SEARCH
TOOLBOX
LANGUAGES
Difference between revisions of "Schedule"

Difference between revisions of "Schedule"

From BruCON 2017

Jump to: navigation, search
(General Information)
Line 13: Line 13:
 
'''Keynotes:'''
 
'''Keynotes:'''
  
* Keynote: The cyber short. A market solution for product safety and corporate governance. - Justine Bone
+
* Keynote: Justine Bone - The cyber short. A market solution for product safety and corporate governance. -  
* Keynote: How hackers changed the security industry and how we need to keep changing it. - Chris Wysopal
+
* Keynote: Chris Wysopal - How hackers changed the security industry and how we need to keep changing it.
  
 
'''Talks:'''
 
'''Talks:'''
Line 25: Line 25:
 
* [[Damien Cauquil]] - [[Weaponizing the BBC Micro:Bit]]
 
* [[Damien Cauquil]] - [[Weaponizing the BBC Micro:Bit]]
 
* [[Sander Demeester]] - [[Secure channels: Building real world crypto systems]]
 
* [[Sander Demeester]] - [[Secure channels: Building real world crypto systems]]
* [[Josh Schwartz]] and [[John Cramb]] - [[MEATPISTOL, A Modular Malware Implant Framework]]
+
* Josh Schwartz and John Cramb - [[MEATPISTOL, A Modular Malware Implant Framework]]
 
* [[Gregory Pickett]] - [[Open Source Security Orchestration]]
 
* [[Gregory Pickett]] - [[Open Source Security Orchestration]]
* [[František Střasák]] and [[Sebastian Garcia]] - [[Detecting malware even when it is encrypted -  Machine Learning for network HTTPS analysis]]
+
* František Střasák and Sebastian Garcia - [[Detecting malware even when it is encrypted -  Machine Learning for network HTTPS analysis]]
 
* [[Nikhil Mittal]] - [[Evading Microsoft ATA for Active Directory Domination]]
 
* [[Nikhil Mittal]] - [[Evading Microsoft ATA for Active Directory Domination]]
 
* [[Debasish Mandal]] - [[Browser Exploits? Grab them by the collar!]]
 
* [[Debasish Mandal]] - [[Browser Exploits? Grab them by the collar!]]
Line 33: Line 33:
 
'''Workshops:'''
 
'''Workshops:'''
  
* Mimikatz workshop - Benjamin Delpy (@gentilkiwi)
+
* Benjamin Delpy - Mimikatz workshop
* Programming Wireshark With Lua - Didier Stevens
+
* [[Didier Stevens]] - [[Programming Wireshark With Lua]]
* Getting the Most Out of Windows Event Logs - David Szili
+
* [[David Szili]] - [[Getting the Most Out of Windows Event Logs]]
* Building a cheap, robust, scaling, penetration testing/bug bounty super computer - Steven Wierckx, Andy Deweirt
+
* [[Steven Wierckx]] and [[Andy Deweirt]] - [[Building a cheap, robust, scaling, penetration testing/bug bounty super computer]]
* Practical iOS App Exploitation and Defense using iGoat - Swaroop Yermalkar
+
* [[Swaroop Yermalkar]] - [[Practical iOS App Exploitation and Defense using iGoat]]
* Malware Triage: Malscripts Are The New Exploit Kit - Sergei Frankoff, Sean Wilson
+
* [[Sergei Frankoff]] and [[Sean Wilson]] - [[Malware Triage: Malscripts Are The New Exploit Kit]]
* Jedi's trick to convince your boss and colleagues - Emmanuel Nicaise
+
* [[Emmanuel Nicaise]] - [[Jedi's trick to convince your boss and colleagues]]
* May the data stay with you - Network Data Exfiltration Techniques. - Leszek Mis
+
* [[Leszek Mis]] - [[May the data stay with you - Network Data Exfiltration Techniques.]]
* Hacking Bluetooth Smart locks - Slawomir Jasek
+
* [[Slawomir Jasek]] - [[Hacking Bluetooth Smart locks]]
* Defeating Proprietary Protocols the Smart Way - Georges Bossert and Frédéric Guihéry
+
* [[Georges Bossert]] and [[Frédéric Guihéry]] - [[Defeating Proprietary Protocols the Smart Way]]
* Practical Machine Learning in InfoSecurity - Anto Joseph, Clarence Chio
+
* [[Anto Joseph]] and [[Clarence Chio]] - [[Practical Machine Learning in InfoSecurity]]
* Playing with RFID workshop - Vinnie Vanhoecke, Tom Kustermans, Joachim Schäfer
+
* Vinnie Vanhoecke and Tom Kustermans and Joachim Schäfer - [[Playing with RFID workshop]]
* Windows malware development: A JMP in the dark - Yannick Wellens
+
* [[Yannick Wellens]] - [[Windows malware development: A JMP in the dark]]

Revision as of 00:25, 2 July 2017


General Information

  • Registrations start at 8h30!
  • Typically workshops run for 2 consecutive speaking slots (ca. 2 hours), but some of them are even longer
  • Workshop rooms in the location Novotel Ghent (Orval, Chimay, La Trappe) are 5 minutes walking from the main venue
  • Workshop seats are limited. Reserved seats get in until 5 min before the workshop. After that it is first come, first in.
  • Read our important instructions on how to use SCHED.org!
  • This schedule is subject to change, check back regularly.

Keynotes:

  • Keynote: Justine Bone - The cyber short. A market solution for product safety and corporate governance. -
  • Keynote: Chris Wysopal - How hackers changed the security industry and how we need to keep changing it.

Talks:

Workshops: