SEARCH
TOOLBOX
LANGUAGES
Difference between revisions of "Schedule"

Difference between revisions of "Schedule"

From BruCON 2016

Jump to: navigation, search
Line 95: Line 95:
 
   padding:0in 5.4pt 0in 5.4pt'>
 
   padding:0in 5.4pt 0in 5.4pt'>
 
   <p class=MsoNormal align=center style='text-align:center'><b><span
 
   <p class=MsoNormal align=center style='text-align:center'><b><span
   lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'> [[Presentations#Trusted_Cryptography | Trusted Cryptography]]</span></b></p>
+
   lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'> [[Presentations#Trusted_Cryptography | Trusted Cryptography]]</span><br> Vincent Rijmen</b></p>
 
   </td>
 
   </td>
 
   <td width=84 rowspan=2 style='width:63.0pt;border-top:none;border-left:none;
 
   <td width=84 rowspan=2 style='width:63.0pt;border-top:none;border-left:none;
Line 113: Line 113:
 
   padding:0in 5.4pt 0in 5.4pt'>
 
   padding:0in 5.4pt 0in 5.4pt'>
 
   <p class=MsoNormal align=center style='text-align:center'><b><span
 
   <p class=MsoNormal align=center style='text-align:center'><b><span
   lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Presentations#Social_engineering_for_penetration_testers  | Social engineering for penetration testers]]</span></b></p>
+
   lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Presentations#Social_engineering_for_penetration_testers  | Social engineering for penetration testers]]</span><br>Sharon Conheady</b></p>
 
   </td>
 
   </td>
 
   <td width=96 rowspan=4 style='width:1.0in;border-top:none;border-left:none;
 
   <td width=96 rowspan=4 style='width:1.0in;border-top:none;border-left:none;
Line 145: Line 145:
 
   padding:0in 5.4pt 0in 5.4pt'>
 
   padding:0in 5.4pt 0in 5.4pt'>
 
   <p class=MsoNormal align=center style='text-align:center'><b><span
 
   <p class=MsoNormal align=center style='text-align:center'><b><span
   lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Presentations#SQL_Injection_-_how_far_does_the_rabbit_hole_go.3F | SQL Injection - how far does the rabbit hole go?]]</span></b></p>
+
   lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Presentations#SQL_Injection_-_how_far_does_the_rabbit_hole_go.3F | SQL Injection - how far does the rabbit hole go?]]</span><br>Justin Clarke</b> </p>
 
   </td>
 
   </td>
 
   <td width=84 rowspan=2 style='width:63.0pt;border-top:none;border-left:none;
 
   <td width=84 rowspan=2 style='width:63.0pt;border-top:none;border-left:none;
Line 158: Line 158:
 
   padding:0in 5.4pt 0in 5.4pt'>
 
   padding:0in 5.4pt 0in 5.4pt'>
 
   <p class=MsoNormal align=center style='text-align:center'><b><span
 
   <p class=MsoNormal align=center style='text-align:center'><b><span
   lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Presentations#.E2.80.9CI_am_walking_through_a_city_made_of_glass_and_I_have_a_bag_full_of_rocks.E2.80.9D_.28Dispelling_the_myths_and_discussing_the_facts_Global_Cyber-Warfare.29 | Dispelling the myths and discussing the facts Global Cyber-Warfare]]</span></b></p>
+
   lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Presentations#.E2.80.9CI_am_walking_through_a_city_made_of_glass_and_I_have_a_bag_full_of_rocks.E2.80.9D_.28Dispelling_the_myths_and_discussing_the_facts_Global_Cyber-Warfare.29 | Dispelling the myths and discussing the facts Global Cyber-Warfare]]</span><br>Jayson E. Street</b></p>
 
   </td>
 
   </td>
 
  </tr>
 
  </tr>
Line 199: Line 199:
 
   padding:0in 5.4pt 0in 5.4pt'>
 
   padding:0in 5.4pt 0in 5.4pt'>
 
   <p class=MsoNormal align=center style='text-align:center'><b><span
 
   <p class=MsoNormal align=center style='text-align:center'><b><span
   lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'> [[Presentations#How_to_prepare.2C_coordinate_and_conduct_a_cyber_attack | How to prepare, coordinate and conduct a cyber attack]]</span></b></p>
+
   lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'> [[Presentations#How_to_prepare.2C_coordinate_and_conduct_a_cyber_attack | How to prepare, coordinate and conduct a cyber attack]]</span><br>Eric Adrian Filiol</b></p>
 
   </td>
 
   </td>
 
   <td width=84 rowspan=4 style='width:63.0pt;border-top:none;border-left:none;
 
   <td width=84 rowspan=4 style='width:63.0pt;border-top:none;border-left:none;
Line 217: Line 217:
 
   padding:0in 5.4pt 0in 5.4pt'>
 
   padding:0in 5.4pt 0in 5.4pt'>
 
   <p class=MsoNormal align=center style='text-align:center'><b><span
 
   <p class=MsoNormal align=center style='text-align:center'><b><span
   lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'> [[Presentations#A_new_web_attack_vector:_Script_Fragmentation |  A new web attack vector: Script Fragmentation]]</span></b></p>
+
   lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'> [[Presentations#A_new_web_attack_vector:_Script_Fragmentation |  A new web attack vector: Script Fragmentation]]</span><br>Stephan Chenette</b></p>
 
   </td>
 
   </td>
 
   <td width=96 rowspan=4 style='width:1.0in;border-top:none;border-left:none;
 
   <td width=96 rowspan=4 style='width:1.0in;border-top:none;border-left:none;
Line 249: Line 249:
 
   padding:0in 5.4pt 0in 5.4pt'>
 
   padding:0in 5.4pt 0in 5.4pt'>
 
   <p class=MsoNormal align=center style='text-align:center'><b><span
 
   <p class=MsoNormal align=center style='text-align:center'><b><span
   lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Presentations#Transition_to_IPv6_on_the_Internet:_Threats_and_Mitigation_Techniques | Transition to IPv6 on the Internet: Threats and Mitigation Techniques]]</span></b></p>
+
   lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Presentations#Transition_to_IPv6_on_the_Internet:_Threats_and_Mitigation_Techniques | Transition to IPv6 on the Internet: Threats and Mitigation Techniques]]</span><br>Eric Vyncke</b></p>
 
   </td>
 
   </td>
 
   <td width=204 colspan=2 rowspan=2 style='width:153.0pt;border-top:none;
 
   <td width=204 colspan=2 rowspan=2 style='width:153.0pt;border-top:none;
Line 255: Line 255:
 
   padding:0in 5.4pt 0in 5.4pt'>
 
   padding:0in 5.4pt 0in 5.4pt'>
 
   <p class=MsoNormal align=center style='text-align:center'><b><span
 
   <p class=MsoNormal align=center style='text-align:center'><b><span
   lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'> [[Presentations#Botnets.2C_Ransomware.2C_Malware.2C_and_Stuff.21 | Botnets, Ransomware, Malware, and Stuff!]]</span></b></p>
+
   lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'> [[Presentations#Botnets.2C_Ransomware.2C_Malware.2C_and_Stuff.21 | Botnets, Ransomware, Malware, and Stuff!]]</span><br>Julia Wolf</b></p>
 
   </td>
 
   </td>
 
  </tr>
 
  </tr>
Line 303: Line 303:
 
   padding:0in 5.4pt 0in 5.4pt'>
 
   padding:0in 5.4pt 0in 5.4pt'>
 
   <p class=MsoNormal align=center style='text-align:center'><b><span
 
   <p class=MsoNormal align=center style='text-align:center'><b><span
   lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Presentations#Rage_Against_The_Kiosk | Rage Against The Kiosk]]</span></b></p>
+
   lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Presentations#Rage_Against_The_Kiosk | Rage Against The Kiosk]]</span><br>Paul James Craig</b></p>
 
   </td>
 
   </td>
 
   <td width=84 rowspan=4 style='width:63.0pt;border-top:none;border-left:none;
 
   <td width=84 rowspan=4 style='width:63.0pt;border-top:none;border-left:none;
Line 321: Line 321:
 
   padding:0in 5.4pt 0in 5.4pt'>
 
   padding:0in 5.4pt 0in 5.4pt'>
 
   <p class=MsoNormal align=center style='text-align:center'><b><span
 
   <p class=MsoNormal align=center style='text-align:center'><b><span
   lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Open_Source_Information_Gathering | Open Source Information Gathering]]</span></b></p>
+
   lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Open_Source_Information_Gathering | Open Source Information Gathering]]</span><br>Chris Gates</b></p>
 
   </td>
 
   </td>
 
   <td width=96 rowspan=4 style='width:1.0in;border-top:none;border-left:none;
 
   <td width=96 rowspan=4 style='width:1.0in;border-top:none;border-left:none;
Line 355: Line 355:
 
   padding:0in 5.4pt 0in 5.4pt'>
 
   padding:0in 5.4pt 0in 5.4pt'>
 
   <p class=MsoNormal align=center style='text-align:center'><b><span
 
   <p class=MsoNormal align=center style='text-align:center'><b><span
   lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Presentations#All_Your_Packets_Are_Belong_to_Us_-_Attacking_Backbone_Technologies | All Your Packets Are Belong to Us - Attacking Backbone Technologies]]</span></b></p>
+
   lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Presentations#All_Your_Packets_Are_Belong_to_Us_-_Attacking_Backbone_Technologies | All Your Packets Are Belong to Us - Attacking Backbone Technologies]]</span><br>Daniel Mende & Roger Klose</b></p>
 
   </td>
 
   </td>
 
   <td width=96 rowspan=2 style='width:1.0in;border-top:none;border-left:none;
 
   <td width=96 rowspan=2 style='width:1.0in;border-top:none;border-left:none;
Line 368: Line 368:
 
   padding:0in 5.4pt 0in 5.4pt'>
 
   padding:0in 5.4pt 0in 5.4pt'>
 
   <p class=MsoNormal align=center style='text-align:center'><b><span
 
   <p class=MsoNormal align=center style='text-align:center'><b><span
   lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'> [[Presentations#Red_and_Tiger_Team | Red and Tiger Team]]</span></b></p>
+
   lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'> [[Presentations#Red_and_Tiger_Team | Red and Tiger Team]]</span>Chris Nickerson<br></b></p>
 
   </td>
 
   </td>
 
   <td width=84 rowspan=2 style='width:63.0pt;border-top:none;border-left:none;
 
   <td width=84 rowspan=2 style='width:63.0pt;border-top:none;border-left:none;
Line 415: Line 415:
 
   padding:0in 5.4pt 0in 5.4pt'>
 
   padding:0in 5.4pt 0in 5.4pt'>
 
   <p class=MsoNormal align=center style='text-align:center'><b><span
 
   <p class=MsoNormal align=center style='text-align:center'><b><span
   lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Presentations#Knowing_Me_Knowing_You_.28The_dangers_of_social_networks.29 | Knowing Me Knowing You (The dangers of social networks)]]</span></b></p>
+
   lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Presentations#Knowing_Me_Knowing_You_.28The_dangers_of_social_networks.29 | Knowing Me Knowing You (The dangers of social networks)]]</span><br>Brian Honan</b></p>
 
   </td>
 
   </td>
 
   <td width=84 rowspan=4 style='width:63.0pt;border-top:none;border-left:none;
 
   <td width=84 rowspan=4 style='width:63.0pt;border-top:none;border-left:none;
Line 433: Line 433:
 
   padding:0in 5.4pt 0in 5.4pt'>
 
   padding:0in 5.4pt 0in 5.4pt'>
 
   <p class=MsoNormal align=center style='text-align:center'><b><span
 
   <p class=MsoNormal align=center style='text-align:center'><b><span
   lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Presentations#Malicious_Markup_-_I_thought_you_were_my_friend_-_cycle_3 | Malicious Markup - I thought you were my friend - cycle 3]]</span></b></p>
+
   lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Presentations#Malicious_Markup_-_I_thought_you_were_my_friend_-_cycle_3 | Malicious Markup - I thought you were my friend - cycle 3]]</span><br>Mario Heiderich</b></p>
 
   </td>
 
   </td>
 
   <td width=96 rowspan=4 style='width:1.0in;border-top:none;border-left:none;
 
   <td width=96 rowspan=4 style='width:1.0in;border-top:none;border-left:none;
Line 465: Line 465:
 
   padding:0in 5.4pt 0in 5.4pt'>
 
   padding:0in 5.4pt 0in 5.4pt'>
 
   <p class=MsoNormal align=center style='text-align:center'><b><span
 
   <p class=MsoNormal align=center style='text-align:center'><b><span
   lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Presentations#Building_Hackerspaces_Everywhere | Building Hackerspaces Everywhere]]</span></b></p>
+
   lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Presentations#Building_Hackerspaces_Everywhere | Building Hackerspaces Everywhere]]</span><br>astera</b></p>
 
   </td>
 
   </td>
 
   <td width=204 colspan=2 rowspan=2 style='width:153.0pt;border-top:none;
 
   <td width=204 colspan=2 rowspan=2 style='width:153.0pt;border-top:none;
Line 471: Line 471:
 
   padding:0in 5.4pt 0in 5.4pt'>
 
   padding:0in 5.4pt 0in 5.4pt'>
 
   <p class=MsoNormal align=center style='text-align:center'><b><span
 
   <p class=MsoNormal align=center style='text-align:center'><b><span
   lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Presentations#The_Belgian_Beer_Lovers_Guide_to_Cloud_Security | The Belgian Beer Lovers Guide to Cloud Security ]]</span></b></p>
+
   lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Presentations#The_Belgian_Beer_Lovers_Guide_to_Cloud_Security | The Belgian Beer Lovers Guide to Cloud Security ]]</span><br>Craig Balding</b></p>
 
   </td>
 
   </td>
 
  </tr>
 
  </tr>

Revision as of 23:47, 10 September 2009

On Wednesday 16/09 & Thursday 17/09 prior to the conference, BruCON is offering some excellent security classes. See Training for details.


Conference doors and registration will be open at 8:00 on Friday

Click here to see the complete Alphabetical list of speakers
Click here to see the complete Alphabetical list of presentations
Click here to see the complete List of Workshops
Click here to see the complete List of Lightning talks


Schedule

 

Friday 18 September

Saturday 19 September

Hour

Track 1

Track 2

Track 3

Track 1

Track 2

Track 3

09:00

Trusted Cryptography
Vincent Rijmen

 

Lockpicking #1

Social engineering for penetration testers
Sharon Conheady

Arduino Workshop #2

Wireless Security #2

09:30

10:00

SQL Injection - how far does the rabbit hole go?
Justin Clarke

The Hex Factor Intro workshop

Dispelling the myths and discussing the facts Global Cyber-Warfare
Jayson E. Street

10:30

11:00

BREAK

BREAK

11:30

How to prepare, coordinate and conduct a cyber attack
Eric Adrian Filiol

Arduino Workshop #1

Digital ID #1

A new web attack vector: Script Fragmentation
Stephan Chenette

Digital ID #2

VOIP #2

12:00

12:30

Transition to IPv6 on the Internet: Threats and Mitigation Techniques
Eric Vyncke

Botnets, Ransomware, Malware, and Stuff!
Julia Wolf

13:00

13:30

LUNCH BREAK

LUNCH BREAK

14:00

14:30

Rage Against The Kiosk
Paul James Craig

Soldering workshop #1

Lightning Talks #1

Open Source Information Gathering
Chris Gates

JTAG Workshop #2

Lightning Talks #2

15:00

15:30

All Your Packets Are Belong to Us - Attacking Backbone Technologies
Daniel Mende & Roger Klose

BISI initiative update

Red and Tiger TeamChris Nickerson

 

16:00

16:30

BREAK

BREAK

17:00

Knowing Me Knowing You (The dangers of social networks)
Brian Honan

Wireless Security #1

VOIP #1

Malicious Markup - I thought you were my friend - cycle 3
Mario Heiderich

Lockpicking #2

Soldering workshop #2

17:30

18:00

Building Hackerspaces Everywhere
astera

The Belgian Beer Lovers Guide to Cloud Security
Craig Balding

18:30

19:00

DINNER BREAK & EFF AUCTION

DINNER BREAK & & Hex Factor Contest winners

19:30

20:00

Open HackerLounge

BruCON afterPARTY & Happy Hour

21:00

 

 

03:00