SEARCH
TOOLBOX
LANGUAGES
Difference between revisions of "Schedule"

Difference between revisions of "Schedule"

From BruCON 2017

Jump to: navigation, search
(General Information)
 
(360 intermediate revisions by 12 users not shown)
Line 1: Line 1:
  Friday 18/09 - Thursday 19/09  : Workshops + Presentations + Lightning Talks
+
__NOTOC__
  
Doors and registration will be open at 8:00 on Friday
+
 +
=General Information=
  
== Current talks ==
+
* '''Registrations start at 8h30!'''
 +
* Typically workshops run for 2 consecutive speaking slots (ca. 2 hours), but some of them are even longer
 +
* Workshop rooms in the location '''Novotel Ghent (Orval, Chimay, La Trappe)''' are 5 minutes walking from the main venue
 +
* Workshop seats are limited. '''Reserved seats get in until 5 min before the workshop. After that it is first come, first in.'''
 +
* Read our important instructions on [[how to use SCHED.org]]!
 +
* This schedule is subject to change, check back regularly.
  
The agenda is probably not the final agenda of the conference as it may slightly change. Please check regularly the website for any updates!
+
Full schedule of the 0x09 (2017) edition [https://brucon0x092017.sched.com/ https://brucon0x092017.sched.com/]
Friday 18.09.2009 Saturday 19.09.2009
 
  
{| width="590" border="0"
+
'''Keynotes:'''
|- valign="top"
 
| colspan="2" width="33%" | <font size="2">'''Friday 18.09.2009 '''</font>
 
| colspan="2" width="33%" | <font size="2">'''Friday 18.09.2009 '''</font>
 
| colspan="2" width="33%" | <font size="2">'''Saturday 19.09.2009'''</font>
 
| colspan="2" width="33%" | <font size="2">'''Saturday 19.09.2009'''</font>
 
|- valign="top"
 
| width="9%" | <font size="2" face="Arial">8:00</font>
 
| width="24%" |
 
<font size="2" >'''[[List#Workshops|Workshops''']]</font>
 
  
<font size="2"></font>
+
* Keynote: [[Justine Bone]] - [[The cyber short. A market solution for product safety and corporate governance.]]
| width="9%" | <font size="2">9:00</font>
+
* Keynote: [[Chris Wysopal]] - [[How hackers changed the security industry and how we need to keep changing it.]]
| width="24%" |
 
<font size="2">'''[[]]'''</font>
 
  
<font size="2"></font>
+
'''Talks:'''
| width="9%" | <font size="2">9:00</font>
 
| width="24%" |
 
<font size="2">'''[[]'''</font>
 
  
<font size="2" ></font>
+
* [[Matt Wixey]] - [[See no evil, hear no evil: Hacking invisibly and silently with light and sound]]
|- valign="top"
+
* [[Balazs Bucsay]] - [[XFLTReaT: a new dimension in tunnelling]]
| width="9%" | <font size="2" ></font>
+
* [[Anna Shirokova]] and [[Veronica Valeros]] - [[Knock Knock... Who's there? admin admin and get in! An overview of the CMS brute-forcing malware landscape.]]
| width="24%" |
+
* [[Volodymyr Styran]] - [[From Weakest Link to Retaliation Weapon: Building Efficient Anti-Social Engineering Awareness Program]]
<font size="2"></font>
+
* [[Sampada Nandedkar]] and [[Rushikesh Nandedkar]] - [[Races, Reaches and Rescues!!! (Race condition vulnerabilities revisited)]]
 +
* [[Damien Cauquil]] - [[Weaponizing the BBC Micro:Bit]]
 +
* [[Sander Demeester]] - [[Secure channels: Building real world crypto systems]]
 +
* Josh Schwartz and John Cramb - [[MEATPISTOL, A Modular Malware Implant Framework]]
 +
* [[Gregory Pickett]] - [[Open Source Security Orchestration]]
 +
* [[František Střasák]] and Sebastian Garcia- [[Detecting malware even when it is encrypted -  Machine Learning for network HTTPS analysis]]
 +
* [[Nikhil Mittal]] - [[Evading Microsoft ATA for Active Directory Domination]]
 +
* [[Debasish Mandal]] - [[Browser Exploits? Grab them by the collar!]]
  
<font size="2"></font>
+
'''Workshops:'''
| width="9%" | <font size="2" >9:50</font>
 
| width="24%" |
 
<font size="2">'''[[]]'''</font>
 
  
<font size="2"></font>
+
* Benjamin Delpy - Mimikatz workshop
| width="9%" | <font size="2" >9:50</font>
+
* [[Didier Stevens]] - [[Programming Wireshark With Lua]]
| width="24%" |
+
* [[David Szili]] - [[Getting the Most Out of Windows Event Logs]]
<font size="2">'''[[]]'''</font>
+
* [[Steven Wierckx]] and [[Andy Deweirt]] - [[Building a cheap, robust, scaling, penetration testing/bug bounty super computer]]
 
