtual https://wildwesthackinfest.com/deadwood/ Attackers and offensive security professionals have been migrating from PowerShell to C# for post-exploitation toolkits due to advances in security product configurations and features. An example of one of these improvements has been AMSI for .NET which allows the scanning of .NET assemblies in memory. Currently the majority of detections for these C# tools rely on static signatures rather"  
[YouTube Link](https://youtube.com/watch?v=JVT4yapkmVI)  2022-10-26T10:00Z 55.7K followers, [----] engagements


"Stephen Spence Converting Blue Team into Advanced Host-Based Alerting WWHF Deadwood [----] Join the WWHF Community Discord: https://discord.gg/wwhf 0:00:00 - One More Thing About Cats 0:04:08 - FEATURE PRESENTATION: Converting Blue Team Expertise of Customer Networks into Advanced Host-Based Alerting 0:08:23 - Overview 0:10:36 - Setup For Success 0:13:52 - Does Your Sysmon Config Look Like This 0:16:24 - Avoid Self-Inflicted Wounds 0:19:56 - Avoid Fear-Based Paralysis 0:23:04 - Sigma Signatures 0:28:38 - Same Page Same Page 0:32:12 - Which Question is Best Questions 0:35:51 - Renamed Processes"  
[YouTube Link](https://youtube.com/watch?v=Jlf-CMFYNtw)  2021-02-11T14:49Z 55.5K followers, [---] engagements


"Never Say Anything: NSA Hacking for Defense at Scale Tony Sager 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com Tony gives a historical and personal perspective on how the field of analysis at the NSA evolved from a focus on mathematics and cryptography through systems and software and then to live operational systems. Whats it like to spend a career as a cyberdefender for the DoD and the nation but homed inside of an intelligence"  
[YouTube Link](https://youtube.com/watch?v=KFUcJ_TwrkQ)  2025-01-16T05:00Z 55.4K followers, [----] engagements


"Baselining for Bad Things with Surveyor Tre Wilkins 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com Surveyor is a free and open source tool for quickly baselining your environments to help identify abnormal activity. You can use it to query supported endpoint detection and response (EDR) products in search of potentially dangerous software that shouldnt be in your environment. In this session well look at remote monitoring and"  
[YouTube Link](https://youtube.com/watch?v=KQ5vChU1MqU)  2025-05-08T04:00Z 56.4K followers, [---] engagements


"JWT. Misuse. & Abuse Tim Tomes 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com JWTs are an incredibly flexible tool that make life easier for developers because they are standardized widely supported and include important security features by default. However like any powerful tool JWTs can be dangerous when used incorrectly or for unintended purposes. In this talk I aim to shine a light on common JWT misuse and abuse. I'll start"  
[YouTube Link](https://youtube.com/watch?v=L4W7CmeNtAI)  2024-12-26T05:00Z 54.3K followers, [---] engagements


"EDR Internals for macOS and Linux Kyle Avery 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com Endpoint Detection and Response (EDR) agents typically comprise multiple sensory components that collect information from various telemetry sources the operating system provides. Many public blogs and conference talks have covered Windows telemetry sources such as kernel callbacks and ETW but only some mention macOS and Linux equivalents."  
[YouTube Link](https://youtube.com/watch?v=Ml5jkW7d-UM)  2024-12-18T05:00Z 54.5K followers, [---] engagements


"Tool/Game: KC7 Jibby Saetang 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com KC7 game website: https://kc7cyber.com/go/wwhf KC7 is a free cybersecurity game that simulates end-to-end intrusions against a fictional company using data modeled on real-world threat actors. Players ranging from students to professionals use Kusto Query Language (KQL) within the Azure Data Explorer (ADX) to analyze complex datasets including Web Email"  
[YouTube Link](https://youtube.com/watch?v=N7JZS1Pshuk)  2025-02-18T05:00Z 54.3K followers, [---] engagements


"Epic Fails and Heist Tales: Red Teaming Toward Truly Tested Security Alethe Denis 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com Alethe takes audiences on a riveting journey into the realm of red teaming through captivating narratives and insightful analysis. Delving into real-life experiences the keynote unveils the complexities and nuances of red team engagements showcasing both the spectacular failures and successful heists"  
[YouTube Link](https://youtube.com/watch?v=NLezMfNXSmw)  2025-01-27T05:37Z 54.2K followers, [---] engagements


"Nadean Tanner Secret Thoughts of a Successful Hacker WWHF Deadwood [----] Join the WWHF Community Discord: https://discord.gg/wwhf 00:00 - Nadean Is Lurking 03:53 - FEATURE PRESENTATION: Secret Thoughts of a Successful Hacker 10:57 - Impostor Syndrome 17:55 - Types of Imposters 20:19 - Who Am I 25:59 - Pluralistic Ignorance 28:33 - Four Stages of Competence 31:52 - Managing Self-doubt 44:01 - Wrapping Things Up"  
[YouTube Link](https://youtube.com/watch?v=O2DwX9aPr3Q)  2021-02-11T14:49Z 54.5K followers, [---] engagements


"Extracting Data from Slack: Hackers Will You Should From Wild West Hackin' Fest [----] in Deadwood SD. Presenters: Carrie Roberts and Tony Habeger Is your Slack workspace full of sensitive data Wouldn't you like to know the details As an experienced red-teamer the answer to these two questions are 'yes' and 'oh baby yes'. I will be releasing and demonstrating a PowerShell script that will extract all documents and files that an authorized user has access to. It can also extract all user profiles. As an attacker I can use the profiles to extract user names email addresses phone numbers and job"  
[YouTube Link](https://youtube.com/watch?v=Q73kk34Otls)  2018-11-29T20:07Z 55.6K followers, [----] engagements


"Digital Doppelgngers: The Dual Faces of Deepfake Technology James McQuiggan 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ In society evolving artificial intelligence leverages cutting-edge technology to create synthetic text audio and video clips at a concerning rate. These emerging innovations pose significant threats to organizations' cybersecurity protocols and defenses. This presentation examines the multifaceted nature of deepfakes offering insights into their creation and detection what organizations"  
[YouTube Link](https://youtube.com/watch?v=RjcaJU-iiHI)  2024-12-27T05:00Z 53.7K followers, [---] engagements


"WWHF Breaking and Entering Tyler Robinson Red Team Roundup RECORDED AUGUST [--] [----] The Red Team Roundup Learn more about the speakers here: https://wildwesthackinfest.com/the-roundup-red-team/ Join the WWHF Community Discord https://discord.gg/wwhf Tyler Robinson As Managing Director of Offensive Security & Research at Trimarc Tyler leads a team of high-performance security professionals within the offensive security field by simulating sophisticated adversaries & creating scalable offensive security platforms using the latest techniques as seen in the wild. Tyler serves as a highly technical"  
[YouTube Link](https://youtube.com/watch?v=V0HsMomlHvA)  2022-03-14T07:00Z 55.6K followers, [----] engagements


"Jargon & Jigsaw: Shellcode Obfuscation Mike Saunders 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com In this talk Mike will cover two highly effective techniques for obfuscating shellcode in your payloads. Jargon is a shellcode obfuscation method that substitutes dictionary words in place of shellcode bytes. This provides two benefits - your loader doesn't have any shellcode and the use of dictionary words reduces the entropy of"  
[YouTube Link](https://youtube.com/watch?v=VhfFQfc0DSM)  2025-08-05T04:00Z 56.4K followers, [---] engagements


"Your Favorite Coffee Shop.How Threat Actors Use Victims to Create More Victims James Bierly 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com 99% of US businesses have [--] users or fewer. In this talk we will discuss how to engage and protect the small businesses that form the backbone of our communities. We'll cover how to convey the risks small business insecurity poses to larger businesses downstream from them in the supply chain"  
[YouTube Link](https://youtube.com/watch?v=ViyRShl8KC8)  2025-02-04T05:00Z 54.2K followers, [---] engagements


"Solving Dumb Hacker Problems With Nix Ryan Basden 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com Between Python version mismatches virtual environments and containers getting even popular software to work on every operating system and setup is more cumbersome than it should be. Hackers should be fighting vulnerabilities not their own tooling. Nix has solved this for me and I need to share it with people. It takes "it works on my"  
[YouTube Link](https://youtube.com/watch?v=VrtpOD2XbH0)  2025-07-22T07:15Z 56.4K followers, [---] engagements


"All on Red: Shifting the Betting Odds to Defense David Kennedy 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com You often hear the phrase "it only takes an adversary one main find to compromise an entire organization." The odds don't seem to be in our favor when it comes to defense. This talk will dive into effective methods to flip the odds into your own favor and things you can do quickly that doesn't take a three year strategic"  
[YouTube Link](https://youtube.com/watch?v=W-cmCFdQS5k)  2025-01-22T05:00Z 54.1K followers, [---] engagements


"Offense for Defense Tim Medin 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ This presentation focuses on the offensive tools that defenders should running to identify high-impact security issues on their network. Explore the proactive advantages of offensive security tools that can be quickly and easily be run by defenders to better protect and defend their network. Attendees will learn how offensive security tools enable defenders to stay ahead of potential adversaries enhancing network resilience and"  
[YouTube Link](https://youtube.com/watch?v=W9ekBMttB98)  2024-12-20T05:00Z 53.5K followers, [---] engagements


"LLMs for Vuln Discovery: Finding 0days With a Click of a Button Marcello Salvati Dan McInerney 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com Large Language Models (LLMs) have opened up the floodgates for a whole new generation of security tooling. One of the most obvious applications is automatic discovery of vulnerabilities which so far has had extremely mixed results. Can LLMs get good at vulnerability discovery In this talk we"  
[YouTube Link](https://youtube.com/watch?v=WnpIuZfTHpo)  2025-03-27T04:00Z 54.4K followers, [---] engagements


"Powering Up Linux-Unleashing PowerShell for Penetration Testing and Red Teaming - Tj Null 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com This talk explores the dynamic potential of PowerShell for Linux in the realms of penetration testing and red teaming. Delving into its capabilities attendees will discover how this versatile tool enhances offensive security strategies. Intended for cybersecurity professionals and enthusiasts"  
[YouTube Link](https://youtube.com/watch?v=XeqrwgXcWW8)  2025-04-15T04:00Z 54.5K followers, [---] engagements


"Operational Technology (OT) - Let's Git OT Cyber-Physical Secured- Matthew Luallen - [--] Hour Join the WWHF Community Discord: https://discord.gg/wwhf 0:00:00 - PreShow Banter The Welcome Matt 0:08:40 - FEATURE PRESENTATION: Lets Git OT Cyber-Physical Secured 0:18:13 - What Could Go Wrong 0:20:15 - Talk slowly. Think Quickly. 0:21:23 - Build the Box 0:25:56 - Active Host Discovery 0:32:02 - Passive Host Discovery 0:38:28 - VirtualPlant 0:57:50 - The Wizards Folder - Other Labs 1:01:16 - Balderdash Saddle up we are going to get "virtually hands-on" with the CybatiWorks platform to learn how"  
[YouTube Link](https://youtube.com/watch?v=Yc_fnsha1H4)  2021-03-19T12:06Z 54.6K followers, [---] engagements


"The Hacker's Apprentice - Mark Baggett https://www.wildwesthackinfest.com/ I turned my house into an escape room In this talk Ill show you how I used IoT devices and open source software to turn my house into an escape room. Topics will include HomeAssistant the HA AppDaemon Alexa Python coding and puzzles. Mark Baggett is the owner of Indepth Defense an independent consulting firm that offers incident response and penetration testing services. Mark has more than [--] years of commercial and government experience ranging from Software Developer to Chief Information Security Officer. Mark is a"  
[YouTube Link](https://youtube.com/watch?v=ZS-YWKH_hT4)  2019-12-20T15:45Z 55.5K followers, [----] engagements


"Breaking Free From the Chains of Fate: Bypassing AWSCompromisedKeyQuarantineV2 Bleon Proko 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com Amazon's AWSCompromisedKeyQuarantineV2 policy is not the panacea it might seem. Join us on an adventure of all the myriad ways to work around this policy when you discover leaked keys in the wild. This presentation is a fun multimedia exploration of all the shortcomings of the"  
[YouTube Link](https://youtube.com/watch?v=aYHf6aycxNg)  2025-04-24T04:00Z 56.4K followers, [---] engagements


"WWHF 3D Printing From the Ground Up Bill Stearns [--] Hour Chat in Discord: https://discord.gg/wwhf 00:00:00 PreShow Banter 00:30:48 FEATURE PRESENTATION 01:20:18 Q & A We're calling anyone that hasn't used a 3D printer before; now's your chance to see what these are how they work and what you get from them You don't need any background or experience just an interest in learning about new technologies. Bill Stearns from Active Countermeasures will be leading the talk and questions are welcome Join the WWHF Discord Community to participate in discussion with the presenter and attendees:"  
[YouTube Link](https://youtube.com/watch?v=b6N_OoWrPfk)  2021-11-10T19:10Z 55.3K followers, [---] engagements


"Did You Knock Out Our noun  Jack Verrier 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com How many times have you heard "Are you doing anything right now that could verb our noun" The answer is sometimes "Yes" always "Maybe" and hopefully "No". I set up a range and hammered common web servers to figure out the impact that pentesting tools have on typical client systems. I tried to answer questions like "Does Nuclei cause performance"  
[YouTube Link](https://youtube.com/watch?v=btiTd3JoznI)  2025-07-01T05:30Z 56.4K followers, [---] engagements


"Abusing API Security Charles Shirer 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com Charles Shirer (the BSD Bandit) will show you how to look at API security in a different way through multiple API attack techniques with a particular focus on GraphQL and gRPC. Charles has over [--] years of IT experience with the last [--] years in Information Security including systems Administration penetration testing threat hunting and security"  
[YouTube Link](https://youtube.com/watch?v=d1xDdJ-mPm8)  2025-01-23T05:00Z 55.5K followers, [----] engagements


"Six Sick Systems One Hour: Investigate with Host Forensics Six Sick Systems One Hour: Investigate With Host Forensics Alissa Torres at Wild West Hackin' Fest [----] in Deadwood SD Follow Wild West Hackin' Fest on Twitter here: https://twitter.com/wwhackinfest Website & Info: https://www.wildwesthackinfest.com/"  
[YouTube Link](https://youtube.com/watch?v=dq-hSl-uVbw)  2018-11-05T21:57Z 54.5K followers, [----] engagements


"Unlocking Physical Security: 3D Printing Your Way Inside Noah Pack 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ Every hacker wants more cool stuff and many of us have a 3D printer gathering dust in the corner. In my presentation "Unlocking Physical Security: 3D Printing Your Way Inside" I will inspire you to buy more filament and start preheating your print beds to extrude a collection of valuable physical security tools (both offensive and defensive). This talk goes over a handful of original (never before"  
[YouTube Link](https://youtube.com/watch?v=e1bdjOtjzQE)  2025-01-10T05:00Z 53.7K followers, [---] engagements


"TOOL: RITA Chris Brenton 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com In this talk I'll show you how to get the open source threat hunting tool RITA up and running and how to use it to find potential command and control channels on your network. A new version of RITA has just dropped and it has been completely updated. The backend is 10X faster it has an ASCII graphical interface based on Charm Bracelet BubbleTea and the"  
[YouTube Link](https://youtube.com/watch?v=eyoOllfnWT4)  2025-02-10T05:00Z 54.2K followers, [---] engagements


"Vunerability-centric Pentesting Matthew Toussain 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com In this talk we will fluidly interact with and exploit network vulnerabilities by leveraging several open-source tools and tying their interactions with vulnerability intelligence. Interacting with vulnerabilities is a core security practice. For a pentester vulnerabilities should form a map to making risk actual but our tools in this"  
[YouTube Link](https://youtube.com/watch?v=gNdD1R_bUCU)  2025-01-30T05:00Z 54.2K followers, [---] engagements


"The Hackers Guide to Risk Management: Evolve Into a Golden Unicorn Jaclyn (Jax) Scott 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com In this session well decode the mystery of risk management and why it matters to hackers and red teamers. Youll learn how the vulnerability tools you already uselike Snyk and Qualysfit into risk management plans and how to level up your skills to communicate risks effectively to leaders and"  
[YouTube Link](https://youtube.com/watch?v=h509jPfm1QA)  2025-03-25T04:00Z 54.4K followers, [---] engagements


"Real World AI Risks And Mitigating Them Jake Williams 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com 00:00 - Welcome intro 00:19 - Agenda 02:44 - Not all AI is generative AI 03:40 - SAAS-based EDRs are training on your data 04:55 - Non-determinism makes assessing Gen-AI difficult 05:34 - Non-determinism definition 07:37 - Deterministic AI risks 08:51 - Googles blog post on Willow and the multiverse 10:18 - Training on your data"  
[YouTube Link](https://youtube.com/watch?v=hT1dNsoK3YA)  2025-05-20T04:00Z 56.4K followers, [----] engagements


"Hackventure: Having Fun With IDOR Attacks Joshua Wright 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com Insecure Direct Object Reference (IDOR) attacks have been a common vulnerability for decades. It still shows up in lots of big websites including Dell Reddit US DoD GitLab Shopify and more. Join Josh Wright for a hackventure in spotting and exploiting this bug as a fun way to get started with bug hunting. Also #AI. ///Black Hills"  
[YouTube Link](https://youtube.com/watch?v=hzrhtHrhwno)  2025-03-11T04:00Z 54.3K followers, [---] engagements


"Hack the Boardroom Mastering the Art of Communicating Cyber Risks to Secure Funding Jax Scott 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com In todays relentless cybersecurity battlefield technical teams often find themselves lost in translation when conveying complex risks and vulnerabilities to senior executives and board members. Breaking through this communication barrier is essential for securing the support and funding"  
[YouTube Link](https://youtube.com/watch?v=jNE_UwPvHh4)  2025-01-20T05:00Z 54.2K followers, [---] engagements


"Mick Douglas - Sebastian Boutin - Thats Fantastic - WWHF January Roundup Join the WWHF Community Discord: https://discord.gg/wwhf 00:00 - PreShow Banter The Mick Douglas & Mick Douglas Firm 02:06 - FEATURE PRESENTATION: Project Fantastic 02:56 - Demo Prep 06:35 - WHOAMI 08:11 - Table of Contents 13:32 - Fantastic Goals 14:26 - DEMO : Modularity 21:00 - Modular and Easy 21:44 - We Need Your Help 27:11 - Editor 30:47 - Cant Code Give us Feedback Sebastian Boutin Blomfield is a game and web developer who loves to learn about different technologies and try out new ideas. Outside of work he plays"  
[YouTube Link](https://youtube.com/watch?v=jV9aeKXJ9HE)  2021-04-15T13:54Z 53.3K followers, [---] engagements


"Dev Offensive Sec Ops Joff Thyer WWHF [----] 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ This presentation describes some of the challenges of malware development for Red Team initial access operations and how continuous integration/continuous development (CICD) pipelines can be employed to assist in solving the challenges. The presentation will start by introducing some of the known techniques employed by modern endpoint defense software and then describe how a CICD approach can be used to enable unique"  
[YouTube Link](https://youtube.com/watch?v=jjrvWyBpbIA)  2024-05-06T11:00Z 55.5K followers, [---] engagements


"WWHF [----] (Virtual): CitiZen Cyber SkillZ for Public Service and Great Justice - Ray Davidson https://www.wildwesthackinfest.com ---- Love the cyberz but your netcat skills are closer to butter knife than Swiss Army knife Love being the packet but that pre-bitmasking hydration is still a little rusty Love CTFs but cant get to the bank (of coins) That was me - I was devastated when I realized I'd never be Hax0RtheSkoudis but I found a way to give back to the community anyway - maybe itll work for you The State of Michigan has created a Civilian Cyber Corps to address the uneven distribution of"  
[YouTube Link](https://youtube.com/watch?v=kFNXvWuF-Wk)  2020-07-21T18:56Z 53.3K followers, [---] engagements


"Critical Infrastructure in Critical Condition: Avoiding Doubt in the Face of Fear . Ray Davidson 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ B-Sides Las Vegas talks link: https://www.youtube.com/playlistlist=PLjpIlpOLoRNQKuMUUX-sAPBMacELm9c-c As a person of a certain age with certain experiences I can attest that life is fraught with uncertainty. Society is increasingly dependent on undependable technology. (This is after all why we all have jobs.) Whether from extreme weather hostile events squirrels with"  
[YouTube Link](https://youtube.com/watch?v=kuMN5djmDXg)  2025-01-06T05:00Z 53.7K followers, [---] engagements


"Hacking Azure AD Identities Nestori Syynimaa WWHF [----] 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ In the cloud era identity has become a new security perimeter. Over [--] per cent of Fortune [---] organizations use Microsofts cloud-based identity and access management system Azure AD. Dr. Nestori Syynimaa is one of the worlds leading Azure AD / M365 experts and the developer of the AADInternals toolkit. He has worked with Microsoft cloud services for over a decade and has been MCT since [----] MVP since [----] and"  
[YouTube Link](https://youtube.com/watch?v=l1T6JbfBywc)  2024-05-13T11:00Z 53.3K followers, [---] engagements


"Red Teaming in the EDR age From Wild West Hackin' Fest [----] in Deadwood SD. Presenter: Will Burgess Will Burgess is a security consultant with experience across both defensive and offensive cyber security. Will previously worked as a Threat Hunter within MWR's Countercept Division and specialised in detecting advanced malware across enterprises. As part of his role Will researched attack techniques used by a wide range of malware families (including popular commercial tools such as Cobalt Strike) developed new ways of catching attackers and presented this research at different conferences."  
[YouTube Link](https://youtube.com/watch?v=l8nkXCOYQC4)  2018-11-14T19:44Z 54.5K followers, 22.8K engagements


"Social Engineering for Covert Access Assignments Dorota Kozlowska 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com This presentation will explore the strategic use of social engineering in penetration testing. Attendees will learn tactics such as pretexting tailgating baiting and phishing all designed to manipulate human behavior and bypass physical security. I will cover the importance of crafting a believable pretext from creating"  
[YouTube Link](https://youtube.com/watch?v=nNV2DcU3Lts)  2025-08-12T04:01Z 56.4K followers, [---] engagements


"Risk Alssessment Jake Williams 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ In this talk we'll present Risk AIssessment - a risk assessment framework for AI-enabled applications. With the rush to embed generative AI in everything but your toaster (oh it's in that now too) there are a lack of usable assessment frameworks for organizations that are deploying these AI-enabled applications. In this talk we'll introduce the framework and show how organizations can utilize it to evaluate their risk to decide"  
[YouTube Link](https://youtube.com/watch?v=nO_wwsltSTw)  2025-01-17T05:00Z 54K followers, [---] engagements


"MailFail: Spoof Emails in Seconds Jack Hyland 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com Join me as we delve into the intricacies and quirks of email uncovering both its complexities and its absurdities. After spending several months delving into the relevant RFCs relating to Email (SMTP) I gained a comprehensive understanding of how to abuse the email ecosystem. In this presentation I will get you up to speed with a browser"  
[YouTube Link](https://youtube.com/watch?v=o1b8D_5gdOo)  2025-06-10T05:30Z 56.4K followers, [---] engagements


"Workshop: Open-Source Intelligence (OSINT) Joe Gray WWHF [----] 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ Developers penetration testers managers system administrators would all benefit from learning how to better detect and consolidate vulnerability and remediation efforts. Joe Gray is an exemplary veteran of the U.S. Navy Submarine Force and a highly esteemed expert in social engineering and OSINT. He is the inaugural winner of the DerbyCon Social Engineering Capture the Flag (SECTF) and in recognition of"  
[YouTube Link](https://youtube.com/watch?v=oAk1fd_nqDA)  2024-05-21T11:00Z 53.4K followers, [---] engagements


"Fusing Reverse Shells And Kernel Exploits For Fun and Profit Aleksa Zatezalo 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com In this presentation I'll show you the inner mechanics of reverse shells and bind shells Offensive Windows API use and the basics of exploit coding in the C programming language all under the umbrella of my personal project The Impersonator shell. The Impersonator Shell started as a combination of two popular"  
[YouTube Link](https://youtube.com/watch?v=p5N4SwQs41U)  2025-06-24T04:30Z 56.4K followers, [---] engagements


"The Secret Thoughts of a Successful Hacker Nadean Tanner [--] Hour Join the WWHF Discord Community: https://discord.gg/wwhf 00:00 - PreShow Banter I Didnt Think It Mattered 09:08 - PreShow Banter Upcoming Things 10:59 - FEATURE PRESENTATION: The Secret Thoughts of a Successful Hacker 15:19 - The Imposter Syndrome 22:33 - Flavors of Imposters 33:01 - Imagine If You Will 41:26 - Strike a Word 52:19 - End of Show Banter Show Notes: https://www.amazon.com/Cybersecurity-Blue-Toolkit-Nadean-Tanner/dp/1119552931/ https://en.wikipedia.org/wiki/Dunning%E2%80%93Kruger_effect Exploring Impostor Syndrome"  
[YouTube Link](https://youtube.com/watch?v=p9swoG62oqc)  2020-11-10T13:08Z 54.5K followers, [----] engagements


"A Journey from Alert1 to P1: Cat Pic Graffiti and Phishing Payloads Cary Hooper 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com Tired of taking screenshots of alert boxes Join me for a working session to discuss how to use JavaScript and DOM manipulation to craft a believable XSS phishing payload resulting in code execution in a target domain. Today I am hosting a learning session to show an approach for turning a reflected XSS bug"  
[YouTube Link](https://youtube.com/watch?v=pPRv5bha2PE)  2025-04-29T04:15Z 56.4K followers, [---] engagements


"Two Cyber Guys And an Al Walk Into a Bar Derek Banks Joff Thyer 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ Are you in cyber security and curious about Machine Learning and Artificial Intelligence and not sure where to start or even what it can do for you ML and AI have rapidly transformed the landscape of technology offering powerful tools for various industries including cyber security. However for many folks in the field the impact and potential of AI remains mysterious as well as understanding how to"  
[YouTube Link](https://youtube.com/watch?v=q3QnDQ88Rik)  2024-12-19T05:00Z 53.4K followers, [---] engagements


"Tool Shed Demo: Token Tactics: A Tactical Usage Demo Steve Borosh WWHF [----] 🔗 Join us in-person and virtually at our Wild West Hackin' Fest Information security conferences https://wildwesthackinfest.com/ In this demo BHIS's Steve Borosh will walk you through how an offensive operator may utilize this attack flow beginning with the initial phish to accessing sensitive files on restricted SharePoint sites and some detections and remediations along the way. ///Black Hills Infosec Socials Twitter: https://twitter.com/BHinfoSecurity Mastodon: https://infosec.exchange/@blackhillsinfosec LinkedIn:"  
[YouTube Link](https://youtube.com/watch?v=qxSSlgRFCVY)  2024-04-27T13:00Z 55.4K followers, [---] engagements


"Lessons Learned in a Year of Social Engineering Alice Thorne 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com Many organizations' current policies and controls allow for their helpdesks to reset users passwords and multi-factor authentication which makes those helpdesks a prime target for social engineering attacks such as those demonstrated in the past by threat actors like the ALPHV/BlackCat ransomware groups. This talk will cover"  
[YouTube Link](https://youtube.com/watch?v=rCUBkpGiSUI)  2025-01-31T05:00Z 54.2K followers, [---] engagements


"Social Engineering My Way Into Conferences Frank Trezza 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com Over the years I've managed to get into numerous security and other conferences and this talk will share some of the most intriguing stories of how I did it. By using a mix of social engineering reconnaissance insider knowledge and quick thinking I was able to navigate these events successfully. Social engineering played a key"  
[YouTube Link](https://youtube.com/watch?v=ry-qesxu81Y)  2025-04-22T08:01Z 56.4K followers, [---] engagements


"Smuggling Botnet C2 Through Users Browser Matthew Bernath WWHF San Diego [----] Attend Wild West Hackin' Fest (WWHF) in Deadwood In-Person and Virtual https://wildwesthackinfest.com/deadwood/ Command and control (C2) infrastructure are vital to the operation of botnets and their operators take active measures to prevent their discovery. In this presentation I demonstrate that an attacker could leverage public advertisement services to obfuscate the source of their command and control servers by co-opting web users browsers to smuggle data. My colleagues and I created a system that garners"  
[YouTube Link](https://youtube.com/watch?v=seQbsIIo6ho)  2022-10-20T10:00Z 55.6K followers, [---] engagements


"Packet Generation with Scapy Bill Stearns 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com Learn how to use Scapy a python packet library to create packets from scratch - with exactly the fields you want This technique can be used either by hand or inside your own python script. A little familiarity with Python will be helpful. ///Black Hills Infosec Socials Twitter: https://twitter.com/BHinfoSecurity Mastodon:"  
[YouTube Link](https://youtube.com/watch?v=sstCScIjLJI)  2025-03-20T04:00Z 54.5K followers, [---] engagements


"Not Doomed.Yet Chloe Messdaghi 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com Lets talk about the elephant in the roomor rather the AI in the network. It's causing more drama than the [----] Tay bot on Twitter. Sorry not sorry I meant X. From GenAI hoodwinking finance firms out of $25 million to the shocking revelation that 77% of companies found their AI sitting in the corner with a dunce cap marked "breached" in the past year."  
[YouTube Link](https://youtube.com/watch?v=toNZGsRVx9M)  2025-02-07T05:01Z 54.3K followers, [---] engagements


"A Post Incident Case Study for SMB Response Teams Amanda Berlin 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ This presentation will delve into a real-world cybersecurity incident involving a masked application attack on an SMB environment. Using an anonymized incident narrative we'll walk through the response process from the perspective of a small to medium-sized business team. The presentation will highlight the importance of early detection the challenges of identifying sophisticated threats and the"  
[YouTube Link](https://youtube.com/watch?v=uHtKHti5RK0)  2025-01-03T05:00Z 53.7K followers, [---] engagements


"Tool Demo CrowdSec Klaus Agnoletti WWHF Deadwood [----] Join us at the annual information security conference in Deadwood SD (in-person and virtually) Wild West Hackin' Fest: https://wildwesthackinfest.com/ CrowdSec is a free modern & collaborative behavior detection engine coupled with a global IP reputation network. It stacks on fail2bans philosophy but is IPV6 compatible and 60x faster (Go vs Python) uses Grok patterns to parse logs and YAML scenario to identify behaviors. CrowdSec is engineered for modern Cloud / Containers / VM based infrastructures (by decoupling detection and"  
[YouTube Link](https://youtube.com/watch?v=uRn5eh_C1Y4)  2023-05-26T11:00Z 55.2K followers, [---] engagements


"What is ATT&CK Coverage Anyway Adam Mashinchi WWHF San Diego [----] Attend Wild West Hackin' Fest (WWHF) in Deadwood In-Person and Virtual https://wildwesthackinfest.com/deadwood/ This talk will highlight the Atomic Red Team projects efforts to define and increase the test coverage of MITRE ATT&CK techniques. Well describe the challenges we encountered in defining what coverage means in the context of an ATT&CK-based framework and how to use that definition to improve an open source project thats used by a diverse audience of practitioners to satisfy an equally diverse array of needs. The"  
[YouTube Link](https://youtube.com/watch?v=umQD0E5_rG0)  2022-09-21T10:00Z 53.3K followers, [---] engagements


"Open Source Intelligence [---] Join us at the annual information security conference in Deadwood SD (in-person and virtually) Wild West Hackin' Fest: https://wildwesthackinfest.com/ From Wild West Hackin' Fest [----] in Deadwood SD. Presenter: April C. Wright Description: April C. Wright is a hacker writer teacher and community leader with over [--] years of breaking making fixing and defending global critical communications and connections. She is an international speaker and trainer educating others about personal privacy and information security with the goal of safeguarding the digital"  
[YouTube Link](https://youtube.com/watch?v=uxZyzJGfrUY)  2018-11-16T17:53Z 54.4K followers, 57.7K engagements


"Mind Over Malware: Harnessing Psychology to Fortify Cybersecurity Jenn Ferreras 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ Discover how psychological theories can revolutionize cybersecurity practices This presentation explores the transformative potential of Attention Restoration Theory (ART) and Social Cognitive Theory (SCT) in enhancing cybersecurity measures. By optimizing work environments to rejuvenate mental focus (ART) and leveraging social influences and self-efficacy to boost security compliance"  
[YouTube Link](https://youtube.com/watch?v=v6BFg_ZeeVE)  2025-01-15T05:00Z 53.9K followers, [---] engagements


"The Hackening: Lessons Learned Compromising MSPs Matt Lee Jason Slagle 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ The security community often criticizes MSPs claiming they offer lax security don't take security seriously and generally implement weak practices. Some presentations even use "fake" MSP breaches as their foundation. But what if we actually tested this ourselves Join Matt Lee and Jason Slagle as they delve into the data and lessons learned from attempts to breach MSPs. We'll review findings"  
[YouTube Link](https://youtube.com/watch?v=whCoR5ZUZ6w)  2025-01-02T05:00Z 53.7K followers, [---] engagements


"Tow Away Zone The Dark Side of Domain Parking Cameron Cartier 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com Companies or individuals often sit on domains for later use and can even make a passive income" off of these unused domains. The monetary incentives of the domain parking system lead to these parked domains becoming littered with malware and potentially putting consumers in danger. This talk is essentially a PSA and gives"  
[YouTube Link](https://youtube.com/watch?v=xdz7EeJyWzU)  2025-01-21T05:01Z 54.2K followers, [---] engagements


"Offensive Lab Environments (Without the Suck) Travis Kaun 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com From building payloads testing evasions and practicing offensive techniques a must-have for every seasoned tester is a lab environment. Join Travis as he demonstrates various methods for deploying dynamic AD lab environments for attack simulation with ease. ///Black Hills Infosec Socials Twitter:"  
[YouTube Link](https://youtube.com/watch?v=ySoLn2WnuGs)  2025-01-29T05:00Z 55.4K followers, [----] engagements


"We're All Scared Too: [--] Years of Lessons from Cybersecurity Mentorship Lesley Carhart WWHF2023 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ We're All Scared Too: [--] Years of Lessons from Cybersecurity Mentorship Lesley Carhart WWHF [----] For the past decade Lesley has been running career clinics for job seekers and changers in cybersecurity. For the past year they have added on 1:1 mentorship office hours. Helping people choose career trajectories and overcome hurdles in employment has been a fascinating"  
[YouTube Link](https://youtube.com/watch?v=ycvUsRaBcSk)  2024-05-02T11:00Z 54K followers, [---] engagements


"From Sore to SOAR: Reinventing Sentinel Automation Without Logic Apps Henri Hambartsumyan 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com This talk shares our journey building a custom SOAR-like solution for Microsoft Sentinel that 1) combines full-code flexibility with low-code simplicity and 2) overcomes the limitations of Logic Apps in performance maintainability and debugging. Learn about architecture and design decisions"  
[YouTube Link](https://youtube.com/watch?v=zP6eM7v0N44)  2025-04-01T04:00Z 55.5K followers, [---] engagements


"The Drone Renaissance - The Attack Surface Now Includes the Sky Luke Canfield The Drone Renaissance - The Attack Surface Now Includes the Sky Presenter: Luke Canfield How can off the shelf technology be used to build modern reconnaissance drones Drones are no longer niche or limited to government budgets. What once required nation state resources is now achievable with open-source software consumer hardware and a 3D printer. What does a DIY reconnaissance drone platform look like today In this talk we break down a real DIY reconnaissance drone built on a fixed wing VTOL airframe. This"  
[YouTube Link](https://youtube.com/watch?v=ZufmF_7p8UE)  2026-02-13T16:00Z 56.4K followers, [---] engagements


"Thirteen Steps to Being Unbroken: Infosec for the Underfunded Tarah Wheeler Thirteen Steps to Being Unbroken: Infosec for the Underfunded Presenter: Tarah Wheeler Small and underfunded organizations are being crushed by todays cybersecurity landscape. Theyre expected to meet the same strict regulatory requirements as massive enterprises but with a fraction of the money staffing and influence. CISAs local support efforts have stalled incident responders are burning out and smaller orgs are now stuck in a storm of regulatory confusion and real-world threats. Holidays only make things worse as"  
[YouTube Link](https://youtube.com/watch?v=2AbbdYwY6PE)  2026-02-10T16:34Z 56.4K followers, [---] engagements


"How To Learn Faster With AI: Sampling Broadly Delving Efficiently Absorbing Fully Jeff McJunkin How To Learn Faster With AI: Sampling Broadly Delving Efficiently Absorbing Fully Presenter: Jeff McJunkin Imagine learning five times more every week and watching that compound over the course of your career. This talk breaks down a practical AI driven workflow that helps you identify high value topics instantly filter out the noise and capture more information with less effort. You will learn how to pull transcripts from online media using Dev Tools and speech to text then turn that content into"  
[YouTube Link](https://youtube.com/watch?v=2kiMEgL0BN4)  2026-02-06T21:53Z 56.4K followers, [---] engagements


"AI Agents in Action: Protecting Against Synthetic Media and Human Risk Exploits James McQuiggan AI Agents in Action: Protecting Against Synthetic Media and Human Risk Exploits Presenter: James McQuiggan AI agents and Agentic AI are reshaping the cybersecurity landscape creating a new era where artificial intelligence can act adapt and make decisions at machine speed. This talk explores the dual nature of AI agents: powerful tools for defenders and potent weapons for attackers. Cybercriminals are already using agentic systems deepfakes and synthetic media to launch highly targeted social"  
[YouTube Link](https://youtube.com/watch?v=Gh8PyEMbRj4)  2026-02-02T22:00Z 56.4K followers, [---] engagements


"Giving Swords to Our Future AI Overlords Matt Lee and Eric Stevens Giving Swords to Our Future AI Overlords Presenters: Matt Lee and Eric Stevens Artificial intelligence is no longer limited to chatbots and copilots. With advances in Model Context Protocols and agentic systems AI can now reason take action and interact across interconnected tools APIs and automated workflows. When misused a single prompt injection can cascade across multiple agents and decision-making systems. In this talk you will see how something as simple as a malicious LinkedIn bio can be used to manipulate an AI-powered"  
[YouTube Link](https://youtube.com/watch?v=yTSAjNZgrcU)  2026-01-30T21:12Z 56.4K followers, [---] engagements


"PWN Free or Die Hard: The YOLO Index and Tactical Risk in Red Team Alethe Denis PWN Free or Die Hard: The YOLO Index and Tactical Risk in Red Team Presenter: Alethe Denis Physical red team operations demand constant judgment calls: when to take bold high-risk actions and when to pull back to protect the team. In this session Alethe Denis introduces the YOLO Index a practical real-world model for evaluating risk reward and operational safety during high-stakes physical penetration tests. Through field stories tactical examples and lessons drawn directly from live engagements youll learn how"  
[YouTube Link](https://youtube.com/watch?v=p4UXDzdsJCM)  2026-01-26T17:01Z 56.4K followers, [---] engagements


"Wild West Hackin Fest @ Mile High [----] - In-Person/Virtual Conference - Meet the Community Register now for Wild West Hackin Fest Mile High Denver [----] - In-Person/Virtual Conference: https://wildwesthackinfest.com/register ///Black Hills Infosec Socials Twitter: https://twitter.com/BHinfoSecurity Mastodon: https://infosec.exchange/@blackhillsinfosec LinkedIn: https://www.linkedin.com/company/antisyphon-training Discord: https://discord.gg/ffzdt3WUDe ///Black Hills Infosec Shirts & Hoodies https://spearphish-general-store.myshopify.com/collections/bhis-shirt-collections ///Black Hills Infosec"  
[YouTube Link](https://youtube.com/watch?v=4YG7tBIFiY0)  2026-01-23T21:23Z 56.4K followers, [---] engagements


"Wild West Hackin Fest @ Mile High [----] - In-Person/Virtual Conference - Register Now Register now for Wild West Hackin Fest Mile High Denver [----] - In-Person/Virtual Conference: https://wildwesthackinfest.com/register ///Black Hills Infosec Socials Twitter: https://twitter.com/BHinfoSecurity Mastodon: https://infosec.exchange/@blackhillsinfosec LinkedIn: https://www.linkedin.com/company/antisyphon-training Discord: https://discord.gg/ffzdt3WUDe ///Black Hills Infosec Shirts & Hoodies https://spearphish-general-store.myshopify.com/collections/bhis-shirt-collections ///Black Hills Infosec"  
[YouTube Link](https://youtube.com/watch?v=QPAXAMSrAPY)  2026-01-23T21:11Z 56.4K followers, [--] engagements


"A New Era of Brute Forcing in Active Directory David Hork A New Era of Brute Forcing in Active Directory Presenter: David Hork Active Directory has been the backbone of enterprise identity for more than [--] years but despite its maturity most environments remain dangerously vulnerable. Misconfigurations overlooked defaults and outdated assumptions make AD one of the most common and valuable targets for attackers. In this session youll learn why securing Active Directory is still far from solved and what you can do about it. This talk breaks down essential but often misunderstood concepts like"  
[YouTube Link](https://youtube.com/watch?v=KneY9UboS9E)  2026-01-23T20:06Z 56.4K followers, [---] engagements


"Legally Compliant: An Incident Handlers Take on Cyber Legal in an Incident Ben Renz & Bradford Alt Legally Compliant: An Incident Handlers Take on Cyber Legal in an Incident Presenters: Ben Renz & Bradford Alt Regulations are increasing reporting timelines are tightening and cyber insurance requirements are shifting. The legal landscape around incidents is evolving just as fast as the threats themselves. While we are not lawyers we have worked closely with legal teams across multiple incident responses giving us a practical perspective on how cyber and legal worlds continue to merge. This"  
[YouTube Link](https://youtube.com/watch?v=_bWvehTfS4Y)  2026-01-20T04:58Z 56.4K followers, [---] engagements


"Web Application Authorization: Taming the Perfect Storm Tim Tomes Web Application Authorization: Taming the Perfect Storm Presenter: Tim Tomes Access control vulnerabilities are everywhere. Across my last [--] web application security assessments I identified [--] access control related findings which means almost every modern application has at least one serious flaw. This aligns with OWASP which ranks Broken Access Control as the number one risk facing web applications today. But why is this problem so persistent The simple answer is that access control is difficult. It is difficult to design"  
[YouTube Link](https://youtube.com/watch?v=vYeJeIuxXaM)  2026-01-17T02:01Z 56.4K followers, [---] engagements


""Everything is a Proxy if You Try Hard Enough"- Old RFCs New Exploits Ken Pyle "Everything is a Proxy if You Try Hard Enough" - Exploiting Old RFCs for New Types of Exploitation Speaker: Ken Pyle The core protocols of the internet are old vague and full of cracks. This session breaks down several new exploitation and exfiltration techniques that take advantage of those gaps in HTTP DNS proxies and CDNs. Well cover: HTTP Status Code Injection for data exfiltration and covert signaling Arbitrary Protocol Injection over HTTP letting attackers bypass firewalls and tunnel traffic through proxies"  
[YouTube Link](https://youtube.com/watch?v=gGDrtN3rtxY)  2026-01-12T23:41Z 56.4K followers, [----] engagements


"Exploiting AI: A Case Study on Voice Biometric Penetration Testing Exploiting AI: A Case Study on Voice Biometric Penetration Testing Speaker: Skyler Tuter This talk presents a real-world case study examining how AI voice cloning can be used to defeat voice biometric authentication systems. Based on a recent engagement with a major financial institution the session walks through how voice-based identity verification in Interactive Voice Response systems can be manipulated using advanced AI voice synthesis techniques. The presentation breaks down the methodology used during the penetration"  
[YouTube Link](https://youtube.com/watch?v=7OzUAY5xfus)  2026-01-09T17:00Z 56.4K followers, [---] engagements


"Modern Recon for Red Teams and Pentesters Jason Haddix Modern Recon for Red Teams and Pentesters Speakers: Jason Haddix Modern offensive security work moves fast and having the right tooling makes all the difference. In this talk Jason will walk through the tools workflows and resources that todays offsec professionals rely on to identify hosts accelerate scanning and map organizations with greater speed and precision. Hell cover distributed scanning stealth techniques GitHub enumeration DNS source nuances and several lesser known methods that can dramatically elevate your recon game. If you"  
[YouTube Link](https://youtube.com/watch?v=B1YcflQRvOI)  2026-01-05T16:00Z 56.4K followers, 10.1K engagements


"Stochastic Garrotes: A Data Driven Approach to LLM Generated Malware Ryan Ashley Stochastic Garrotes: A Data Driven Approach to LLM Generated Malware Speaker: Ryan Ashley Principal Engineer Applied Research IQT Large Language Models are everywhere now and their role as coding assistants has sparked growing fears about a coming wave of AI generated malware. But this creates a strange sort of Fermi Paradox. If these models are truly as powerful as many claim where is all the malware Threat actors tend to adopt new technology quickly. They follow trends. They capitalize on opportunity fast. In a"  
[YouTube Link](https://youtube.com/watch?v=Qo5D8XhmG0w)  2026-01-02T17:00Z 56.4K followers, [---] engagements


"Beyond the Malware: Dissecting Info Stealers' Infection Vectors Stolen Assets and Countermeasures Beyond the Malware: Dissecting Information Stealers' Infection Vectors Stolen Assets and Countermeasures Speakers: Olivier Bilodeau and Eric Boivin Senior Technical Platform Specialist Flare Modern information stealers have grown far beyond basic credential theft and now operate as highly advanced tools capable of capturing full digital fingerprints of their victims. In this technical deep dive the speaker presents new research into how modern stealers are built how their attack chains operate"  
[YouTube Link](https://youtube.com/watch?v=s5M7QqMaacE)  2025-12-29T16:01Z 56.4K followers, [---] engagements


"Practical Cybersecurity Control Auditing: From Preparation to Reporting Gerald Auger PhD Practical Cybersecurity Control Auditing: From Preparation to Reporting Speaker: Gerald Auger PhD Auditing business environments against the CIS Controls [--] framework can feel complex but this session breaks it down into a clear repeatable process. In this practical one-hour walkthrough Dr. Auger guides participants through the full audit lifecycle from understanding the fundamentals of CIS Controls to preparing executing and documenting a complete cybersecurity audit. You will learn how to interpret the"  
[YouTube Link](https://youtube.com/watch?v=G0gmRARrtGQ)  2025-12-26T13:00Z 56.4K followers, [---] engagements


"Cyber on a Shoestring: Building Wagyu Career Skills and Experience on a Ramen Budget Evan Kirstein Cyber on a Shoestring: Building Wagyu Career Skills and Experience on a Ramen Budget Speaker: Evan Kirstein Landing a cybersecurity job requires experience but getting that experience can feel impossible when you are trying to break in switch specialties or stretch out a tight budget. This presentation shows you how to build real demonstrable skills without needing expensive gear or paid programs. We will explore free and affordable ways to create meaningful hands-on experience through home labs"  
[YouTube Link](https://youtube.com/watch?v=MFfSUoq9kJo)  2025-12-22T13:00Z 56.4K followers, [---] engagements


"Augmenting Your Offensiveness With AI for Fun and Job Security Marcello Salvati and Dan McInerney Augmenting Your Offensiveness With AI for Fun and Job Security Speakers: Marcello Salvati and Dan McInerney AI is transforming offensive security defensive operations and everything in between. In this talk we cut through the hype and explore what large language models and AI agents can actually do for you today. We break down the core concepts behind LLMs agent architecture and practical workflows so you can understand how to apply these tools in real world security work. Using concrete examples"  
[YouTube Link](https://youtube.com/watch?v=9BCK5-bGRTE)  2025-12-19T15:35Z 56.4K followers, [---] engagements


"Wild West Hackin Fest @ Mile High [----] - In-Person/Virtual Conference - Keynote Speakers Announced Register now for Wild West Hackin Fest Mile High Denver [----] - In-Person/Virtual Conference: https://wildwesthackinfest.com/register ///Black Hills Infosec Socials Twitter: https://twitter.com/BHinfoSecurity Mastodon: https://infosec.exchange/@blackhillsinfosec LinkedIn: https://www.linkedin.com/company/antisyphon-training Discord: https://discord.gg/ffzdt3WUDe ///Black Hills Infosec Shirts & Hoodies https://spearphish-general-store.myshopify.com/collections/bhis-shirt-collections ///Black Hills"  
[YouTube Link](https://youtube.com/watch?v=LL0X1y2q3Vw)  2025-12-18T14:30Z 56.4K followers, [---] engagements


"Dungeons & Dragons: The Security Tool You Didnt Know You Needed Dungeons & Dragons: The Security Tool You Didnt Know You Needed Speakers: Klaus Agnoletti & Glen Sorensen Sick of security training that puts everyone to sleep This session dives into why the most effective cybersecurity training tool might already be sitting in your game room. Welcome to game-based learning where the proven power of play transforms how professionals master complex skills and actually retain what they learn. We explore research showing that people learn best together not in isolation. Traditional training forces"  
[YouTube Link](https://youtube.com/watch?v=8_S7n-Obv6Q)  2025-12-15T13:00Z 56.4K followers, [---] engagements


"Elicitation: Weaponizing Social Engineering for Covert Access Operations Dorota Kozlowska Elicitation: Weaponizing Social Engineering for Covert Access Operations Presenter: Presenter: Dorota Kozlowska Elicitation is one of the most powerful and underrated skills in social engineering and covert access operations and this session breaks down exactly how professionals use it to gather sensitive information without ever asking a direct question. Whether you're in offensive security red teaming physical penetration testing or corporate security understanding elicitation techniques is essential"  
[YouTube Link](https://youtube.com/watch?v=1mWrreMAB8M)  2025-12-12T21:21Z 56.4K followers, [---] engagements


"The Human Vulnerability: Social Engineering in a Hyper Connected World David Boyd In a hyperconnected world the most reliable vulnerability is still the human element. Social engineering remains one of the most effective ways attackers bypass security controls and gain access to sensitive information. This talk breaks down real-world social engineering tactics including: Phishing and email-based attacks Vishing and phone-based scams Physical intrusion and tailgating Pretexting and impersonation Youll see real examples of how attackers exploit emotions like urgency trust curiosity and sympathy"  
[YouTube Link](https://youtube.com/watch?v=rNcu-0igvzE)  2025-12-08T13:01Z 56.4K followers, [---] engagements


"Death by Dashboards - Moving the Needle on What Actually Matters Tim Medin Death by Dashboards Moving the Needle on What Actually Matters Speaker: Tim Medin Dashboards dominate cybersecurity reportingbut are they helping us focus on what truly matters In this talk Tim Medin CEO and founder of Red Siege Information Security challenges the obsession with metrics that look good but fail to improve real security outcomes. Youll learn why traditional vulnerability dashboards often incentivize the wrong behaviors and how to shift your strategy toward meaningful risk reduction. Tim shares practical"  
[YouTube Link](https://youtube.com/watch?v=BgxWaLUr8aU)  2025-12-05T13:00Z 56.4K followers, [---] engagements


"Attacking AI - The New Frontier Jason Haddix Attacking AI - The New Frontier Speaker: Jason Haddix Artificial intelligence is now embedded in applications networks SaaS platforms security products and decision-making systems that impact millions of users every day. While many AI security talks stay academic this keynote is built specifically for penetration testers red teamers and offensive security professionals who need real-world methods they can use immediately. In this session you will learn practical AI attack techniques including: AI jailbreaks and prompt injection attacks Bypassing"  
[YouTube Link](https://youtube.com/watch?v=m2ghNay6z5M)  2025-12-01T13:01Z 56.4K followers, [----] engagements


"Strengthening Cybersecurity Potential: Investing in People Instead of Tools Markus Schober The Secret to Strong Cybersecurity Invest in Your People Not Just More Tools In todays fast-paced cybersecurity landscape its easy to believe the solution to every challenge is another tool. But the truth is far simpler: your people are your greatest security asset. In this talk Markus Schober breaks down why security teams strugglenot because they lack technology but because they lack support development and meaningful engagement. When professionals dont receive the right onboarding training or growth"  
[YouTube Link](https://youtube.com/watch?v=3ED4Jkb8BZQ)  2025-11-28T13:00Z 56.4K followers, [---] engagements


"Too Much JSON Try jq BB King jq Tutorial: Master JSON on the Command Line Unix Philosophy in Action The Unix Philosophy teaches that text streams are a universal interface. Programs should produce plain text output so other programs can use it as input with minimal friction. This made the command line incredibly powerful until JSON became the standard for modern data interchange. Enter jq the ultimate command line JSON processor. With jq you can parse filter extract and transform JSON data as easily as using awk cut or grep. Even a little familiarity will allow you to handle complex JSON"  
[YouTube Link](https://youtube.com/watch?v=RddcuGhtn_8)  2025-11-24T20:08Z 56.4K followers, [---] engagements


"Ghosts in the Graph: GoPhlare Meets BloodHound Phil Miller Ghosts in the Graph GoPhlare Meets BloodHound Detect AD Attack Paths from Breached Credentials In this talk Phil Miller demonstrates how to leverage GoPhlare an open-source tool alongside BloodHound Community Edition to uncover Active Directory attack paths using breached credentials. Learn how to automate credential correlation streamline breach data analysis and identify high-value targets without noisy password spraying. Youll discover: Why breach credential correlation matters for red teams and pentesters How GoPhlare accelerates"  
[YouTube Link](https://youtube.com/watch?v=WpuPA_rUCyA)  2025-11-21T19:37Z 56.4K followers, [---] engagements


"Hardware Hacking Curiosity IoT & Firmware Hacking Adrien Lasalle Hardware Hacking Explained IoT Security Firmware Analysis & Real Attacks In this video we break down the essentials of hardware hacking and why its a critical part of modern cybersecurity. Learn how to perform IoT reconnaissance analyze hardware interfaces like UART JTAG and SPI and extract or reverse engineer firmware to uncover vulnerabilities. Youll also see live demos on real devices including: Wi-Fi Router: firmware extraction secret hunting and security analysis Connected Camera: exploiting a known CVE to achieve remote"  
[YouTube Link](https://youtube.com/watch?v=UpOzUdd7cqM)  2025-11-18T18:49Z 56.4K followers, [---] engagements


"Building a Hacking Lab on Azure Jordan Drysdale and Kent Ickler How to build a cybersecurity lab fast with Azure ARM templates Automate Active Directory setup and common tool installs Rapid testing cleanup and lab lifecycle management Real-world insights from BHIS pentester Jordan Drysdale Who Its For: Pentesters red teamers blue teamers SOC analysts and security researchers who want to automate Azure-based lab environments. Optional: Pre-configure a Pay-As-You-Go Azure account if youd like to follow along. Chapters 00:00 - Intro & Workshop Overview 00:06 - Why Build Labs in Azure 00:28 - ARM"  
[YouTube Link](https://youtube.com/watch?v=WLuO1Izm9uA)  2025-11-14T18:03Z 56.4K followers, [---] engagements


"Social Engineering for Covert Access Assignments Dorota Kozlowska 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com This presentation will explore the strategic use of social engineering in penetration testing. Attendees will learn tactics such as pretexting tailgating baiting and phishing all designed to manipulate human behavior and bypass physical security. I will cover the importance of crafting a believable pretext from creating"  
[YouTube Link](https://youtube.com/watch?v=nNV2DcU3Lts)  2025-08-12T04:01Z 56.4K followers, [---] engagements


"Jargon & Jigsaw: Shellcode Obfuscation Mike Saunders 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com In this talk Mike will cover two highly effective techniques for obfuscating shellcode in your payloads. Jargon is a shellcode obfuscation method that substitutes dictionary words in place of shellcode bytes. This provides two benefits - your loader doesn't have any shellcode and the use of dictionary words reduces the entropy of"  
[YouTube Link](https://youtube.com/watch?v=VhfFQfc0DSM)  2025-08-05T04:00Z 56.4K followers, [---] engagements


"OSINT Gone Wild: How I Found Drug Traffickers and NarcoTerrorists Online Schuyler Davis 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com In this presentation I'll present my thorough research on how narcotics narcoterrorism and the fentanyl epidemic are new cyber crime issues. I will show you how OSINT can be used to combat illicit narcotic transactions narcoterrorism and uncover valuable information from the dark web. 00:00 -"  
[YouTube Link](https://youtube.com/watch?v=jxTuM9B-Cns)  2025-07-29T09:01Z 56.4K followers, [---] engagements


"Solving Dumb Hacker Problems With Nix Ryan Basden 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com Between Python version mismatches virtual environments and containers getting even popular software to work on every operating system and setup is more cumbersome than it should be. Hackers should be fighting vulnerabilities not their own tooling. Nix has solved this for me and I need to share it with people. It takes "it works on my"  
[YouTube Link](https://youtube.com/watch?v=VrtpOD2XbH0)  2025-07-22T07:15Z 56.4K followers, [---] engagements


"How I Used AI to Crush CTF Challenges and What I Learned Along the Way Tabatha Kossman 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com Participating in Capture The Flag (CTF) competitions is always a thrilling experience but this time I had a secret weapon up my sleeve: AI. From cracking codes to navigating complex cyber challenges AI became my go-to sidekick. Here's how I teamed up with AI to tackle CTF puzzles and what I learned"  
[YouTube Link](https://youtube.com/watch?v=QVN97YMHWhk)  2025-07-15T07:30Z 56.4K followers, [---] engagements


"The Extendables: Exploiting Browser Extensions for PrivEsc and Persistence Fin Hume 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com This talk explores new ways to exploit browser extensions for both privilege escalation and persistence. It will explore the NativeMessaging functionality within all popular browsers (Edge Chrome and Firefox) across all major Operating Systems (Windows Linux MacOS) and how it can be exploited to run"  
[YouTube Link](https://youtube.com/watch?v=BiXGaGX1Zhk)  2025-07-08T04:45Z 56.4K followers, [---] engagements

Limited data mode. Full metrics available with subscription: lunarcrush.com/pricing

@wildwesthackinfest Avatar @wildwesthackinfest Wild West Hackin' Fest

Wild West Hackin' Fest posts on YouTube about red, john, ai, discord the most. They currently have [------] followers and [---] posts still getting attention that total [---] engagements in the last [--] hours.

Engagements: [---] #

Engagements Line Chart

  • [--] Week [-----] +104%
  • [--] Month [-----] -37%
  • [--] Months [------] -60%
  • [--] Year [------] +196%

Mentions: [--] #

Mentions Line Chart

  • [--] Week [--] +50%
  • [--] Month [--] +31%
  • [--] Months [--] -19%
  • [--] Year [--] +78%

Followers: [------] #

Followers Line Chart

  • [--] Week [------] no change
  • [--] Month [------] +0.36%
  • [--] Months [------] +1.40%
  • [--] Year [------] +4.10%

CreatorRank: [---------] #

CreatorRank Line Chart

Social Influence

Social category influence social networks technology brands finance countries luxury brands

Social topic influence red, john, ai, discord, engineering, social, how to, virtual, fun, has been

Top accounts mentioned or mentioned by @blackhillsinfosec @antisytraining @nd @k3 @cy @byt3bl33d3r @blackhillsi @antisytrai @tylerrobinson

Top assets mentioned CyberConnect (CYBER) FilesCoins Power Cu (FILECOIN)

Top Social Posts

Top posts by engagements in the last [--] hours

"Modern Recon for Red Teams and Pentesters Jason Haddix Modern Recon for Red Teams and Pentesters Speakers: Jason Haddix Modern offensive security work moves fast and having the right tooling makes all the difference. In this talk Jason will walk through the tools workflows and resources that todays offsec professionals rely on to identify hosts accelerate scanning and map organizations with greater speed and precision. Hell cover distributed scanning stealth techniques GitHub enumeration DNS source nuances and several lesser known methods that can dramatically elevate your recon game. If you"
YouTube Link 2026-01-05T16:00Z 56.4K followers, 10.1K engagements

"The Drone Renaissance - The Attack Surface Now Includes the Sky Luke Canfield The Drone Renaissance - The Attack Surface Now Includes the Sky Presenter: Luke Canfield How can off the shelf technology be used to build modern reconnaissance drones Drones are no longer niche or limited to government budgets. What once required nation state resources is now achievable with open-source software consumer hardware and a 3D printer. What does a DIY reconnaissance drone platform look like today In this talk we break down a real DIY reconnaissance drone built on a fixed wing VTOL airframe. This"
YouTube Link 2026-02-13T16:00Z 56.4K followers, [---] engagements

"Elicitation: Weaponizing Social Engineering for Covert Access Operations Dorota Kozlowska Elicitation: Weaponizing Social Engineering for Covert Access Operations Presenter: Presenter: Dorota Kozlowska Elicitation is one of the most powerful and underrated skills in social engineering and covert access operations and this session breaks down exactly how professionals use it to gather sensitive information without ever asking a direct question. Whether you're in offensive security red teaming physical penetration testing or corporate security understanding elicitation techniques is essential"
YouTube Link 2025-12-12T21:21Z 56.4K followers, [---] engagements

"Strengthening Cybersecurity Potential: Investing in People Instead of Tools Markus Schober The Secret to Strong Cybersecurity Invest in Your People Not Just More Tools In todays fast-paced cybersecurity landscape its easy to believe the solution to every challenge is another tool. But the truth is far simpler: your people are your greatest security asset. In this talk Markus Schober breaks down why security teams strugglenot because they lack technology but because they lack support development and meaningful engagement. When professionals dont receive the right onboarding training or growth"
YouTube Link 2025-11-28T13:00Z 56.4K followers, [---] engagements

"WWHF Creating a Strategic Vulnerability Response Plan - Joe Pierini Daniel Brown Patrick Fussell Chat in Discord: Join the WWHF Community Discord: https://discord.gg/wwhf NOTE: Re-upload to fix a video flicker on some displays. Heartbleed Shellshock Ghost Stagefright Log4j . the vulns that caused massive responses will inevitably happen again. Should your pentest practice or internal team have a defined vulnerability response plan What elements should be in a VR plan How do you allocate resources and protect your clients BEFORE the next big one hits. Our talk features an all-star cast of"
YouTube Link 2022-03-30T22:30Z 56.3K followers, [---] engagements

"Wild West Hackin Fest @ Mile High [----] - In-Person/Virtual Conference - Meet the Community Register now for Wild West Hackin Fest Mile High Denver [----] - In-Person/Virtual Conference: https://wildwesthackinfest.com/register ///Black Hills Infosec Socials Twitter: https://twitter.com/BHinfoSecurity Mastodon: https://infosec.exchange/@blackhillsinfosec LinkedIn: https://www.linkedin.com/company/antisyphon-training Discord: https://discord.gg/ffzdt3WUDe ///Black Hills Infosec Shirts & Hoodies https://spearphish-general-store.myshopify.com/collections/bhis-shirt-collections ///Black Hills Infosec"
YouTube Link 2026-01-23T21:23Z 56.4K followers, [---] engagements

"Play to Win: Getting Your Dream Cybersecurity Job Kip Boyle [--] Hour Join the WWHF Community Discord: https://discord.gg/wwhf 0:00:00 - PreShow Banter I Am Gort 0:02:19 - PreShow Banter Joff Has a Class (Link below) 0:10:08 - FEATURE PRESENTATION: Getting Your Dream Cybersecurity Job 0:16:05 - The Four Blockers 0:17:04 - [--]. Job Title 0:30:15 - [--]. Lack of Skills 0:42:18 - [--]. Convince Hiring Manager 0:50:30 - [--]. Poor Job Hunting 1:00:04 - Qs & As Kip Show Notes https://www.youtube.com/playlistlist=PLK1Bn1577F9nbrTcYHYKdXtl4aw79HjZn https://www.twitch.tv/banjocrashland You want your first"
YouTube Link 2020-12-16T15:18Z 55.7K followers, [----] engagements

"Dungeons & Dragons: The Security Tool You Didnt Know You Needed Dungeons & Dragons: The Security Tool You Didnt Know You Needed Speakers: Klaus Agnoletti & Glen Sorensen Sick of security training that puts everyone to sleep This session dives into why the most effective cybersecurity training tool might already be sitting in your game room. Welcome to game-based learning where the proven power of play transforms how professionals master complex skills and actually retain what they learn. We explore research showing that people learn best together not in isolation. Traditional training forces"
YouTube Link 2025-12-15T13:00Z 56.4K followers, [---] engagements

"Augmenting Your Offensiveness With AI for Fun and Job Security Marcello Salvati and Dan McInerney Augmenting Your Offensiveness With AI for Fun and Job Security Speakers: Marcello Salvati and Dan McInerney AI is transforming offensive security defensive operations and everything in between. In this talk we cut through the hype and explore what large language models and AI agents can actually do for you today. We break down the core concepts behind LLMs agent architecture and practical workflows so you can understand how to apply these tools in real world security work. Using concrete examples"
YouTube Link 2025-12-19T15:35Z 56.4K followers, [---] engagements

"OSINT and the Hermit Kingdom - Nick Roy https://www.wildwesthackinfest.com/ Leveraging online sources to learn more about the worlds most secret nation. Nick Roy is currently a Senior Security Specialist at Splunk focusing on security automation and improving blue team response. Before Splunk Nick was at Phantom Cyber working with partners across the globe build out their security automation practices and delivering them to their customers"
YouTube Link 2020-02-11T15:19Z 54.3K followers, [----] engagements

".Everything You Need to Know About Moving into a Cybersecurity Leadership Role Naomi Buckwalter 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com In this talk youll hear all about the good the bad and the ugly about being in cybersecurity leadership. Youll learn about what it takes to succeed as a leader on technical teams. Youll also learn about some tried-and-true ways of breaking into management roles. Whether you're itching for a"
YouTube Link 2025-02-06T05:00Z 54.3K followers, [---] engagements

"CULTivating Growth and Connection Wade Wells 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com In this talk Wade will explore the psychological and social benefits of community involvement and mentorship such as increased belonging mental health and professional growth. We'll discuss how these engagements enhance networking skill development and foster mutual learning and leadership. Additionally practical strategies for effectively"
YouTube Link 2025-02-14T05:00Z 55.7K followers, [---] engagements

"Death by Dashboards - Moving the Needle on What Actually Matters Tim Medin Death by Dashboards Moving the Needle on What Actually Matters Speaker: Tim Medin Dashboards dominate cybersecurity reportingbut are they helping us focus on what truly matters In this talk Tim Medin CEO and founder of Red Siege Information Security challenges the obsession with metrics that look good but fail to improve real security outcomes. Youll learn why traditional vulnerability dashboards often incentivize the wrong behaviors and how to shift your strategy toward meaningful risk reduction. Tim shares practical"
YouTube Link 2025-12-05T13:00Z 56.4K followers, [---] engagements

"The Extendables: Exploiting Browser Extensions for PrivEsc and Persistence Fin Hume 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com This talk explores new ways to exploit browser extensions for both privilege escalation and persistence. It will explore the NativeMessaging functionality within all popular browsers (Edge Chrome and Firefox) across all major Operating Systems (Windows Linux MacOS) and how it can be exploited to run"
YouTube Link 2025-07-08T04:45Z 56.4K followers, [---] engagements

"From Noise to Knowledge: Demystifying RF Signals Ty Purcell 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com Links mentioned in the talk FCC Website: http://www.fccid.io NASA: https://science.nasa.gov/ems/ Tait Radio Academy: https://www.taitradioacademy.com/ Amateur Radio: https://www.arrl.org/ The expansion of wireless technologies has introduced a diverse range of hardware protocols and radio frequencies. When terms like LoRa"
YouTube Link 2025-03-18T04:00Z 55.8K followers, [---] engagements

"0wning the network with CrackMapExec v4.0 Wild West Hackin' Fest [----] Ever needed to pentest a network with [--] gazillion hosts with a very limited time frame Ever wanted to Mimikatz entire subnets How about shelling entire subnets How about dumping SAM hashes Share spidering Keeping track of all the credentials you pillaged (The list goes on) And doing all of this in the stealthiest way possible Look no further than CrackMapExec CrackMapExec (a.k.a CME) is a modular post-exploitation tool written in Python that helps automate assessing the security of large Active Directory networks. Built"
YouTube Link 2017-12-05T00:50Z 55.7K followers, 12K engagements

"Practical Cybersecurity Control Auditing: From Preparation to Reporting Gerald Auger PhD Practical Cybersecurity Control Auditing: From Preparation to Reporting Speaker: Gerald Auger PhD Auditing business environments against the CIS Controls [--] framework can feel complex but this session breaks it down into a clear repeatable process. In this practical one-hour walkthrough Dr. Auger guides participants through the full audit lifecycle from understanding the fundamentals of CIS Controls to preparing executing and documenting a complete cybersecurity audit. You will learn how to interpret the"
YouTube Link 2025-12-26T13:00Z 56.4K followers, [---] engagements

"From User to Entra ID Admin Sean Metcalf 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com It only takes minutes for an attacker to compromise an account with access. The account doesn't even need to have obvious privileged rights for the attacker to own the cloud environment. This talk covers methods in Entra ID to go from standard user access to Entra ID Global Admin. 00:00 - Welcome intro 00:05 - Whoami 00:07 - Agenda 00:43 -"
YouTube Link 2025-05-01T04:00Z 56.4K followers, [----] engagements

"Backdoors and Breaches Live Demo Jason Blanchard WWHF Deadwood [----] Join us at the annual information security conference in Deadwood SD (in-person and virtually) Wild West Hackin' Fest: https://wildwesthackinfest.com/ ///Black Hills Infosec Socials Twitter: https://twitter.com/BHinfoSecurity Mastodon: https://infosec.exchange/@blackhillsinfosec LinkedIn: https://www.linkedin.com/company/antisyphon-training Discord: https://discord.gg/ffzdt3WUDe ///Black Hills Infosec Shirts & Hoodies https://spearphish-general-store.myshopify.com/collections/bhis-shirt-collections ///Black Hills Infosec"
YouTube Link 2023-09-18T11:00Z 55.7K followers, [---] engagements

"Tool Shed Demo: Aleph Corey Ham WWHF [----] 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ Join BHIS's Corey Ham as he teaches about Aleph Aleph is a tool that can be utilized for ingesting and analyzing unstructured data from ransomware leaks or even internal file shares. Corey will demonstrate how to ingest and extract useful data and information using Aleph. ///Black Hills Infosec Socials Twitter: https://twitter.com/BHinfoSecurity Mastodon: https://infosec.exchange/@blackhillsinfosec LinkedIn:"
YouTube Link 2024-04-30T13:00Z 55.7K followers, [---] engagements

"Closing Ceremony John Strand WWHF Deadwood [----] Join us at the annual information security conference in Deadwood SD (in-person and virtually) Wild West Hackin' Fest: https://wildwesthackinfest.com/ ///Black Hills Infosec Socials Twitter: https://twitter.com/BHinfoSecurity Mastodon: https://infosec.exchange/@blackhillsinfosec LinkedIn: https://www.linkedin.com/company/antisyphon-training Discord: https://discord.gg/ffzdt3WUDe ///Black Hills Infosec Shirts & Hoodies https://spearphish-general-store.myshopify.com/collections/bhis-shirt-collections ///Black Hills Infosec Services Active SOC:"
YouTube Link 2023-09-22T11:00Z 56.3K followers, [---] engagements

"GeoINT Mastery: A Pixel is Worth a Thousand Words Mishaal Khan 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com After this talk you will never see images the same way again. This enlightening session explores the dynamic realm of GeoINT (Geospatial Intelligence) a captivating subset of OSINT (Open Source Intelligence) that unlocks a wealth of hidden insights within images and videos. From identifying objects landscapes and aircrafts"
YouTube Link 2025-01-24T05:00Z 55.6K followers, [---] engagements

"See Sharper There has been an increase in .NET and specifically C# payloads to carry out adversary objectives. There are many reasons for this. This talk describse the architecture of the .NET CLR how attackers are gaining execution via built in tools and what defenders can do to increase their visibility and detection capabilities. Zac and Joe provide examples from the field and actual intrusion attempts that leverage these techniques. Presenters: Joe Moles & Zac Brown From Wild West Hackin' Fest [----] in Deadwood SD. Follow Wild West Hackin' Fest on Twitter here:"
YouTube Link 2018-11-08T01:17Z 55.7K followers, [---] engagements

"A New Era of Brute Forcing in Active Directory David Hork A New Era of Brute Forcing in Active Directory Presenter: David Hork Active Directory has been the backbone of enterprise identity for more than [--] years but despite its maturity most environments remain dangerously vulnerable. Misconfigurations overlooked defaults and outdated assumptions make AD one of the most common and valuable targets for attackers. In this session youll learn why securing Active Directory is still far from solved and what you can do about it. This talk breaks down essential but often misunderstood concepts like"
YouTube Link 2026-01-23T20:06Z 56.4K followers, [---] engagements

"Wild West Hackin Fest @ Mile High [----] - In-Person/Virtual Conference - Keynote Speakers Announced Register now for Wild West Hackin Fest Mile High Denver [----] - In-Person/Virtual Conference: https://wildwesthackinfest.com/register ///Black Hills Infosec Socials Twitter: https://twitter.com/BHinfoSecurity Mastodon: https://infosec.exchange/@blackhillsinfosec LinkedIn: https://www.linkedin.com/company/antisyphon-training Discord: https://discord.gg/ffzdt3WUDe ///Black Hills Infosec Shirts & Hoodies https://spearphish-general-store.myshopify.com/collections/bhis-shirt-collections ///Black Hills"
YouTube Link 2025-12-18T14:30Z 56.4K followers, [---] engagements

"Cyber on a Shoestring: Building Wagyu Career Skills and Experience on a Ramen Budget Evan Kirstein Cyber on a Shoestring: Building Wagyu Career Skills and Experience on a Ramen Budget Speaker: Evan Kirstein Landing a cybersecurity job requires experience but getting that experience can feel impossible when you are trying to break in switch specialties or stretch out a tight budget. This presentation shows you how to build real demonstrable skills without needing expensive gear or paid programs. We will explore free and affordable ways to create meaningful hands-on experience through home labs"
YouTube Link 2025-12-22T13:00Z 56.4K followers, [---] engagements

"An Invitation to Way West Wild West Hackin' Fest - John Strand John Strand would like to invite you Way West - Wild West Hackin' Fest. Find out more:https://www.wildwesthackinfest.com/"
YouTube Link 2020-01-11T15:51Z 56.3K followers, [----] engagements

"Passive DNS Collection and Analysis -- the dnstap (& fstrm) Approach From Wild West Hackin' Fest [----] in Deadwood SD. Presenter: Paul Vixie Dr. Paul Vixie used to be a programmer (cron bind rtty ncap dnscap) and has contributed to many dns-related RFC documents (1876 [----] [----] and so on). he founded and ran several companies (PAIX MAPS MIBH ISC Farsight) and was a technical executive at others (Abovenet/MFN). he co-invented the RBL and RPZ distributed reputation technologies among others. today his main activity seems to be deleting spam and ranting about things. Follow Wild West Hackin' Fest"
YouTube Link 2018-11-08T21:58Z 55.7K followers, [----] engagements

"Wild West Hackin Fest @ Mile High [----] - In-Person/Virtual Conference - Register Now Register now for Wild West Hackin Fest Mile High Denver [----] - In-Person/Virtual Conference: https://wildwesthackinfest.com/register ///Black Hills Infosec Socials Twitter: https://twitter.com/BHinfoSecurity Mastodon: https://infosec.exchange/@blackhillsinfosec LinkedIn: https://www.linkedin.com/company/antisyphon-training Discord: https://discord.gg/ffzdt3WUDe ///Black Hills Infosec Shirts & Hoodies https://spearphish-general-store.myshopify.com/collections/bhis-shirt-collections ///Black Hills Infosec"
YouTube Link 2026-01-23T21:11Z 56.4K followers, [--] engagements

"WWHF [----] (Virtual): Don't Cross The Streams: The Battle Over DNS Control-Plane - Daniel Schwalbe https://www.wildwesthackinfest.com 00:00 - Pay No Attention to the Tiny Green Men Behind the Curtain 00:49 - What We Talking About 02:29 - Why Encrypt DNS Resolutions 04:44 - Encryption Options 10:23 - Performance 13:02 - Security 22:39 - Network Management 26:31 - Privacy 31:24 - Conclusion -- DNS-over-HTTPS and DNS-over-TLS have become charged topics of discussion between network operators browser companies and public recursor operators. It is worth discussing how both of these technologies"
YouTube Link 2020-07-21T18:56Z 55.7K followers, [---] engagements

"Stochastic Garrotes: A Data Driven Approach to LLM Generated Malware Ryan Ashley Stochastic Garrotes: A Data Driven Approach to LLM Generated Malware Speaker: Ryan Ashley Principal Engineer Applied Research IQT Large Language Models are everywhere now and their role as coding assistants has sparked growing fears about a coming wave of AI generated malware. But this creates a strange sort of Fermi Paradox. If these models are truly as powerful as many claim where is all the malware Threat actors tend to adopt new technology quickly. They follow trends. They capitalize on opportunity fast. In a"
YouTube Link 2026-01-02T17:00Z 56.4K followers, [---] engagements

"Too Much JSON Try jq BB King jq Tutorial: Master JSON on the Command Line Unix Philosophy in Action The Unix Philosophy teaches that text streams are a universal interface. Programs should produce plain text output so other programs can use it as input with minimal friction. This made the command line incredibly powerful until JSON became the standard for modern data interchange. Enter jq the ultimate command line JSON processor. With jq you can parse filter extract and transform JSON data as easily as using awk cut or grep. Even a little familiarity will allow you to handle complex JSON"
YouTube Link 2025-11-24T20:08Z 56.4K followers, [---] engagements

"Hiding in Plain Sight: Shellcode Obfuscation Techniques Mike Saunders 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com It doesnt matter how advanced your shellcode loader is if you dont protect your shellcode from prying AV & EDR sensors youre going to have a bad time. From simple encryption schemes like the Caesar cipher to more complex schemes like AES reversing arrays steganography encoding shellcode as other data types and other"
YouTube Link 2025-02-13T05:00Z 54.3K followers, [---] engagements

"Hardware Hacking Curiosity IoT & Firmware Hacking Adrien Lasalle Hardware Hacking Explained IoT Security Firmware Analysis & Real Attacks In this video we break down the essentials of hardware hacking and why its a critical part of modern cybersecurity. Learn how to perform IoT reconnaissance analyze hardware interfaces like UART JTAG and SPI and extract or reverse engineer firmware to uncover vulnerabilities. Youll also see live demos on real devices including: Wi-Fi Router: firmware extraction secret hunting and security analysis Connected Camera: exploiting a known CVE to achieve remote"
YouTube Link 2025-11-18T18:49Z 56.4K followers, [---] engagements

"Building a Hacking Lab on Azure Jordan Drysdale and Kent Ickler How to build a cybersecurity lab fast with Azure ARM templates Automate Active Directory setup and common tool installs Rapid testing cleanup and lab lifecycle management Real-world insights from BHIS pentester Jordan Drysdale Who Its For: Pentesters red teamers blue teamers SOC analysts and security researchers who want to automate Azure-based lab environments. Optional: Pre-configure a Pay-As-You-Go Azure account if youd like to follow along. Chapters 00:00 - Intro & Workshop Overview 00:06 - Why Build Labs in Azure 00:28 - ARM"
YouTube Link 2025-11-14T18:03Z 56.4K followers, [---] engagements

"The Tao and Te of Device Code Phishing Andrew Krug 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com In this session well dive deep on the different ways device code authentication can be exploited and changes that cloud providers are making to mitigate phishing that targets this type of authentication flow. As a bonus youll also get a peek at how a new concept; trusted identity propagation helps companies build chains of trust to"
YouTube Link 2025-04-08T04:00Z 55.7K followers, [---] engagements

"Ghosts in the Graph: GoPhlare Meets BloodHound Phil Miller Ghosts in the Graph GoPhlare Meets BloodHound Detect AD Attack Paths from Breached Credentials In this talk Phil Miller demonstrates how to leverage GoPhlare an open-source tool alongside BloodHound Community Edition to uncover Active Directory attack paths using breached credentials. Learn how to automate credential correlation streamline breach data analysis and identify high-value targets without noisy password spraying. Youll discover: Why breach credential correlation matters for red teams and pentesters How GoPhlare accelerates"
YouTube Link 2025-11-21T19:37Z 56.4K followers, [---] engagements

"Hack Dumberly Not Harderer From Wild West Hackin' Fest [----] in Deadwood SD. Presenters: Derek Banks & Tim Medin Tim Medin is the founder and Principal Consultant at Red Siege a company focused to adversary emulation and penetration testing. Tim is also the SANS MSISE Program Director and a course author. Through the course of his career Tim has performed penetration tests on a wide range of organizations and technologies. He gained information security experience in a variety of industries including previous positions in control systems higher education financial services and manufacturing."
YouTube Link 2018-12-04T18:48Z 55.7K followers, 13.9K engagements

"Vulnerability analysis: most likely doing it wrong John Strand & Bryson Bort San Diego [----] Attend Wild West Hackin' Fest (WWHF) in Deadwood In-Person and Virtual https://wildwesthackinfest.com/deadwood/ In this talk John and Bryson will talk about how companies fail to effectively tackle modern vulnerabilities"
YouTube Link 2022-10-27T10:00Z 56.3K followers, [----] engagements

"Keynote Roundtable Paul Vixie Lesley Carhart Marcus J Carey & John Strand [--] Hour WWHF Virtual Registration https://wildwesthackinfest.com/deadwood/ WWHF Discord https://discord.gg/wwhf 00:00:00 - PreShow Banter One Weird Thing 00:03:51 - PreShow Banter Wild West Hackin Fest Preview 00:07:18 - PreShow Banter Introducing The Roundup 00:09:30 - Feature Presentation: Keynote Roundtable Lesley Carhart Marcus J Carey Dr. Paul Vixie & John Strand Join us for a 1-hour panel discussion hosted by John Strand. It's like PreShow Banter but actually about important stuff. This years Wild West Hackin Fest"
YouTube Link 2020-09-02T14:13Z 56.3K followers, [---] engagements

"Legally Compliant: An Incident Handlers Take on Cyber Legal in an Incident Ben Renz & Bradford Alt Legally Compliant: An Incident Handlers Take on Cyber Legal in an Incident Presenters: Ben Renz & Bradford Alt Regulations are increasing reporting timelines are tightening and cyber insurance requirements are shifting. The legal landscape around incidents is evolving just as fast as the threats themselves. While we are not lawyers we have worked closely with legal teams across multiple incident responses giving us a practical perspective on how cyber and legal worlds continue to merge. This"
YouTube Link 2026-01-20T04:58Z 56.4K followers, [---] engagements

