Difference between revisions of "Workshop Registration"
From BruCON 2017
Security4all (talk | contribs) (→WiFi malware for Fun and Profit) |
Security4all (talk | contribs) (→Collective Malicious PDF Analysis) |
||
Line 74: | Line 74: | ||
| #1 | | #1 | ||
| Ryan Dewhurst | | Ryan Dewhurst | ||
− | | | + | | Bkay "@security4all" |
|- | |- | ||
| #2 | | #2 |
Revision as of 12:45, 12 September 2011
To prevent chaos for our workshops, we kindly ask you to register on this page (actual name or nickname)
Most workshops will be given on both days so you have 2 options.
Arrive early (5 minutes before start).
Even if you don't have a spot, drop by to see if anybody didn't show up.
Lists will be closed at midnight the day before.
If you didn't get a chance to register in time but the list isn't full yet, come and try your luck.
Contents
- 1 DJ Workshop
- 2 Collective Malicious PDF Analysis
- 3 Script Kiddie Hacking Techniques
- 4 The Web Application Hacking Toolchain
- 5 White Hat Shellcode: Not for Exploits
- 6 WiFi malware for Fun and Profit
- 7 Cisco VoIP insecurity workshop
- 8 Beer brewing workshop
- 9 Lock Picking 101
- 10 Hacking your conference badge
- 11 Agnitio: the security code review Swiss army knife
- 12 Podcasters meetup
- 13 Infosec Mentors
DJ Workshop
by Joernchen & Mumpi of Phenoelit
The workshop will run for 2,5 hours. Two sessions catering for 8 attendees will be run. When registering, indicate (1) or (2) !!!
Monday | |
---|---|
#1 | Ryan Dewhurst (1) |
#2 | Wim Remes (1) |
#3 | |
#4 | |
#5 | |
#6 | |
#7 | |
#8 | |
#9 | |
#10 | |
#11 | |
#12 | |
#13 | |
#14 | |
#15 | |
#16 | |
### | COMPLETE No more people, thanks! |
Collective Malicious PDF Analysis
by (Brandon Dixon - x0ner)
Monday | Tuesday | |
---|---|---|
#1 | Ryan Dewhurst | Bkay "@security4all" |
#2 | ||
#3 | ||
#4 | ||
#5 | ||
#6 | ||
#7 | ||
#8 | ||
#9 | ||
#10 | ||
#11 | ||
#12 | ||
#13 | ||
#14 | ||
#15 | ||
#16 | ||
#17 | ||
#18 | ||
#19 | ||
#20 | ||
### | COMPLETE No more people, thanks! |
COMPLETE No more people, thanks! |
Script Kiddie Hacking Techniques
by Ellen Moar & Colin McLean
Tuesday | |
---|---|
#1 | Mike - ydoow |
#2 | |
#3 | |
#4 | |
#5 | |
#6 | |
#7 | |
#8 | |
#9 | |
#10 | |
#11 | |
#12 | |
#13 | |
#14 | |
#15 | |
#16 | |
#17 | |
#18 | |
#19 | |
#20 | |
### | COMPLETE No more people, thanks! |
The Web Application Hacking Toolchain
by Jason Haddix - jhaddix
Monday | Tuesday | |
---|---|---|
#1 | Robin - digininja | Ryan Dewhurst |
#2 | Mike - ydoow | |
#3 | Matt Erasmus | |
#4 | ||
#5 | ||
#6 | ||
#7 | ||
#8 | ||
#9 | ||
#10 | ||
#11 | ||
#12 | ||
#13 | ||
#14 | ||
#15 | ||
#16 | ||
#17 | ||
#18 | ||
#19 | ||
#20 | ||
### | COMPLETE No more people, thanks! |
COMPLETE No more people, thanks! |
