際際滷shows by User: MikeSaunders4 / http://www.slideshare.net/images/logo.gif 際際滷shows by User: MikeSaunders4 / Tue, 07 Nov 2017 19:45:12 GMT 際際滷Share feed for 際際滷shows by User: MikeSaunders4 I Want My EIP - Buffer Overflow 101 /slideshow/i-want-my-eip-buffer-overflow-101/81723078 wantmyeip-171107194512
A 101-level overview of 32-bit x86 stack-based buffer overflows. In this presentation I discuss buffer overflows, the stack, and how overflows work on the stack. I also discuss how to identify an overflow opportunity, locate the return address, and develop a working exploit. Presented at DerbyCon 7 (2017) and BSides Winnipeg 2017. Video available at: https://www.youtube.com/watch?v=NHDRJbLj7Jg]]>

A 101-level overview of 32-bit x86 stack-based buffer overflows. In this presentation I discuss buffer overflows, the stack, and how overflows work on the stack. I also discuss how to identify an overflow opportunity, locate the return address, and develop a working exploit. Presented at DerbyCon 7 (2017) and BSides Winnipeg 2017. Video available at: https://www.youtube.com/watch?v=NHDRJbLj7Jg]]>
Tue, 07 Nov 2017 19:45:12 GMT /slideshow/i-want-my-eip-buffer-overflow-101/81723078 MikeSaunders4@slideshare.net(MikeSaunders4) I Want My EIP - Buffer Overflow 101 MikeSaunders4 A 101-level overview of 32-bit x86 stack-based buffer overflows. In this presentation I discuss buffer overflows, the stack, and how overflows work on the stack. I also discuss how to identify an overflow opportunity, locate the return address, and develop a working exploit. Presented at DerbyCon 7 (2017) and BSides Winnipeg 2017. Video available at: https://www.youtube.com/watch?v=NHDRJbLj7Jg <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/wantmyeip-171107194512-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A 101-level overview of 32-bit x86 stack-based buffer overflows. In this presentation I discuss buffer overflows, the stack, and how overflows work on the stack. I also discuss how to identify an overflow opportunity, locate the return address, and develop a working exploit. Presented at DerbyCon 7 (2017) and BSides Winnipeg 2017. Video available at: https://www.youtube.com/watch?v=NHDRJbLj7Jg
I Want My EIP - Buffer Overflow 101 from Mike Saunders
]]>
171 2 https://cdn.slidesharecdn.com/ss_thumbnails/wantmyeip-171107194512-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
BSidesMSP 2017 - SDR101 workshop /slideshow/bsidesmsp-2017-sdr101-workshop/77891755 sdr101-workshop-distribution-170714233255
Software Defined Radio 101 workshop presented at BSidesMSP 2017 by @hardwaterhacker and @eapolsniper.]]>

Software Defined Radio 101 workshop presented at BSidesMSP 2017 by @hardwaterhacker and @eapolsniper.]]>
Fri, 14 Jul 2017 23:32:55 GMT /slideshow/bsidesmsp-2017-sdr101-workshop/77891755 MikeSaunders4@slideshare.net(MikeSaunders4) BSidesMSP 2017 - SDR101 workshop MikeSaunders4 Software Defined Radio 101 workshop presented at BSidesMSP 2017 by @hardwaterhacker and @eapolsniper. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/sdr101-workshop-distribution-170714233255-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Software Defined Radio 101 workshop presented at BSidesMSP 2017 by @hardwaterhacker and @eapolsniper.
BSidesMSP 2017 - SDR101 workshop from Mike Saunders
]]>
250 2 https://cdn.slidesharecdn.com/ss_thumbnails/sdr101-workshop-distribution-170714233255-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
SDR 101 - NDSU CyberSecurity 2017 /slideshow/sdr-101-ndsu-cybersecurity-2017/73228038 sdr101-presentation-ndsu-170316225610
Intro to Software Defined Radio, presented at NDSU CyberSecurity Conference 2017 #NDCSC17]]>

Intro to Software Defined Radio, presented at NDSU CyberSecurity Conference 2017 #NDCSC17]]>
Thu, 16 Mar 2017 22:56:10 GMT /slideshow/sdr-101-ndsu-cybersecurity-2017/73228038 MikeSaunders4@slideshare.net(MikeSaunders4) SDR 101 - NDSU CyberSecurity 2017 MikeSaunders4 Intro to Software Defined Radio, presented at NDSU CyberSecurity Conference 2017 #NDCSC17 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/sdr101-presentation-ndsu-170316225610-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Intro to Software Defined Radio, presented at NDSU CyberSecurity Conference 2017 #NDCSC17
SDR 101 - NDSU CyberSecurity 2017 from Mike Saunders
]]>
868 5 https://cdn.slidesharecdn.com/ss_thumbnails/sdr101-presentation-ndsu-170316225610-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
SDR101-presentation-distro /slideshow/sdr101presentationdistro/62021863 75f900da-14ea-418c-b530-25d7a32af645-160514235455
]]>

]]>
Sat, 14 May 2016 23:54:55 GMT /slideshow/sdr101presentationdistro/62021863 MikeSaunders4@slideshare.net(MikeSaunders4) SDR101-presentation-distro MikeSaunders4 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/75f900da-14ea-418c-b530-25d7a32af645-160514235455-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
SDR101-presentation-distro from Mike Saunders
]]>
590 7 https://cdn.slidesharecdn.com/ss_thumbnails/75f900da-14ea-418c-b530-25d7a32af645-160514235455-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
InsiderThreat-2016NDITS /slideshow/insiderthreat2016ndits/61841527 4ad1e632-b864-4680-acde-fee9f4276911-160510025109
]]>

]]>
Tue, 10 May 2016 02:51:09 GMT /slideshow/insiderthreat2016ndits/61841527 MikeSaunders4@slideshare.net(MikeSaunders4) InsiderThreat-2016NDITS MikeSaunders4 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/4ad1e632-b864-4680-acde-fee9f4276911-160510025109-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
InsiderThreat-2016NDITS from Mike Saunders
]]>
186 5 https://cdn.slidesharecdn.com/ss_thumbnails/4ad1e632-b864-4680-acde-fee9f4276911-160510025109-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Detecting-Preventing-Insider-Threat /slideshow/detectingpreventinginsiderthreat/53668751 3135dc62-0a3f-4271-9221-d36eadf627ab-151007220526-lva1-app6892
]]>

]]>
Wed, 07 Oct 2015 22:05:26 GMT /slideshow/detectingpreventinginsiderthreat/53668751 MikeSaunders4@slideshare.net(MikeSaunders4) Detecting-Preventing-Insider-Threat MikeSaunders4 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/3135dc62-0a3f-4271-9221-d36eadf627ab-151007220526-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Detecting-Preventing-Insider-Threat from Mike Saunders
]]>
659 5 https://cdn.slidesharecdn.com/ss_thumbnails/3135dc62-0a3f-4271-9221-d36eadf627ab-151007220526-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
DetectingSpearPhishingAttacks /slideshow/detectingspearphishingattacks/53215231 ce95c1fd-a60b-4510-8e6a-dcc6208ec2d6-150926034814-lva1-app6891
]]>

]]>
Sat, 26 Sep 2015 03:48:14 GMT /slideshow/detectingspearphishingattacks/53215231 MikeSaunders4@slideshare.net(MikeSaunders4) DetectingSpearPhishingAttacks MikeSaunders4 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ce95c1fd-a60b-4510-8e6a-dcc6208ec2d6-150926034814-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
DetectingSpearPhishingAttacks from Mike Saunders
]]>
926 6 https://cdn.slidesharecdn.com/ss_thumbnails/ce95c1fd-a60b-4510-8e6a-dcc6208ec2d6-150926034814-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
You Will Be Breached /slideshow/you-will-be-breached-49847163/49847163 ywbb-distribution-150625193025-lva1-app6892
Your organization will be breached. It's a matter of when, not if. How you respond may be the difference between recovering and closing your doors. This talk is designed to help small businesses or businesses with small IT organizations to develop a viable incident response program.]]>

Your organization will be breached. It's a matter of when, not if. How you respond may be the difference between recovering and closing your doors. This talk is designed to help small businesses or businesses with small IT organizations to develop a viable incident response program.]]>
Thu, 25 Jun 2015 19:30:25 GMT /slideshow/you-will-be-breached-49847163/49847163 MikeSaunders4@slideshare.net(MikeSaunders4) You Will Be Breached MikeSaunders4 Your organization will be breached. It's a matter of when, not if. How you respond may be the difference between recovering and closing your doors. This talk is designed to help small businesses or businesses with small IT organizations to develop a viable incident response program. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ywbb-distribution-150625193025-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Your organization will be breached. It&#39;s a matter of when, not if. How you respond may be the difference between recovering and closing your doors. This talk is designed to help small businesses or businesses with small IT organizations to develop a viable incident response program.
You Will Be Breached from Mike Saunders
]]>
656 6 https://cdn.slidesharecdn.com/ss_thumbnails/ywbb-distribution-150625193025-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Is Your Data Literally Walking Out the Door? /slideshow/is-your-data-literally-walking-out-the-door/49847083 isyourdataliterallywalkingoutthedoor-distribution-150625192809-lva1-app6892
Your network security doesn't matter if an attacker can enter your facility and walk off with your critical assets and sensitive data, or attach a back door to your network. This presentation provides an introductory overview of physical security from an attacker's perspective.]]>

Your network security doesn't matter if an attacker can enter your facility and walk off with your critical assets and sensitive data, or attach a back door to your network. This presentation provides an introductory overview of physical security from an attacker's perspective.]]>
Thu, 25 Jun 2015 19:28:09 GMT /slideshow/is-your-data-literally-walking-out-the-door/49847083 MikeSaunders4@slideshare.net(MikeSaunders4) Is Your Data Literally Walking Out the Door? MikeSaunders4 Your network security doesn't matter if an attacker can enter your facility and walk off with your critical assets and sensitive data, or attach a back door to your network. This presentation provides an introductory overview of physical security from an attacker's perspective. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/isyourdataliterallywalkingoutthedoor-distribution-150625192809-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Your network security doesn&#39;t matter if an attacker can enter your facility and walk off with your critical assets and sensitive data, or attach a back door to your network. This presentation provides an introductory overview of physical security from an attacker&#39;s perspective.
Is Your Data Literally Walking Out the Door? from Mike Saunders
]]>
370 2 https://cdn.slidesharecdn.com/ss_thumbnails/isyourdataliterallywalkingoutthedoor-distribution-150625192809-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
YBB-NW-distribution /MikeSaunders4/ybbnwdistribution d04083c8-427b-4ace-9a92-0abf936cda71-150513033726-lva1-app6892
]]>

]]>
Wed, 13 May 2015 03:37:26 GMT /MikeSaunders4/ybbnwdistribution MikeSaunders4@slideshare.net(MikeSaunders4) YBB-NW-distribution MikeSaunders4 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/d04083c8-427b-4ace-9a92-0abf936cda71-150513033726-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
YBB-NW-distribution from Mike Saunders
]]>
644 1 https://cdn.slidesharecdn.com/ss_thumbnails/d04083c8-427b-4ace-9a92-0abf936cda71-150513033726-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Is Your Data Literally Walking Out the Door-presentation /slideshow/is-your-data-literally-walking-out-the-doorpresentation/46014792 a4dc5032-f674-4177-ab49-cbd3437304cc-150318201653-conversion-gate01
]]>

]]>
Wed, 18 Mar 2015 20:16:52 GMT /slideshow/is-your-data-literally-walking-out-the-doorpresentation/46014792 MikeSaunders4@slideshare.net(MikeSaunders4) Is Your Data Literally Walking Out the Door-presentation MikeSaunders4 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/a4dc5032-f674-4177-ab49-cbd3437304cc-150318201653-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Is Your Data Literally Walking Out the Door-presentation from Mike Saunders
]]>
528 3 https://cdn.slidesharecdn.com/ss_thumbnails/a4dc5032-f674-4177-ab49-cbd3437304cc-150318201653-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
You will be breached /slideshow/you-will-be-breached-38429510/38429510 youwillbebreached-140827170722-phpapp01
Your organization will be breached. It's a matter of when, not if. How you respond may be the difference between recovering and closing your doors. This talk is designed to help small businesses or businesses with small IT organizations to develop a viable incident response program. Presented at the 2013 ND IT Symposium on 5/1/2013.]]>