"AI-Driven OSINT in the Hands of Cybercriminals James McQuiggan 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com Cybercriminals increasingly leverage Artificial Intelligence (AI) and Generative AI in Open Source Intelligence (OSINT) activities to enhance reconnaissance efforts targeting individuals and organizations. By utilizing AI-driven techniques attackers can efficiently gather analyze and exploit publicly available data"
YouTube Link 2025-05-06T04:00Z 56.4K followers, 21.1K engagements

"Effectively Detecting Modern Code Injection Techniques with Volatility [--] Andrew Case 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com In this talk attendees will be shown how to use Volatility [--] the latest version of the most widely used open-source memory forensics framework to detect methods that modern stealthy malware uses to inject code such as process hollowing process ghosting module stomping and their many variants that are"
YouTube Link 2025-04-03T04:00Z 55.7K followers, [---] engagements

"Mapping Your Network to Mitre ATT&CK to Visualize Threats Logging and Detection w/ Wade Wells Find out about upcoming Hackin' Casts training and in-person & virtual infosec conferences at https://www.wildwesthackinfest.com 0:00 - Hotel California 0:42 - The Mitre Attack Map 3:21 - Three Tools 3:52 - OK But Why 4:40 - So Hot Right Now 5:26 - Challenge Accepted 7:00 - Mitre ATT&CK Navigator 9:14 - DeTT&CT 18:23 - My Network's Setup Example 20:34 - Atomic Red Team 23:43 - End Credits 24:12 - Q&A Extended Edition Using open-source tools Wade will describe how to map test and display your network"
YouTube Link 2020-06-22T19:04Z 55.7K followers, [----] engagements

"TRACK [--] Blue Team Summit August [--] [----] /// 📄 Register Now for the the Summit and for Training: https://cvent.me/9OVzwV /// 📄 Live Chat will take place in the Antisyphon Training Discord: https://discord.gg/antisyphon Last March we had theMost Offensive Con that Ever Offensivedonline summit event featuring talks and trainings for Red Teamers. Now were putting together a similar summit event just for the Blue Team Blue Teamers have it rough so were putting together an online summit event just for them featuring talks trainings and lots of fun and frivolity TheAntisyphon Blue Team Summit"
YouTube Link 2023-08-23T20:06Z 55.7K followers, [----] engagements

"DoH DNS over HTTPS: for Attackers and Defenders - Marcus W Tonsmann https://www.wildwesthackinfest.com DoH is coming. This talk will prepare you by covering the basics of the protocol available tools for testers and techniques being leveraged by real adversaries. Proactive defensive measures will also be discussed with an eye towards the future. Marcus works as a Detection Engineer at a national healthcare company. In his role he spends a lot of time researching offensive techniques and how to detect and prevent them. Currently he holds GPEN GDAT and GNFA certifications. When not in front of"
YouTube Link 2020-02-25T16:14Z 55.7K followers, [----] engagements

"Encrypting Buckets for Compliance and Ransom: Using KMS to Ransomware S3 Buckets Bleon Proko 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com A successful ransomware attack is the culmination of numerous steps by a determined attacker: gaining initial access to the victims environment identifying sensitive data exfiltrating sensitive data encrypting original data etc. We can all agree that Ransomware is tough. Its hard on the target"
YouTube Link 2025-03-13T04:00Z 55.7K followers, [---] engagements

"WWHF24 [--] Y TOOL DarkWidow Soumyanil Biswas 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com Links to higher-resolution versions of the demos used in this presentation: DarkWidow V1 : Evade ( NonAdmin process) Sophos XDR : "Call For Tools" Demo https://www.youtube.com/watchv=YEe3HccdvBk DarkWidow V1: Evade (Admin privilege process) Sophos XDR: "Call For Tools" Demo https://www.youtube.com/watchv=IL-FpKS_LzY DarkWidow V2 - Synthetic"
YouTube Link 2025-02-17T05:00Z 54.3K followers, [--] engagements

"The Art of Lurking: Effective C2 Channels Corey Overstreet 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com Lurking means to wait or move in a secret way so that you cannot be seen. On a red team or assumed breach operation our success hinges on how our implants communicate with us. The way these communications happen - how fast how often and how much data is exchanged - is key to realistically mimicking cyber attackers. In this"
YouTube Link 2024-12-23T05:00Z 55.7K followers, [----] engagements

"ELD Device Security From Wild West Hackin' Fest [----] in Deadwood SD. Presenters: Brian Fehrman and David Fletcher David has extensive experience in a wide array of IT disciplines having worked in the industry for [--] years. His experience includes enterprise system administration application and database development network defense and cyber research and development. He is a graduate of the SANS Technology Institute MSISE program holds many certifications (including GSE) and teaches the SANS SEC504 and SEC560 courses. Brian has been interested in security from the time his family obtained"
YouTube Link 2018-12-17T03:03Z 55.8K followers, [----] engagements

"OSINT Gone Wild: How I Found Drug Traffickers and NarcoTerrorists Online Schuyler Davis 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com In this presentation I'll present my thorough research on how narcotics narcoterrorism and the fentanyl epidemic are new cyber crime issues. I will show you how OSINT can be used to combat illicit narcotic transactions narcoterrorism and uncover valuable information from the dark web. 00:00 -"
YouTube Link 2025-07-29T09:01Z 56.4K followers, [---] engagements

"Attacking AI - The New Frontier Jason Haddix Attacking AI - The New Frontier Speaker: Jason Haddix Artificial intelligence is now embedded in applications networks SaaS platforms security products and decision-making systems that impact millions of users every day. While many AI security talks stay academic this keynote is built specifically for penetration testers red teamers and offensive security professionals who need real-world methods they can use immediately. In this session you will learn practical AI attack techniques including: AI jailbreaks and prompt injection attacks Bypassing"
YouTube Link 2025-12-01T13:01Z 56.4K followers, [----] engagements

"PWN Free or Die Hard: The YOLO Index and Tactical Risk in Red Team Alethe Denis PWN Free or Die Hard: The YOLO Index and Tactical Risk in Red Team Presenter: Alethe Denis Physical red team operations demand constant judgment calls: when to take bold high-risk actions and when to pull back to protect the team. In this session Alethe Denis introduces the YOLO Index a practical real-world model for evaluating risk reward and operational safety during high-stakes physical penetration tests. Through field stories tactical examples and lessons drawn directly from live engagements youll learn how"
YouTube Link 2026-01-26T17:01Z 56.4K followers, [---] engagements

"Consent Alignment and Cooperation in the Internet Era - Paul Vixie https://www.wildwesthackinfest.com/ Much of the spectrum of human action and human custom translates more or less obviously from the real world ("meat space") into the Internet ("cyber space"). Yet some pieces of the human puzzle do not have an obvious place in the Internet game board and this has wrought unconsidered change to human society through its digital nervous system the Internet. Is this merely the post-Westphalia era or as many claim the post-national era Let's discuss. Dr. Paul Vixie is an internet pioneer."
YouTube Link 2020-02-27T16:01Z 55.8K followers, [---] engagements

"TOOL: Adam and Eve Darryl Baker 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com Adam and Eve is a Remote Access Tool socket (and HTTP) server used to interact with Active Directory Environments across the Internet via a Flask API. It is modular so custom commands (and custom scripts) can be uploaded and invoked on a client machine in real time. ///Black Hills Infosec Socials Twitter: https://twitter.com/BHinfoSecurity Mastodon:"
YouTube Link 2025-02-12T05:00Z 54.3K followers, [---] engagements

"WWHF (Virtual): Backdoors & Breaches - John Strand John Strand teaches and explains how to play the Incident Response card game"
YouTube Link 2020-07-21T18:52Z 56.3K followers, [---] engagements

"The Human Vulnerability: Social Engineering in a Hyper Connected World David Boyd In a hyperconnected world the most reliable vulnerability is still the human element. Social engineering remains one of the most effective ways attackers bypass security controls and gain access to sensitive information. This talk breaks down real-world social engineering tactics including: Phishing and email-based attacks Vishing and phone-based scams Physical intrusion and tailgating Pretexting and impersonation Youll see real examples of how attackers exploit emotions like urgency trust curiosity and sympathy"
YouTube Link 2025-12-08T13:01Z 56.4K followers, [---] engagements

"I'll Let Myself In: Tactics of Physical Pen Testers Join us at the annual information security conference in Deadwood SD (in-person and virtually) Wild West Hackin' Fest: https://wildwesthackinfest.com/ Wild West Hackin' Fest [----] Presented by Deviant Ollam: https://enterthecore.net/ Description: Many organizations are accustomed to being scared at the results of their network scans and digital penetration tests but seldom do these tests yield outright "surprise" across an entire enterprise. Some servers are unpatched some software is vulnerable and networks are often not properly segmented."
YouTube Link 2017-12-12T00:47Z 55.8K followers, 3M engagements

"Beyond the Malware: Dissecting Info Stealers' Infection Vectors Stolen Assets and Countermeasures Beyond the Malware: Dissecting Information Stealers' Infection Vectors Stolen Assets and Countermeasures Speakers: Olivier Bilodeau and Eric Boivin Senior Technical Platform Specialist Flare Modern information stealers have grown far beyond basic credential theft and now operate as highly advanced tools capable of capturing full digital fingerprints of their victims. In this technical deep dive the speaker presents new research into how modern stealers are built how their attack chains operate"
YouTube Link 2025-12-29T16:01Z 56.4K followers, [---] engagements

"Web Application Authorization: Taming the Perfect Storm Tim Tomes Web Application Authorization: Taming the Perfect Storm Presenter: Tim Tomes Access control vulnerabilities are everywhere. Across my last [--] web application security assessments I identified [--] access control related findings which means almost every modern application has at least one serious flaw. This aligns with OWASP which ranks Broken Access Control as the number one risk facing web applications today. But why is this problem so persistent The simple answer is that access control is difficult. It is difficult to design"
YouTube Link 2026-01-17T02:01Z 56.4K followers, [---] engagements

"TOOL: DarkWidow Soumyanil Biswas 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com Links to the demos used in this presentation: DarkWidow V1 : Evade ( NonAdmin process) Sophos XDR : "Call For Tools" Demo https://www.youtube.com/watchv=YEe3HccdvBk DarkWidow V1: Evade (Admin privilege process) Sophos XDR: "Call For Tools" Demo https://www.youtube.com/watchv=IL-FpKS_LzY DarkWidow V2 - Synthetic Frame Thread Stack Spoofing Enabled"
YouTube Link 2025-02-17T07:24Z 54.3K followers, [---] engagements

"WWHF Post Breach FSOS (False Sense of Survival) Joey Marinello [--] Hour Chapters: 00:00:00 - PreShow Banter 00:29:17 - FEATURE PRESENTATION 01:08:31 - Questions & Answers Join the WWHF Community Discord: https://discord.gg/wwhf Incident Response (IR) is a complex and challenging process. By nature of the trade it is easy to get lost in the active phase of an incident and tune everything else out. Effective post-incident analysis and action are critical to our success as Incident Responders. In this talk we will take a step back and focus on the Lessons Learned phase of IR. We will deep dive"
YouTube Link 2021-12-15T19:05Z 56.3K followers, [---] engagements

"How To Learn Faster With AI: Sampling Broadly Delving Efficiently Absorbing Fully Jeff McJunkin How To Learn Faster With AI: Sampling Broadly Delving Efficiently Absorbing Fully Presenter: Jeff McJunkin Imagine learning five times more every week and watching that compound over the course of your career. This talk breaks down a practical AI driven workflow that helps you identify high value topics instantly filter out the noise and capture more information with less effort. You will learn how to pull transcripts from online media using Dev Tools and speech to text then turn that content into"
YouTube Link 2026-02-06T21:53Z 56.4K followers, [---] engagements

"Exploiting AI: A Case Study on Voice Biometric Penetration Testing Exploiting AI: A Case Study on Voice Biometric Penetration Testing Speaker: Skyler Tuter This talk presents a real-world case study examining how AI voice cloning can be used to defeat voice biometric authentication systems. Based on a recent engagement with a major financial institution the session walks through how voice-based identity verification in Interactive Voice Response systems can be manipulated using advanced AI voice synthesis techniques. The presentation breaks down the methodology used during the penetration"
YouTube Link 2026-01-09T17:00Z 56.4K followers, [---] engagements

"AI Agents in Action: Protecting Against Synthetic Media and Human Risk Exploits James McQuiggan AI Agents in Action: Protecting Against Synthetic Media and Human Risk Exploits Presenter: James McQuiggan AI agents and Agentic AI are reshaping the cybersecurity landscape creating a new era where artificial intelligence can act adapt and make decisions at machine speed. This talk explores the dual nature of AI agents: powerful tools for defenders and potent weapons for attackers. Cybercriminals are already using agentic systems deepfakes and synthetic media to launch highly targeted social"
YouTube Link 2026-02-02T22:00Z 56.4K followers, [---] engagements

"CTF 101: How to Play and Win Roman Bohuk 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com Capture the Flag (CTF) competitions offer a great way to acquire new technical skills while having fun and meeting new people. If you have never participated in a CTF event before it can feel intimidating to try. This quick talk will walk you through the different types of cybersecurity competitions and go over jeopardy-style CTFs. You will"
YouTube Link 2024-12-17T05:00Z 56.3K followers, [---] engagements

""Everything is a Proxy if You Try Hard Enough"- Old RFCs New Exploits Ken Pyle "Everything is a Proxy if You Try Hard Enough" - Exploiting Old RFCs for New Types of Exploitation Speaker: Ken Pyle The core protocols of the internet are old vague and full of cracks. This session breaks down several new exploitation and exfiltration techniques that take advantage of those gaps in HTTP DNS proxies and CDNs. Well cover: HTTP Status Code Injection for data exfiltration and covert signaling Arbitrary Protocol Injection over HTTP letting attackers bypass firewalls and tunnel traffic through proxies"
YouTube Link 2026-01-12T23:41Z 56.4K followers, [----] engagements

"Thirteen Steps to Being Unbroken: Infosec for the Underfunded Tarah Wheeler Thirteen Steps to Being Unbroken: Infosec for the Underfunded Presenter: Tarah Wheeler Small and underfunded organizations are being crushed by todays cybersecurity landscape. Theyre expected to meet the same strict regulatory requirements as massive enterprises but with a fraction of the money staffing and influence. CISAs local support efforts have stalled incident responders are burning out and smaller orgs are now stuck in a storm of regulatory confusion and real-world threats. Holidays only make things worse as"
YouTube Link 2026-02-10T16:34Z 56.4K followers, [---] engagements

"How I Used AI to Crush CTF Challenges and What I Learned Along the Way Tabatha Kossman 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com Participating in Capture The Flag (CTF) competitions is always a thrilling experience but this time I had a secret weapon up my sleeve: AI. From cracking codes to navigating complex cyber challenges AI became my go-to sidekick. Here's how I teamed up with AI to tackle CTF puzzles and what I learned"
YouTube Link 2025-07-15T07:30Z 56.4K followers, [---] engagements

"The Terminator Effect: AI's Role in Fighting Cyber Threats James McQuiggan WWHF [----] 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ To effectively mitigate the risks associated with AI-based cybersecurity systems it is crucial to implement a range of risk mitigation strategies such as developing robust training datasets multi-layered security architectures industry-standard practices into accountability and transparency and continuously monitoring and updating AI models. Additionally organizations must"
YouTube Link 2024-05-14T11:00Z 56.4K followers, [---] engagements

"Tool Demo BBOT The Techromancer WWHF Deadwood [----] Join us at the annual information security conference in Deadwood SD (in-person and virtually) Wild West Hackin' Fest: https://wildwesthackinfest.com/ BBOT (Bighuge BLS OSINT Tool) is an OSINT framework written in Python. It uses a recursive consumer-event system similar to Spiderfoot but with several improvements including a more powerful threading engine and a versatile tagging system that automatically labels events according to whether theyre in scope resolved/unresolved wildcard etc. It can be used both as a Python library and as a CLI"
YouTube Link 2023-07-12T11:00Z 56.3K followers, [---] engagements

"Giving Swords to Our Future AI Overlords Matt Lee and Eric Stevens Giving Swords to Our Future AI Overlords Presenters: Matt Lee and Eric Stevens Artificial intelligence is no longer limited to chatbots and copilots. With advances in Model Context Protocols and agentic systems AI can now reason take action and interact across interconnected tools APIs and automated workflows. When misused a single prompt injection can cascade across multiple agents and decision-making systems. In this talk you will see how something as simple as a malicious LinkedIn bio can be used to manipulate an AI-powered"
YouTube Link 2026-01-30T21:12Z 56.4K followers, [---] engagements

"WWHF AppSec Triage: Finding Needles in the Application Haystack Kevin Johnson & Nathan Sweaney 00:00:00 - PreShow Banter [--] Pounds of Wig Hair 00:32:10 - FEATURE PRESENTATION 01:28:19 - Questions and Closing Join the WWHF Community Discord: https://discord.gg/wwhf In this presentation Nathan Sweaney and Kevin Johnson of Secure Ideas will discuss how penetration testers and security professionals can improve the efficiency of their testing. Working with real applications Nathan and Kevin will show attendees how to determine what parts of the application are important to prioritize during"
YouTube Link 2022-01-19T19:06Z 55.7K followers, [----] engagements

"Breaking NTLMv1 For Once And For All (w/Bonus Kerberoasting talk) Jeff McJunkin 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ With network authentication protocols the most important thing is to not yell the secret in plain text. It turns out that half of the on-premise Windows challenge/response protocols (LM Challenge/Response and NTLMv1) fail that basic test for about $30 in cloud costs with potentially catastrophic results. Come to this Tool Shed talk demo and tool release to see just how broken it is and"
YouTube Link 2025-01-13T11:03Z 53.7K followers, [---] engagements

"WWHF Making MITRE ATT&CK Actionable Josh Rickard [--] Hour Join the WWHF Community Discord: https://discord.gg/wwhf 00:00:00 - PreShow Banter 00:21:42 - FEATURE PRESENTATION 01:17:08 - Questions and Closing MITRE ATT&CK provides security teams with a framework to assist with detecting attacks and techniques used by malicious actors. Currently using MITRE ATT&CK generally entails an intensely manual process since MITRE ATT&CK is strictly text-based. In order to build detections or create defense strategies using ATT&CK security practitioners must have deep technical knowledge of attack phases"
YouTube Link 2022-01-12T19:07Z 54.3K followers, [----] engagements

"Threat Hunting with a Chorus of Strings Jonathan Ham 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ Three common real-world scenarios will be presented in which analysis of network-based evidence can be sufficiently done with nothing more sophisticated than captured PCAP data and 'strings'. ///Black Hills Infosec Socials Twitter: https://twitter.com/BHinfoSecurity Mastodon: https://infosec.exchange/@blackhillsinfosec LinkedIn: https://www.linkedin.com/company/antisyphon-training Discord:"
YouTube Link 2025-01-07T05:00Z 53.7K followers, [---] engagements

"Tool Demo Sirius Scan & Nmap Scripting Engine Matthew Toussain WWHF Deadwood [----] Join us at the annual information security conference in Deadwood SD (in-person and virtually) Wild West Hackin' Fest: https://wildwesthackinfest.com/ Sirius is the first truly open-source general purpose vulnerability scanner. Today the information security community remains the best and most expedient source for cybersecurity intelligence. The community itself regularly outperforms commercial vendors. This is the primary advantage Sirius Scan intends to leverage. The framework is built around four general"
YouTube Link 2023-09-08T11:10Z 52.5K followers, [---] engagements

"I Want You to Hack AWS: Cloud Penetration Testing for Traditional Hackers Nick Frichette 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com I Want You to Hack AWS: Cloud Penetration Testing for Traditional Hackers Nick Frichette As the world's largest cloud platform Amazon Web Services (AWS) powers millions of applications and deployments making it a common target for offensive security professionals. The complexity of AWS introduces"
YouTube Link 2025-03-06T05:00Z 55.6K followers, [----] engagements

"Gravwell CE for Logs: The Truth Is In There Corey Thuen 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com Whether you're experimenting in your homelab or building "Management Pacification Dashboards" for work logs are crucial. Join Gravwell founder Corey Thuen as he uses the Gravwell CE (free 15gb/day for personal OR commercial use) to teach basic log correlation plus a bit of advanced techniques to show the "art of the possible"."
YouTube Link 2025-01-09T05:00Z 54.2K followers, [---] engagements

"PowerPug a Tool to Help People Use a Single Group Jake Hildreth 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com PowerPUG is a tiny tool built to help Active Directory (AD) admins operators and defenders smoothly transition their most sensitive users (Domain Admins etc.) into the AD Protected Users Group (PUG) with minimal complications. The PUG provides its member multiple non-configurable protections that stop common attacks in"
YouTube Link 2025-01-14T05:00Z 54.2K followers, [---] engagements

"Six Things DevOps Wants from InfoSec Naomi Buckwalter WHF [----] 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ Why does it seem that DevOps and Security are always at odds with each other Why does Security have such a bad reputation among developers In this talk "Six Things DevOps Wants from InfoSec" you'll learn that developers actually WANT to work with Security - they care about writing secure code But we as security professionals need to understand that developers don't want another "Big Brother" telling"
YouTube Link 2024-05-27T11:00Z 55.6K followers, [---] engagements

"The Ethics of Digital Surveillance Kathryn Carnell Deadwood [----] Join us at the annual information security conference in Deadwood SD (in-person and virtually) Wild West Hackin' Fest: https://wildwesthackinfest.com/ The Ethics of Digital Surveillance: Making Sense of Our Liberties in a Connected Age With more people transitioning to work-from-home practical technological integrations have reached new heights. This is great More tech in our daily lives means new problems new perspectives new solutions and more creativity: widening the field to include all kind of people and situations is a"
YouTube Link 2023-08-07T11:00Z 54.3K followers, [---] engagements

"Hunting for Windows Features and How To Use Them Chris Spehn WWHF San Diego [----] Attend Wild West Hackin' Fest (WWHF) in Deadwood In-Person and Virtual https://wildwesthackinfest.com/deadwood/ Offensive security professionals have been using Frida for analyzing iOS and Android mobile applications. However there has been minimal usage of Frida for desktop operating systems such as Windows. Frida is described by the author as a Dynamic instrumentation toolkit for developers reverse-engineers and security researchers. From a security research and adversarial simulation perspective Frida can be"
YouTube Link 2023-10-16T04:16Z 52.5K followers, [---] engagements

"Hacking Through the Weeds Justin Watkins 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com Let's take a deep dive into Nmap and other open source reconnaissance tools These are tools that everyone has access to but they only use about 5% of their capabilities. I have worked with specific open source tools and have explored them thoroughly to learn some of their lesser-known features and I'll showcase them in this talk. 00:00 -"
YouTube Link 2025-05-27T05:00Z 56.4K followers, [---] engagements

"I Didn't Waste My Life Gaming I Learned Cyber Security Jenna Lawrence Samantha Peters 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ This presentation offers an exploration into the origins innovations and implications of hacking in the gaming industry. In a virtual world where pixels and code meet human creativity video games have taken off in popularity within the last [--] years. Beginning with a look at the rudimentary hacks of early classics we will explore how the earliest video game hacks shaped the"
YouTube Link 2024-12-31T05:00Z 53.7K followers, [---] engagements

"Playing Tag With Modern-Day AV and EDR: A Guide to Evading. Aryan Jogia & Chetanya Kunndra 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ From the perspective of a malware developer developing malware is considerably easier than evading it. In this talk we will discuss various techniques employed by malware developers to circumvent detection measure implemented by modern day AVs and EDRs. This talk will solely focus on the Windows ecosystem. We will discuss the nitty gritty of the Windows OS followed by"
YouTube Link 2025-01-08T05:00Z 53.7K followers, [---] engagements

"Dan DeCloss Purple Teaming With Runbooks for Plextrac WWHF Deadwood [----] Join the WWHF Community Discord: https://discord.gg/wwhf https://plextrac.com Everyone knows PlexTrac as The Purple Teaming Platform and our support for purple engagements has been taken to the next level with the creation of Runbooks for PlexTrac. Tune in to Purple Teaming with Runbooks for an engaging demo of the new module in action. See how Runbooks helps you rapidly plan Purple Team engagements through intuitive selection of Tactics Techniques and Procedures. Witness the execution of that plan from both the red and"
YouTube Link 2021-02-11T14:49Z 53.4K followers, [---] engagements

"What I Learned From Building A Tabletop Security Exercise Dwayne McDaniel 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com At DEFCON [--] my team taught over [---] people the limitations of manual code review to solve secrets sprawl. We did not use new tech we did not use computers or anything that needed electricity. We used paper cards. What we learned along the way was eye opening and changed the way I think about security. This talk"
YouTube Link 2025-05-13T08:00Z 56.4K followers, [---] engagements

"AD (Addie) and DNS (Dennis): A Match Made in Heck Jim Sykora & Jake Hildreth WWHF [----] 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ Since the mid-80s the Domain Name System (DNS) has been instrumental in improving the useability of computer networks and the Internet. In [----] Microsoft released Active Directory (AD) which combined DNS with a Lightweight Directory Access Protocol (LDAP) database and Kerberos authentication to create a unified directory service platform. Since ADs release the fates of AD and"
YouTube Link 2024-05-12T11:00Z 55.2K followers, [---] engagements

"Hackin' Cast: How to Sell Security to C Levels w Chris Brenton Find out about upcoming Hackin' Casts training and in-person & virtual infosec conferences at https://www.wildwesthackinfest.com 0:00 - Covid Style Haircuts & Other Courses 1:07 - Which C-Level Pitch is Best Pitch 3:59 - Security Leader Requirements 5:58 - Security Management Vs Tech Roles 9:11 - Step [--] Asses Unique Business Need(s) 13:55 - Talk to the Teams 15:56 - Collect Supporting Data 17:21 - Consider Question Tone 19:02 - Roles of Compliance 26:17 - Compliance Vs Security 29:40 - Layered Defense 32:55 - Collect & List"
YouTube Link 2020-06-04T21:18Z 55.5K followers, [----] engagements

"2024: A Cyborg Odyssey Len Noe 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com Transhumans individuals enhanced with technological augmentations have moved beyond science fiction into reality. Historically viewed through medical or cyborg lenses recent advancements like Brain-Computer Interfaces (BCIs) and SMART technologies are blurring the lines between physical and biological entities. This shift is significantly impacting"
YouTube Link 2025-06-17T04:45Z 56.4K followers, [---] engagements

"Will It Run Fooling EDRs With Command Lines Using Empirical Data Wietze Beukema 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com There is a wealth of system-native programs particularly on Windows operating systems that happily accept unexpected command-line transformations such as character substitutions deletions or insertions. An implication of this is that command-line-based detections can be bypassed with minimal effort and"
YouTube Link 2025-03-04T05:00Z 54.3K followers, [---] engagements

"Cybersecurity for the "Have-Nots" of the World Jake Williams WWHF [----] 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ The cybersecurity landscape can broadly be broken down into the haves vs the have-nots. The security recommendations offered by so many of just deploy X fall on deaf ears to the vast majority of organizations who fall into the latter category. Until the security gap for the have-nots of the world is closed were doomed to continue failing at security overall. Cybersecurity expert Jake Williams"
YouTube Link 2024-05-31T11:00Z 54.1K followers, [---] engagements

"Demystifying Deep Fakes Anmol Agarwal 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com Artificial Intelligence is being used to create deep fakes to manipulate public opinion. I'll show you how AI is used to create deep fakes and discuss current strategies that you can use to spot them including tools used for deep fake detection. After the talk you will have a better understanding of deep fake technology and be armed with some"
YouTube Link 2025-02-05T05:00Z 54.2K followers, [---] engagements

"Identifying New Attack Paths via Password Analysis Esteban Rodriguez 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com In this talk I will cover how you can enrich BloodHound with different fields and edges to expose previously unidentified attack paths. By combining multiple open source tools it is possible to track password sharing relationships across separate accounts and even across different Active Directory forests. 00:00 -"
YouTube Link 2025-04-10T04:00Z 54.5K followers, [---] engagements

"From Prototype to Production: Engineering Physical Tools for Offensive Security Travis Weathers 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com Whether youre designing a long-range skimmer an embedded implant or a portable badge cloning rig understanding the full lifecyclefrom design to deploymentis critical. In this talk I will cover the end-to-end development of physical offensive security tooling covering: PCB Design &"
YouTube Link 2025-04-17T04:00Z 54.5K followers, [---] engagements

"Detection Engineering.My Educational Failures That Proved to be Useful After All Olaf Hartog 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com Failure can be a phenomenal teacher in the time-consuming and deeply technical field of Detection Engineering. In this talk Ill share my process for researching and creating detections. This is not always successful. In fact when researching some harder-to-detect techniques we sometimes end up"
YouTube Link 2025-06-03T04:00Z 56.4K followers, [---] engagements

"That's a Deal and That's a Legally Binding Offer: The Dark Side of Al Brian Mead TJ Toterhi 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com Let's explore the darker side of AI In this talk we'll dissect various attack vectors such as prompt injection (malicious input designed to manipulate AI output) data extraction (siphoning off sensitive information embedded within AI models) and evasion attacks (a nebulous category that"
YouTube Link 2025-01-28T05:00Z 54.2K followers, [---] engagements

"Dawn of Enlightenment: The Golden Age of Cybersecurity Knowledge and Collaboration Gerald Auger 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com ///Black Hills Infosec Socials Twitter: https://twitter.com/BHinfoSecurity Mastodon: https://infosec.exchange/@blackhillsinfosec LinkedIn: https://www.linkedin.com/company/antisyphon-training Discord: https://discord.gg/ffzdt3WUDe ///Black Hills Infosec Shirts & Hoodies"
YouTube Link 2024-12-16T15:30Z 54.1K followers, [---] engagements

"Getting Started in Entra ID Security Jonathan Rogers 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com ///Black Hills Infosec Socials Twitter: https://twitter.com/BHinfoSecurity Mastodon: https://infosec.exchange/@blackhillsinfosec LinkedIn: https://www.linkedin.com/company/antisyphon-training Discord: https://discord.gg/ffzdt3WUDe ///Black Hills Infosec Shirts & Hoodies"
YouTube Link 2025-02-11T05:00Z 54.2K followers, [---] engagements

"GraphRunner Beau Bullock Steve Borosh WWHF [----] 🔗 Join us in-person and virtually at our Wild West Hackin' Fest Information security conferences https://wildwesthackinfest.com/ During this presentation I will provide an in-depth exploration of GraphRunner's features showcasing its role in elevating post-exploitation strategies. Designed to empower both red team professionals and defenders this toolset equips users with a means to navigate the intricate Graph API at the heart of M365 and manipulate it for offensive purposes. GraphRunner offers functionalities that aid in lateral movement data"
YouTube Link 2024-04-25T13:00Z 55.6K followers, [---] engagements

"The Invisibility Cloak: Obfuscate C# Tools to Evade Signature Based Detection Brett Hawkins Attend Wild West Hackin' Fest (WWHF) in Deadwood In-Person and Virtual https://wildwesthackinfest.com/deadwood/ Attackers and offensive security professionals have been migrating from PowerShell to C# for post-exploitation toolkits due to advances in security product configurations and features. An example of one of these improvements has been AMSI for .NET which allows the scanning of .NET assemblies in memory. Currently the majority of detections for these C# tools rely on static signatures rather"
YouTube Link 2022-10-26T10:00Z 55.7K followers, [----] engagements

"Stephen Spence Converting Blue Team into Advanced Host-Based Alerting WWHF Deadwood [----] Join the WWHF Community Discord: https://discord.gg/wwhf 0:00:00 - One More Thing About Cats 0:04:08 - FEATURE PRESENTATION: Converting Blue Team Expertise of Customer Networks into Advanced Host-Based Alerting 0:08:23 - Overview 0:10:36 - Setup For Success 0:13:52 - Does Your Sysmon Config Look Like This 0:16:24 - Avoid Self-Inflicted Wounds 0:19:56 - Avoid Fear-Based Paralysis 0:23:04 - Sigma Signatures 0:28:38 - Same Page Same Page 0:32:12 - Which Question is Best Questions 0:35:51 - Renamed Processes"
YouTube Link 2021-02-11T14:49Z 55.5K followers, [---] engagements

"Never Say Anything: NSA Hacking for Defense at Scale Tony Sager 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com Tony gives a historical and personal perspective on how the field of analysis at the NSA evolved from a focus on mathematics and cryptography through systems and software and then to live operational systems. Whats it like to spend a career as a cyberdefender for the DoD and the nation but homed inside of an intelligence"
YouTube Link 2025-01-16T05:00Z 55.4K followers, [----] engagements

"Baselining for Bad Things with Surveyor Tre Wilkins 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com Surveyor is a free and open source tool for quickly baselining your environments to help identify abnormal activity. You can use it to query supported endpoint detection and response (EDR) products in search of potentially dangerous software that shouldnt be in your environment. In this session well look at remote monitoring and"
YouTube Link 2025-05-08T04:00Z 56.4K followers, [---] engagements

"JWT. Misuse. & Abuse Tim Tomes 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com JWTs are an incredibly flexible tool that make life easier for developers because they are standardized widely supported and include important security features by default. However like any powerful tool JWTs can be dangerous when used incorrectly or for unintended purposes. In this talk I aim to shine a light on common JWT misuse and abuse. I'll start"
YouTube Link 2024-12-26T05:00Z 54.3K followers, [---] engagements

"EDR Internals for macOS and Linux Kyle Avery 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com Endpoint Detection and Response (EDR) agents typically comprise multiple sensory components that collect information from various telemetry sources the operating system provides. Many public blogs and conference talks have covered Windows telemetry sources such as kernel callbacks and ETW but only some mention macOS and Linux equivalents."
YouTube Link 2024-12-18T05:00Z 54.5K followers, [---] engagements

"Tool/Game: KC7 Jibby Saetang 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com KC7 game website: https://kc7cyber.com/go/wwhf KC7 is a free cybersecurity game that simulates end-to-end intrusions against a fictional company using data modeled on real-world threat actors. Players ranging from students to professionals use Kusto Query Language (KQL) within the Azure Data Explorer (ADX) to analyze complex datasets including Web Email"
YouTube Link 2025-02-18T05:00Z 54.3K followers, [---] engagements

"Epic Fails and Heist Tales: Red Teaming Toward Truly Tested Security Alethe Denis 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com Alethe takes audiences on a riveting journey into the realm of red teaming through captivating narratives and insightful analysis. Delving into real-life experiences the keynote unveils the complexities and nuances of red team engagements showcasing both the spectacular failures and successful heists"
YouTube Link 2025-01-27T05:37Z 54.2K followers, [---] engagements

"Nadean Tanner Secret Thoughts of a Successful Hacker WWHF Deadwood [----] Join the WWHF Community Discord: https://discord.gg/wwhf 00:00 - Nadean Is Lurking 03:53 - FEATURE PRESENTATION: Secret Thoughts of a Successful Hacker 10:57 - Impostor Syndrome 17:55 - Types of Imposters 20:19 - Who Am I 25:59 - Pluralistic Ignorance 28:33 - Four Stages of Competence 31:52 - Managing Self-doubt 44:01 - Wrapping Things Up"
YouTube Link 2021-02-11T14:49Z 54.5K followers, [---] engagements

"Extracting Data from Slack: Hackers Will You Should From Wild West Hackin' Fest [----] in Deadwood SD. Presenters: Carrie Roberts and Tony Habeger Is your Slack workspace full of sensitive data Wouldn't you like to know the details As an experienced red-teamer the answer to these two questions are 'yes' and 'oh baby yes'. I will be releasing and demonstrating a PowerShell script that will extract all documents and files that an authorized user has access to. It can also extract all user profiles. As an attacker I can use the profiles to extract user names email addresses phone numbers and job"
YouTube Link 2018-11-29T20:07Z 55.6K followers, [----] engagements

"Digital Doppelgngers: The Dual Faces of Deepfake Technology James McQuiggan 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ In society evolving artificial intelligence leverages cutting-edge technology to create synthetic text audio and video clips at a concerning rate. These emerging innovations pose significant threats to organizations' cybersecurity protocols and defenses. This presentation examines the multifaceted nature of deepfakes offering insights into their creation and detection what organizations"
YouTube Link 2024-12-27T05:00Z 53.7K followers, [---] engagements

"WWHF Breaking and Entering Tyler Robinson Red Team Roundup RECORDED AUGUST [--] [----] The Red Team Roundup Learn more about the speakers here: https://wildwesthackinfest.com/the-roundup-red-team/ Join the WWHF Community Discord https://discord.gg/wwhf Tyler Robinson As Managing Director of Offensive Security & Research at Trimarc Tyler leads a team of high-performance security professionals within the offensive security field by simulating sophisticated adversaries & creating scalable offensive security platforms using the latest techniques as seen in the wild. Tyler serves as a highly technical"
YouTube Link 2022-03-14T07:00Z 55.6K followers, [----] engagements

"Jargon & Jigsaw: Shellcode Obfuscation Mike Saunders 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com In this talk Mike will cover two highly effective techniques for obfuscating shellcode in your payloads. Jargon is a shellcode obfuscation method that substitutes dictionary words in place of shellcode bytes. This provides two benefits - your loader doesn't have any shellcode and the use of dictionary words reduces the entropy of"
YouTube Link 2025-08-05T04:00Z 56.4K followers, [---] engagements

"Your Favorite Coffee Shop.How Threat Actors Use Victims to Create More Victims James Bierly 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com 99% of US businesses have [--] users or fewer. In this talk we will discuss how to engage and protect the small businesses that form the backbone of our communities. We'll cover how to convey the risks small business insecurity poses to larger businesses downstream from them in the supply chain"
YouTube Link 2025-02-04T05:00Z 54.2K followers, [---] engagements

"Solving Dumb Hacker Problems With Nix Ryan Basden 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com Between Python version mismatches virtual environments and containers getting even popular software to work on every operating system and setup is more cumbersome than it should be. Hackers should be fighting vulnerabilities not their own tooling. Nix has solved this for me and I need to share it with people. It takes "it works on my"
YouTube Link 2025-07-22T07:15Z 56.4K followers, [---] engagements

"All on Red: Shifting the Betting Odds to Defense David Kennedy 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com You often hear the phrase "it only takes an adversary one main find to compromise an entire organization." The odds don't seem to be in our favor when it comes to defense. This talk will dive into effective methods to flip the odds into your own favor and things you can do quickly that doesn't take a three year strategic"
YouTube Link 2025-01-22T05:00Z 54.1K followers, [---] engagements

"Offense for Defense Tim Medin 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ This presentation focuses on the offensive tools that defenders should running to identify high-impact security issues on their network. Explore the proactive advantages of offensive security tools that can be quickly and easily be run by defenders to better protect and defend their network. Attendees will learn how offensive security tools enable defenders to stay ahead of potential adversaries enhancing network resilience and"
YouTube Link 2024-12-20T05:00Z 53.5K followers, [---] engagements

"LLMs for Vuln Discovery: Finding 0days With a Click of a Button Marcello Salvati Dan McInerney 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com Large Language Models (LLMs) have opened up the floodgates for a whole new generation of security tooling. One of the most obvious applications is automatic discovery of vulnerabilities which so far has had extremely mixed results. Can LLMs get good at vulnerability discovery In this talk we"
YouTube Link 2025-03-27T04:00Z 54.4K followers, [---] engagements

"Powering Up Linux-Unleashing PowerShell for Penetration Testing and Red Teaming - Tj Null 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com This talk explores the dynamic potential of PowerShell for Linux in the realms of penetration testing and red teaming. Delving into its capabilities attendees will discover how this versatile tool enhances offensive security strategies. Intended for cybersecurity professionals and enthusiasts"
YouTube Link 2025-04-15T04:00Z 54.5K followers, [---] engagements

"Operational Technology (OT) - Let's Git OT Cyber-Physical Secured- Matthew Luallen - [--] Hour Join the WWHF Community Discord: https://discord.gg/wwhf 0:00:00 - PreShow Banter The Welcome Matt 0:08:40 - FEATURE PRESENTATION: Lets Git OT Cyber-Physical Secured 0:18:13 - What Could Go Wrong 0:20:15 - Talk slowly. Think Quickly. 0:21:23 - Build the Box 0:25:56 - Active Host Discovery 0:32:02 - Passive Host Discovery 0:38:28 - VirtualPlant 0:57:50 - The Wizards Folder - Other Labs 1:01:16 - Balderdash Saddle up we are going to get "virtually hands-on" with the CybatiWorks platform to learn how"
YouTube Link 2021-03-19T12:06Z 54.6K followers, [---] engagements

"The Hacker's Apprentice - Mark Baggett https://www.wildwesthackinfest.com/ I turned my house into an escape room In this talk Ill show you how I used IoT devices and open source software to turn my house into an escape room. Topics will include HomeAssistant the HA AppDaemon Alexa Python coding and puzzles. Mark Baggett is the owner of Indepth Defense an independent consulting firm that offers incident response and penetration testing services. Mark has more than [--] years of commercial and government experience ranging from Software Developer to Chief Information Security Officer. Mark is a"
YouTube Link 2019-12-20T15:45Z 55.5K followers, [----] engagements

