SEARCH
TOOLBOX
LANGUAGES
Difference between revisions of "Schedule"

Difference between revisions of "Schedule"

From BruCON 2016

Jump to: navigation, search
 
(116 intermediate revisions by 7 users not shown)
Line 1: Line 1:
 
__NOTOC__
 
__NOTOC__
 +
{| border="1" width="100%" style="text-align:center;"
 +
| The completed schedule is available on '''http://sched.brucon.org/grid-full'''
 +
|-
 +
|}
 +
 +
 
=General Information=
 
=General Information=
* Registration for workshops will be possible '''at the venue'''
 
** we have a varied audience. Some of you are on twitter, some read the blog, some do neither. As each workshop has limited seats available, we want to give everybody the same chance to register for the workshop of their choice.
 
* Workshops run for 2 consecutive speaking slots (ca. 2 hours)
 
* 't Pand is a location within 10 minutes walking distance of the main venue !
 
* La Trappe isn't a room or an aula but rather an open space gallery in the main venue. Directions will be clearly visible.
 
* We do have the "Beer Workshop" again this year !!! It is not on the schedule yet, but prepare to brew your own !
 
* This schedule is subject to change, check back regularly.
 
  
=Current list of speakers=
+
* '''Registrations start at 8h30!'''
 +
* Typically workshops run for 2 consecutive speaking slots (ca. 2 hours), but some of them are even longer
 +
* Workshop rooms in the location '''Novotel Ghent (Orval, Chimay, La Trappe)''' are 5 minutes walking from the main venue
 +
* Workshop seats are limited. '''Reserved seats get in until 5 min before the workshop. After that it is first come, first in.'''
 +
* Read our important instructions on [[how to use SCHED.org]]!
 +
* This schedule is subject to change, check back regularly.
  
'''Keynotes'''
+
'''Talks:'''
* Ed Skoudis - founder and senior security consultant with InGuardians
 
* Katie Moussouris - Lead Security Community Outreach and Strategy team at Microsoft
 
  
'''Talks'''
+
* Building a Successful Internal Adversarial Simulation Team - Chris Nickerson and Chris Gates
* Georgia Weidman - Introducing the Smartphone Penetration Testing Framework
+
* What Does the Perfect Door or Padlock Look Like? - Deviant Ollam
* Robert McArdle HTML5 - A Whole New Attack Vector
+
  * New Adventures in Active Defense, Offensive Countermeasures and Hacking Back - John Strand
* Raul Siles - Security of National eID (smartcard-based) Web Applications
+
* NO EASY BREACH:Challenges and Lessons Learned from an Epic Investigation - Matthew Dunwoody
* Andreas Bogk - Herding RATs
+
* Decepticon The Rise and Evolution of an Intelligent Evil Twin…!!! - Rushikesh Nandedkar, Amrita Iyer and Krishnakant Patil
* Josh Corman and Jericho - "Cyberwar" : Not What We Were Expecting
+
* Hello to the Dark Side: Understanding YOUR Adversaries without All Those Expensive Threat Intel Tools" - L. Grecs
* Allison Miller - A Million Mousetraps: Using Big Data and Little Loops to Build Better Defenses
+
* Security through design - Making security better by designing for people - Jelle Niemantsverdriet
* Mathy Vanhoef - New flaws in WPA-TKIP
+
* Esoteric Web Application Vulnerabilities - Andres Riancho
* Martin Gallo - Uncovering SAP vulnerabilities: dissecting and breaking the Diag protocol
+
* Invoke-Obfuscation: PowerShell obFUsk8tion Techniques - Daniel Bohannon
* Fernando Gont - Recent Advances in IPv6 Security
+
* Virtual Terminals, POS Security and becoming a billionaire overnight - Grigorios Fragkos
* Gregory Pickett - pMap, the silent killer
+
* Hacking KPN: Lessons from the trenches - Jeremy Goldstein and Bouke van Laethem
* Carlos Garcia - How I met your pointer (Hijacking client software for fuzz and profit)
+
* Scraping leaky browsers for fun and passwords - Stefaan Truijen, Adrian Toma
* Paul Marsh - Satellite Hacking
+
* Smart Sheriff, Dumb Idea. The wild west of government assisted parenting - Abraham Aranguren, and Fabian Fäßler
* Chris Nickerson - Tactical Surveillance : Look at me now!
+
* Anti-Forensics AF - DualCore
* Mickey Shkatov - we have you by the gadgets
 
* int0x80 (of Dual Core) - Moar Anti-Forensics for the Louise
 
* David Mortman - The Defense RESTs: Automation and APIs for Improving Security
 
  
  
'''Workshops'''
+
'''Workshops:'''
* Didier Stevens - Windows x64: The Essentials
 
* Kyle 'Kos' Osborn & Krzysztof Kotowicz - Advanced Chrome Extension Exploitation
 
* Michael Sikorski & William Ballenthin - Clearing the Red Forest
 
* Abraham Aranguren - Introducing OWTF
 
* Biosshadow, Matt Erasmus, Benson - The PANIC Project
 
* Vivek Ramachandran - Hacking with Python
 
* fbz - Hardware Hacking
 
* Walter Belgers (TOOOL) - Lockpicking
 
* Joernchen, Astera & Mumpi - DJ Workshop
 
* Meredith L. Patterson & Sergey Bratus - Langsec Workshop
 
* Machtelt Garrels - Beer brewing workshop
 
  
 +
* The Control Things Workshop - Justin Searle
 +
* Hacking The Enterprise - Nathan Magniez and Wim Remes
 +
* Brewcon - Chris Lytle
 +
* Hunting Malware with osquery at scale - Erik Waher, Jackie Bow, and Nick Anderson
 +
* Analyzing Malicious Office Documents - Didier Stevens
 +
* Incident Response Workshop - Maxim Deweerdt and Erik Van Buggenhout
 +
* Crowdsourced Malware Triage - Sergei Frankoff and Sean Wilson
 +
* How to securely build your own IoT enabling embedded systems - Jens Devloo, Jean-Georges Valle and Vito Rallo
 +
* 802.11 Leakage: How passive interception leads to active exploitation - Solomon Sonya
 +
* Putting a lock around your containers with Docker Security Primitives - Nils De Moor
  
==Day 1 : Wednesday September 26th==
 
'''Registrations start at 9h00!'''
 
  
'''Workshop rooms in the location 't Pand are 10 minutes walking from the main venue.'''
 
  
'''Please be there in time!!'''
+
Final times for talks are still being finalised.
{| border="1px solid" style="text-align:center;"
 
|- bgcolor="#CCCCCC"
 
!|Time
 
!|Lounge
 
!|Westvleteren (main track)
 
!|Westmalle (workshops)
 
!|Orval (@Pand!)
 
!|Chimay (@Pand!)
 
!|La Trappe
 
|- bgcolor="#CCCCCC"
 
!|9:00
 
|Breakfast
 
|
 
|
 
|
 
|
 
|
 
|-
 
!|9:50
 
|
 
|Welcome (Seba & Wim)
 
|
 
|
 
|
 
|The Hex Factor (continuously)
 
|-
 
!|10:00
 
|
 
|Katie Moussouris
 
|
 
|
 
|
 
|
 
|-
 
!|11:00
 
|
 
|[http://2012.brucon.org/index.php/Talks_and_workshops#Meredith_L._Patterson_and_Sergey_Bratus_-_LangSec Meredith L. Patterson and Sergey Bratus]
 
| rowspan="2" | [http://2012.brucon.org/index.php/Talks_and_workshops#Didier_Stevens_-_Windows_x64:_The_Essentials_.282h.29 Didier Stevens]
 
| rowspan="2" |
 
|
 
|
 
|-
 
!|12:00
 
|
 
|[http://2012.brucon.org/index.php/Talks_and_workshops#David_Mortman_-_The_Defense_RESTs:_Automation_and_APIs_for_Improving_Security David Mortman]
 
|
 
|
 
|- bgcolor="#CCCCCC"
 
!|13:00
 
|Lunch
 
|
 
|
 
|
 
|
 
|
 
|-
 
!|14:00
 
| rowspan="2" |
 
|[http://2012.brucon.org/index.php/Talks_and_workshops#Paul_Marsh_-_Satellite_Hacking Paul Marsh]
 
| rowspan="2" |[http://2012.brucon.org/index.php/Talks_and_workshops#Michael_Sikorski_.26_William_Ballenthin_-_Clearing_the_Red_Forest_.284h.29 Michael Sikorski & Willi Ballenthin]
 
| rowspan="2" |[http://2012.brucon.org/index.php/Talks_and_workshops#Abraham_Aranguren_-_Introducing_OWTF_.284hr.29 Abraham Aranguren]
 
| rowspan="2" |[http://2012.brucon.org/index.php/Talks_and_workshops#Vivek_Ramachandran_-_Hacking_with_Python_.282hr.29 Vivek Ramachandran]
 
| rowspan="2" | [http://2012.brucon.org/index.php/Talks_and_workshops#fbz_-_Hardware_Hacking fbz]
 
|-
 
!|15:00
 
|[http://2012.brucon.org/index.php/Talks_and_workshops#Raul_Siles_-_Security_of_National_eID_.28smartcard-based.29_Web_Applications Raul Siles]
 
|- bgcolor="#CCCCCC"
 
!|16:00
 
|Coffee break
 
|
 
|
 
|
 
|
 
|
 
|-
 
!|16:30
 
|
 
| [http://2012.brucon.org/index.php/Talks_and_workshops#int0x80_.28of_Dual_Core.29_-_Moar_Anti-Forensics_for_the_Louise int0x80]
 
| rowspan="2" |[http://2012.brucon.org/index.php/Talks_and_workshops#Michael_Sikorski_.26_William_Ballenthin_-_Clearing_the_Red_Forest_.284h.29 Michael Sikorski & Willi Ballenthin]
 
| rowspan="2" |[http://2012.brucon.org/index.php/Talks_and_workshops#Abraham_Aranguren_-_Introducing_OWTF_.284hr.29 Abraham Aranguren]
 
| rowspan = "2" | [http://2012.brucon.org/index.php/Talks_and_workshops#Walter_Belgers_.28TOOOL.29_-_Lockpicking TOOOL (lockpicking)]
 
| rowspan = "2" |
 
|-
 
!|17:30
 
|
 
| [http://2012.brucon.org/index.php/Talks_and_workshops#Gregory_Pickett_-_pMap.2C_the_silent_killer Gregory Pickett]
 
|- bgcolor="#CCCCCC"
 
