SEARCH
TOOLBOX
LANGUAGES
Difference between revisions of "Schedule"

Difference between revisions of "Schedule"

From BruCON 2017

Jump to: navigation, search
(General Information)
(General Information)
Line 18: Line 18:
 
'''Talks:'''
 
'''Talks:'''
  
* See no evil, hear no evil: Hacking invisibly and silently with light and sound - Matt Wixey
+
* [[Matt Wixey]] - [[See no evil, hear no evil: Hacking invisibly and silently with light and sound]]
* XFLTReaT: a new dimension in tunnelling - Balazs Bucsay
+
* [[Balazs Bucsay]] - [[XFLTReaT: a new dimension in tunnelling]]
* Knock Knock... Who's there? admin admin and get in! An overview of the CMS brute-forcing malware landscape. - Anna Shirokova, Veronica Valeros
+
* [[Anna Shirokova]] and [[Veronica Valeros]] - [[Knock Knock... Who's there? admin admin and get in! An overview of the CMS brute-forcing malware landscape.]]
* Exploiting IoT Devices over Software Defined Radio, ZigBee, WiFi and BLE - Swaroop Yermalkar
+
* [[Swaroop Yermalkar]] - [[Exploiting IoT Devices over Software Defined Radio, ZigBee, WiFi and BLE]]
* Races, Reaches and Rescues!!! (Race condition vulnerabilities revisited) - Sampada Nandedkar, Rushikesh Nandedkar
+
* [[Sampada Nandedkar]] and [[Rushikesh Nandedkar]] - [[Races, Reaches and Rescues!!! (Race condition vulnerabilities revisited)]]
* Weaponizing the BBC Micro:Bit - Damien Cauquil
+
* [[Damien Cauquil]] - [[Weaponizing the BBC Micro:Bit]]
* Secure channels: Building real world crypto systems - Sander Demeester
+
* [[Sander Demeester]] - [[Secure channels: Building real world crypto systems]]
* MEATPISTOL, A Modular Malware Implant Framework - Josh Schwartz, John Cramb
+
* [[Josh Schwartz]] and [[John Cramb]] - [[MEATPISTOL, A Modular Malware Implant Framework]]
* Open Source Security Orchestration - Gregory Pickett
+
* [[Gregory Pickett]] - [[Open Source Security Orchestration]]
* Detecting malware even when it is encrypted - Machine Learning for network HTTPS analysis - František Střasák and Sebastian Garcia
+
* [[František Střasák]] and [[Sebastian Garcia]] - [[Detecting malware even when it is encrypted - Machine Learning for network HTTPS analysis]]
* Evading Microsoft ATA for Active Directory Domination - Nikhil Mittal
+
* [[Nikhil Mittal]] - [[Evading Microsoft ATA for Active Directory Domination]]
* Browser Exploits? Grab them by the collar! - Debasish Mandal
+
* [[Debasish Mandal]] - [[Browser Exploits? Grab them by the collar!]]
  
 
'''Workshops:'''
 
'''Workshops:'''

Revision as of 22:18, 1 July 2017


General Information

  • Registrations start at 8h30!
  • Typically workshops run for 2 consecutive speaking slots (ca. 2 hours), but some of them are even longer
  • Workshop rooms in the location Novotel Ghent (Orval, Chimay, La Trappe) are 5 minutes walking from the main venue
  • Workshop seats are limited. Reserved seats get in until 5 min before the workshop. After that it is first come, first in.
  • Read our important instructions on how to use SCHED.org!
  • This schedule is subject to change, check back regularly.

Keynotes:

  • Keynote: The cyber short. A market solution for product safety and corporate governance. - Justine Bone
  • Keynote: How hackers changed the security industry and how we need to keep changing it. - Chris Wysopal

Talks:

Workshops:

  • Mimikatz workshop - Benjamin Delpy (@gentilkiwi)
  • Programming Wireshark With Lua - Didier Stevens
  • Getting the Most Out of Windows Event Logs - David Szili
  • Building a cheap, robust, scaling, penetration testing/bug bounty super computer - Steven Wierckx, Andy Deweirt
  • Practical iOS App Exploitation and Defense using iGoat - Swaroop Yermalkar
  • Malware Triage: Malscripts Are The New Exploit Kit - Sergei Frankoff, Sean Wilson
  • Jedi's trick to convince your boss and colleagues - Emmanuel Nicaise
  • May the data stay with you - Network Data Exfiltration Techniques. - Leszek Mis
  • Hacking Bluetooth Smart locks - Slawomir Jasek
  • Defeating Proprietary Protocols the Smart Way - Georges Bossert and Frédéric Guihéry
  • Practical Machine Learning in InfoSecurity - Anto Joseph, Clarence Chio
  • Playing with RFID workshop - Vinnie Vanhoecke, Tom Kustermans, Joachim Schäfer
  • Windows malware development: A JMP in the dark - Yannick Wellens