| 
				     | 
				
| (481 intermediate revisions by more than 100 users not shown) | 
| Line 1: | 
Line 1: | 
| − | '''Regsitration is not yet open. Come back later for more information'''
  |   | 
|   |  |   |  | 
| − | '''To prevent chaos for our workshops, we kindly ask you to register on this page (actual name or nickname)'''
  |   | 
| − | 
  |   | 
| − | Most workshops will be given on both days so you have 2 options. <br>Arrive early (5 minutes before start). <br>Even if you don't have a spot, drop by to see if anybody didn't show up.
  |   | 
| − | 
  |   | 
| − | '''Lists will be closed at midnight the day before'''. 
  |   | 
| − | <br>If you didn't get a chance to register in time but the list isn't full yet, come and try your luck.
  |   | 
| − | 
  |   | 
| − | ==  Collective Malicious PDF Analysis ==
  |   | 
| − | by'''''(Brandon Dixon - x0ner)'''''
  |   | 
| − | {| border='1px'
  |   | 
| − | !  !!  '''Monday'''
  |   | 
| − | ! '''Tuesday''' 
  |   | 
| − | |-
  |   | 
| − | | #1
  |   | 
| − | | 
  |   | 
| − | |
  |   | 
| − | |-
  |   | 
| − | | #2
  |   | 
| − | |
  |   | 
| − | | 
  |   | 
| − | |-
  |   | 
| − | | #3
  |   | 
| − | |
  |   | 
| − | |
  |   | 
| − | |-
  |   | 
| − | | #4
  |   | 
| − | |
  |   | 
| − | |
  |   | 
| − | |-
  |   | 
| − | | #5
  |   | 
| − | |
  |   | 
| − | |
  |   | 
| − | |-
  |   | 
| − | | #6
  |   | 
| − | |
  |   | 
| − | |
  |   | 
| − | |-
  |   | 
| − | | #7
  |   | 
| − | |
  |   | 
| − | |
  |   | 
| − | |-
  |   | 
| − | | #8
  |   | 
| − | |
  |   | 
| − | |
  |   | 
| − | |-
  |   | 
| − | | #9
  |   | 
| − | |
  |   | 
| − | |
  |   | 
| − | |-
  |   | 
| − | | #10
  |   | 
| − | |
  |   | 
| − | |
  |   | 
| − | |-
  |   | 
| − | | #11
  |   | 
| − | |
  |   | 
| − | |
  |   | 
| − | |-
  |   | 
| − | | #12
  |   | 
| − | |
  |   | 
| − | |
  |   | 
| − | |-
  |   | 
| − | | #13 
  |   | 
| − | |
  |   | 
| − | |
  |   | 
| − | |-
  |   | 
| − | | #14
  |   | 
| − | |
  |   | 
| − | |
  |   | 
| − | |-
  |   | 
| − | | #15
  |   | 
| − | |
  |   | 
| − | |
  |   | 
| − | |-
  |   | 
| − | | #16
  |   | 
| − | |
  |   | 
| − | |
  |   | 
| − | |- 
  |   | 
| − | | #17
  |   | 
| − | |
  |   | 
| − | |
  |   | 
| − | |- 
  |   | 
| − | | #18
  |   | 
| − | |
  |   | 
| − | |
  |   | 
| − | |- 
  |   | 
| − | | #19
  |   | 
| − | |
  |   | 
| − | |
  |   | 
| − | |-
  |   | 
| − | | #20
  |   | 
| − | |
  |   | 
| − | |
  |   | 
| − | |-
  |   | 
| − | | ###
  |   | 
| − | | '''COMPLETE'''<br>No more people, thanks!
  |   | 
| − | | '''COMPLETE'''<br>No more people, thanks!
  |   | 
| − | |-
  |   | 
| − | |}
  |   | 
| − | 
  |   | 
| − | ==Script Kiddie Hacking Techniques==
  |   | 
| − | by '''Ellen Moar & Colin McLean'''
  |   | 
| − | 
  |   | 
| − | 
  |   | 
| − | ==The Web Application Hacking Toolchain==
  |   | 
| − | by '''Jason Haddix - jhaddix'''
  |   | 
| − | 
  |   | 
| − | {| border='1px'
  |   | 
| − | !  !!  '''Monday'''
  |   | 
| − | ! '''Tuesday''' 
  |   | 
| − | |-
  |   | 
| − | | #1
  |   | 
| − | | 
  |   | 
| − | |
  |   | 
| − | |-
  |   | 
| − | | #2
  |   | 
| − | |
  |   | 
| − | | 
  |   | 
| − | |-
  |   | 
| − | | #3
  |   | 
| − | |
  |   | 
| − | |
  |   | 
| − | |-
  |   | 
| − | | #4
  |   | 
| − | |
  |   | 
| − | |
  |   | 
| − | |-
  |   | 
| − | | #5
  |   | 
| − | |
  |   | 
| − | |
  |   | 
| − | |-
  |   | 
| − | | #6
  |   | 
| − | |
  |   | 
| − | |
  |   | 
| − | |-
  |   | 
| − | | #7
  |   | 
| − | |
  |   | 
| − | |
  |   | 
| − | |-
  |   | 
| − | | #8
  |   | 
| − | |
  |   | 
| − | |
  |   | 
| − | |-
  |   | 
| − | | #9
  |   | 
| − | |
  |   | 
| − | |
  |   | 
| − | |-
  |   | 
| − | | #10
  |   | 
| − | |
  |   | 
| − | |
  |   | 
| − | |-
  |   | 
| − | | #11
  |   | 
| − | |
  |   | 
| − | |
  |   | 
| − | |-
  |   | 
| − | | #12
  |   | 
| − | |
  |   | 
| − | |
  |   | 
| − | |-
  |   | 
| − | | #13 
  |   | 
| − | |
  |   | 
| − | |
  |   | 
| − | |-
  |   | 
| − | | #14
  |   | 
| − | |
  |   | 
| − | |
  |   | 
| − | |-
  |   | 
| − | | #15
  |   | 
| − | |
  |   | 
| − | |
  |   | 
| − | |-
  |   | 
| − | | #16
  |   | 
| − | |
  |   | 
| − | |
  |   | 
| − | |- 
  |   | 
| − | | #17
  |   | 
| − | |
  |   | 
| − | |
  |   | 
| − | |- 
  |   | 
| − | | #18
  |   | 
| − | |
  |   | 
| − | |
  |   | 
| − | |- 
  |   | 
| − | | #19
  |   | 
| − | |
  |   | 
| − | |
  |   | 
| − | |-
  |   | 
| − | | #20
  |   | 
| − | |
  |   | 
| − | |
  |   | 
| − | |-
  |   | 
| − | | ###
  |   | 
| − | | '''COMPLETE'''<br>No more people, thanks!
  |   | 
| − | | '''COMPLETE'''<br>No more people, thanks!
  |   | 
| − | |-
  |   | 
| − | |}
  |   | 
| − | 
  |   | 
| − | ==White Hat Shellcode: Not for Exploits==
  |   | 
| − | by '''Didier Stevens'''
  |   | 
| − | 
  |   | 
| − | {| border='1px'
  |   | 
| − | !  !!  '''Monday'''
  |   | 
| − | ! '''Tuesday''' 
  |   | 
| − | |-
  |   | 
| − | | #1
  |   | 
| − | | 
  |   | 
| − | |
  |   | 
| − | |-
  |   | 
| − | | #2
  |   | 
| − | |
  |   | 
| − | | 
  |   | 
| − | |-
  |   | 
| − | | #3
  |   | 
| − | |
  |   | 
| − | |
  |   | 
| − | |-
  |   | 
| − | | #4
  |   | 
| − | |
  |   | 
| − | |
  |   | 
| − | |-
  |   | 
| − | | #5
  |   | 
| − | |
  |   | 
| − | |
  |   | 
| − | |-
  |   | 
| − | | #6
  |   | 
| − | |
  |   | 
| − | |
  |   | 
| − | |-
  |   | 
| − | | #7
  |   | 
| − | |
  |   | 
| − | |
  |   | 
| − | |-
  |   | 
| − | | #8
  |   | 
| − | |
  |   | 
| − | |
  |   | 
| − | |-
  |   | 
| − | | #9
  |   | 
| − | |
  |   | 
| − | |
  |   | 
| − | |-
  |   | 
| − | | #10
  |   | 
| − | |
  |   | 
| − | |
  |   | 
| − | |-
  |   | 
| − | | #11
  |   | 
| − | |
  |   | 
| − | |
  |   | 
| − | |-
  |   | 
| − | | #12
  |   | 
| − | |
  |   | 
| − | |
  |   | 
| − | |-
  |   | 
| − | | #13 
  |   | 
| − | |
  |   | 
| − | |
  |   | 
| − | |-
  |   | 
| − | | #14
  |   | 
| − | |
  |   | 
| − | |
  |   | 
| − | |-
  |   | 
| − | | #15
  |   | 
| − | |
  |   | 
| − | |
  |   | 
| − | |-
  |   | 
| − | | #16
  |   | 
| − | |
  |   | 
| − | |
  |   | 
| − | |- 
  |   | 
| − | | #17
  |   | 
| − | |
  |   | 
| − | |
  |   | 
| − | |- 
  |   | 
| − | | #18
  |   | 
| − | |
  |   | 
| − | |
  |   | 
| − | |- 
  |   | 
| − | | #19
  |   | 
| − | |
  |   | 
| − | |
  |   | 
| − | |-
  |   | 
| − | | #20
  |   | 
| − | |
  |   | 
| − | |
  |   | 
| − | |-
  |   | 
| − | | ###
  |   | 
| − | | '''COMPLETE'''<br>No more people, thanks!
  |   | 
| − | | '''COMPLETE'''<br>No more people, thanks!
  |   | 
| − | |-
  |   | 
| − | |}
  |   | 
| − | 
  |   | 
| − | ==WiFi malware for Fun and Profit==
  |   | 
| − | by '''Vivek Ramachandran'''
  |   | 
| − | 
  |   | 
| − | {| border='1px'
  |   | 
| − | !  !!  '''Monday'''
  |   | 
| − | ! '''Tuesday''' 
  |   | 
| − | |-
  |   | 
| − | | #1
  |   | 
| − | | 
  |   | 
| − | |
  |   | 
| − | |-
  |   | 
| − | | #2
  |   | 
| − | |
  |   | 
| − | | 
  |   | 
| − | |-
  |   | 
| − | | #3
  |   | 
| − | |
  |   | 
| − | |
  |   | 
| − | |-
  |   | 
| − | | #4
  |   | 
| − | |
  |   | 
| − | |
  |   | 
| − | |-
  |   | 
| − | | #5
  |   | 
| − | |
  |   | 
| − | |
  |   | 
| − | |-
  |   | 
| − | | #6
  |   | 
| − | |
  |   | 
| − | |
  |   | 
| − | |-
  |   | 
| − | | #7
  |   | 
| − | |
  |   | 
| − | |
  |   | 
| − | |-
  |   | 
| − | | #8
  |   | 
| − | |
  |   | 
| − | |
  |   | 
| − | |-
  |   | 
| − | | #9
  |   | 
| − | |
  |   | 
| − | |
  |   | 
| − | |-
  |   | 
| − | | #10
  |   | 
| − | |
  |   | 
| − | |
  |   | 
| − | |-
  |   | 
| − | | #11
  |   | 
| − | |
  |   | 
| − | |
  |   | 
| − | |-
  |   | 
| − | | #12
  |   | 
| − | |
  |   | 
| − | |
  |   | 
| − | |-
  |   | 
| − | | #13 
  |   | 
| − | |
  |   | 
| − | |
  |   | 
| − | |-
  |   | 
| − | | #14
  |   | 
| − | |
  |   | 
| − | |
  |   | 
| − | |-
  |   | 
| − | | #15
  |   | 
| − | |
  |   | 
| − | |
  |   | 
| − | |-
  |   | 
| − | | #16
  |   | 
| − | |
  |   | 
| − | |
  |   | 
| − | |- 
  |   | 
| − | | #17
  |   | 
| − | |
  |   | 
| − | |
  |   | 
| − | |- 
  |   | 
| − | | #18
  |   | 
| − | |
  |   | 
| − | |
  |   | 
| − | |- 
  |   | 
| − | | #19
  |   | 
| − | |
  |   | 
| − | |
  |   | 
| − | |-
  |   | 
| − | | #20
  |   | 
| − | |
  |   | 
| − | |
  |   | 
| − | |-
  |   | 
| − | | ###
  |   | 
| − | | '''COMPLETE'''<br>No more people, thanks!
  |   | 
| − | | '''COMPLETE'''<br>No more people, thanks!
  |   | 
| − | |-
  |   | 
| − | |}
  |   | 
| − | 
  |   | 
| − | ==Cisco VoIP insecurity workshop==
  |   | 
| − | by '''Sandro Gauci and Joffrey Czarny aka Sn0rkY'''
  |   | 
| − | 
  |   | 
| − | ==Beer brewing workshop==
  |   | 
| − | by '''Machtelt Garrels'''
  |   | 
| − | 
  |   | 
| − | ==Lock Picking 101==
  |   | 
| − | by '''Walter Belgers (TOOOL)'''
  |   | 
| − | 
  |   | 
| − | ==Hacking your conference badge==
  |   | 
| − | by '''OpenAMD Crew'''
  |   | 
| − | 
  |   | 
| − | ==Agnitio: the security code review Swiss army knife==
  |   | 
| − | by '''David Rook aka Securityninja'''
  |   |