SEARCH
TOOLBOX
LANGUAGES
Difference between revisions of "Schedule"

Difference between revisions of "Schedule"

From BruCON 2017

Jump to: navigation, search
Line 87: Line 87:
 
| rowspan="2" | [[Presentations#Rage_Against_The_Kiosk | Rage Against The Kiosk]]
 
| rowspan="2" | [[Presentations#Rage_Against_The_Kiosk | Rage Against The Kiosk]]
 
| rowspan="4" | TBD
 
| rowspan="4" | TBD
| rowspan="4" | TBD
+
| rowspan="2" | [[Lightning_Talks#Lightning_talks_day_1| Lightning Talks #1]]
 
| rowspan="2" | [[Open_Source_Information_Gathering | Open Source Information Gathering]]
 
| rowspan="2" | [[Open_Source_Information_Gathering | Open Source Information Gathering]]
 
| rowspan="4" | JTAG Workshop #2
 
| rowspan="4" | JTAG Workshop #2
| rowspan="4" | TBD
+
| rowspan="2" |[[Lightning_Talks#Lightning_talks_day_2| Lightning Talks #2]]
 +
 
  
 
|- style="font-size:11pt" align="center"
 
|- style="font-size:11pt" align="center"
Line 98: Line 99:
 
| height="40" | 15:30
 
| height="40" | 15:30
 
| rowspan="2" | [[Presentations#All_Your_Packets_Are_Belong_to_Us_-_Attacking_Backbone_Technologies | All Your Packets Are Belong to Us - Attacking Backbone Technologies]]
 
| rowspan="2" | [[Presentations#All_Your_Packets_Are_Belong_to_Us_-_Attacking_Backbone_Technologies | All Your Packets Are Belong to Us - Attacking Backbone Technologies]]
 +
| rowspan="2" | TBD
 
| rowspan="2" | [[Presentations#Red_and_Tiger_Team | Red and Tiger Team]]
 
| rowspan="2" | [[Presentations#Red_and_Tiger_Team | Red and Tiger Team]]
 +
| rowspan="2" | TBD
  
 
|- style="font-size:11pt" align="center"
 
|- style="font-size:11pt" align="center"

Revision as of 02:28, 2 July 2009

  • Wednesday 16/09 - Thursday 17/09: see Training
  • Friday 18/09 - Saturday 19/09: Workshops + Presentations + Lightning Talks

Conference doors and registration will be open at 8:00 on Friday

Click here to see the complete Alphabetical list of speakers
Click here to see the complete Alphabetical list of presentations

Schedule

Hour Speaker Track Workshop Track #1 Workshop Track #2 Speaker Track Workshop Track #1 Workshop Track #2
9:00 Trusted Cryptography Digital ID #1 Physical Locks #1 Social engineering for penetration testers Arduino Workshop #2 Wireless Security #2
9:30
10:00 SQL Injection - how far does the rabbit hole go? “I am walking through a city made of glass and I have a bag full of rocks” (Dispelling the myths and discussing the facts Global Cyber-Warfare)
10:30
11:00 Break Break Break Break Break Break
11:30 How to prepare, coordinate and conduct a cyber attack Arduino Workshop #1 JTAG Workshop #1 A new web attack vector: Script Fragmentation Digital ID #2 VOIP #2
12:00
12:30 Malicious Markup - I thought you were my friend - cycle 3 Botnets, Ransomware, Malware, and Stuff!
13:00
13:30 Lunch Lunch Lunch Lunch Lunch Lunch
14:00
14:30 Rage Against The Kiosk TBD Lightning Talks #1 Open Source Information Gathering JTAG Workshop #2 Lightning Talks #2


15:00
15:30 All Your Packets Are Belong to Us - Attacking Backbone Technologies TBD Red and Tiger Team TBD
16:00
16:30 Break Break Break Break Break Break
17:00 Knowing Me Knowing You (The dangers of social networks) Wireless Security #1 VOIP #1 Transition to IPv6 on the Internet: Threats and Mitigation Techniques Physical Locks #2 TBD
17:30
18:00 Building Hackerspaces Everywhere The Frogs Who Desired A King: A Virtualization and Cloud Computing Security Fable Set To Interpretive Dance
18:30
19:00 Dinner Break Dinner Break Dinner Break Dinner Break Dinner Break Dinner Break
19:30
20:00 Auction Auction Auction Brucon Afterparty Brucon Afterparty Brucon Afterparty
20:30
21:00      
21:30      
22:00      
22:30      
23:00      
23:30      
0:00