SEARCH
TOOLBOX
LANGUAGES
Difference between revisions of "Schedule"

Difference between revisions of "Schedule"

From BruCON 2017

Jump to: navigation, search
(General Information)
 
(324 intermediate revisions by 11 users not shown)
Line 1: Line 1:
* Wednesday 16/09 - Thursday 17/09: see [[Training]]
 
* Friday 18/09 - Saturday 19/09: Workshops + Presentations + [[Lightning Talks]]<br><br>
 
 
'''Conference doors and registration will be open at 8:00 on Friday'''
 
 
Click here to see the complete '''[[Speakers | Alphabetical list of speakers]]'''<br>
 
Click here to see the complete '''[[Presentations | Alphabetical list of presentations]]'''
 
 
==Schedule==
 
 
 
 
__NOTOC__
 
__NOTOC__
  
{| border='1px'
+
   
|- style="font-size:11pt;font-weight:bold" align="center"
+
=General Information=
|
 
| colspan="4" | Friday 18th
 
| colspan="4" | Saturday 19th
 
 
 
|- style="font-size:10pt;font-weight:bold" align="center"
 
| width="92" height="15" | Hour
 
| width="92" | Speaker Track
 
| width="92" | Workshop Track #1
 
| width="92" | Workshop Track #2
 
| width="6" | The Hex Factor
 
| width="92" | Speaker Track
 
| width="92" | Workshop Track #1
 
| width="92" | Workshop Track #2
 
| width="6" | The Hex Factor
 
 
 
|- style="font-size:11pt" align="center"
 
| height="26" | 9:00
 
| rowspan="2" | [[Presentations#Trusted_Cryptography | Trusted Cryptography]]
 
| rowspan="4" | TBD
 
| rowspan="4" | [[Workshops#Physical_locks_by_Toool | Lockpicking #1]]
 
| rowspan="24" | [[Challenge | The Hex Factor]]
 
| rowspan="2" | [[Presentations#Social_engineering_for_penetration_testers  | Social engineering for penetration testers]]
 
| rowspan="4" | [[Workshops#Arduino:_how_we_made_the_beerduino | Arduino Workshop #2]]
 
| rowspan="4" | [[Workshops#Wireless_auditing | Wireless Security #2]]
 
| rowspan="22" | [[Challenge | The Hex Factor]]
 
 
 
|- style="font-size:11pt" align="center"
 
| height="26" | 9:30
 
 
 
|- style="font-size:11pt" align="center"
 
| height="129" | 10:00
 
| rowspan="2" | [[Presentations#SQL_Injection_-_how_far_does_the_rabbit_hole_go.3F | SQL Injection - how far does the rabbit hole go?]]
 
| rowspan="2" | [[Presentations#.E2.80.9CI_am_walking_through_a_city_made_of_glass_and_I_have_a_bag_full_of_rocks.E2.80.9D_.28Dispelling_the_myths_and_discussing_the_facts_Global_Cyber-Warfare.29 | “I am walking through a city made of glass and I have a bag full of rocks” (Dispelling the myths and discussing the facts Global Cyber-Warfare)]]
 
 
 
|- style="font-size:11pt" align="center"
 
| height="15" | 10:30
 
 
 
|- style="font-size:11pt" align="center"
 
| height="15" | 11:00
 
| Break
 
| Break
 
| Break
 
| Break
 
| Break
 
| Break
 
 
 
|- style="font-size:11pt" align="center"
 
| height="29" | 11:30
 
| rowspan="2" | [[Presentations#How_to_prepare.2C_coordinate_and_conduct_a_cyber_attack | How to prepare, coordinate and conduct a cyber attack]]
 
| rowspan="4" |[[Workshops#Arduino:_how_we_made_the_beerduino | Arduino Workshop #1]]
 
| rowspan="4" | [[Workshops#Digital_ID | Digital ID #1]]
 
| rowspan="2" | [[Presentations#A_new_web_attack_vector:_Script_Fragmentation |  A new web attack vector: Script Fragmentation]]
 
| rowspan="4" |  [[Workshops#Digital_ID | Digital ID #2]]
 
| rowspan="4" | [[Workshops#Auditing_VOIP | VOIP #2]]
 
 
 
|- style="font-size:11pt" align="center"
 
| height="29" | 12:00
 
 
 
|- style="font-size:11pt" align="center"
 
| height="33" | 12:30
 
| rowspan="2" | [[Presentations#Transition_to_IPv6_on_the_Internet:_Threats_and_Mitigation_Techniques | Transition to IPv6 on the Internet: Threats and Mitigation Techniques]]
 
| rowspan="2" | [[Presentations#Botnets.2C_Ransomware.2C_Malware.2C_and_Stuff.21 | Botnets, Ransomware, Malware, and Stuff!]]
 
 
 
|- style="font-size:11pt" align="center"
 
| height="33" | 13:00
 
 
 
|- style="font-size:11pt" align="center"
 
| height="15" | 13:30
 
| rowspan="2" | Lunch
 
| rowspan="2" | Lunch
 
| rowspan="2" | Lunch
 
| rowspan="2" | Lunch
 
| rowspan="2" | Lunch
 
| rowspan="2" | Lunch
 
 
 
|- style="font-size:11pt" align="center"
 
| height="15" | 14:00
 
 
 
|- style="font-size:11pt" align="center"
 
| height="34" | 14:30
 
| rowspan="2" | [[Presentations#Rage_Against_The_Kiosk | Rage Against The Kiosk]]
 
| rowspan="4" | Soldering workshop
 
| rowspan="2" | [[Lightning_Talks#Lightning_talks_day_1| Lightning Talks #1]]
 
| rowspan="2" | [[Open_Source_Information_Gathering | Open Source Information Gathering]]
 
| rowspan="4" | [[Workshops#JTAG| JTAG Workshop #2]]
 
 
 
| rowspan="2" |[[Lightning_Talks#Lightning_talks_day_2| Lightning Talks #2]]
 
 
 
 
 
|- style="font-size:11pt" align="center"
 
| height="34" | 15:00
 
 
 
|- style="font-size:11pt" align="center"
 
| height="40" | 15:30
 
| rowspan="2" | [[Presentations#All_Your_Packets_Are_Belong_to_Us_-_Attacking_Backbone_Technologies | All Your Packets Are Belong to Us - Attacking Backbone Technologies]]
 
| rowspan="2" |
 
| rowspan="2" | [[Presentations#Red_and_Tiger_Team | Red and Tiger Team]]
 
| rowspan="2" |
 
 
 
|- style="font-size:11pt" align="center"
 
| height="40" | 16:00
 
 
 
|- style="font-size:11pt" align="center"
 
| height="15" | 16:30
 
| Break
 
| Break
 
| Break
 
| Break
 
| Break
 
| Break
 
 
 
|- style="font-size:11pt" align="center"
 
| height="40" | 17:00
 
| rowspan="2" | [[Presentations#Knowing_Me_Knowing_You_.28The_dangers_of_social_networks.29 | Knowing Me Knowing You (The dangers of social networks)]]
 
| rowspan="4" |  [[Workshops#Wireless_auditing | Wireless Security #1]]
 
| rowspan="4" |  [[Workshops#Auditing_VOIP | VOIP #1]]
 
 
 
| rowspan="2" | [[Presentations#Malicious_Markup_-_I_thought_you_were_my_friend_-_cycle_3 | Malicious Markup - I thought you were my friend - cycle 3]]
 
| rowspan="4" |  [[Workshops#Physical_locks_by_Toool | Lockpicking #2]]
 
| rowspan="4" | Soldering workshop
 
 
 
|- style="font-size:11pt" align="center"
 
| height="40" | 17:30
 
 
 
|- style="font-size:11pt" align="center"
 
| height="64" | 18:00
 
| rowspan="2" | [[Presentations#Building_Hackerspaces_Everywhere | Building Hackerspaces Everywhere]]
 
| rowspan="2" | [[Presentations#The_Frogs_Who_Desired_A_King:_A_Virtualization_and_Cloud_Computing_Security_Fable_Set_To_Interpretive_Dance | The Frogs Who Desired A King: A Virtualization and Cloud Computing Security Fable Set To Interpretive Dance ]]
 
 
 
|- style="font-size:11pt" align="center"
 
| height="64" | 18:30
 
 
 
|- style="font-size:11pt" align="center"
 
| height="15" | 19:00
 
| rowspan="2" | Dinner Break
 
| rowspan="2" | Dinner Break
 
| rowspan="2" | Dinner Break
 
| rowspan="2" | Dinner Break
 
| rowspan="2" | Dinner Break
 
| rowspan="2" | Dinner Break
 
 
 
|- style="font-size:11pt" align="center"
 
| height="15" | 19:30
 
 
 
|- style="font-size:11pt" align="center"
 
| height="15" | 20:00
 
| rowspan="2" | Auction
 
| rowspan="2" | Auction
 
| rowspan="2" | Auction
 
| rowspan="9" | Brucon Afterparty
 
| rowspan="9" | Brucon Afterparty
 
| rowspan="9" | Brucon Afterparty
 
| rowspan="2" | End
 
 
 
|- style="font-size:11pt" align="center"
 
| height="15" | 20:30
 
 
 
|- style="font-size:11pt" align="center"
 
| height="15" | 21:00
 
| &nbsp;
 
| &nbsp;
 
| &nbsp;
 
| rowspan="7" | [[Challenge | THF @ HSB ]]
 
| &nbsp;
 
  
 +
* '''Registrations start at 8h30!'''
 +
* Typically workshops run for 2 consecutive speaking slots (ca. 2 hours), but some of them are even longer
 +
* Workshop rooms in the location '''Novotel Ghent (Orval, Chimay, La Trappe)''' are 5 minutes walking from the main venue
 +
* Workshop seats are limited. '''Reserved seats get in until 5 min before the workshop. After that it is first come, first in.'''
 +
* Read our important instructions on [[how to use SCHED.org]]!
 +
* This schedule is subject to change, check back regularly.
  
|- style="font-size:11pt" align="center"
+
Full schedule of the 0x09 (2017) edition [https://brucon0x092017.sched.com/ https://brucon0x092017.sched.com/]
| height="15" | 21:30
 
| &nbsp;
 
| &nbsp;
 
| &nbsp;
 
| &nbsp;
 
  
|- style="font-size:11pt" align="center"
+
'''Keynotes:'''
| height="15" | 22:00
 
| &nbsp;
 
| &nbsp;
 
| &nbsp;
 
| &nbsp;
 
  
|- style="font-size:11pt" align="center"
+
* Keynote: [[Justine Bone]] - [[The cyber short. A market solution for product safety and corporate governance.]]
| height="15" | 22:30
+
* Keynote: [[Chris Wysopal]] - [[How hackers changed the security industry and how we need to keep changing it.]]
| &nbsp;
 
| &nbsp;
 
| &nbsp;
 
| &nbsp;
 
  
|- style="font-size:11pt" align="center"
+
'''Talks:'''
| height="15" | 23:00
 
| &nbsp;
 
| &nbsp;
 
| &nbsp;
 
| &nbsp;
 
  
|- style="font-size:11pt" align="center"
+
* [[Matt Wixey]] - [[See no evil, hear no evil: Hacking invisibly and silently with light and sound]]
| height="15" | 23:30
+
* [[Balazs Bucsay]] - [[XFLTReaT: a new dimension in tunnelling]]
| &nbsp;
+
* [[Anna Shirokova]] and [[Veronica Valeros]] - [[Knock Knock... Who's there? admin admin and get in! An overview of the CMS brute-forcing malware landscape.]]
  | &nbsp;
+
* [[Volodymyr Styran]] - [[From Weakest Link to Retaliation Weapon: Building Efficient Anti-Social Engineering Awareness Program]]
| &nbsp;
+
* [[Sampada Nandedkar]] and [[Rushikesh Nandedkar]] - [[Races, Reaches and Rescues!!! (Race condition vulnerabilities revisited)]]
| &nbsp;
+
* [[Damien Cauquil]] - [[Weaponizing the BBC Micro:Bit]]
 +
* [[Sander Demeester]] - [[Secure channels: Building real world crypto systems]]
 +
* Josh Schwartz and John Cramb - [[MEATPISTOL, A Modular Malware Implant Framework]]
 +
* [[Gregory Pickett]] - [[Open Source Security Orchestration]]
 +
* [[František Střasák]] and Sebastian Garcia- [[Detecting malware even when it is encrypted - Machine Learning for network HTTPS analysis]]
 +
* [[Nikhil Mittal]] - [[Evading Microsoft ATA for Active Directory Domination]]
 +
* [[Debasish Mandal]] - [[Browser Exploits? Grab them by the collar!]]
  
|- style="font-size:11pt" align="center"
+
'''Workshops:'''
| height="15" | 0:00
 
| &nbsp;
 
| &nbsp;
 
| &nbsp;
 
| &nbsp;
 
  
|}
+
* Benjamin Delpy - Mimikatz workshop
 +
* [[Didier Stevens]] - [[Programming Wireshark With Lua]]
 +
* [[David Szili]] - [[Getting the Most Out of Windows Event Logs]]
 +
* [[Steven Wierckx]] and [[Andy Deweirt]] - [[Building a cheap, robust, scaling, penetration testing/bug bounty super computer]]
 +
* [[Swaroop Yermalkar]] - [[Practical iOS App Exploitation and Defense using iGoat]]
 +
* [[Sergei Frankoff]] and [[Sean Wilson]] - [[Malware Triage: Malscripts Are The New Exploit Kit]]
 +
* [[Emmanuel Nicaise]] - [[Jedi's trick to convince your boss and colleagues]]
 +
* [[Leszek Mis]] - [[May the data stay with you -  Network Data Exfiltration Techniques.]]
 +
* [[Slawomir Jasek]] - [[Hacking Bluetooth Smart locks]]
 +
* [[Georges Bossert]] and [[Frédéric Guihéry]] - [[Defeating Proprietary Protocols the Smart Way]]
 +
* [[Anto Joseph]] and [[Clarence Chio]] - [[Practical Machine Learning in InfoSecurity]]
 +
* [[Vinnie Vanhoecke]] and Tom Kustermans and Joachim Schäfer - [[Playing with RFID workshop]]
 +
* [[Yannick Wellens]] - [[Windows malware development: A JMP in the dark]]

Latest revision as of 07:40, 3 October 2017


General Information

  • Registrations start at 8h30!
  • Typically workshops run for 2 consecutive speaking slots (ca. 2 hours), but some of them are even longer
  • Workshop rooms in the location Novotel Ghent (Orval, Chimay, La Trappe) are 5 minutes walking from the main venue
  • Workshop seats are limited. Reserved seats get in until 5 min before the workshop. After that it is first come, first in.
  • Read our important instructions on how to use SCHED.org!
  • This schedule is subject to change, check back regularly.

Full schedule of the 0x09 (2017) edition https://brucon0x092017.sched.com/

Keynotes:

Talks:

Workshops: