SEARCH
TOOLBOX
LANGUAGES
Difference between revisions of "Schedule"

Difference between revisions of "Schedule"

From BruCON 2017

Jump to: navigation, search
(General Information)
 
(251 intermediate revisions by 9 users not shown)
Line 1: Line 1:
=Keynote Speakers=
+
__NOTOC__
  
'''Haroon Meer (Thinkst.com, South-Africa)'''
+
 +
=General Information=
  
Haroon is a well-known security researcher who has recently started his own venture with Thinkst.com, an applied research company. He is also involved with ZACON, a security conference in South-Africa. 
+
* '''Registrations start at 8h30!'''
Haroon is a frequent speaker at conferences such as Blackhat, Defcon, etc.
+
* Typically workshops run for 2 consecutive speaking slots (ca. 2 hours), but some of them are even longer
+
* Workshop rooms in the location '''Novotel Ghent (Orval, Chimay, La Trappe)''' are 5 minutes walking from the main venue
'''Alex Hutton (Verizon Business, United States)'''
+
* Workshop seats are limited. '''Reserved seats get in until 5 min before the workshop. After that it is first come, first in.'''
 +
* Read our important instructions on [[how to use SCHED.org]]!
 +
* This schedule is subject to change, check back regularly.
  
Alex is a principal in the Verizon Business RISK intelligence team and has been one of the driving forces behind the VERIS (Verizon Risk Information Sharing) Framework and their yearly Databreach Investigations Report (DBIR). He is involved with the SIRA podcast and frequently presents on risk management and data-driven security at conferences such as Blackhat and Source.
+
Full schedule of the 0x09 (2017) edition [https://brucon0x092017.sched.com/ https://brucon0x092017.sched.com/]
  
'''Jaron Lanier (Microsoft, United States)'''
+
'''Keynotes:'''
  
Jaron is a pioneer in the realm of virtual reality and currently works as a principal architect for Microsoft’s Extreme Computing lab. He is the author of the 2010 bestseller “you are not a gadget” and has given talks at conferences around the world on virtual reality and the impact of social networks and web 2.0.
+
* Keynote: [[Justine Bone]] - [[The cyber short. A market solution for product safety and corporate governance.]]
 +
* Keynote: [[Chris Wysopal]] - [[How hackers changed the security industry and how we need to keep changing it.]]
  
'''Due to time constraints Jaron will not be able to attend the conference. Instead we are organizing for him to deliver his keynote talk through a video link. We're still privileged to have Jaron on-board for our 2011 edition!'''
+
'''Talks:'''
  
=Workshops=
+
* [[Matt Wixey]] - [[See no evil, hear no evil: Hacking invisibly and silently with light and sound]]
 +
* [[Balazs Bucsay]] - [[XFLTReaT: a new dimension in tunnelling]]
 +
* [[Anna Shirokova]] and [[Veronica Valeros]] - [[Knock Knock... Who's there? admin admin and get in! An overview of the CMS brute-forcing malware landscape.]]
 +
* [[Volodymyr Styran]] - [[From Weakest Link to Retaliation Weapon: Building Efficient Anti-Social Engineering Awareness Program]]
 +
* [[Sampada Nandedkar]] and [[Rushikesh Nandedkar]] - [[Races, Reaches and Rescues!!! (Race condition vulnerabilities revisited)]]
 +
* [[Damien Cauquil]] - [[Weaponizing the BBC Micro:Bit]]
 +
* [[Sander Demeester]] - [[Secure channels: Building real world crypto systems]]
 +
* Josh Schwartz and John Cramb - [[MEATPISTOL, A Modular Malware Implant Framework]]
 +
* [[Gregory Pickett]] - [[Open Source Security Orchestration]]
 +
* [[František Střasák]] and Sebastian Garcia- [[Detecting malware even when it is encrypted -  Machine Learning for network HTTPS analysis]]
 +
* [[Nikhil Mittal]] - [[Evading Microsoft ATA for Active Directory Domination]]
 +
* [[Debasish Mandal]] - [[Browser Exploits? Grab them by the collar!]]
  
 +
'''Workshops:'''
  
'''Agnitio: the security code review Swiss army knife (David Rook - Security Ninja)'''
+
* Benjamin Delpy - Mimikatz workshop
 
+
* [[Didier Stevens]] - [[Programming Wireshark With Lua]]
Its static analysis, but not as we know it
+
* [[David Szili]] - [[Getting the Most Out of Windows Event Logs]]
 
+
* [[Steven Wierckx]] and [[Andy Deweirt]] - [[Building a cheap, robust, scaling, penetration testing/bug bounty super computer]]
'''Collective Malicious PDF Analysis (Brandon Dixon - x0ner)'''
+
* [[Swaroop Yermalkar]] - [[Practical iOS App Exploitation and Defense using iGoat]]
 
+
* [[Sergei Frankoff]] and [[Sean Wilson]] - [[Malware Triage: Malscripts Are The New Exploit Kit]]
Going beyond one sample at a time
+
* [[Emmanuel Nicaise]] - [[Jedi's trick to convince your boss and colleagues]]
 
+
* [[Leszek Mis]] - [[May the data stay with you -  Network Data Exfiltration Techniques.]]
'''Script Kiddie Hacking Techniques (Ellen Moar - soyflower)'''
+
* [[Slawomir Jasek]] - [[Hacking Bluetooth Smart locks]]
 
+
* [[Georges Bossert]] and [[Frédéric Guihéry]] - [[Defeating Proprietary Protocols the Smart Way]]
How a script kiddie can copy and paste their way to effective hacks
+
* [[Anto Joseph]] and [[Clarence Chio]] - [[Practical Machine Learning in InfoSecurity]]
 
+
* [[Vinnie Vanhoecke]] and Tom Kustermans and Joachim Schäfer - [[Playing with RFID workshop]]
'''The Web Application Hacking Toolchain (Jason Haddix - jhaddix)'''
+
* [[Yannick Wellens]] - [[Windows malware development: A JMP in the dark]]
 
 
web hacking made better
 
 
 
'''White Hat Shellcode: Not for Exploits (Didier Stevens)'''
 
 
 
Learn to use shellcode for defense
 
 
 
'''Beer brewing (TBD)'''
 
 
 
'''Lockpicking (TBD)'''
 
 
 
'''VOIP (TBD)'''
 
 
 
'''RFID (TBD)'''
 
 
 
 
 
=Presentations=
 
 
 
 
 
''' Ripping Out Code: Practical Attack Surface Reduction for Open Source Systems (Craig Balding)'''
 
 
 
'''Abusing Locality in Shared Web Hosting (Nick Nikiforakis - nikifor)'''
 
 
 
'''Botnet Identification and remediation (Barry Irwin)'''
 
 
 
Cleaning up in your own back yard
 
 
 
'''Botnets and Browsers - Brothers in a Ghost Shell (Aditya K Sood)'''
 
 
 
'''iOS Data Protection Internals (Andrey Belenko)'''
 
 
 
'''The 99¢ heart surgeon dilemma (Stefan Friedli)'''
 
 
 
How to fix penetration testing
 
 
 
'''Pushing in, leaving a present, and pulling out without anybody noticing (Ian Amit)'''
 
 
 
Data Exfiltration in highly secure environments
 
 
 
'''Social Engineering Like In The Movies (Dale Pearson)'''
 
 
 
The reality of awareness and manipulation
 
 
 
'''Smart Phones – The Weak Link in the Security Chain (Nick Walker - tel0seh)'''
 
 
 
Hacking a network through an Android device
 
 
 
'''Enterprise Wi-Fi Worms, Backdoors and Botnets for Fun and Profit (Vivek Ramachandran)'''
 

Latest revision as of 07:40, 3 October 2017


General Information

  • Registrations start at 8h30!
  • Typically workshops run for 2 consecutive speaking slots (ca. 2 hours), but some of them are even longer
  • Workshop rooms in the location Novotel Ghent (Orval, Chimay, La Trappe) are 5 minutes walking from the main venue
  • Workshop seats are limited. Reserved seats get in until 5 min before the workshop. After that it is first come, first in.
  • Read our important instructions on how to use SCHED.org!
  • This schedule is subject to change, check back regularly.

Full schedule of the 0x09 (2017) edition https://brucon0x092017.sched.com/

Keynotes:

Talks:

Workshops: