SEARCH
TOOLBOX
LANGUAGES
Difference between revisions of "Schedule"

Difference between revisions of "Schedule"

From BruCON 2016

Jump to: navigation, search
 
(311 intermediate revisions by 10 users not shown)
Line 1: Line 1:
* Wednesday 16/09 - Thursday 17/09: see [[Training]]
 
* Friday 18/09 - Saturday 19/09: Workshops + Presentations + [[Lightning Talks]]<br><br>
 
 
'''Conference doors and registration will be open at 8:00 on Friday'''
 
 
Click here to see the complete '''[[Speakers | Alphabetical list of speakers]]'''<br>
 
Click here to see the complete '''[[Presentations | Alphabetical list of presentations]]'''
 
 
==Schedule==
 
 
 
 
__NOTOC__
 
__NOTOC__
 +
{| border="1" width="100%" style="text-align:center;"
 +
| The completed schedule is available on '''http://sched.brucon.org/grid-full'''
 +
|-
 +
|}
  
{| border='1px'
+
   
|- style="font-size:11pt;font-weight:bold" align="center"
+
=General Information=
|
 
| colspan="4" | Friday 18th
 
| colspan="4" | Saturday 19th
 
 
 
|- style="font-size:10pt;font-weight:bold" align="center"
 
| width="92" height="15" | Hour
 
| width="92" | Speaker Track
 
| width="92" | Workshop Track #1
 
| width="92" | Workshop Track #2
 
| width="6" | The Hex Factor
 
| width="92" | Speaker Track
 
| width="92" | Workshop Track #1
 
| width="92" | Workshop Track #2
 
| width="6" | The Hex Factor
 
 
 
|- style="font-size:11pt" align="center"
 
| height="26" | 9:00
 
| rowspan="2" | [[Presentations#Trusted_Cryptography | Trusted Cryptography]]
 
| rowspan="4" | -
 
| rowspan="4" | [[Workshops#Physical_locks_by_Toool | Lockpicking #1]]
 
| rowspan="24" | [[Challenge | The Hex Factor]]
 
| rowspan="2" | [[Presentations#Social_engineering_for_penetration_testers | Social engineering for penetration testers]]
 
| rowspan="4" | [[Workshops#Arduino:_how_we_made_the_beerduino | Arduino Workshop #2]]
 
| rowspan="4" | [[Workshops#Wireless_auditing | Wireless Security #2]]
 
| rowspan="22" | [[Challenge | The Hex Factor]]
 
 
 
|- style="font-size:11pt" align="center"
 
| height="26" | 9:30
 
 
 
|- style="font-size:11pt" align="center"
 
| height="129" | 10:00
 
| rowspan="2" | [[Presentations#SQL_Injection_-_how_far_does_the_rabbit_hole_go.3F | SQL Injection - how far does the rabbit hole go?]]
 
| rowspan="2" | [[Presentations#.E2.80.9CI_am_walking_through_a_city_made_of_glass_and_I_have_a_bag_full_of_rocks.E2.80.9D_.28Dispelling_the_myths_and_discussing_the_facts_Global_Cyber-Warfare.29 |  “I am walking through a city made of glass and I have a bag full of rocks” (Dispelling the myths and discussing the facts Global Cyber-Warfare)]]
 
  
|- style="font-size:11pt" align="center"
+
* '''Registrations start at 8h30!'''
| height="15" | 10:30
+
* Typically workshops run for 2 consecutive speaking slots (ca. 2 hours), but some of them are even longer
 +
* Workshop rooms in the location '''Novotel Ghent (Orval, Chimay, La Trappe)''' are 5 minutes walking from the main venue
 +
* Workshop seats are limited. '''Reserved seats get in until 5 min before the workshop. After that it is first come, first in.'''
 +
* Read our important instructions on [[how to use SCHED.org]]!
 +
* This schedule is subject to change, check back regularly.
  