Your organization will be breached. It's a matter of when, not if. How you respond may be the difference between recovering and closing your doors. This talk is designed to help small businesses or businesses with small IT organizations to develop a viable incident response program. Presented at the 2013 ND IT Symposium on 5/1/2013.]]>
Wed, 27 Aug 2014 17:07:22 GMT /slideshow/you-will-be-breached-38429510/38429510 MikeSaunders4@slideshare.net(MikeSaunders4) You will be breached MikeSaunders4 Your organization will be breached. It's a matter of when, not if. How you respond may be the difference between recovering and closing your doors. This talk is designed to help small businesses or businesses with small IT organizations to develop a viable incident response program. Presented at the 2013 ND IT Symposium on 5/1/2013. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/youwillbebreached-140827170722-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Your organization will be breached. It&#39;s a matter of when, not if. How you respond may be the difference between recovering and closing your doors. This talk is designed to help small businesses or businesses with small IT organizations to develop a viable incident response program. Presented at the 2013 ND IT Symposium on 5/1/2013.
You will be breached from Mike Saunders
]]>
704 4 https://cdn.slidesharecdn.com/ss_thumbnails/youwillbebreached-140827170722-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Problems with parameters b sides-msp /slideshow/problems-with-parameters-b-sidesmsp/38292245 problemswithparameters-bsidesmsp-140823215635-phpapp02
Problems With Parameters - A high-level overview of common vulnerabilities identified in web applications, techniques to mitigate these vulnerabilities, and thoughts on incorporating secure webapp development practices into your organization's development culture.]]>

Problems With Parameters - A high-level overview of common vulnerabilities identified in web applications, techniques to mitigate these vulnerabilities, and thoughts on incorporating secure webapp development practices into your organization's development culture.]]>
Sat, 23 Aug 2014 21:56:34 GMT /slideshow/problems-with-parameters-b-sidesmsp/38292245 MikeSaunders4@slideshare.net(MikeSaunders4) Problems with parameters b sides-msp MikeSaunders4 Problems With Parameters - A high-level overview of common vulnerabilities identified in web applications, techniques to mitigate these vulnerabilities, and thoughts on incorporating secure webapp development practices into your organization's development culture. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/problemswithparameters-bsidesmsp-140823215635-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Problems With Parameters - A high-level overview of common vulnerabilities identified in web applications, techniques to mitigate these vulnerabilities, and thoughts on incorporating secure webapp development practices into your organization&#39;s development culture.
Problems with parameters b sides-msp from Mike Saunders
]]>
542 2 https://cdn.slidesharecdn.com/ss_thumbnails/problemswithparameters-bsidesmsp-140823215635-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-MikeSaunders4-48x48.jpg?cb=1511734517 Former President, ND Information Systems Security Association Board of Directors Skills: penetration testing, vulnerability assessment, incident response, security architecture, Information Security Management FISMA, DISA STIG, NIST 800 series, CMS ARS Metasploit, Nessus, BurpSuite, python OSCP, CISSP, GPEN, GWAPT, GMOB, GCIH, GCFA (previously held) Windows/Linux/UNIX Administration, Network Administration http://www.noridian.com https://cdn.slidesharecdn.com/ss_thumbnails/wantmyeip-171107194512-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/i-want-my-eip-buffer-overflow-101/81723078 I Want My EIP - Buffer... https://cdn.slidesharecdn.com/ss_thumbnails/sdr101-workshop-distribution-170714233255-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/bsidesmsp-2017-sdr101-workshop/77891755 BSidesMSP 2017 - SDR10... https://cdn.slidesharecdn.com/ss_thumbnails/sdr101-presentation-ndsu-170316225610-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/sdr-101-ndsu-cybersecurity-2017/73228038 SDR 101 - NDSU CyberSe...