Difference between revisions of "Schedule"
From BruCON 2017
(→General Information) |
(→General Information) |
||
(5 intermediate revisions by one other user not shown) | |||
Line 10: | Line 10: | ||
* Read our important instructions on [[how to use SCHED.org]]! | * Read our important instructions on [[how to use SCHED.org]]! | ||
* This schedule is subject to change, check back regularly. | * This schedule is subject to change, check back regularly. | ||
+ | |||
+ | Full schedule of the 0x09 (2017) edition [https://brucon0x092017.sched.com/ https://brucon0x092017.sched.com/] | ||
'''Keynotes:''' | '''Keynotes:''' | ||
* Keynote: [[Justine Bone]] - [[The cyber short. A market solution for product safety and corporate governance.]] | * Keynote: [[Justine Bone]] - [[The cyber short. A market solution for product safety and corporate governance.]] | ||
− | * Keynote: Chris Wysopal - How hackers changed the security industry and how we need to keep changing it. | + | * Keynote: [[Chris Wysopal]] - [[How hackers changed the security industry and how we need to keep changing it.]] |
'''Talks:''' | '''Talks:''' | ||
Line 21: | Line 23: | ||
* [[Balazs Bucsay]] - [[XFLTReaT: a new dimension in tunnelling]] | * [[Balazs Bucsay]] - [[XFLTReaT: a new dimension in tunnelling]] | ||
* [[Anna Shirokova]] and [[Veronica Valeros]] - [[Knock Knock... Who's there? admin admin and get in! An overview of the CMS brute-forcing malware landscape.]] | * [[Anna Shirokova]] and [[Veronica Valeros]] - [[Knock Knock... Who's there? admin admin and get in! An overview of the CMS brute-forcing malware landscape.]] | ||
− | * [[ | + | * [[Volodymyr Styran]] - [[From Weakest Link to Retaliation Weapon: Building Efficient Anti-Social Engineering Awareness Program]] |
* [[Sampada Nandedkar]] and [[Rushikesh Nandedkar]] - [[Races, Reaches and Rescues!!! (Race condition vulnerabilities revisited)]] | * [[Sampada Nandedkar]] and [[Rushikesh Nandedkar]] - [[Races, Reaches and Rescues!!! (Race condition vulnerabilities revisited)]] | ||
* [[Damien Cauquil]] - [[Weaponizing the BBC Micro:Bit]] | * [[Damien Cauquil]] - [[Weaponizing the BBC Micro:Bit]] | ||
Line 27: | Line 29: | ||
* Josh Schwartz and John Cramb - [[MEATPISTOL, A Modular Malware Implant Framework]] | * Josh Schwartz and John Cramb - [[MEATPISTOL, A Modular Malware Implant Framework]] | ||
* [[Gregory Pickett]] - [[Open Source Security Orchestration]] | * [[Gregory Pickett]] - [[Open Source Security Orchestration]] | ||
− | * [[František Střasák]] and Sebastian Garcia - [[Detecting malware even when it is encrypted - Machine Learning for network HTTPS analysis]] | + | * [[František Střasák]] and Sebastian Garcia- [[Detecting malware even when it is encrypted - Machine Learning for network HTTPS analysis]] |
* [[Nikhil Mittal]] - [[Evading Microsoft ATA for Active Directory Domination]] | * [[Nikhil Mittal]] - [[Evading Microsoft ATA for Active Directory Domination]] | ||
* [[Debasish Mandal]] - [[Browser Exploits? Grab them by the collar!]] | * [[Debasish Mandal]] - [[Browser Exploits? Grab them by the collar!]] | ||
Line 44: | Line 46: | ||
* [[Georges Bossert]] and [[Frédéric Guihéry]] - [[Defeating Proprietary Protocols the Smart Way]] | * [[Georges Bossert]] and [[Frédéric Guihéry]] - [[Defeating Proprietary Protocols the Smart Way]] | ||
* [[Anto Joseph]] and [[Clarence Chio]] - [[Practical Machine Learning in InfoSecurity]] | * [[Anto Joseph]] and [[Clarence Chio]] - [[Practical Machine Learning in InfoSecurity]] | ||
− | * Vinnie Vanhoecke and Tom Kustermans and Joachim Schäfer - [[Playing with RFID workshop]] | + | * [[Vinnie Vanhoecke]] and Tom Kustermans and Joachim Schäfer - [[Playing with RFID workshop]] |
* [[Yannick Wellens]] - [[Windows malware development: A JMP in the dark]] | * [[Yannick Wellens]] - [[Windows malware development: A JMP in the dark]] |
Latest revision as of 08:40, 3 October 2017
General Information
- Registrations start at 8h30!
- Typically workshops run for 2 consecutive speaking slots (ca. 2 hours), but some of them are even longer
- Workshop rooms in the location Novotel Ghent (Orval, Chimay, La Trappe) are 5 minutes walking from the main venue
- Workshop seats are limited. Reserved seats get in until 5 min before the workshop. After that it is first come, first in.
- Read our important instructions on how to use SCHED.org!
- This schedule is subject to change, check back regularly.
Full schedule of the 0x09 (2017) edition https://brucon0x092017.sched.com/
Keynotes:
- Keynote: Justine Bone - The cyber short. A market solution for product safety and corporate governance.
- Keynote: Chris Wysopal - How hackers changed the security industry and how we need to keep changing it.
Talks:
- Matt Wixey - See no evil, hear no evil: Hacking invisibly and silently with light and sound
- Balazs Bucsay - XFLTReaT: a new dimension in tunnelling
- Anna Shirokova and Veronica Valeros - Knock Knock... Who's there? admin admin and get in! An overview of the CMS brute-forcing malware landscape.
- Volodymyr Styran - From Weakest Link to Retaliation Weapon: Building Efficient Anti-Social Engineering Awareness Program
- Sampada Nandedkar and Rushikesh Nandedkar - Races, Reaches and Rescues!!! (Race condition vulnerabilities revisited)
- Damien Cauquil - Weaponizing the BBC Micro:Bit
- Sander Demeester - Secure channels: Building real world crypto systems
- Josh Schwartz and John Cramb - MEATPISTOL, A Modular Malware Implant Framework
- Gregory Pickett - Open Source Security Orchestration
- František Střasák and Sebastian Garcia- Detecting malware even when it is encrypted - Machine Learning for network HTTPS analysis
- Nikhil Mittal - Evading Microsoft ATA for Active Directory Domination
- Debasish Mandal - Browser Exploits? Grab them by the collar!
Workshops:
- Benjamin Delpy - Mimikatz workshop
- Didier Stevens - Programming Wireshark With Lua
- David Szili - Getting the Most Out of Windows Event Logs
- Steven Wierckx and Andy Deweirt - Building a cheap, robust, scaling, penetration testing/bug bounty super computer
- Swaroop Yermalkar - Practical iOS App Exploitation and Defense using iGoat
- Sergei Frankoff and Sean Wilson - Malware Triage: Malscripts Are The New Exploit Kit
- Emmanuel Nicaise - Jedi's trick to convince your boss and colleagues
- Leszek Mis - May the data stay with you - Network Data Exfiltration Techniques.
- Slawomir Jasek - Hacking Bluetooth Smart locks
- Georges Bossert and Frédéric Guihéry - Defeating Proprietary Protocols the Smart Way
- Anto Joseph and Clarence Chio - Practical Machine Learning in InfoSecurity
- Vinnie Vanhoecke and Tom Kustermans and Joachim Schäfer - Playing with RFID workshop
- Yannick Wellens - Windows malware development: A JMP in the dark