+
* [[Swaroop Yermalkar]] - [[Practical iOS App Exploitation and Defense using iGoat]]
<font size="2"></font>
+
* [[Sergei Frankoff]] and [[Sean Wilson]] - [[Malware Triage: Malscripts Are The New Exploit Kit]]
|- valign="top"
+
* [[Emmanuel Nicaise]] - [[Jedi's trick to convince your boss and colleagues]]
| width="9%" | <font size="2">10:40</font>
+
* [[Leszek Mis]] - [[May the data stay with you - Network Data Exfiltration Techniques.]]
| width="24%" | <font size="2">Refreshment Break</font>
+
* [[Slawomir Jasek]] - [[Hacking Bluetooth Smart locks]]
| width="9%" | <font size="2">10:40</font>
+
* [[Georges Bossert]] and [[Frédéric Guihéry]] - [[Defeating Proprietary Protocols the Smart Way]]
| width="24%" | <font size="2">Refreshment Break</font>
+
* [[Anto Joseph]] and [[Clarence Chio]] - [[Practical Machine Learning in InfoSecurity]]
| width="9%" | <font size="2">10:40</font>
+
* [[Vinnie Vanhoecke]] and Tom Kustermans and Joachim Schäfer - [[Playing with RFID workshop]]
| width="24%" | <font size="2">Refreshment Break</font>
+
* [[Yannick Wellens]] - [[Windows malware development: A JMP in the dark]]
|- valign="top"
 
| width="9%" | <font size="2"></font>
 
| width="24%" |
 
<font size="2"></font>
 
 
 
<font size="2"></font>
 
| width="9%" | <font size="2">11:00</font>
 
| width="24%" |
 
<font size="2">'''[[]]'''</font>
 
 
 
<font size="2"></font>
 
| width="9%" | <font size="2">11:00</font>
 
| width="24%" |
 
<font size="2">'''[[]]'''</font>
 
 
 
<font size="2"></font>
 
|- valign="top"
 
| width="9%" | <font size="2" face="Arial"></font>
 
| width="24%" |
 
<font size="2"></font>
 
 
 
<font size="2"></font>
 
| width="9%" | <font size="2" face="Arial">11:50</font>
 
| width="24%" |
 
<font size="2">'''[[]]'''</font>
 
 
 
<font size="2"></font>
 
| width="9%" | <font size="2" face="Arial">11:50</font>
 
| width="24%" |
 
<font size="2">'''[[]]'''</font>
 
 
 
<font size="2"></font>
 
|- valign="top"
 
| width="9%" | <font size="2">12:40</font>
 
| width="24%" | <font size="2">Lunch Break</font>
 
| width="9%" | <font size="2">12:40</font>
 
| width="24%" | <font size="2">Lunch Break</font>
 
| width="9%" | <font size="2">12:40</font>
 
| width="24%" | <font size="2">Lunch Break</font>
 
|- valign="top"
 
| width="9%" | <font size="2"></font>
 
| width="24%" | <font size="2"></font>
 
| width="9%" | <font size="2">13:30</font>
 
| width="24%" | <font size="2">'''[[LightningTalks|Lightning talks]]'''</font>
 
| width="9%" | <font size="2"></font>
 
| width="24%" | <font size="2"></font>
 
|- valign="top"
 
| width="9%" | <font size="2">14:00</font>
 
| width="24%" |
 
<font size="2">'''[[List#Workshops|Workshops]]'''</font>
 
 
 
<font size="2"></font>
 
| width="9%" | <font size="2">14:00</font>
 
| width="24%" |
 
<font size="2">'''[[]]'''</font>
 
 
 
<font size="2"></font>
 
| width="9%" | <font size="2">14:00</font>
 
| width="24%" |
 
<font size="2">'''[[]]'''</font>
 
 
 
<font size="2"></font>
 
|- valign="top"
 
| width="9%" | <font size="2"></font>
 
| width="24%" |
 
<font size="2"></font>
 
 
 
<font size="2"></font>
 
| width="9%" | <font size="2">14:50</font>
 
| width="24%" |
 
<font size="2" >'''[[]]'''</font>
 
 
 
<font size="2"></font>
 
| width="9%" | <font size="2">14:50</font>
 
| width="24%" |
 
<font size="2" >'''[[]]'''</font>
 
 
 
<font size="2"></font>
 
 
 
|- valign="top"
 
| width="9%" | <font size="2">15:40</font>
 
| width="24%" | <font size="2">Refreshment Break</font>
 
| width="9%" | <font size="2">15:40</font>
 
| width="24%" | <font size="2">Refreshment Break</font>
 
| width="9%" | <font size="2">15:40</font>
 
| width="24%" | <font size="2">Refreshment Break</font>
 
 
 
|- valign="top"
 
| width="9%" | <font size="2" ></font>
 
| width="24%" |
 
<font size="2"></font>
 
 
 
<font size="2"></font>
 
| width="9%" | <font size="2">16:00</font>
 
| width="24%" |
 
<font size="2">'''[[ ]]'''</font>
 
 
 
<font size="2" ></font>
 
| width="9%" | <font size="2">16:00</font>
 
| width="24%" |
 
<font size="2">'''[[]]'''</font>
 
 
 
<font size="2" ></font>
 
 
 
|- valign="top"
 
| width="9%" | <font size="2" >17:00</font>
 
| width="24%" |
 
<font size="2"></font>
 
 
 
<font size="2" ></font>
 
| width="9%" | <font size="2" >16:50</font>
 
| width="24%" | <font size="2"></font>
 
 
 
<font size="2" ></font>
 
| width="9%" | <font size="2" >16:50</font>
 
| width="24%" | <font size="2"></font>
 
|}
 

Latest revision as of 07:40, 3 October 2017


General Information

  • Registrations start at 8h30!
  • Typically workshops run for 2 consecutive speaking slots (ca. 2 hours), but some of them are even longer
  • Workshop rooms in the location Novotel Ghent (Orval, Chimay, La Trappe) are 5 minutes walking from the main venue
  • Workshop seats are limited. Reserved seats get in until 5 min before the workshop. After that it is first come, first in.
  • Read our important instructions on how to use SCHED.org!
  • This schedule is subject to change, check back regularly.

Full schedule of the 0x09 (2017) edition https://brucon0x092017.sched.com/

Keynotes:

Talks:

Workshops: