OWASP LA – SharePoint Hacking – 22Feb2012 – Slides.PDF InfoSec World 2016 – RFIDiggity – Pentester Guide to Hacking HF/NFC and UHF RFID – 05Apr2016 – Slides.PDF InfoSec World 2013 – W4 – Using Google to Find Vulnerabilities in Your IT Environment – 14Apr2013 – Slides DEFCON 20 (2012) – Tenacious Diggity – 29July2012 – Slides.PDF Smarter Home Invasion With ZigDiggity Hacking Exposed EBS Volumes Ghost in the Browser: Broad-Scale Espionage with Bitsquatting Ferris Bueller’s Guide to Abuse Domain Permutations Check Your Privilege (Escalation) Introduction to Linux Privilege Escalation Methods Network Penetration Testing Toolkit - Nmap, Netcat, and Metasploit Basics How Perceptual Analysis Helps Bug Hunters Getting Buzzed on Buzzwords: Using Cloud & Big Data to Pentest at Scale Evolving Cyber Adversary Simulation: How Red Teaming Benefits Organizations