This whitepaper had been proposed (but not accepted) at DEF CON 26 and Blackhat USA 2018 conferences.
By forging packets via the user datagram protocol, an attackers can leverage the memcached denial of service vulnerability (CVE-2018-1000115) to initiate record breaking denial of service attacks (stretching 1.7 terabytes per second). This paper will outline how a single computer can be used for mass memcached exploitation to launch such attacks (using Shodan API), how such attacks can be prevented and the exploration of other types of attacks similar to the memcached structure. Proof of concept code has been released prior to this paper’s creation.

These slides were presented at an MLH.io and Github sponsored event.
An introduction to circuitry and how some PCBs can be utilized into physical hacking (like in the video game, Watch Dogs). These slides will guide you into creating payloads suitable for HID (human interface devices), intercepting RFID access cards, hijacking IR remotes, jamming WIFI signals, and devices capable of delivering electromagnetic pulses.

These slides were presented at an MLH.io and Github sponsored event.
An introduction presentation to OPSEC; Keeping your digital persona and anonymity. These slides will guide you into using secure methods of communication, transferring digital currencies in secret, and other methods into keeping good IPSec.