White Hat Shellcode: Not for Exploits
by Didier Stevens
Monday | Tuesday | |
---|---|---|
#1 | ||
#2 | ||
#3 | ||
#4 | ||
#5 | ||
#6 | ||
#7 | ||
#8 | ||
#9 | ||
#10 | ||
#11 | ||
#12 | ||
#13 | ||
#14 | ||
#15 | ||
#16 | ||
#17 | ||
#18 | ||
#19 | ||
#20 | ||
#21 | ||
#22 | ||
#23 | ||
#24 | ||
#25 | ||
### | COMPLETE No more people, thanks! |
COMPLETE No more people, thanks! |
WiFi malware for Fun and Profit
by Vivek Ramachandran
Monday | Tuesday | |
---|---|---|
#1 | Thibault B | Bkay "@security4all" |
#2 | Robin - digininja | |
#3 | Dale Pearson | |
#4 | BaconZombie | |
#5 | ||
#6 | ||
#7 | ||
#8 | ||
#9 | ||
#10 | ||
#11 | ||
#12 | ||
#13 | ||
#14 | ||
#15 | ||
#16 | ||
#17 | ||
#18 | ||
#19 | ||
#20 | ||
### | COMPLETE No more people, thanks! |
COMPLETE No more people, thanks! |
Cisco VoIP insecurity workshop
by Sandro Gauci and Joffrey Czarny aka Sn0rkY
Tuesday | |
---|---|
#1 | Robin - digininja |
#2 | Bryn Bellis |
#3 | |
#4 | |
#5 | |
#6 | |
#7 | |
#8 | |
#9 | |
#10 | |
#11 | |
#12 | |
#13 | |
#14 | |
#15 | |
#16 | |
#17 | |
#18 | |
#19 | |
#20 | |
### | COMPLETE No more people, thanks! |
Beer brewing workshop
by Machtelt Garrels
Monday | |
---|---|
#1 | BaconZombie |
#2 | |
#3 | |
#4 | |
#5 | |
#6 | |
#7 | |
#8 | |
#9 | |
#10 | |
#11 | |
#12 | |
#13 | |
#14 | |
#15 | |
#16 | |
#17 | |
#18 | |
#19 | |
#20 | |
#21 | |
#22 | |
#23 | |
#24 | |
#25 | |
#26 | |
#27 | |
#28 | |
#29 | |
#30 | |
### | COMPLETE No more people, thanks! |
Lock Picking 101
by Walter Belgers (TOOOL)
Monday | |
---|---|
#1 | Mike - ydoow |
#2 | Matt Erasmus |
#3 | |
#4 | |
#5 | |
#6 | |
#7 | |
#8 | |
#9 | |
#10 | |
#11 | |
#12 | |
#13 | |
#14 | |
#15 | |
#16 | |
#17 | |
#18 | |
#19 | |
#20 | |
### | COMPLETE No more people, thanks! |
Hacking your conference badge
by OpenAMD Crew
Monday | Tuesday | |
---|---|---|
#1 | Mike - ydoow | |
#2 | Matt Erasmus | |
#3 | Bkay "@security4all" | |
#4 | ||
#5 | ||
#6 | ||
#7 | ||
#8 | ||
#9 | ||
#10 | ||
#11 | ||
#12 | ||
#13 | ||
#14 | ||
#15 | ||
#16 | ||
#17 | ||
#18 | ||
#19 | ||
#20 | ||
### | COMPLETE No more people, thanks! |
COMPLETE No more people, thanks! |
Agnitio: the security code review Swiss army knife
by David Rook aka Securityninja
What you need : http://www.securityninja.co.uk/application-security/brucon-agnitio-workshop/
Tuesday | |
---|---|
#1 | Ryan Dewhurst |
#2 | Mike - ydoow |
#3 | |
#4 | |
#5 | |
#6 | |
#7 | |
#8 | |
#9 | |
#10 | |
#11 | |
#12 | |
#13 | |
#14 | |
#15 | |
#16 | |
#17 | |
#18 | |
#19 | |
#20 | |
#21 | |
#22 | |
#23 | |
#24 | |
#25 | |
#26 | |
#27 | |
#28 | |
#29 | |
#30 | |
### | COMPLETE No more people, thanks! |
Podcasters meetup
This is a walk-in event
Infosec Mentors
This is a walk-in event