|
|
(223 intermediate revisions by more than 100 users not shown) |
Line 1: |
Line 1: |
− | '''To prevent chaos for our workshops, we kindly ask you to register on this page (actual name or nickname)'''
| |
| | | |
− | Most workshops will be given on both days so you have 2 options. <br>Arrive early (5 minutes before start). <br>Even if you don't have a spot, drop by to see if anybody didn't show up.
| |
− |
| |
− | '''Lists will be closed at midnight the day before'''.
| |
− | <br>If you didn't get a chance to register in time but the list isn't full yet, come and try your luck.
| |
− |
| |
− | == DJ Workshop ==
| |
− | by '''''Joernchen & Mumpi of Phenoelit'''''
| |
− |
| |
− | The workshop will run for 2,5 hours. Two sessions catering for 8 attendees will be run. When registering, indicate (1) or (2) !!!
| |
− | {| border='1px'
| |
− | ! !! '''Monday'''
| |
− | |-
| |
− | | #1
| |
− | | Ryan Dewhurst (1)
| |
− | |-
| |
− | | #2
| |
− | | Wim Remes (1)
| |
− | |-
| |
− | | #3
| |
− | |Dieter (@dietervds) (1)
| |
− | |-
| |
− | | #4
| |
− | |Aasia96 (1)
| |
− | |-
| |
− | | #5
| |
− | |laurensv (1)
| |
− | |-
| |
− | | #6
| |
− | |KeithMyers! (1)
| |
− | |-
| |
− | | #7
| |
− | |Juliana Nicolau
| |
− | |-
| |
− | | #8
| |
− | |astera (1)
| |
− | |-
| |
− | | #9
| |
− | |
| |
− | |-
| |
− | | #10
| |
− | |
| |
− | |-
| |
− | | #11
| |
− | |
| |
− | |-
| |
− | | #12
| |
− | |
| |
− | |-
| |
− | | #13
| |
− | |
| |
− | |-
| |
− | | #14
| |
− | |
| |
− | |-
| |
− | | #15
| |
− | |
| |
− | |-
| |
− | | #16
| |
− | |
| |
− | |-
| |
− | | ###
| |
− | | '''COMPLETE'''<br>No more people, thanks!
| |
− | |-
| |
− | |}
| |
− |
| |
− | == Collective Malicious PDF Analysis ==
| |
− | by '''''(Brandon Dixon - x0ner)'''''
| |
− |
| |
− | What you need : Users should bring their laptop if they want to participate in the analysis.
| |
− | You should also have the ability to run a VMware Virtual machine. This could mean having Fusion, Player or Workstation installed.
| |
− |
| |
− | There is no maximum audience amount.
| |
− |
| |
− |
| |
− | {| border='1px'
| |
− | ! !! '''Monday'''
| |
− | ! '''Tuesday'''
| |
− | |-
| |
− | | #1
| |
− | | Ryan Dewhurst
| |
− | | Bkay "@security4all"
| |
− | |-
| |
− | | #2
| |
− | |@davehardy20
| |
− | | Jochen - hammer
| |
− | |-
| |
− | | #3
| |
− | |Juliana Nicolau
| |
− | |Charlie Brown
| |
− | |-
| |
− | | #4
| |
− | | @vanhoefm
| |
− | |Etienne Stalmans
| |
− | |-
| |
− | | #5
| |
− | |
| |
− | |@Guillermo
| |
− | |-
| |
− | | #6
| |
− | |
| |
− | |David Durvaux
| |
− | |-
| |
− | | #7
| |
− | |
| |
− | |Christophe Vandeplas
| |
− | |-
| |
− | | #8
| |
− | |
| |
− | |David André
| |
− | |-
| |
− | | #9
| |
− | |
| |
− | | smtx (@5M7X)
| |
− | |-
| |
− | | #10
| |
− | |
| |
− | |PhilFr
| |
− | |-
| |
− | | #11
| |
− | |
| |
− | |
| |
− | |-
| |
− | | #12
| |
− | |
| |
− | |
| |
− | |-
| |
− | | #13
| |
− | |
| |
− | |
| |
− | |-
| |
− | | #14
| |
− | |
| |
− | |
| |
− | |-
| |
− | | #15
| |
− | |
| |
− | |
| |
− | |-
| |
− | | #16
| |
− | |
| |
− | |
| |
− | |-
| |
− | | #17
| |
− | |
| |
− | |
| |
− | |-
| |
− | | #18
| |
− | |
| |
− | |
| |
− | |-
| |
− | | #19
| |
− | |
| |
− | |
| |
− | |-
| |
− | | #20
| |
− | |
| |
− | |
| |
− | |-
| |
− | | ###
| |
− | | '''COMPLETE'''<br>No more people, thanks!
| |
− | | '''COMPLETE'''<br>No more people, thanks!
| |
− | |-
| |
− | |}
| |
− |
| |
− | ==Script Kiddie Hacking Techniques==
| |
− | by '''Ellen Moar & Colin McLean'''
| |
− |
| |
− | {| border='1px'
| |
− | ! !! '''Tuesday'''
| |
− | |-
| |
− | | #1
| |
− | | Mike - ydoow
| |
− | |-
| |
− | | #2
| |
− | |Benoit
| |
− | |-
| |
− | | #3
| |
− | | Gavin Watson
| |
− | |-
| |
− | | #4
| |
− | |Bryn Bellis
| |
− | |-
| |
− | | #5
| |
− | |Xavier "@xme"
| |
− | |-
| |
− | | #6
| |
− | |Dieter (@dietervds)
| |
− | |-
| |
− | | #7
| |
− | | smtx (@5M7X)
| |
− | |-
| |
− | | #8
| |
− | | BaconZombie { @BaconZombie }
| |
− | |-
| |
− | | #9
| |
− | |Charlie Brown
| |
− | |-
| |
− | | #10
| |
− | |Dieter Van Den Bosch
| |
− | |-
| |
− | | #11
| |
− | |Koen VB
| |
− | |-
| |
− | | #12
| |
− | |Aasia96
| |
− | |-
| |
− | | #13
| |
− | |@Dave_von_S
| |
− | |-
| |
− | | #14
| |
− | |@steevebarbeau
| |
− | |-
| |
− | | #15
| |
− | |GeCo
| |
− | |-
| |
− | | #16
| |
− | |Koen Machilsen
| |
− | |-
| |
− | | #17
| |
− | |corelanc0d3r
| |
− | |-
| |
− | | #18
| |
− | |jps
| |
− | |-
| |
− | | #19
| |
− | |padzer0
| |
− | |-
| |
− | | #20
| |
− | |@davehardy20
| |
− | |-
| |
− | | ***
| |
− | | *******************
| |
− | |-
| |
− | |
| |
− | | '''WAITING LIST'''
| |
− | |-
| |
− | | #1
| |
− | | Fancy
| |
− | |-
| |
− | | #2
| |
− | |Ruben - b33f
| |
− | |-
| |
− | | #3
| |
− | | Vincent Hutsebaut
| |
− | |-
| |
− | | #4
| |
− | |Eugene N
| |
− | |-
| |
− | | #5
| |
− | |astera
| |
− | |-
| |
− | | #6
| |
− | |PhilFr
| |
− | |-
| |
− | | #7
| |
− | | David André
| |
− | |}
| |
− |
| |
− | ==The Web Application Hacking Toolchain==
| |
− | by '''Jason Haddix - jhaddix'''
| |
− |
| |
− | {| border='1px'
| |
− | ! !! '''Monday'''
| |
− | ! '''Tuesday'''
| |
− | |-
| |
− | | #1
| |
− | | Robin - digininja
| |
− | | Ryan Dewhurst
| |
− | |-
| |
− | | #2
| |
− | | Benoit
| |
− | | Mike - ydoow
| |
− | |-
| |
− | | #3
| |
− | |@Dave_von_S
| |
− | |Matt Erasmus
| |
− | |-
| |
− | | #4
| |
− | | Gavin Watson
| |
− | | Michael - mfs
| |
− | |-
| |
− | | #5
| |
− | | Marc - wicky
| |
− | | Jochen - hammer
| |
− | |-
| |
− | | #6
| |
− | | Bart Van der Aovrt
| |
− | |Dieter (@dietervds)
| |
− | |-
| |
− | | #7
| |
− | | smtx (@5M7X)
| |
− | | Dieter Van Den Bosch
| |
− | |-
| |
− | | #8
| |
− | |GeCo
| |
− | |Charlie Brown
| |
− | |-
| |
− | | #9
| |
− | |padzer0
| |
− | |Koen VB
| |
− | |-
| |
− | | #10
| |
− | |J.Boutet
| |
− | |@chrisjohnriley
| |
− | |-
| |
− | | #11
| |
− | |Tino Brants
| |
− | |@davehardy20
| |
− | |-
| |
− | | #12
| |
− | |Vincent Spriet
| |
− | |Ruben - b33f
| |
− | |-
| |
− | | #13
| |
− | |System33
| |
− | |@alcyonsecurity
| |
− | |-
| |
− | | #14
| |
− | |David Rook @securityninja
| |
− | |@vanhoefm
| |
− | |-
| |
− | | #15
| |
− | |Eugene N
| |
− | |Erik VB
| |
− | |-
| |
− | | #16
| |
− | |David André
| |
− | |Kurt Beheydt
| |
− | |-
| |
− | | #17
| |
− | |PhilFr
| |
− | |Fancy
| |
− | |-
| |
− | | #18
| |
− | |
| |
− | |Giuseppe Trotta @Giutro
| |
− | |-
| |
− | | #19
| |
− | |
| |
− | |Bert V.
| |
− | |-
| |
− | | #20
| |
− | |
| |
− | |Francesco Stillavato
| |
− | |-
| |
− | | ###
| |
− | | '''COMPLETE'''<br>No more people, thanks!
| |
− | | '''COMPLETE'''<br>No more people, thanks!
| |
− | |-
| |
− | |}
| |
− |
| |
− | ==White Hat Shellcode: Not for Exploits==
| |
− | by '''Didier Stevens'''
| |
− |
| |
− | The goal of this workshop is to plant a seed: that shellcode has a place in your defense toolbox. The goal is not to learn to write shellcode, neither is it to present a complete anthology of white hat shellcode. I want to show a few examples to help you be more creative, so that when you are facing a problem in your IT sec job, you will also consider shellcode as a potential solution.
| |
− |
| |
− | Shellcode is almost always used in attack scenarios, but it can also be used to defend. Shellcode is just a tool, and it can be a solution to your problem.
| |
− |
| |
− | In this workshop we will work together on 5 cases:
| |
− |
| |
− | 1. loading/unloading a DLL
| |
− |
| |
− | 2. enforcing DEP
| |
− |
| |
− | 3. testing your security setup
| |
− |
| |
− | 4. patching an application
| |
− |
| |
− | 5. preventing heapsprays with shellcode
| |
− |
| |
− | What you need to bring: your laptop with Windows XP SP3 (32-bit, preferably in a virtual machine).
| |
− |
| |
− | {| border='1px'
| |
− | ! !! '''Monday'''
| |
− | ! '''Tuesday'''
| |
− | |-
| |
− | | #1
| |
− | | @vanhoefm
| |
− | | Bart Van der Avort
| |
− | |-
| |
− | | #2
| |
− | | @jfte
| |
− | | smtx (@5M7X)
| |
− | |-
| |
− | | #3
| |
− | | Vincent Hutsebaut :)
| |
− | |Etienne Stalmans
| |
− | |-
| |
− | | #4
| |
− | | Bert V.
| |
− | | @nfoonf
| |
− | |-
| |
− | | #5
| |
− | |
| |
− | | David Durvaux
| |
− | |-
| |
− | | #6
| |
− | |
| |
− | |David Rook @securityninja
| |
− | |-
| |
− | | #7
| |
− | |
| |
− | |PhilFr
| |
− | |-
| |
− | | #8
| |
− | |
| |
− | |
| |
− | |-
| |
− | | #9
| |
− | |
| |
− | |
| |
− | |-
| |
− | | #10
| |
− | |
| |
− | |
| |
− | |-
| |
− | | #11
| |
− | |
| |
− | |
| |
− | |-
| |
− | | #12
| |
− | |
| |
− | |
| |
− | |-
| |
− | | #13
| |
− | |
| |
− | |
| |
− | |-
| |
− | | #14
| |
− | |
| |
− | |
| |
− | |-
| |
− | | #15
| |
− | |
| |
− | |
| |
− | |-
| |
− | | #16
| |
− | |
| |
− | |
| |
− | |-
| |
− | | #17
| |
− | |
| |
− | |
| |
− | |-
| |
− | | #18
| |
− | |
| |
− | |
| |
− | |-
| |
− | | #19
| |
− | |
| |
− | |
| |
− | |-
| |
− | | #20
| |
− | |
| |
− | |
| |
− | |-
| |
− | | #21
| |
− | |
| |
− | |
| |
− | |-
| |
− | | #22
| |
− | |
| |
− | |
| |
− | |-
| |
− | | #23
| |
− | |
| |
− | |
| |
− | |-
| |
− | | #24
| |
− | |
| |
− | |
| |
− | |-
| |
− | | #25
| |
− | |
| |
− | |
| |
− | |-
| |
− | | ###
| |
− | | '''COMPLETE'''<br>No more people, thanks!
| |
− | | '''COMPLETE'''<br>No more people, thanks!
| |
− | |-
| |
− | |}
| |
− |
| |
− | ==WiFi malware for Fun and Profit==
| |
− | by '''Vivek Ramachandran'''
| |
− |
| |
− | {| border='1px'
| |
− | ! !! '''Monday'''
| |
− | ! '''Tuesday'''
| |
− | |-
| |
− | | #1
| |
− | | Thibault B
| |
− | | Bkay "@security4all"
| |
− | |-
| |
− | | #2
| |
− | |Robin - digininja
| |
− | | Charlie Brown
| |
− | |-
| |
− | | #3
| |
− | | Dale Pearson
| |
− | | Dieter Van Den Bosch
| |
− | |-
| |
− | | #4
| |
− | | BaconZombie { @BaconZombie }
| |
− | |@steevebarbeau
| |
− | |-
| |
− | | #5
| |
− | |Benoit
| |
− | |Dieter (@dietervds)
| |
− | |-
| |
− | | #6
| |
− | | Marc - wicky
| |
− | |SenseiZeon
| |
− | |-
| |
− | | #7
| |
− | | Jochen - hammer
| |
− | |Tino Brants
| |
− | |-
| |
− | | #8
| |
− | | smtx (@5M7X)
| |
− | |Vincent Spriet
| |
− | |-
| |
− | | #9
| |
− | |Ruben - b33f
| |
− | |Kurt Beheydt
| |
− | |-
| |
− | | #10
| |
− | |@alcyonsecurity
| |
− | |Tim Beyens
| |
− | |-
| |
− | | #11
| |
− | |Bruno DiLo
| |
− | |Eugene N
| |
− | |-
| |
− | | #12
| |
− | |azerton
| |
− | |David André
| |
− | |-
| |
− | | #13
| |
− | |@Guillermo
| |
− | |
| |
− | |-
| |
− | | #14
| |
− | |Benjamin Carlier
| |
− | |
| |
− | |-
| |
− | | #15
| |
− | |@jfte
| |
− | |
| |
− | |-
| |
− | | #16
| |
− | |J.Boutet
| |
− | |
| |
− | |-
| |
− | | #17
| |
− | | David Durvaux
| |
− | |
| |
− | |-
| |
− | | #18
| |
− | | Giuseppe Trotta - @giutro
| |
− | |
| |
− | |-
| |
− | | #19
| |
− | | @vanhoefm
| |
− | |
| |
− | |-
| |
− | | #20
| |
− | |
| |
− | |
| |
− | |-
| |
− | | ###
| |
− | | '''COMPLETE'''<br>No more people, thanks!
| |
− | | '''COMPLETE'''<br>No more people, thanks!
| |
− | |-
| |
− | |}
| |
− |
| |
− | ==Cisco VoIP insecurity workshop==
| |
− | by '''Sandro Gauci and Joffrey Czarny aka Sn0rkY'''
| |
− |
| |
− | What you need : Users should bring their laptop and a long ethernet network cable!
| |
− |
| |
− | There is a maximum number of Cisco IP phone available.
| |
− |
| |
− |
| |
− | {| border='1px'
| |
− | ! !! '''Tuesday'''
| |
− | |-
| |
− | | #1
| |
− | | Robin - digininja
| |
− | |-
| |
− | | #2
| |
− | |Bryn Bellis
| |
− | |-
| |
− | | #3
| |
− | | Gavin Watson
| |
− | |-
| |
− | | #4
| |
− | | Hilko Bouwman
| |
− | |-
| |
− | | #5
| |
− | | smtx (@5M7X)
| |
− | |-
| |
− | | #6
| |
− | | BaconZombie
| |
− | |-
| |
− | | #7
| |
− | |@steevebarbeau
| |
− | |-
| |
− | | #8
| |
− | |Koen Machilsen
| |
− | |-
| |
− | | #9
| |
− | |jps
| |
− | |-
| |
− | | #10
| |
− | |J.Boutet
| |
− | |-
| |
− | | #11
| |
− | |Tino Brants
| |
− | |-
| |
− | | #12
| |
− | |Vincent Spriet
| |
− | |-
| |
− | | #13
| |
− | |Tim Beyens
| |
− | |-
| |
− | | #14
| |
− | |
| |
− | |-
| |
− | | #15
| |
− | |
| |
− | |-
| |
− | | #16
| |
− | |
| |
− | |-
| |
− | | #17
| |
− | |
| |
− | |-
| |
− | | #18
| |
− | |
| |
− | |-
| |
− | | #19
| |
− | |
| |
− | |-
| |
− | | #20
| |
− | |
| |
− | |-
| |
− | | ###
| |
− | | '''COMPLETE'''<br>No more people, thanks!
| |
− | |-
| |
− | |}
| |
− |
| |
− | ==Beer brewing workshop==
| |
− | by '''Machtelt Garrels'''
| |
− |
| |
− | {| border='1px'
| |
− | ! !! '''Monday'''
| |
− | |-
| |
− | | #1
| |
− | | BaconZombie
| |
− | |-
| |
− | | #2
| |
− | | Niall Kearney
| |
− | |-
| |
− | | #3
| |
− | |Charlie Brown
| |
− | |-
| |
− | | #4
| |
− | |Etienne Stalmans
| |
− | |-
| |
− | | #5
| |
− | |@steevebarbeau
| |
− | |-
| |
− | | #6
| |
− | |BrunoDiLo
| |
− | |-
| |
− | | #7
| |
− | |Frederik Geerts
| |
− | |-
| |
− | | #8
| |
− | |Bram Van der Steen
| |
− | |-
| |
− | | #9
| |
− | |JorisVH
| |
− | |-
| |
− | | #10
| |
− | |Kurt Beheydt
| |
− | |-
| |
− | | #11
| |
− | |
| |
− | |-
| |
− | | #12
| |
− | |
| |
− | |-
| |
− | | #13
| |
− | |
| |
− | |-
| |
− | | #14
| |
− | |
| |
− | |-
| |
− | | #15
| |
− | |
| |
− | |-
| |
− | | #16
| |
− | |
| |
− | |-
| |
− | | #17
| |
− | |
| |
− | |-
| |
− | | #18
| |
− | |
| |
− | |-
| |
− | | #19
| |
− | |
| |
− | |-
| |
− | | #20
| |
− | |
| |
− | |-
| |
− | | #21
| |
− | |
| |
− | |-
| |
− | | #22
| |
− | |
| |
− | |-
| |
− | | #23
| |
− | |
| |
− | |-
| |
− | | #24
| |
− | |
| |
− | |-
| |
− | | #25
| |
− | |
| |
− | |-
| |
− | | #26
| |
− | |
| |
− | |-
| |
− | | #27
| |
− | |
| |
− | |-
| |
− | | #28
| |
− | |
| |
− | |-
| |
− | | #29
| |
− | |
| |
− | |-
| |
− | | #30
| |
− | |
| |
− | |-
| |
− | | ###
| |
− | | '''COMPLETE'''<br>No more people, thanks!
| |
− | |-
| |
− | |}
| |
− |
| |
− | ==Lock Picking 101==
| |
− | by '''Walter Belgers (TOOOL)'''
| |
− |
| |
− | What you need : You don't need to bring any particular tools. Everything will be lended to participant during the workshop. If you have, you can bring your own lockpicking toolset.
| |
− |
| |
− | There is a maximum circular capacity of 20 people.
| |
− |
| |
− | {| border='1px'
| |
− | ! !! '''Monday'''
| |
− | |-
| |
− | | #1
| |
− | | Mike - ydoow
| |
− | |-
| |
− | | #2
| |
− | |Matt Erasmus
| |
− | |-
| |
− | | #3
| |
− | |Benoit
| |
− | |-
| |
− | | #4
| |
− | |Niall Kearney
| |
− | |-
| |
− | | #5
| |
− | | smtx (@5M7X)
| |
− | |-
| |
− | | #6
| |
− | | BaconZombie { @BaconZombie }
| |
− | |-
| |
− | | #7
| |
− | |Dieter Van Den Bosch
| |
− | |-
| |
− | | #8
| |
− | |Charlie Brown
| |
− | |-
| |
− | | #9
| |
− | |Dieter (@dietervds)
| |
− | |-
| |
− | | #10
| |
− | |JorisVH
| |
− | |-
| |
− | | #11
| |
− | |corelanc0d3r
| |
− | |-
| |
− | | #12
| |
− | |jps
| |
− | |-
| |
− | | #13
| |
− | |laurensv
| |
− | |-
| |
− | | #14
| |
− | |SenseiZeon
| |
− | |-
| |
− | | #15
| |
− | |Ruben - b33f
| |
− | |-
| |
− | | #16
| |
− | |Bruno DiLo
| |
− | |-
| |
− | | #17
| |
− | |Benjamin Carlier
| |
− | |-
| |
− | | #18
| |
− | |Frederik Geerts
| |
− | |-
| |
− | | #19
| |
− | |Bram Van der Steen
| |
− | |-
| |
− | | #20
| |
− | |Tino Brants
| |
− | |-
| |
− | | ###
| |
− | | '''COMPLETE'''<br>No more people, thanks!
| |
− | |-
| |
− | |}
| |
− |
| |
− | ==Hacking your conference badge==
| |
− | by '''OpenAMD Crew'''
| |
− |
| |
− | {| border='1px'
| |
− | ! !! '''Monday'''
| |
− | ! '''Tuesday'''
| |
− | |-
| |
− | | #1
| |
− | | Mike - ydoow
| |
− | | SenseiZeon
| |
− | |-
| |
− | | #2
| |
− | | Matt Erasmus
| |
− | | azerton
| |
− | |-
| |
− | | #3
| |
− | | Bkay "@security4all"
| |
− | | @jfte
| |
− | |-
| |
− | | #4
| |
− | | Xavier "@xme"
| |
− | | @vanhoefm
| |
− | |-
| |
− | | #5
| |
− | |Charlie Brown
| |
− | |
| |
− | |-
| |
− | | #6
| |
− | | Dieter Van Den Bosch
| |
− | |
| |
− | |-
| |
− | | #7
| |
− | |Etienne Stalmans
| |
− | |
| |
− | |-
| |
− | | #8
| |
− | |@steevebarbeau
| |
− | |
| |
− | |-
| |
− | | #9
| |
− | |jps
| |
− | |
| |
− | |-
| |
− | | #10
| |
− | |padzer0
| |
− | |
| |
− | |-
| |
− | | #11
| |
− | |Frederik Geerts
| |
− | |
| |
− | |-
| |
− | | #12
| |
− | |Tino Brants
| |
− | |
| |
− | |-
| |
− | | #13
| |
− | |Vincent Spriet
| |
− | |
| |
− | |-
| |
− | | #14
| |
− | |Didier Stevens
| |
− | |
| |
− | |-
| |
− | | #15
| |
− | |Kurt Beheydt
| |
− | |
| |
− | |-
| |
− | | #16
| |
− | |Juliana Nicolau
| |
− | |
| |
− | |-
| |
− | | #17
| |
− | |David Rook @securityninja
| |
− | |
| |
− | |-
| |
− | | #18
| |
− | |PhilFr
| |
− | |
| |
− | |-
| |
− | | #19
| |
− | |
| |
− | |
| |
− | |-
| |
− | | #20
| |
− | |
| |
− | |
| |
− | |-
| |
− | | ###
| |
− | | '''COMPLETE'''<br>No more people, thanks!
| |
− | | '''COMPLETE'''<br>No more people, thanks!
| |
− | |-
| |
− | |}
| |
− |
| |
− | ==Agnitio: the security code review Swiss army knife==
| |
− | by '''David Rook aka Securityninja'''
| |
− |
| |
− | What you need: Users needs to bring a laptop configured as per the information in the link below.
| |
− |
| |
− | The following things are required for the Agnitio hands on demos:
| |
− | •A 32bit Windows Operating System (XP or 7 preferably – VM will be fine)
| |
− | •.NET framework 3.5 installed
| |
− | •Agnitio v2.0 installed
| |
− | •Download the Pandemobium Android and iOS source code
| |
− | •Download the selected vulnerable open source application
| |
− |
| |
− | http://www.securityninja.co.uk/application-security/brucon-agnitio-workshop/
| |
− |
| |
− | There is no maximum audience amount.
| |
− |
| |
− | {| border='1px'
| |
− | ! !! '''Monday'''
| |
− | |-
| |
− | | #1
| |
− | | Ryan Dewhurst
| |
− | |-
| |
− | | #2
| |
− | | Mike - ydoow
| |
− | |-
| |
− | | #3
| |
− | |Dieter (@dietervds)
| |
− | |-
| |
− | | #4
| |
− | |@steevebarbeau
| |
− | |-
| |
− | | #5
| |
− | |padzer0
| |
− | |-
| |
− | | #6
| |
− | |azerton
| |
− | |-
| |
− | | #7
| |
− | |Kurt Beheydt
| |
− | |-
| |
− | | #8
| |
− | |
| |
− | |-
| |
− | | #9
| |
− | |
| |
− | |-
| |
− | | #10
| |
− | |
| |
− | |-
| |
− | | #11
| |
− | |
| |
− | |-
| |
− | | #12
| |
− | |
| |
− | |-
| |
− | | #13
| |
− | |
| |
− | |-
| |
− | | #14
| |
− | |
| |
− | |-
| |
− | | #15
| |
− | |
| |
− | |-
| |
− | | #16
| |
− | |
| |
− | |-
| |
− | | #17
| |
− | |
| |
− | |-
| |
− | | #18
| |
− | |
| |
− | |-
| |
− | | #19
| |
− | |
| |
− | |-
| |
− | | #20
| |
− | |
| |
− | |-
| |
− | | #21
| |
− | |
| |
− | |-
| |
− | | #22
| |
− | |
| |
− | |-
| |
− | | #23
| |
− | |
| |
− | |-
| |
− | | #24
| |
− | |
| |
− | |-
| |
− | | #25
| |
− | |
| |
− | |-
| |
− | | #26
| |
− | |
| |
− | |-
| |
− | | #27
| |
− | |
| |
− | |-
| |
− | | #28
| |
− | |
| |
− | |-
| |
− | | #29
| |
− | |
| |
− | |-
| |
− | | #30
| |
− | |
| |
− | |-
| |
− | | ###
| |
− | | '''COMPLETE'''<br>No more people, thanks!
| |
− | |-
| |
− | |}
| |
− |
| |
− | ==Podcasters meetup==
| |
− | '''This is a walk-in event'''
| |
− |
| |
− | ==Infosec Mentors==
| |
− | '''This is a walk-in event'''
| |