-
Intro And Welcome
- SteelCon Organizers
-
Murder! Mossad? Watching SE Experts In The
Real World, Literally Getting Away With Murder
- Chris Pritchard
-
Deep Dive Into Kubernetes Attack Surface And
How To Defend Against Cloud Native Ecosystem?
- Sadi Zane
-
X-Com: Editing Savegame Files
Is Still Strategy: Redux
- Paul Williams
-
How To Kill A Russian Commander In 20 Minutes Or
Less & Other Cyber Stories From The War In Ukraine
- Ian Thornton-Trump
-
Debugging Cordava Applications
- Nishaanth Kumar G
-
“I’ll Take Hacking For $100.”
Keeping Your CTF Costs Out Of Jeopardy
- James Boland
-
Hacking A Treadmill For Fame And Profit
- Soroush Dalili
-
Finding Zero Days In WordPress Plugins
And Themes And Testing Beyond WPScan
- Noman Riffat
-
Friend Or Foe?
- Jess Amery
-
How To Enhance Your Cybersecurity
Career Through Regional Alliances
- Gary Hibbard
-
Paving The Way To DA:
A Live (Hopefully) Path Of Pwnage
- Andy Gill And Neil Lines
-
Can You Detect This? Inside The
Ransomware Operator’s Toolkit
- Peter O
-
Taming Horses For Combat
- Sina Kheirkhah
-
Writing Tiny, Efficient,
And Reliable Malware
- Rad Kawar
-
Windows Credential Theft:
A Primer
- Keith Learmonth
-
Security Vulnerabilities
That (Mostly) Aren’t
- David Lodge
-
Catch Me If You Can:
Hiding Web Shell From WAF
- Manish Kishan Tanwar
-
P4ssw0rds!!!!111
- Richard Hicks
-
Closing
- SteelCon Organizers