"Breaking Free From the Chains of Fate: Bypassing AWSCompromisedKeyQuarantineV2 Bleon Proko 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com Amazon's AWSCompromisedKeyQuarantineV2 policy is not the panacea it might seem. Join us on an adventure of all the myriad ways to work around this policy when you discover leaked keys in the wild. This presentation is a fun multimedia exploration of all the shortcomings of the"
YouTube Link 2025-04-24T04:00Z 56.4K followers, [---] engagements

"WWHF 3D Printing From the Ground Up Bill Stearns [--] Hour Chat in Discord: https://discord.gg/wwhf 00:00:00 PreShow Banter 00:30:48 FEATURE PRESENTATION 01:20:18 Q & A We're calling anyone that hasn't used a 3D printer before; now's your chance to see what these are how they work and what you get from them You don't need any background or experience just an interest in learning about new technologies. Bill Stearns from Active Countermeasures will be leading the talk and questions are welcome Join the WWHF Discord Community to participate in discussion with the presenter and attendees:"
YouTube Link 2021-11-10T19:10Z 55.3K followers, [---] engagements

"Did You Knock Out Our noun Jack Verrier 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com How many times have you heard "Are you doing anything right now that could verb our noun" The answer is sometimes "Yes" always "Maybe" and hopefully "No". I set up a range and hammered common web servers to figure out the impact that pentesting tools have on typical client systems. I tried to answer questions like "Does Nuclei cause performance"
YouTube Link 2025-07-01T05:30Z 56.4K followers, [---] engagements

"Abusing API Security Charles Shirer 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com Charles Shirer (the BSD Bandit) will show you how to look at API security in a different way through multiple API attack techniques with a particular focus on GraphQL and gRPC. Charles has over [--] years of IT experience with the last [--] years in Information Security including systems Administration penetration testing threat hunting and security"
YouTube Link 2025-01-23T05:00Z 55.5K followers, [----] engagements

"Six Sick Systems One Hour: Investigate with Host Forensics Six Sick Systems One Hour: Investigate With Host Forensics Alissa Torres at Wild West Hackin' Fest [----] in Deadwood SD Follow Wild West Hackin' Fest on Twitter here: https://twitter.com/wwhackinfest Website & Info: https://www.wildwesthackinfest.com/"
YouTube Link 2018-11-05T21:57Z 54.5K followers, [----] engagements

"Unlocking Physical Security: 3D Printing Your Way Inside Noah Pack 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ Every hacker wants more cool stuff and many of us have a 3D printer gathering dust in the corner. In my presentation "Unlocking Physical Security: 3D Printing Your Way Inside" I will inspire you to buy more filament and start preheating your print beds to extrude a collection of valuable physical security tools (both offensive and defensive). This talk goes over a handful of original (never before"
YouTube Link 2025-01-10T05:00Z 53.7K followers, [---] engagements

"TOOL: RITA Chris Brenton 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com In this talk I'll show you how to get the open source threat hunting tool RITA up and running and how to use it to find potential command and control channels on your network. A new version of RITA has just dropped and it has been completely updated. The backend is 10X faster it has an ASCII graphical interface based on Charm Bracelet BubbleTea and the"
YouTube Link 2025-02-10T05:00Z 54.2K followers, [---] engagements

"Vunerability-centric Pentesting Matthew Toussain 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com In this talk we will fluidly interact with and exploit network vulnerabilities by leveraging several open-source tools and tying their interactions with vulnerability intelligence. Interacting with vulnerabilities is a core security practice. For a pentester vulnerabilities should form a map to making risk actual but our tools in this"
YouTube Link 2025-01-30T05:00Z 54.2K followers, [---] engagements

"The Hackers Guide to Risk Management: Evolve Into a Golden Unicorn Jaclyn (Jax) Scott 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com In this session well decode the mystery of risk management and why it matters to hackers and red teamers. Youll learn how the vulnerability tools you already uselike Snyk and Qualysfit into risk management plans and how to level up your skills to communicate risks effectively to leaders and"
YouTube Link 2025-03-25T04:00Z 54.4K followers, [---] engagements

"Real World AI Risks And Mitigating Them Jake Williams 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com 00:00 - Welcome intro 00:19 - Agenda 02:44 - Not all AI is generative AI 03:40 - SAAS-based EDRs are training on your data 04:55 - Non-determinism makes assessing Gen-AI difficult 05:34 - Non-determinism definition 07:37 - Deterministic AI risks 08:51 - Googles blog post on Willow and the multiverse 10:18 - Training on your data"
YouTube Link 2025-05-20T04:00Z 56.4K followers, [----] engagements

"Hackventure: Having Fun With IDOR Attacks Joshua Wright 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com Insecure Direct Object Reference (IDOR) attacks have been a common vulnerability for decades. It still shows up in lots of big websites including Dell Reddit US DoD GitLab Shopify and more. Join Josh Wright for a hackventure in spotting and exploiting this bug as a fun way to get started with bug hunting. Also #AI. ///Black Hills"
YouTube Link 2025-03-11T04:00Z 54.3K followers, [---] engagements

"Hack the Boardroom Mastering the Art of Communicating Cyber Risks to Secure Funding Jax Scott 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com In todays relentless cybersecurity battlefield technical teams often find themselves lost in translation when conveying complex risks and vulnerabilities to senior executives and board members. Breaking through this communication barrier is essential for securing the support and funding"
YouTube Link 2025-01-20T05:00Z 54.2K followers, [---] engagements

"Mick Douglas - Sebastian Boutin - Thats Fantastic - WWHF January Roundup Join the WWHF Community Discord: https://discord.gg/wwhf 00:00 - PreShow Banter The Mick Douglas & Mick Douglas Firm 02:06 - FEATURE PRESENTATION: Project Fantastic 02:56 - Demo Prep 06:35 - WHOAMI 08:11 - Table of Contents 13:32 - Fantastic Goals 14:26 - DEMO : Modularity 21:00 - Modular and Easy 21:44 - We Need Your Help 27:11 - Editor 30:47 - Cant Code Give us Feedback Sebastian Boutin Blomfield is a game and web developer who loves to learn about different technologies and try out new ideas. Outside of work he plays"
YouTube Link 2021-04-15T13:54Z 53.3K followers, [---] engagements

"Dev Offensive Sec Ops Joff Thyer WWHF [----] 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ This presentation describes some of the challenges of malware development for Red Team initial access operations and how continuous integration/continuous development (CICD) pipelines can be employed to assist in solving the challenges. The presentation will start by introducing some of the known techniques employed by modern endpoint defense software and then describe how a CICD approach can be used to enable unique"
YouTube Link 2024-05-06T11:00Z 55.5K followers, [---] engagements

"WWHF [----] (Virtual): CitiZen Cyber SkillZ for Public Service and Great Justice - Ray Davidson https://www.wildwesthackinfest.com ---- Love the cyberz but your netcat skills are closer to butter knife than Swiss Army knife Love being the packet but that pre-bitmasking hydration is still a little rusty Love CTFs but cant get to the bank (of coins) That was me - I was devastated when I realized I'd never be Hax0RtheSkoudis but I found a way to give back to the community anyway - maybe itll work for you The State of Michigan has created a Civilian Cyber Corps to address the uneven distribution of"
YouTube Link 2020-07-21T18:56Z 53.3K followers, [---] engagements

"Critical Infrastructure in Critical Condition: Avoiding Doubt in the Face of Fear . Ray Davidson 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ B-Sides Las Vegas talks link: https://www.youtube.com/playlistlist=PLjpIlpOLoRNQKuMUUX-sAPBMacELm9c-c As a person of a certain age with certain experiences I can attest that life is fraught with uncertainty. Society is increasingly dependent on undependable technology. (This is after all why we all have jobs.) Whether from extreme weather hostile events squirrels with"
YouTube Link 2025-01-06T05:00Z 53.7K followers, [---] engagements

"Hacking Azure AD Identities Nestori Syynimaa WWHF [----] 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ In the cloud era identity has become a new security perimeter. Over [--] per cent of Fortune [---] organizations use Microsofts cloud-based identity and access management system Azure AD. Dr. Nestori Syynimaa is one of the worlds leading Azure AD / M365 experts and the developer of the AADInternals toolkit. He has worked with Microsoft cloud services for over a decade and has been MCT since [----] MVP since [----] and"
YouTube Link 2024-05-13T11:00Z 53.3K followers, [---] engagements

"Red Teaming in the EDR age From Wild West Hackin' Fest [----] in Deadwood SD. Presenter: Will Burgess Will Burgess is a security consultant with experience across both defensive and offensive cyber security. Will previously worked as a Threat Hunter within MWR's Countercept Division and specialised in detecting advanced malware across enterprises. As part of his role Will researched attack techniques used by a wide range of malware families (including popular commercial tools such as Cobalt Strike) developed new ways of catching attackers and presented this research at different conferences."
YouTube Link 2018-11-14T19:44Z 54.5K followers, 22.8K engagements

"Social Engineering for Covert Access Assignments Dorota Kozlowska 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com This presentation will explore the strategic use of social engineering in penetration testing. Attendees will learn tactics such as pretexting tailgating baiting and phishing all designed to manipulate human behavior and bypass physical security. I will cover the importance of crafting a believable pretext from creating"
YouTube Link 2025-08-12T04:01Z 56.4K followers, [---] engagements

"Risk Alssessment Jake Williams 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ In this talk we'll present Risk AIssessment - a risk assessment framework for AI-enabled applications. With the rush to embed generative AI in everything but your toaster (oh it's in that now too) there are a lack of usable assessment frameworks for organizations that are deploying these AI-enabled applications. In this talk we'll introduce the framework and show how organizations can utilize it to evaluate their risk to decide"
YouTube Link 2025-01-17T05:00Z 54K followers, [---] engagements

"MailFail: Spoof Emails in Seconds Jack Hyland 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com Join me as we delve into the intricacies and quirks of email uncovering both its complexities and its absurdities. After spending several months delving into the relevant RFCs relating to Email (SMTP) I gained a comprehensive understanding of how to abuse the email ecosystem. In this presentation I will get you up to speed with a browser"
YouTube Link 2025-06-10T05:30Z 56.4K followers, [---] engagements

"Workshop: Open-Source Intelligence (OSINT) Joe Gray WWHF [----] 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ Developers penetration testers managers system administrators would all benefit from learning how to better detect and consolidate vulnerability and remediation efforts. Joe Gray is an exemplary veteran of the U.S. Navy Submarine Force and a highly esteemed expert in social engineering and OSINT. He is the inaugural winner of the DerbyCon Social Engineering Capture the Flag (SECTF) and in recognition of"
YouTube Link 2024-05-21T11:00Z 53.4K followers, [---] engagements

"Fusing Reverse Shells And Kernel Exploits For Fun and Profit Aleksa Zatezalo 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com In this presentation I'll show you the inner mechanics of reverse shells and bind shells Offensive Windows API use and the basics of exploit coding in the C programming language all under the umbrella of my personal project The Impersonator shell. The Impersonator Shell started as a combination of two popular"
YouTube Link 2025-06-24T04:30Z 56.4K followers, [---] engagements

"The Secret Thoughts of a Successful Hacker Nadean Tanner [--] Hour Join the WWHF Discord Community: https://discord.gg/wwhf 00:00 - PreShow Banter I Didnt Think It Mattered 09:08 - PreShow Banter Upcoming Things 10:59 - FEATURE PRESENTATION: The Secret Thoughts of a Successful Hacker 15:19 - The Imposter Syndrome 22:33 - Flavors of Imposters 33:01 - Imagine If You Will 41:26 - Strike a Word 52:19 - End of Show Banter Show Notes: https://www.amazon.com/Cybersecurity-Blue-Toolkit-Nadean-Tanner/dp/1119552931/ https://en.wikipedia.org/wiki/Dunning%E2%80%93Kruger_effect Exploring Impostor Syndrome"
YouTube Link 2020-11-10T13:08Z 54.5K followers, [----] engagements

"A Journey from Alert1 to P1: Cat Pic Graffiti and Phishing Payloads Cary Hooper 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com Tired of taking screenshots of alert boxes Join me for a working session to discuss how to use JavaScript and DOM manipulation to craft a believable XSS phishing payload resulting in code execution in a target domain. Today I am hosting a learning session to show an approach for turning a reflected XSS bug"
YouTube Link 2025-04-29T04:15Z 56.4K followers, [---] engagements

"Two Cyber Guys And an Al Walk Into a Bar Derek Banks Joff Thyer 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ Are you in cyber security and curious about Machine Learning and Artificial Intelligence and not sure where to start or even what it can do for you ML and AI have rapidly transformed the landscape of technology offering powerful tools for various industries including cyber security. However for many folks in the field the impact and potential of AI remains mysterious as well as understanding how to"
YouTube Link 2024-12-19T05:00Z 53.4K followers, [---] engagements

"Tool Shed Demo: Token Tactics: A Tactical Usage Demo Steve Borosh WWHF [----] 🔗 Join us in-person and virtually at our Wild West Hackin' Fest Information security conferences https://wildwesthackinfest.com/ In this demo BHIS's Steve Borosh will walk you through how an offensive operator may utilize this attack flow beginning with the initial phish to accessing sensitive files on restricted SharePoint sites and some detections and remediations along the way. ///Black Hills Infosec Socials Twitter: https://twitter.com/BHinfoSecurity Mastodon: https://infosec.exchange/@blackhillsinfosec LinkedIn:"
YouTube Link 2024-04-27T13:00Z 55.4K followers, [---] engagements

"Lessons Learned in a Year of Social Engineering Alice Thorne 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com Many organizations' current policies and controls allow for their helpdesks to reset users passwords and multi-factor authentication which makes those helpdesks a prime target for social engineering attacks such as those demonstrated in the past by threat actors like the ALPHV/BlackCat ransomware groups. This talk will cover"
YouTube Link 2025-01-31T05:00Z 54.2K followers, [---] engagements

"Social Engineering My Way Into Conferences Frank Trezza 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com Over the years I've managed to get into numerous security and other conferences and this talk will share some of the most intriguing stories of how I did it. By using a mix of social engineering reconnaissance insider knowledge and quick thinking I was able to navigate these events successfully. Social engineering played a key"
YouTube Link 2025-04-22T08:01Z 56.4K followers, [---] engagements

"Smuggling Botnet C2 Through Users Browser Matthew Bernath WWHF San Diego [----] Attend Wild West Hackin' Fest (WWHF) in Deadwood In-Person and Virtual https://wildwesthackinfest.com/deadwood/ Command and control (C2) infrastructure are vital to the operation of botnets and their operators take active measures to prevent their discovery. In this presentation I demonstrate that an attacker could leverage public advertisement services to obfuscate the source of their command and control servers by co-opting web users browsers to smuggle data. My colleagues and I created a system that garners"
YouTube Link 2022-10-20T10:00Z 55.6K followers, [---] engagements

"Packet Generation with Scapy Bill Stearns 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com Learn how to use Scapy a python packet library to create packets from scratch - with exactly the fields you want This technique can be used either by hand or inside your own python script. A little familiarity with Python will be helpful. ///Black Hills Infosec Socials Twitter: https://twitter.com/BHinfoSecurity Mastodon:"
YouTube Link 2025-03-20T04:00Z 54.5K followers, [---] engagements

"Not Doomed.Yet Chloe Messdaghi 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com Lets talk about the elephant in the roomor rather the AI in the network. It's causing more drama than the [----] Tay bot on Twitter. Sorry not sorry I meant X. From GenAI hoodwinking finance firms out of $25 million to the shocking revelation that 77% of companies found their AI sitting in the corner with a dunce cap marked "breached" in the past year."
YouTube Link 2025-02-07T05:01Z 54.3K followers, [---] engagements

"A Post Incident Case Study for SMB Response Teams Amanda Berlin 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ This presentation will delve into a real-world cybersecurity incident involving a masked application attack on an SMB environment. Using an anonymized incident narrative we'll walk through the response process from the perspective of a small to medium-sized business team. The presentation will highlight the importance of early detection the challenges of identifying sophisticated threats and the"
YouTube Link 2025-01-03T05:00Z 53.7K followers, [---] engagements

"Tool Demo CrowdSec Klaus Agnoletti WWHF Deadwood [----] Join us at the annual information security conference in Deadwood SD (in-person and virtually) Wild West Hackin' Fest: https://wildwesthackinfest.com/ CrowdSec is a free modern & collaborative behavior detection engine coupled with a global IP reputation network. It stacks on fail2bans philosophy but is IPV6 compatible and 60x faster (Go vs Python) uses Grok patterns to parse logs and YAML scenario to identify behaviors. CrowdSec is engineered for modern Cloud / Containers / VM based infrastructures (by decoupling detection and"
YouTube Link 2023-05-26T11:00Z 55.2K followers, [---] engagements

"What is ATT&CK Coverage Anyway Adam Mashinchi WWHF San Diego [----] Attend Wild West Hackin' Fest (WWHF) in Deadwood In-Person and Virtual https://wildwesthackinfest.com/deadwood/ This talk will highlight the Atomic Red Team projects efforts to define and increase the test coverage of MITRE ATT&CK techniques. Well describe the challenges we encountered in defining what coverage means in the context of an ATT&CK-based framework and how to use that definition to improve an open source project thats used by a diverse audience of practitioners to satisfy an equally diverse array of needs. The"
YouTube Link 2022-09-21T10:00Z 53.3K followers, [---] engagements

"Open Source Intelligence [---] Join us at the annual information security conference in Deadwood SD (in-person and virtually) Wild West Hackin' Fest: https://wildwesthackinfest.com/ From Wild West Hackin' Fest [----] in Deadwood SD. Presenter: April C. Wright Description: April C. Wright is a hacker writer teacher and community leader with over [--] years of breaking making fixing and defending global critical communications and connections. She is an international speaker and trainer educating others about personal privacy and information security with the goal of safeguarding the digital"
YouTube Link 2018-11-16T17:53Z 54.4K followers, 57.7K engagements

"Mind Over Malware: Harnessing Psychology to Fortify Cybersecurity Jenn Ferreras 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ Discover how psychological theories can revolutionize cybersecurity practices This presentation explores the transformative potential of Attention Restoration Theory (ART) and Social Cognitive Theory (SCT) in enhancing cybersecurity measures. By optimizing work environments to rejuvenate mental focus (ART) and leveraging social influences and self-efficacy to boost security compliance"
YouTube Link 2025-01-15T05:00Z 53.9K followers, [---] engagements

"The Hackening: Lessons Learned Compromising MSPs Matt Lee Jason Slagle 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ The security community often criticizes MSPs claiming they offer lax security don't take security seriously and generally implement weak practices. Some presentations even use "fake" MSP breaches as their foundation. But what if we actually tested this ourselves Join Matt Lee and Jason Slagle as they delve into the data and lessons learned from attempts to breach MSPs. We'll review findings"
YouTube Link 2025-01-02T05:00Z 53.7K followers, [---] engagements

"Tow Away Zone The Dark Side of Domain Parking Cameron Cartier 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com Companies or individuals often sit on domains for later use and can even make a passive income" off of these unused domains. The monetary incentives of the domain parking system lead to these parked domains becoming littered with malware and potentially putting consumers in danger. This talk is essentially a PSA and gives"
YouTube Link 2025-01-21T05:01Z 54.2K followers, [---] engagements

"Offensive Lab Environments (Without the Suck) Travis Kaun 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com From building payloads testing evasions and practicing offensive techniques a must-have for every seasoned tester is a lab environment. Join Travis as he demonstrates various methods for deploying dynamic AD lab environments for attack simulation with ease. ///Black Hills Infosec Socials Twitter:"
YouTube Link 2025-01-29T05:00Z 55.4K followers, [----] engagements

"We're All Scared Too: [--] Years of Lessons from Cybersecurity Mentorship Lesley Carhart WWHF2023 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ We're All Scared Too: [--] Years of Lessons from Cybersecurity Mentorship Lesley Carhart WWHF [----] For the past decade Lesley has been running career clinics for job seekers and changers in cybersecurity. For the past year they have added on 1:1 mentorship office hours. Helping people choose career trajectories and overcome hurdles in employment has been a fascinating"
YouTube Link 2024-05-02T11:00Z 54K followers, [---] engagements

"From Sore to SOAR: Reinventing Sentinel Automation Without Logic Apps Henri Hambartsumyan 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com This talk shares our journey building a custom SOAR-like solution for Microsoft Sentinel that 1) combines full-code flexibility with low-code simplicity and 2) overcomes the limitations of Logic Apps in performance maintainability and debugging. Learn about architecture and design decisions"
YouTube Link 2025-04-01T04:00Z 55.5K followers, [---] engagements

"The Drone Renaissance - The Attack Surface Now Includes the Sky Luke Canfield The Drone Renaissance - The Attack Surface Now Includes the Sky Presenter: Luke Canfield How can off the shelf technology be used to build modern reconnaissance drones Drones are no longer niche or limited to government budgets. What once required nation state resources is now achievable with open-source software consumer hardware and a 3D printer. What does a DIY reconnaissance drone platform look like today In this talk we break down a real DIY reconnaissance drone built on a fixed wing VTOL airframe. This"
YouTube Link 2026-02-13T16:00Z 56.4K followers, [---] engagements

"Thirteen Steps to Being Unbroken: Infosec for the Underfunded Tarah Wheeler Thirteen Steps to Being Unbroken: Infosec for the Underfunded Presenter: Tarah Wheeler Small and underfunded organizations are being crushed by todays cybersecurity landscape. Theyre expected to meet the same strict regulatory requirements as massive enterprises but with a fraction of the money staffing and influence. CISAs local support efforts have stalled incident responders are burning out and smaller orgs are now stuck in a storm of regulatory confusion and real-world threats. Holidays only make things worse as"
YouTube Link 2026-02-10T16:34Z 56.4K followers, [---] engagements

"How To Learn Faster With AI: Sampling Broadly Delving Efficiently Absorbing Fully Jeff McJunkin How To Learn Faster With AI: Sampling Broadly Delving Efficiently Absorbing Fully Presenter: Jeff McJunkin Imagine learning five times more every week and watching that compound over the course of your career. This talk breaks down a practical AI driven workflow that helps you identify high value topics instantly filter out the noise and capture more information with less effort. You will learn how to pull transcripts from online media using Dev Tools and speech to text then turn that content into"
YouTube Link 2026-02-06T21:53Z 56.4K followers, [---] engagements

"AI Agents in Action: Protecting Against Synthetic Media and Human Risk Exploits James McQuiggan AI Agents in Action: Protecting Against Synthetic Media and Human Risk Exploits Presenter: James McQuiggan AI agents and Agentic AI are reshaping the cybersecurity landscape creating a new era where artificial intelligence can act adapt and make decisions at machine speed. This talk explores the dual nature of AI agents: powerful tools for defenders and potent weapons for attackers. Cybercriminals are already using agentic systems deepfakes and synthetic media to launch highly targeted social"
YouTube Link 2026-02-02T22:00Z 56.4K followers, [---] engagements

"Giving Swords to Our Future AI Overlords Matt Lee and Eric Stevens Giving Swords to Our Future AI Overlords Presenters: Matt Lee and Eric Stevens Artificial intelligence is no longer limited to chatbots and copilots. With advances in Model Context Protocols and agentic systems AI can now reason take action and interact across interconnected tools APIs and automated workflows. When misused a single prompt injection can cascade across multiple agents and decision-making systems. In this talk you will see how something as simple as a malicious LinkedIn bio can be used to manipulate an AI-powered"
YouTube Link 2026-01-30T21:12Z 56.4K followers, [---] engagements

"PWN Free or Die Hard: The YOLO Index and Tactical Risk in Red Team Alethe Denis PWN Free or Die Hard: The YOLO Index and Tactical Risk in Red Team Presenter: Alethe Denis Physical red team operations demand constant judgment calls: when to take bold high-risk actions and when to pull back to protect the team. In this session Alethe Denis introduces the YOLO Index a practical real-world model for evaluating risk reward and operational safety during high-stakes physical penetration tests. Through field stories tactical examples and lessons drawn directly from live engagements youll learn how"
YouTube Link 2026-01-26T17:01Z 56.4K followers, [---] engagements

"Wild West Hackin Fest @ Mile High [----] - In-Person/Virtual Conference - Meet the Community Register now for Wild West Hackin Fest Mile High Denver [----] - In-Person/Virtual Conference: https://wildwesthackinfest.com/register ///Black Hills Infosec Socials Twitter: https://twitter.com/BHinfoSecurity Mastodon: https://infosec.exchange/@blackhillsinfosec LinkedIn: https://www.linkedin.com/company/antisyphon-training Discord: https://discord.gg/ffzdt3WUDe ///Black Hills Infosec Shirts & Hoodies https://spearphish-general-store.myshopify.com/collections/bhis-shirt-collections ///Black Hills Infosec"
YouTube Link 2026-01-23T21:23Z 56.4K followers, [---] engagements

"Wild West Hackin Fest @ Mile High [----] - In-Person/Virtual Conference - Register Now Register now for Wild West Hackin Fest Mile High Denver [----] - In-Person/Virtual Conference: https://wildwesthackinfest.com/register ///Black Hills Infosec Socials Twitter: https://twitter.com/BHinfoSecurity Mastodon: https://infosec.exchange/@blackhillsinfosec LinkedIn: https://www.linkedin.com/company/antisyphon-training Discord: https://discord.gg/ffzdt3WUDe ///Black Hills Infosec Shirts & Hoodies https://spearphish-general-store.myshopify.com/collections/bhis-shirt-collections ///Black Hills Infosec"
YouTube Link 2026-01-23T21:11Z 56.4K followers, [--] engagements

"A New Era of Brute Forcing in Active Directory David Hork A New Era of Brute Forcing in Active Directory Presenter: David Hork Active Directory has been the backbone of enterprise identity for more than [--] years but despite its maturity most environments remain dangerously vulnerable. Misconfigurations overlooked defaults and outdated assumptions make AD one of the most common and valuable targets for attackers. In this session youll learn why securing Active Directory is still far from solved and what you can do about it. This talk breaks down essential but often misunderstood concepts like"
YouTube Link 2026-01-23T20:06Z 56.4K followers, [---] engagements

"Legally Compliant: An Incident Handlers Take on Cyber Legal in an Incident Ben Renz & Bradford Alt Legally Compliant: An Incident Handlers Take on Cyber Legal in an Incident Presenters: Ben Renz & Bradford Alt Regulations are increasing reporting timelines are tightening and cyber insurance requirements are shifting. The legal landscape around incidents is evolving just as fast as the threats themselves. While we are not lawyers we have worked closely with legal teams across multiple incident responses giving us a practical perspective on how cyber and legal worlds continue to merge. This"
YouTube Link 2026-01-20T04:58Z 56.4K followers, [---] engagements

"Web Application Authorization: Taming the Perfect Storm Tim Tomes Web Application Authorization: Taming the Perfect Storm Presenter: Tim Tomes Access control vulnerabilities are everywhere. Across my last [--] web application security assessments I identified [--] access control related findings which means almost every modern application has at least one serious flaw. This aligns with OWASP which ranks Broken Access Control as the number one risk facing web applications today. But why is this problem so persistent The simple answer is that access control is difficult. It is difficult to design"
YouTube Link 2026-01-17T02:01Z 56.4K followers, [---] engagements

""Everything is a Proxy if You Try Hard Enough"- Old RFCs New Exploits Ken Pyle "Everything is a Proxy if You Try Hard Enough" - Exploiting Old RFCs for New Types of Exploitation Speaker: Ken Pyle The core protocols of the internet are old vague and full of cracks. This session breaks down several new exploitation and exfiltration techniques that take advantage of those gaps in HTTP DNS proxies and CDNs. Well cover: HTTP Status Code Injection for data exfiltration and covert signaling Arbitrary Protocol Injection over HTTP letting attackers bypass firewalls and tunnel traffic through proxies"
YouTube Link 2026-01-12T23:41Z 56.4K followers, [----] engagements

"Exploiting AI: A Case Study on Voice Biometric Penetration Testing Exploiting AI: A Case Study on Voice Biometric Penetration Testing Speaker: Skyler Tuter This talk presents a real-world case study examining how AI voice cloning can be used to defeat voice biometric authentication systems. Based on a recent engagement with a major financial institution the session walks through how voice-based identity verification in Interactive Voice Response systems can be manipulated using advanced AI voice synthesis techniques. The presentation breaks down the methodology used during the penetration"
YouTube Link 2026-01-09T17:00Z 56.4K followers, [---] engagements

"Modern Recon for Red Teams and Pentesters Jason Haddix Modern Recon for Red Teams and Pentesters Speakers: Jason Haddix Modern offensive security work moves fast and having the right tooling makes all the difference. In this talk Jason will walk through the tools workflows and resources that todays offsec professionals rely on to identify hosts accelerate scanning and map organizations with greater speed and precision. Hell cover distributed scanning stealth techniques GitHub enumeration DNS source nuances and several lesser known methods that can dramatically elevate your recon game. If you"
YouTube Link 2026-01-05T16:00Z 56.4K followers, 10.1K engagements

"Stochastic Garrotes: A Data Driven Approach to LLM Generated Malware Ryan Ashley Stochastic Garrotes: A Data Driven Approach to LLM Generated Malware Speaker: Ryan Ashley Principal Engineer Applied Research IQT Large Language Models are everywhere now and their role as coding assistants has sparked growing fears about a coming wave of AI generated malware. But this creates a strange sort of Fermi Paradox. If these models are truly as powerful as many claim where is all the malware Threat actors tend to adopt new technology quickly. They follow trends. They capitalize on opportunity fast. In a"
YouTube Link 2026-01-02T17:00Z 56.4K followers, [---] engagements

"Beyond the Malware: Dissecting Info Stealers' Infection Vectors Stolen Assets and Countermeasures Beyond the Malware: Dissecting Information Stealers' Infection Vectors Stolen Assets and Countermeasures Speakers: Olivier Bilodeau and Eric Boivin Senior Technical Platform Specialist Flare Modern information stealers have grown far beyond basic credential theft and now operate as highly advanced tools capable of capturing full digital fingerprints of their victims. In this technical deep dive the speaker presents new research into how modern stealers are built how their attack chains operate"
YouTube Link 2025-12-29T16:01Z 56.4K followers, [---] engagements

"Practical Cybersecurity Control Auditing: From Preparation to Reporting Gerald Auger PhD Practical Cybersecurity Control Auditing: From Preparation to Reporting Speaker: Gerald Auger PhD Auditing business environments against the CIS Controls [--] framework can feel complex but this session breaks it down into a clear repeatable process. In this practical one-hour walkthrough Dr. Auger guides participants through the full audit lifecycle from understanding the fundamentals of CIS Controls to preparing executing and documenting a complete cybersecurity audit. You will learn how to interpret the"
YouTube Link 2025-12-26T13:00Z 56.4K followers, [---] engagements

"Cyber on a Shoestring: Building Wagyu Career Skills and Experience on a Ramen Budget Evan Kirstein Cyber on a Shoestring: Building Wagyu Career Skills and Experience on a Ramen Budget Speaker: Evan Kirstein Landing a cybersecurity job requires experience but getting that experience can feel impossible when you are trying to break in switch specialties or stretch out a tight budget. This presentation shows you how to build real demonstrable skills without needing expensive gear or paid programs. We will explore free and affordable ways to create meaningful hands-on experience through home labs"
YouTube Link 2025-12-22T13:00Z 56.4K followers, [---] engagements

"Augmenting Your Offensiveness With AI for Fun and Job Security Marcello Salvati and Dan McInerney Augmenting Your Offensiveness With AI for Fun and Job Security Speakers: Marcello Salvati and Dan McInerney AI is transforming offensive security defensive operations and everything in between. In this talk we cut through the hype and explore what large language models and AI agents can actually do for you today. We break down the core concepts behind LLMs agent architecture and practical workflows so you can understand how to apply these tools in real world security work. Using concrete examples"
YouTube Link 2025-12-19T15:35Z 56.4K followers, [---] engagements

"Wild West Hackin Fest @ Mile High [----] - In-Person/Virtual Conference - Keynote Speakers Announced Register now for Wild West Hackin Fest Mile High Denver [----] - In-Person/Virtual Conference: https://wildwesthackinfest.com/register ///Black Hills Infosec Socials Twitter: https://twitter.com/BHinfoSecurity Mastodon: https://infosec.exchange/@blackhillsinfosec LinkedIn: https://www.linkedin.com/company/antisyphon-training Discord: https://discord.gg/ffzdt3WUDe ///Black Hills Infosec Shirts & Hoodies https://spearphish-general-store.myshopify.com/collections/bhis-shirt-collections ///Black Hills"
YouTube Link 2025-12-18T14:30Z 56.4K followers, [---] engagements

"Dungeons & Dragons: The Security Tool You Didnt Know You Needed Dungeons & Dragons: The Security Tool You Didnt Know You Needed Speakers: Klaus Agnoletti & Glen Sorensen Sick of security training that puts everyone to sleep This session dives into why the most effective cybersecurity training tool might already be sitting in your game room. Welcome to game-based learning where the proven power of play transforms how professionals master complex skills and actually retain what they learn. We explore research showing that people learn best together not in isolation. Traditional training forces"
YouTube Link 2025-12-15T13:00Z 56.4K followers, [---] engagements

"Elicitation: Weaponizing Social Engineering for Covert Access Operations Dorota Kozlowska Elicitation: Weaponizing Social Engineering for Covert Access Operations Presenter: Presenter: Dorota Kozlowska Elicitation is one of the most powerful and underrated skills in social engineering and covert access operations and this session breaks down exactly how professionals use it to gather sensitive information without ever asking a direct question. Whether you're in offensive security red teaming physical penetration testing or corporate security understanding elicitation techniques is essential"
YouTube Link 2025-12-12T21:21Z 56.4K followers, [---] engagements

"The Human Vulnerability: Social Engineering in a Hyper Connected World David Boyd In a hyperconnected world the most reliable vulnerability is still the human element. Social engineering remains one of the most effective ways attackers bypass security controls and gain access to sensitive information. This talk breaks down real-world social engineering tactics including: Phishing and email-based attacks Vishing and phone-based scams Physical intrusion and tailgating Pretexting and impersonation Youll see real examples of how attackers exploit emotions like urgency trust curiosity and sympathy"
YouTube Link 2025-12-08T13:01Z 56.4K followers, [---] engagements

"Death by Dashboards - Moving the Needle on What Actually Matters Tim Medin Death by Dashboards Moving the Needle on What Actually Matters Speaker: Tim Medin Dashboards dominate cybersecurity reportingbut are they helping us focus on what truly matters In this talk Tim Medin CEO and founder of Red Siege Information Security challenges the obsession with metrics that look good but fail to improve real security outcomes. Youll learn why traditional vulnerability dashboards often incentivize the wrong behaviors and how to shift your strategy toward meaningful risk reduction. Tim shares practical"
YouTube Link 2025-12-05T13:00Z 56.4K followers, [---] engagements

"Attacking AI - The New Frontier Jason Haddix Attacking AI - The New Frontier Speaker: Jason Haddix Artificial intelligence is now embedded in applications networks SaaS platforms security products and decision-making systems that impact millions of users every day. While many AI security talks stay academic this keynote is built specifically for penetration testers red teamers and offensive security professionals who need real-world methods they can use immediately. In this session you will learn practical AI attack techniques including: AI jailbreaks and prompt injection attacks Bypassing"
YouTube Link 2025-12-01T13:01Z 56.4K followers, [----] engagements

"Strengthening Cybersecurity Potential: Investing in People Instead of Tools Markus Schober The Secret to Strong Cybersecurity Invest in Your People Not Just More Tools In todays fast-paced cybersecurity landscape its easy to believe the solution to every challenge is another tool. But the truth is far simpler: your people are your greatest security asset. In this talk Markus Schober breaks down why security teams strugglenot because they lack technology but because they lack support development and meaningful engagement. When professionals dont receive the right onboarding training or growth"
YouTube Link 2025-11-28T13:00Z 56.4K followers, [---] engagements

"Too Much JSON Try jq BB King jq Tutorial: Master JSON on the Command Line Unix Philosophy in Action The Unix Philosophy teaches that text streams are a universal interface. Programs should produce plain text output so other programs can use it as input with minimal friction. This made the command line incredibly powerful until JSON became the standard for modern data interchange. Enter jq the ultimate command line JSON processor. With jq you can parse filter extract and transform JSON data as easily as using awk cut or grep. Even a little familiarity will allow you to handle complex JSON"
YouTube Link 2025-11-24T20:08Z 56.4K followers, [---] engagements

"Ghosts in the Graph: GoPhlare Meets BloodHound Phil Miller Ghosts in the Graph GoPhlare Meets BloodHound Detect AD Attack Paths from Breached Credentials In this talk Phil Miller demonstrates how to leverage GoPhlare an open-source tool alongside BloodHound Community Edition to uncover Active Directory attack paths using breached credentials. Learn how to automate credential correlation streamline breach data analysis and identify high-value targets without noisy password spraying. Youll discover: Why breach credential correlation matters for red teams and pentesters How GoPhlare accelerates"
YouTube Link 2025-11-21T19:37Z 56.4K followers, [---] engagements

"Hardware Hacking Curiosity IoT & Firmware Hacking Adrien Lasalle Hardware Hacking Explained IoT Security Firmware Analysis & Real Attacks In this video we break down the essentials of hardware hacking and why its a critical part of modern cybersecurity. Learn how to perform IoT reconnaissance analyze hardware interfaces like UART JTAG and SPI and extract or reverse engineer firmware to uncover vulnerabilities. Youll also see live demos on real devices including: Wi-Fi Router: firmware extraction secret hunting and security analysis Connected Camera: exploiting a known CVE to achieve remote"
YouTube Link 2025-11-18T18:49Z 56.4K followers, [---] engagements

"Building a Hacking Lab on Azure Jordan Drysdale and Kent Ickler How to build a cybersecurity lab fast with Azure ARM templates Automate Active Directory setup and common tool installs Rapid testing cleanup and lab lifecycle management Real-world insights from BHIS pentester Jordan Drysdale Who Its For: Pentesters red teamers blue teamers SOC analysts and security researchers who want to automate Azure-based lab environments. Optional: Pre-configure a Pay-As-You-Go Azure account if youd like to follow along. Chapters 00:00 - Intro & Workshop Overview 00:06 - Why Build Labs in Azure 00:28 - ARM"
YouTube Link 2025-11-14T18:03Z 56.4K followers, [---] engagements

"Social Engineering for Covert Access Assignments Dorota Kozlowska 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com This presentation will explore the strategic use of social engineering in penetration testing. Attendees will learn tactics such as pretexting tailgating baiting and phishing all designed to manipulate human behavior and bypass physical security. I will cover the importance of crafting a believable pretext from creating"
YouTube Link 2025-08-12T04:01Z 56.4K followers, [---] engagements

"Jargon & Jigsaw: Shellcode Obfuscation Mike Saunders 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com In this talk Mike will cover two highly effective techniques for obfuscating shellcode in your payloads. Jargon is a shellcode obfuscation method that substitutes dictionary words in place of shellcode bytes. This provides two benefits - your loader doesn't have any shellcode and the use of dictionary words reduces the entropy of"
YouTube Link 2025-08-05T04:00Z 56.4K followers, [---] engagements

"OSINT Gone Wild: How I Found Drug Traffickers and NarcoTerrorists Online Schuyler Davis 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com In this presentation I'll present my thorough research on how narcotics narcoterrorism and the fentanyl epidemic are new cyber crime issues. I will show you how OSINT can be used to combat illicit narcotic transactions narcoterrorism and uncover valuable information from the dark web. 00:00 -"
YouTube Link 2025-07-29T09:01Z 56.4K followers, [---] engagements

"Solving Dumb Hacker Problems With Nix Ryan Basden 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com Between Python version mismatches virtual environments and containers getting even popular software to work on every operating system and setup is more cumbersome than it should be. Hackers should be fighting vulnerabilities not their own tooling. Nix has solved this for me and I need to share it with people. It takes "it works on my"
YouTube Link 2025-07-22T07:15Z 56.4K followers, [---] engagements

"How I Used AI to Crush CTF Challenges and What I Learned Along the Way Tabatha Kossman 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com Participating in Capture The Flag (CTF) competitions is always a thrilling experience but this time I had a secret weapon up my sleeve: AI. From cracking codes to navigating complex cyber challenges AI became my go-to sidekick. Here's how I teamed up with AI to tackle CTF puzzles and what I learned"
YouTube Link 2025-07-15T07:30Z 56.4K followers, [---] engagements

"The Extendables: Exploiting Browser Extensions for PrivEsc and Persistence Fin Hume 🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences https://wildwesthackinfest.com/ 🔗 Register for Infosec Webcasts Anti-casts & Summits. https://poweredbybhis.com This talk explores new ways to exploit browser extensions for both privilege escalation and persistence. It will explore the NativeMessaging functionality within all popular browsers (Edge Chrome and Firefox) across all major Operating Systems (Windows Linux MacOS) and how it can be exploited to run"
YouTube Link 2025-07-08T04:45Z 56.4K followers, [---] engagements

Limited data mode. Full metrics available with subscription: lunarcrush.com/pricing

@wildwesthackinfest
/creator/youtube::wildwesthackinfest