SEARCH
TOOLBOX
LANGUAGES
Difference between revisions of "Schedule"

Difference between revisions of "Schedule"

From BruCON 2016

Jump to: navigation, search
(Day 1 : Monday September 19th)
(Day 2 : Tuesday September 20th)
Line 141: Line 141:
 
!|10:00
 
!|10:00
 
|
 
|
|[[Content#Pushing_in.2C_leaving_a_present.2C_and_pulling_out_without_anybody_noticing_.28Ian_Amit.29|Pushing in, leaving a present and pulling out without anybody noticing - Ian Amit]] ([http://2011.brucon.org/images/a/ab/Brucon2011-DataExfiltration-iiamit-Brucon-2011.pdf pdf])
+
|[[Content#Pushing_in.2C_leaving_a_present.2C_and_pulling_out_without_anybody_noticing_.28Ian_Amit.29|Pushing in, leaving a present and pulling out without anybody noticing - Ian Amit]] ([http://2011.brucon.org/images/a/ab/Brucon2011-DataExfiltration-iiamit-Brucon-2011.pdf pdf]) ([http://files.brucon.org/brucon2011-Ian-Amit.avi video])
 
|
 
|
 
|
 
|
Line 148: Line 148:
 
!|11:00
 
!|11:00
 
|
 
|
| [[Content#Andreas_Bogk_-_Certified_programming_with_dependent_types_Because_the_future_of_defense_is_liberal_application_of_math|Certified programming with dependent types : Because the future of defense is liberal application of math - Andreas Bogk]]
+
| [[Content#Andreas_Bogk_-_Certified_programming_with_dependent_types_Because_the_future_of_defense_is_liberal_application_of_math|Certified programming with dependent types : Because the future of defense is liberal application of math - Andreas Bogk]] ([http://files.brucon.org/brucon2011-Andreas-Borg.avi video])
 
| rowspan="2" |[[Content#Hacking_your_conference_badge_.28OpenAMD_Crew.29|Hacking your conference badge - OpenAMD]]
 
| rowspan="2" |[[Content#Hacking_your_conference_badge_.28OpenAMD_Crew.29|Hacking your conference badge - OpenAMD]]
 
| rowspan="2" |[[Content#Script_Kiddie_Hacking_Techniques_.28Ellen_Moar_.26_Colin_McLean.29|Scriptkiddie hacking techniques - Ellen Moar & Colin McLean]]
 
| rowspan="2" |[[Content#Script_Kiddie_Hacking_Techniques_.28Ellen_Moar_.26_Colin_McLean.29|Scriptkiddie hacking techniques - Ellen Moar & Colin McLean]]

Revision as of 08:58, 19 November 2011

General Information

  • Please register for workshops here
  • Workshops run for 2 consecutive speaking slots (ca. 2 hours)
  • This schedule is subject to change, check back regularly.
  • LAST MINUTE Announcements <- check it regularly!

Day 1 : Monday September 19th

Registrations start at 9h00!

Time Lounge (Basement) Westvleteren (Aula A - main track) Westmalle (Aula B - workshops) Orval (Aula D - workshop) Outside
9:00 Breakfast
9:50 Welcome (Seba & Wim)
10:00 Keynote - Alex Hutton (video)
11:00 IOS Data Protection Internals - Andrey Belenko (pdf) (video) Collective Malicious PDF Analysis - Brandon Dixon & x0ner Lockpicking workshop - TOOOL NL
12:00 Botnet Identification and remediation - Barry Irwin (pdf)
13:00 Lunch
14:00 DJ Workshop (Joernchen and Mumpi of Phenoelit) Lightning talks Day 1 The web application hacking toolchain - Jason Haddix White hat shellcode: not for exploits - Didier Stevens (paper-pdf slides-pdf) Beer workshop - Machtelt Garrels (pdf)
15:00 Smart Phones, the weak link in the security chain - Nick Walker and Werner Nel
16:00 Coffee break
16:30 keynote Incident response : the good the bad and the ugly, or how to keep your face after a security breach.- Aluc (pdf) (video) Wifi malware for fun and profit - Vivek Ramachandran (pdf) Hacking your conference badge - OpenAMD
17:30 keynote Black Ops of TCP/IP 2011 - Dan Kaminsky (video)
18:30 Dinner
19:30 Pentesting high security environments - Joe McCray and Chris Gates Podcasters meetup Agnitio: the security code review Swiss knife - David Rook (Securityninja)
20:30 Abusing locality in shared web hosting - Nick Nikiforakis (pdf) PowerPoint Karaoke
21:30 Close
22:00 Doors closed

Day 2 : Tuesday September 20th

Time Lounge (Basement) Westvleteren (Aula A - main track) Westmalle (Aula B - workshops) Orval (Aula D - workshop) Outside
9:00 Breakfast
10:00 Pushing in, leaving a present and pulling out without anybody noticing - Ian Amit (pdf) (video)
11:00 Certified programming with dependent types : Because the future of defense is liberal application of math - Andreas Bogk (video) Hacking your conference badge - OpenAMD Scriptkiddie hacking techniques - Ellen Moar & Colin McLean
12:00 Botnets and Browsers, Brothers in a Ghost Shell - Aditya K Sood (pdf)
13:00 Lunch
14:00 Social Engineering like in the movies - Dale Pearson (pdf) Cisco VoIP insecurity - Sandro Gauci and Joffrey Czarny The web application hacking toolchain - Jason Haddix
15:00 Myth-busting Risk - Jack Jones (pdf)
16:00 Coffee break
16:30 Attacking SAP's J2EE Engine - Alexander Polyakov and Dmitriy Chastuhin (pdf) White hat shellcode: not for exploits - Didier Stevens (paper-pdf slides-pdf) Wifi malware for fun and profit - Vivek Ramachandran (pdf)
17:30 Keynote : You and your research - Haroon Meer (pdf)
18:30 Dinner
19:30 Lightning talks Day 2 Infosec Mentors Collective Malicious PDF Analysis - Brandon Dixon & x0ner
20:30 The 99c heart surgeon dilemma - Stefan Friedli
21:30 Close
22:00 Doors closed