|- style="font-size:11pt" align="center"
+
'''Talks:'''
| height="15" | 11:00
 
| Break
 
| Break
 
| Break
 
| Break
 
| Break
 
| Break
 
  
|- style="font-size:11pt" align="center"
+
* Building a Successful Internal Adversarial Simulation Team - Chris Nickerson and Chris Gates
| height="29" | 11:30
+
* What Does the Perfect Door or Padlock Look Like? - Deviant Ollam
| rowspan="2" | [[Presentations#How_to_prepare.2C_coordinate_and_conduct_a_cyber_attack | How to prepare, coordinate and conduct a cyber attack]]
+
* New Adventures in Active Defense, Offensive Countermeasures and Hacking Back - John Strand
| rowspan="4" |[[Workshops#Arduino:_how_we_made_the_beerduino | Arduino Workshop #1]]
+
* NO EASY BREACH:Challenges and Lessons Learned from an Epic Investigation - Matthew Dunwoody
| rowspan="4" | [[Workshops#Digital_ID | Digital ID #1]]
+
* Decepticon The Rise and Evolution of an Intelligent Evil Twin…!!! - Rushikesh Nandedkar, Amrita Iyer and Krishnakant Patil
| rowspan="2" | [[Presentations#A_new_web_attack_vector:_Script_Fragmentation | A new web attack vector: Script Fragmentation]]
+
* Hello to the Dark Side: Understanding YOUR Adversaries without All Those Expensive Threat Intel Tools" - L. Grecs
| rowspan="4" | [[Workshops#Digital_ID | Digital ID #2]]
+
* Security through design - Making security better by designing for people - Jelle Niemantsverdriet
| rowspan="4" | [[Workshops#Auditing_VOIP | VOIP #2]]
+
* Esoteric Web Application Vulnerabilities - Andres Riancho
 +
* Invoke-Obfuscation: PowerShell obFUsk8tion Techniques - Daniel Bohannon
 +
* Virtual Terminals, POS Security and becoming a billionaire overnight - Grigorios Fragkos
 +
* Hacking KPN: Lessons from the trenches - Jeremy Goldstein and Bouke van Laethem
 +
* Scraping leaky browsers for fun and passwords - Stefaan Truijen, Adrian Toma
 +
  * Smart Sheriff, Dumb Idea. The wild west of government assisted parenting - Abraham Aranguren, and Fabian Fäßler
 +
  * Anti-Forensics AF - DualCore
  
|- style="font-size:11pt" align="center"
 
| height="29" | 12:00
 
  
|- style="font-size:11pt" align="center"
+
'''Workshops:'''
| height="33" | 12:30
 
| rowspan="2" | [[Presentations#Transition_to_IPv6_on_the_Internet:_Threats_and_Mitigation_Techniques | Transition to IPv6 on the Internet: Threats and Mitigation Techniques]]
 
| rowspan="2" | [[Presentations#Botnets.2C_Ransomware.2C_Malware.2C_and_Stuff.21 | Botnets, Ransomware, Malware, and Stuff!]]
 
  
|- style="font-size:11pt" align="center"
+
* The Control Things Workshop - Justin Searle
| height="33" | 13:00
+
* Hacking The Enterprise - Nathan Magniez and Wim Remes
 +
* Brewcon - Chris Lytle
 +
* Hunting Malware with osquery at scale - Erik Waher, Jackie Bow, and Nick Anderson
 +
* Analyzing Malicious Office Documents - Didier Stevens
 +
* Incident Response Workshop - Maxim Deweerdt and Erik Van Buggenhout
 +
* Crowdsourced Malware Triage - Sergei Frankoff and Sean Wilson
 +
* How to securely build your own IoT enabling embedded systems - Jens Devloo, Jean-Georges Valle and Vito Rallo
 +
* 802.11 Leakage: How passive interception leads to active exploitation - Solomon Sonya
 +
* Putting a lock around your containers with Docker Security Primitives - Nils De Moor
  
|- style="font-size:11pt" align="center"
 
| height="15" | 13:30
 
| rowspan="2" | Lunch
 
| rowspan="2" | Lunch
 
| rowspan="2" | Lunch
 
| rowspan="2" | Lunch
 
| rowspan="2" | Lunch
 
| rowspan="2" | Lunch
 
  
|- style="font-size:11pt" align="center"
 
| height="15" | 14:00
 
  
|- style="font-size:11pt" align="center"
+
Final times for talks are still being finalised.
| height="34" | 14:30
 
| rowspan="2" | [[Presentations#Rage_Against_The_Kiosk | Rage Against The Kiosk]]
 
| rowspan="4" | Soldering workshop
 
| rowspan="2" | [[Lightning_Talks#Lightning_talks_day_1| Lightning Talks #1]]
 
| rowspan="2" | [[Open_Source_Information_Gathering | Open Source Information Gathering]]
 
| rowspan="4" | [[Workshops#JTAG| JTAG Workshop #2]]
 
 
 
| rowspan="2" |[[Lightning_Talks#Lightning_talks_day_2| Lightning Talks #2]]
 
 
 
 
 
|- style="font-size:11pt" align="center"
 
| height="34" | 15:00
 
 
 
|- style="font-size:11pt" align="center"
 
| height="40" | 15:30
 
| rowspan="2" | [[Presentations#All_Your_Packets_Are_Belong_to_Us_-_Attacking_Backbone_Technologies | All Your Packets Are Belong to Us - Attacking Backbone Technologies]]
 
| rowspan="2" |
 
| rowspan="2" | [[Presentations#Red_and_Tiger_Team | Red and Tiger Team]]
 
| rowspan="2" |
 
 
 
|- style="font-size:11pt" align="center"
 
| height="40" | 16:00
 
 
 
|- style="font-size:11pt" align="center"
 
| height="15" | 16:30
 
| Break
 
| Break
 
| Break
 
| Break
 
| Break
 
| Break
 
 
 
|- style="font-size:11pt" align="center"
 
| height="40" | 17:00
 
| rowspan="2" | [[Presentations#Knowing_Me_Knowing_You_.28The_dangers_of_social_networks.29 | Knowing Me Knowing You (The dangers of social networks)]]
 
| rowspan="4" |  [[Workshops#Wireless_auditing | Wireless Security #1]]
 
| rowspan="4" |  [[Workshops#Auditing_VOIP | VOIP #1]]
 
 
 
| rowspan="2" | [[Presentations#Malicious_Markup_-_I_thought_you_were_my_friend_-_cycle_3 | Malicious Markup - I thought you were my friend - cycle 3]]
 
| rowspan="4" |  [[Workshops#Physical_locks_by_Toool | Lockpicking #2]]
 
| rowspan="4" | Soldering workshop
 
 
 
|- style="font-size:11pt" align="center"
 
| height="40" | 17:30
 
 
 
|- style="font-size:11pt" align="center"
 
| height="64" | 18:00
 
| rowspan="2" | [[Presentations#Building_Hackerspaces_Everywhere | Building Hackerspaces Everywhere]]
 
| rowspan="2" | [[Presentations#The_Frogs_Who_Desired_A_King:_A_Virtualization_and_Cloud_Computing_Security_Fable_Set_To_Interpretive_Dance | The Frogs Who Desired A King: A Virtualization and Cloud Computing Security Fable Set To Interpretive Dance ]]
 
 
 
|- style="font-size:11pt" align="center"
 
| height="64" | 18:30
 
 
 
|- style="font-size:11pt" align="center"
 
| height="15" | 19:00
 
| rowspan="2" | Dinner Break
 
| rowspan="2" | Dinner Break
 
| rowspan="2" | Dinner Break
 
| rowspan="2" | Dinner Break
 
| rowspan="2" | Dinner Break
 
| rowspan="2" | Dinner Break
 
 
 
|- style="font-size:11pt" align="center"
 
| height="15" | 19:30
 
 
 
|- style="font-size:11pt" align="center"
 
| height="15" | 20:00
 
| rowspan="2" | Auction
 
| rowspan="2" | Auction
 
| rowspan="2" | Auction
 
| rowspan="9" | Brucon Afterparty
 
| rowspan="9" | Brucon Afterparty
 
| rowspan="9" | Brucon Afterparty
 
| rowspan="2" | End
 
 
 
|- style="font-size:11pt" align="center"
 
| height="15" | 20:30
 
 
 
|- style="font-size:11pt" align="center"
 
| height="15" | 21:00
 
| &nbsp;
 
| &nbsp;
 
| &nbsp;
 
| rowspan="7" | [[Challenge | THF @ HSB ]]
 
| &nbsp;
 
 
 
 
 
|- style="font-size:11pt" align="center"
 
| height="15" | 21:30
 
| &nbsp;
 
| &nbsp;
 
| &nbsp;
 
| &nbsp;
 
 
 
|- style="font-size:11pt" align="center"
 
| height="15" | 22:00
 
| &nbsp;
 
| &nbsp;
 
| &nbsp;
 
| &nbsp;
 
 
 
|- style="font-size:11pt" align="center"
 
| height="15" | 22:30
 
| &nbsp;
 
| &nbsp;
 
| &nbsp;
 
| &nbsp;
 
 
 
|- style="font-size:11pt" align="center"
 
| height="15" | 23:00
 
| &nbsp;
 
| &nbsp;
 
| &nbsp;
 
| &nbsp;
 
 
 
|- style="font-size:11pt" align="center"
 
| height="15" | 23:30
 
| &nbsp;
 
| &nbsp;
 
| &nbsp;
 
| &nbsp;
 
 
 
|- style="font-size:11pt" align="center"
 
| height="15" | 0:00
 
| &nbsp;
 
| &nbsp;
 
| &nbsp;
 
| &nbsp;
 
 
 
|}
 

Latest revision as of 13:33, 18 October 2016

The completed schedule is available on http://sched.brucon.org/grid-full


General Information

  • Registrations start at 8h30!
  • Typically workshops run for 2 consecutive speaking slots (ca. 2 hours), but some of them are even longer
  • Workshop rooms in the location Novotel Ghent (Orval, Chimay, La Trappe) are 5 minutes walking from the main venue
  • Workshop seats are limited. Reserved seats get in until 5 min before the workshop. After that it is first come, first in.
  • Read our important instructions on how to use SCHED.org!
  • This schedule is subject to change, check back regularly.

Talks:

* Building a Successful Internal Adversarial Simulation Team - Chris Nickerson and Chris Gates
* What Does the Perfect Door or Padlock Look Like? - Deviant Ollam
* New Adventures in Active Defense, Offensive Countermeasures and Hacking Back - John Strand
* NO EASY BREACH:Challenges and Lessons Learned from an Epic Investigation - Matthew Dunwoody
* Decepticon The Rise and Evolution of an Intelligent Evil Twin…!!! - Rushikesh Nandedkar, Amrita Iyer and Krishnakant Patil
* Hello to the Dark Side: Understanding YOUR Adversaries without All Those Expensive Threat Intel Tools" - L. Grecs
* Security through design - Making security better by designing for people - Jelle Niemantsverdriet
* Esoteric Web Application Vulnerabilities - Andres Riancho
* Invoke-Obfuscation: PowerShell obFUsk8tion Techniques - Daniel Bohannon
* Virtual Terminals, POS Security and becoming a billionaire overnight - Grigorios Fragkos
* Hacking KPN: Lessons from the trenches - Jeremy Goldstein and Bouke van Laethem
* Scraping leaky browsers for fun and passwords - Stefaan Truijen, Adrian Toma
* Smart Sheriff, Dumb Idea. The wild west of government assisted parenting - Abraham Aranguren, and Fabian Fäßler
* Anti-Forensics AF - DualCore


Workshops:

* The Control Things Workshop - Justin Searle
* Hacking The Enterprise - Nathan Magniez and Wim Remes
* Brewcon - Chris Lytle
* Hunting Malware with osquery at scale - Erik Waher, Jackie Bow, and Nick Anderson
* Analyzing Malicious Office Documents - Didier Stevens
* Incident Response Workshop - Maxim Deweerdt and Erik Van Buggenhout
* Crowdsourced Malware Triage - Sergei Frankoff and Sean Wilson
* How to securely build your own IoT enabling embedded systems - Jens Devloo, Jean-Georges Valle and Vito Rallo
* 802.11 Leakage: How passive interception leads to active exploitation - Solomon Sonya
* Putting a lock around your containers with Docker Security Primitives - Nils De Moor


Final times for talks are still being finalised.