SEARCH
TOOLBOX
LANGUAGES
Difference between revisions of "Schedule"

Difference between revisions of "Schedule"

From BruCON 2017

Jump to: navigation, search
(Day 1 : Wednesday September 26th)
(General Information)
 
(123 intermediate revisions by 8 users not shown)
Line 1: Line 1:
 
__NOTOC__
 
__NOTOC__
 +
 +
 
=General Information=
 
=General Information=
* Registration for workshops will be possible '''at the venue'''
+
 
** we have a varied audience. Some of you are on twitter, some read the blog, some do neither. As each workshop has limited seats available, we want to give everybody the same chance to register for the workshop of their choice.
+
* '''Registrations start at 8h30!'''
* Workshops run for 2 consecutive speaking slots (ca. 2 hours)
+
* Typically workshops run for 2 consecutive speaking slots (ca. 2 hours), but some of them are even longer
* 't Pand is a location within 10 minutes walking distance of the main venue !
+
* Workshop rooms in the location '''Novotel Ghent (Orval, Chimay, La Trappe)''' are 5 minutes walking from the main venue
* La Trappe isn't a room or an aula but rather an open space gallery in the main venue. Directions will be clearly visible.
+
* Workshop seats are limited. '''Reserved seats get in until 5 min before the workshop. After that it is first come, first in.'''
* We do have the "Beer Workshop" again this year !!! It is not on the schedule yet, but prepare to brew your own !
+
* Read our important instructions on [[how to use SCHED.org]]!
 
* This schedule is subject to change, check back regularly.
 
* This schedule is subject to change, check back regularly.
  
=Current list of speakers=
+
Full schedule of the 0x09 (2017) edition [https://brucon0x092017.sched.com/ https://brucon0x092017.sched.com/]
 
 
'''Keynotes'''
 
* Ed Skoudis - founder and senior security consultant with InGuardians
 
* Katie Moussouris - Lead Security Community Outreach and Strategy team at Microsoft
 
 
 
'''Talks'''
 
* Georgia Weidman - Introducing the Smartphone Penetration Testing Framework
 
* Robert McArdle -  HTML5 - A Whole New Attack Vector
 
* Raul Siles - Security of National eID (smartcard-based) Web Applications
 
* Andreas Bogk - Herding RATs
 
* Josh Corman and Jericho - "Cyberwar" : Not What We Were Expecting
 
* Allison Miller - A Million Mousetraps: Using Big Data and Little Loops to Build Better Defenses
 
* Mathy Vanhoef - New flaws in WPA-TKIP
 
* Martin Gallo - Uncovering SAP vulnerabilities: dissecting and breaking the Diag protocol
 
* Fernando Gont - Recent Advances in IPv6 Security
 
* Gregory Pickett - pMap, the silent killer
 
* Carlos Garcia - How I met your pointer (Hijacking client software for fuzz and profit)
 
* Paul Marsh - Satellite Hacking
 
* Chris Nickerson - Tactical Surveillance : Look at me now!
 
* Mickey Shkatov - we have you by the gadgets
 
* int0x80 (of Dual Core) - Moar Anti-Forensics for the Louise
 
* David Mortman - The Defense RESTs: Automation and APIs for Improving Security
 
 
 
  
'''Workshops'''
+
'''Keynotes:'''
* Didier Stevens - Windows x64: The Essentials
 
* Kyle 'Kos' Osborn & Krzysztof Kotowicz - Advanced Chrome Extension Exploitation
 
* Michael Sikorski & William Ballenthin - Clearing the Red Forest
 
* Abraham Aranguren - Introducing OWTF
 
* Biosshadow, Matt Erasmus, Benson - The PANIC Project
 
* Vivek Ramachandran - Hacking with Python
 
* fbz - Hardware Hacking
 
* Walter Belgers (TOOOL) - Lockpicking
 
* Joernchen, Astera & Mumpi - DJ Workshop
 
* Meredith L. Patterson & Sergey Bratus - Langsec Workshop
 
* Machtelt Garrels - Beer brewing workshop
 
* LSEC - Hiring! Looking for volunteer Cyber FireFighters and Innovative Cyber Security Measures
 
  
 +
* Keynote: [[Justine Bone]] - [[The cyber short. A market solution for product safety and corporate governance.]]
 +
* Keynote: [[Chris Wysopal]] - [[How hackers changed the security industry and how we need to keep changing it.]]
  
==Day 1 : Wednesday September 26th==
+
'''Talks:'''
'''Registrations start at 9h00!'''
 
  
'''Workshop rooms in the location 't Pand are 10 minutes walking from the main venue.'''
+
* [[Matt Wixey]] - [[See no evil, hear no evil: Hacking invisibly and silently with light and sound]]
 +
* [[Balazs Bucsay]] - [[XFLTReaT: a new dimension in tunnelling]]
 +
* [[Anna Shirokova]] and [[Veronica Valeros]] - [[Knock Knock... Who's there? admin admin and get in! An overview of the CMS brute-forcing malware landscape.]]
 +
* [[Volodymyr Styran]] - [[From Weakest Link to Retaliation Weapon: Building Efficient Anti-Social Engineering Awareness Program]]
 +
* [[Sampada Nandedkar]] and [[Rushikesh Nandedkar]] - [[Races, Reaches and Rescues!!! (Race condition vulnerabilities revisited)]]
 +
* [[Damien Cauquil]] - [[Weaponizing the BBC Micro:Bit]]
 +
* [[Sander Demeester]] - [[Secure channels: Building real world crypto systems]]
 +
* Josh Schwartz and John Cramb - [[MEATPISTOL, A Modular Malware Implant Framework]]
 +
* [[Gregory Pickett]] - [[Open Source Security Orchestration]]
 +
* [[František Střasák]] and Sebastian Garcia- [[Detecting malware even when it is encrypted -  Machine Learning for network HTTPS analysis]]
 +
* [[Nikhil Mittal]] - [[Evading Microsoft ATA for Active Directory Domination]]
 +
* [[Debasish Mandal]] - [[Browser Exploits? Grab them by the collar!]]
  
'''Please be there in time!!'''
+
'''Workshops:'''
{| border="1px solid" style="text-align:center;"
 
|- bgcolor="#CCCCCC"
 
!|Time
 
!|Lounge
 
!|Westvleteren (main track)
 
!|Westmalle (workshops)
 
!|Orval (@Pand!)
 
!|Chimay (@Pand!)
 
!|La Trappe
 
|- bgcolor="#CCCCCC"
 
!|9:00
 
|Breakfast
 
|
 
|
 
|
 
|
 
|
 
|-
 
!|9:50
 
|
 
|Welcome (Seba & Wim)
 
|rowspan="2" | Streaming from Westvleteren
 
|
 
|
 
|The Hex Factor (continuously)
 
|-
 
!|10:00
 
|
 
|Keynote (Katie Moussouris)
 
|
 
|
 
|
 
|-
 
!|11:00
 
|
 
|[http://2012.brucon.org/index.php/Talks_and_workshops#Meredith_L._Patterson_and_Sergey_Bratus_-_LangSec Meredith L. Patterson and Sergey Bratus]
 
| rowspan="2" | Windows x64: The Essentials ([http://2012.brucon.org/index.php/Talks_and_workshops#Didier_Stevens_-_Windows_x64:_The_Essentials_.282h.29 Didier Stevens])
 
|
 
|
 
|
 
|-
 
!|12:00
 
|
 
|The Defense RESTs: Automation and APIs for Improving Security ([http://2012.brucon.org/index.php/Talks_and_workshops#David_Mortman_-_The_Defense_RESTs:_Automation_and_APIs_for_Improving_Security David Mortman])
 
|
 
|
 
|
 
|- bgcolor="#CCCCCC"
 
!|13:00
 
|Lunch
 
|
 
|
 
|
 
|
 
|
 
|-
 
!|14:00
 
|
 
|Satellite Hacking ([http://2012.brucon.org/index.php/Talks_and_workshops#Paul_Marsh_-_Satellite_Hacking Paul Marsh])
 
| rowspan="2" |Clearing the Red Forest ([http://2012.brucon.org/index.php/Talks_and_workshops#Michael_Sikorski_.26_William_Ballenthin_-_Clearing_the_Red_Forest_.284h.29 Michael Sikorski & Willi Ballenthin])
 
| rowspan="2" |Introducing OWTF ([http://2012.brucon.org/index.php/Talks_and_workshops#Abraham_Aranguren_-_Introducing_OWTF_.284hr.29 Abraham Aranguren])
 
| rowspan="2" |Hacking with Python ([http://2012.brucon.org/index.php/Talks_and_workshops#Vivek_Ramachandran_-_Hacking_with_Python_.282hr.29 Vivek Ramachandran])
 
| rowspan="2" |Hardware Hacking ([http://2012.brucon.org/index.php/Talks_and_workshops#fbz_-_Hardware_Hacking fbz])
 
|-
 
!|15:00
 
|
 
|Security of National eID (smartcard-based) Web Applications ([http://2012.brucon.org/index.php/Talks_and_workshops#Raul_Siles_-_Security_of_National_eID_.28smartcard-based.29_Web_Applications Raul Siles])
 
|- bgcolor="#CCCCCC"
 
!|16:00
 
|Coffee break
 
|
 
|
 
|
 
|
 
|
 
|-
 
!|16:30
 
| rowspan="2" | [http://2012.brucon.org/index.php/Talks_and_workshops#Beer_Hacking_workshop Beer Workshop]
 
| Moar Anti-Forensics for the Louise ([http://2012.brucon.org/index.php/Talks_and_workshops#int0x80_.28of_Dual_Core.29_-_Moar_Anti-Forensics_for_the_Louise int0x80])
 
| rowspan="2" |Clearing the Red Forest ([http://2012.brucon.org/index.php/Talks_and_workshops#Michael_Sikorski_.26_William_Ballenthin_-_Clearing_the_Red_Forest_.284h.29 Michael Sikorski & Willi Ballenthin])
 
| rowspan="2" |Introducing OWTF ([http://2012.brucon.org/index.php/Talks_and_workshops#Abraham_Aranguren_-_Introducing_OWTF_.284hr.29 Abraham Aranguren])
 
| rowspan = "2" | [http://2012.brucon.org/index.php/Talks_and_workshops#Walter_Belgers_.28TOOOL.29_-_Lockpicking TOOOL (lockpicking)]
 
| rowspan = "2" |
 
|-
 
!|17:30
 
|pMap, the silent killer ([http://2012.brucon.org/index.php/Talks_and_workshops#Gregory_Pickett_-_pMap.2C_the_silent_killer Gregory Pickett])
 
|- bgcolor="#CCCCCC"
 
!|18:30
 
|Dinner
 
|
 
|
 
|
 
|
 
|
 
|-
 
!|19:30
 
|[http://2012.brucon.org/index.php/Talks_and_workshops#Joernchen.2C_Astera_.26_Mumpi_-_DJ_Workshop_.282h.29 DJ Workshop]
 
|"Cyberwar" : Not What We Were Expecting ([http://2012.brucon.org/index.php/Talks_and_workshops#Josh_Corman_and_Jericho_-_.22Cyberwar.22_:_Not_What_We_Were_Expecting Josh Corman & Jericho])
 
|Streaming from Westvleteren
 
|
 
|
 
|
 
|-
 
!|20:30
 
|[http://2012.brucon.org/index.php/Talks_and_workshops#Joernchen.2C_Astera_.26_Mumpi_-_DJ_Workshop_.282h.29 DJ Workshop]
 
|Recent Advances in IPv6 Security ([http://2012.brucon.org/index.php/Talks_and_workshops#Fernando_Gont_-_Recent_Advances_in_IPv6_Security Fernando Gont])
 
|Streaming from Westvleteren
 
|
 
|
 
|
 
|-
 
!|21:30
 
|Close
 
|
 
|
 
|
 
|
 
|
 
|-
 
!|22:00
 
|Doors closed
 
|
 
|
 
|
 
|
 
|
 
|-
 
|}
 
  
==Day 2 : Thursday September 27th==
+
* Benjamin Delpy - Mimikatz workshop
{| border="1px solid" style="text-align:center;"
+
* [[Didier Stevens]] - [[Programming Wireshark With Lua]]
|- bgcolor="#CCCCCC"
+
* [[David Szili]] - [[Getting the Most Out of Windows Event Logs]]
!|Time
+
* [[Steven Wierckx]] and [[Andy Deweirt]] - [[Building a cheap, robust, scaling, penetration testing/bug bounty super computer]]
!|Lounge
+
* [[Swaroop Yermalkar]] - [[Practical iOS App Exploitation and Defense using iGoat]]
!|Westvleteren (main track)
+
* [[Sergei Frankoff]] and [[Sean Wilson]] - [[Malware Triage: Malscripts Are The New Exploit Kit]]
!|Westmalle (workshops)
+
* [[Emmanuel Nicaise]] - [[Jedi's trick to convince your boss and colleagues]]
!|Orval (@Pand)
+
* [[Leszek Mis]] - [[May the data stay with you - Network Data Exfiltration Techniques.]]
!|La Trappe
+
* [[Slawomir Jasek]] - [[Hacking Bluetooth Smart locks]]
|- bgcolor="#CCCCCC"
+
* [[Georges Bossert]] and [[Frédéric Guihéry]] - [[Defeating Proprietary Protocols the Smart Way]]
!|9:00
+
* [[Anto Joseph]] and [[Clarence Chio]] - [[Practical Machine Learning in InfoSecurity]]
|Breakfast
+
* [[Vinnie Vanhoecke]] and Tom Kustermans and Joachim Schäfer - [[Playing with RFID workshop]]
|
+
* [[Yannick Wellens]] - [[Windows malware development: A JMP in the dark]]
|
 
|
 
|
 
|-
 
!|10:00
 
|
 
|We have you by the gadgets ([http://2012.brucon.org/index.php/Talks_and_workshops#Mickey_Shkatov_-_we_have_you_by_the_gadgets Mickey Shkatov])
 
|Streaming from Westvleteren
 
|
 
|
 
|-
 
!|11:00
 
|
 
|Introducing the Smartphone Penetration Testing Framework ([http://2012.brucon.org/index.php/Talks_and_workshops#Georgia_Weidman_-_Introducing_the_Smartphone_Penetration_Testing_Framework Georgia Weidman])
 
| rowspan="2" |Windows x64: The Essentials ([http://2012.brucon.org/index.php/Talks_and_workshops#Didier_Stevens_-_Windows_x64:_The_Essentials_.282h.29 Didier Stevens])
 
| rowspan="2" | [http://2012.brucon.org/index.php/Talks_and_workshops#Walter_Belgers_.28TOOOL.29_-_Lockpicking TOOOL (lockpicking)]
 
| rowspan="2" | The Hex Factor (continuously)
 
|-
 
!|12:00
 
|
 
|Herding RATs ([http://2012.brucon.org/index.php/Talks_and_workshops#Andreas_Bogk_-_Herding_RATs Andreas Bogk])
 
|- bgcolor="#CCCCCC"
 
!|13:00
 
|Lunch
 
|
 
|
 
|
 
|
 
|-
 
!|14:00
 
|
 
|HTML5 - A Whole New Attack Vector ([http://2012.brucon.org/index.php/Talks_and_workshops#Robert_McArdle_-_HTML5_-_A_Whole_New_Attack_Vector Robert McArdle])
 
|[http://2012.brucon.org/index.php/Lightning_Talks Lightning talks]
 
| rowspan="2" |Hacking with Python ([http://2012.brucon.org/index.php/Talks_and_workshops#Vivek_Ramachandran_-_Hacking_with_Python_.282hr.29 Vivek Ramachandran])
 
| rowspan="2" |Hardware Hacking ([http://2012.brucon.org/index.php/Talks_and_workshops#fbz_-_Hardware_Hacking fbz])
 
|-
 
!|15:00
 
|
 
|A Million Mousetraps: Using Big Data and Little Loops to Build Better Defenses ([http://2012.brucon.org/index.php/Talks_and_workshops#Allison_Miller_-_A_Million_Mousetraps:_Using_Big_Data_and_Little_Loops_to_Build_Better_Defenses Allison Miller])
 
|Hiring! Looking for volunteer Cyber FireFighters and Innovative Cyber Security Measures ([http://2012.brucon.org/index.php/Talks_and_workshops#LSEC_-_Hiring.21_Looking_for_volunteer_Cyber_FireFighters_and_Innovative_Cyber_Security_Measures LSEC])
 
|- bgcolor="#CCCCCC"
 
!|16:00
 
|Coffee break
 
|
 
|
 
|
 
|
 
|-
 
!|16:30
 
|
 
|Uncovering SAP vulnerabilities: dissecting and breaking the Diag protocol ([http://2012.brucon.org/index.php/Talks_and_workshops#Martin_Gallo_-_Uncovering_SAP_vulnerabilities:_dissecting_and_breaking_the_Diag_protocol Martin Gallo])
 
| rowspan="2" |Advanced Chrome Extension Exploitation ([http://2012.brucon.org/index.php/Talks_and_workshops#Kyle_.27Kos.27_Osborn_.26_Krzysztof_Kotowicz_-_Advanced_Chrome_Extension_Exploitation_.282h.29 Kyle Osborn & K. Kotowicz])
 
| rowspan="2" |The PANIC Project ([http://2012.brucon.org/index.php/Talks_and_workshops#Biosshadow.2C_Matt_Erasmus.2C_Benson_-_The_PANIC_Project Biosshadow, Matt Erasmus & Benson])
 
|
 
|-
 
!|17:30
 
|
 
|Keynote ([http://2012.brucon.org/index.php/Talks_and_workshops#.28Keynote.29_Ed_Skoudis_-_Letting_Loose_the_Dogs_of_.28cyber.29_War Ed Skoudis])
 
|
 
|- bgcolor="#CCCCCC"
 
!|18:30
 
|Dinner
 
|
 
|
 
|
 
|
 
|-
 
!|19:30
 
|
 
|New flaws in WPA-TKIP ([http://2012.brucon.org/index.php/Talks_and_workshops#Mathy_Vanhoef_-_New_flaws_in_WPA-TKIP Mathy Vanhoef])
 
| rowspan="2" | Streaming from Westvleteren
 
|
 
|
 
|-
 
!|20:30
 
|
 
|How I met your pointer (Hijacking client software for fuzz and profit) ([http://2012.brucon.org/index.php/Talks_and_workshops#Carlos_Garcia_-_How_I_met_your_pointer_.28Hijacking_client_software_for_fuzz_and_profit.29 Carlos Garcia Prado])
 
|
 
|
 
|-
 
!|21:30
 
|Close
 
|
 
|
 
|
 
|
 
|-
 
!|22:00
 
|Doors closed
 
|
 
|
 
|
 
|
 
|-
 
|}
 

Latest revision as of 08:40, 3 October 2017


General Information

  • Registrations start at 8h30!
  • Typically workshops run for 2 consecutive speaking slots (ca. 2 hours), but some of them are even longer
  • Workshop rooms in the location Novotel Ghent (Orval, Chimay, La Trappe) are 5 minutes walking from the main venue
  • Workshop seats are limited. Reserved seats get in until 5 min before the workshop. After that it is first come, first in.
  • Read our important instructions on how to use SCHED.org!
  • This schedule is subject to change, check back regularly.

Full schedule of the 0x09 (2017) edition https://brucon0x092017.sched.com/

Keynotes:

Talks:

Workshops: