SEARCH
TOOLBOX
LANGUAGES
Difference between revisions of "Schedule"

Difference between revisions of "Schedule"

From BruCON 2017

Jump to: navigation, search
(Schedule)
Line 74: Line 74:
 
|- style="font-size:11pt" align="center"
 
|- style="font-size:11pt" align="center"
 
| height="33" | 12:30
 
| height="33" | 12:30
| rowspan="2" | [[Presentations#Malicious_Markup_-_I_thought_you_were_my_friend_-_cycle_3 | Malicious Markup - I thought you were my friend - cycle 3]]
+
| rowspan="2" | [[Presentations#Transition_to_IPv6_on_the_Internet:_Threats_and_Mitigation_Techniques | Transition to IPv6 on the Internet: Threats and Mitigation Techniques]]
 
| rowspan="2" | [[Presentations#Botnets.2C_Ransomware.2C_Malware.2C_and_Stuff.21 | Botnets, Ransomware, Malware, and Stuff!]]
 
| rowspan="2" | [[Presentations#Botnets.2C_Ransomware.2C_Malware.2C_and_Stuff.21 | Botnets, Ransomware, Malware, and Stuff!]]
  
Line 131: Line 131:
 
| rowspan="4" |  [[Workshops#Auditing_VOIP | VOIP #1]]
 
| rowspan="4" |  [[Workshops#Auditing_VOIP | VOIP #1]]
  
| rowspan="2" | [[Presentations#Transition_to_IPv6_on_the_Internet:_Threats_and_Mitigation_Techniques | Transition to IPv6 on the Internet: Threats and Mitigation Techniques]]
+
| rowspan="2" | [[Presentations#Malicious_Markup_-_I_thought_you_were_my_friend_-_cycle_3 | Malicious Markup - I thought you were my friend - cycle 3]]
 
| rowspan="4" |  [[Workshops#Physical_locks_by_Toool | Lockpicking #2]]
 
| rowspan="4" |  [[Workshops#Physical_locks_by_Toool | Lockpicking #2]]
 
| rowspan="4" | Soldering workshop
 
| rowspan="4" | Soldering workshop

Revision as of 21:54, 30 August 2009

  • Wednesday 16/09 - Thursday 17/09: see Training
  • Friday 18/09 - Saturday 19/09: Workshops + Presentations + Lightning Talks

Conference doors and registration will be open at 8:00 on Friday

Click here to see the complete Alphabetical list of speakers
Click here to see the complete Alphabetical list of presentations

Schedule

Friday 18th Saturday 19th
Hour Speaker Track Workshop Track #1 Workshop Track #2 The Hex Factor Speaker Track Workshop Track #1 Workshop Track #2 The Hex Factor
9:00 Trusted Cryptography Digital ID #1 Lockpicking #1 The Hex Factor Social engineering for penetration testers Arduino Workshop #2 Wireless Security #2 The Hex Factor
9:30
10:00 SQL Injection - how far does the rabbit hole go? “I am walking through a city made of glass and I have a bag full of rocks” (Dispelling the myths and discussing the facts Global Cyber-Warfare)
10:30
11:00 Break Break Break Break Break Break
11:30 How to prepare, coordinate and conduct a cyber attack Arduino Workshop #1 JTAG Workshop #1 A new web attack vector: Script Fragmentation Digital ID #2 VOIP #2
12:00
12:30 Transition to IPv6 on the Internet: Threats and Mitigation Techniques Botnets, Ransomware, Malware, and Stuff!
13:00
13:30 Lunch Lunch Lunch Lunch Lunch Lunch
14:00
14:30 Rage Against The Kiosk Soldering workshop Lightning Talks #1 Open Source Information Gathering JTAG Workshop #2 Lightning Talks #2


15:00
15:30 All Your Packets Are Belong to Us - Attacking Backbone Technologies Red and Tiger Team
16:00
16:30 Break Break Break Break Break Break
17:00 Knowing Me Knowing You (The dangers of social networks) Wireless Security #1 VOIP #1 Malicious Markup - I thought you were my friend - cycle 3 Lockpicking #2 Soldering workshop
17:30
18:00 Building Hackerspaces Everywhere The Frogs Who Desired A King: A Virtualization and Cloud Computing Security Fable Set To Interpretive Dance
18:30
19:00 Dinner Break Dinner Break Dinner Break Dinner Break Dinner Break Dinner Break
19:30
20:00 Auction Auction Auction Brucon Afterparty Brucon Afterparty Brucon Afterparty End
20:30
21:00       THF @ HSB  


21:30        
22:00        
22:30        
23:00        
23:30        
0:00