!|18:30
 
|Dinner
 
|
 
|
 
|
 
|
 
|
 
|-
 
!|19:30
 
|[http://2012.brucon.org/index.php/Talks_and_workshops#Joernchen.2C_Astera_.26_Mumpi_-_DJ_Workshop_.282h.29 DJ Workshop]
 
|[http://2012.brucon.org/index.php/Talks_and_workshops#Josh_Corman_and_Jericho_-_.22Cyberwar.22_:_Not_What_We_Were_Expecting Josh Corman & Jericho]
 
|[http://2012.brucon.org/index.php/Lightning_Talks Lightning talks]
 
|
 
|
 
|
 
|-
 
!|20:30
 
|[http://2012.brucon.org/index.php/Talks_and_workshops#Joernchen.2C_Astera_.26_Mumpi_-_DJ_Workshop_.282h.29 DJ Workshop]
 
|[http://2012.brucon.org/index.php/Talks_and_workshops#Fernando_Gont_-_Recent_Advances_in_IPv6_Security Fernando Gont]
 
|
 
|
 
|
 
|
 
|-
 
!|21:30
 
|Close
 
|
 
|
 
|
 
|
 
|
 
|-
 
!|22:00
 
|Doors closed
 
|
 
|
 
|
 
|
 
|
 
|-
 
|}
 
 
 
==Day 2 : Thursday September 27th==
 
{| border="1px solid" style="text-align:center;"
 
|- bgcolor="#CCCCCC"
 
!|Time
 
!|Lounge
 
!|Westvleteren (main track)
 
!|Westmalle (workshops)
 
!|Orval (@Pand)
 
!|La Trappe
 
|- bgcolor="#CCCCCC"
 
!|9:00
 
|Breakfast
 
|
 
|
 
|
 
|
 
|-
 
!|10:00
 
|
 
|[http://2012.brucon.org/index.php/Talks_and_workshops#Mickey_Shkatov_-_we_have_you_by_the_gadgets Mickey Shkatov]
 
|
 
|
 
|
 
|-
 
!|11:00
 
|
 
| [http://2012.brucon.org/index.php/Talks_and_workshops#Georgia_Weidman_-_Introducing_the_Smartphone_Penetration_Testing_Framework Georgia Weidman]
 
| rowspan="2" | [http://2012.brucon.org/index.php/Talks_and_workshops#Didier_Stevens_-_Windows_x64:_The_Essentials_.282h.29 Didier Stevens]
 
| rowspan="2" | [http://2012.brucon.org/index.php/Talks_and_workshops#Walter_Belgers_.28TOOOL.29_-_Lockpicking TOOOL (lockpicking)]
 
| rowspan="2" | The Hex Factor (continuously)
 
|-
 
!|12:00
 
|
 
| [http://2012.brucon.org/index.php/Talks_and_workshops#Andreas_Bogk_-_Herding_RATs Andreas Bogk]
 
|
 
|- bgcolor="#CCCCCC"
 
!|13:00
 
|Lunch
 
|
 
|
 
|
 
|
 
|-
 
!|14:00
 
|
 
|[http://2012.brucon.org/index.php/Talks_and_workshops#Robert_McArdle_-_HTML5_-_A_Whole_New_Attack_Vector Robert McArdle]
 
|[http://2012.brucon.org/index.php/Lightning_Talks Lightning talks]
 
| rowspan="2" |[http://2012.brucon.org/index.php/Talks_and_workshops#Vivek_Ramachandran_-_Hacking_with_Python_.282hr.29 Vivek Ramachandran]
 
| rowspan="2" | [http://2012.brucon.org/index.php/Talks_and_workshops#fbz_-_Hardware_Hacking fbz]
 
|-
 
!|15:00
 
|
 
|[http://2012.brucon.org/index.php/Talks_and_workshops#Allison_Miller_-_A_Million_Mousetraps:_Using_Big_Data_and_Little_Loops_to_Build_Better_Defenses Allison Miller]
 
|LSEC event
 
|- bgcolor="#CCCCCC"
 
!|16:00
 
|Coffee break
 
|
 
|
 
|
 
|
 
|-
 
!|16:30
 
|
 
|[http://2012.brucon.org/index.php/Talks_and_workshops#Martin_Gallo_-_Uncovering_SAP_vulnerabilities:_dissecting_and_breaking_the_Diag_protocol Martin Gallo]
 
| rowspan="2" |[http://2012.brucon.org/index.php/Talks_and_workshops#Kyle_.27Kos.27_Osborn_.26_Krzysztof_Kotowicz_-_Advanced_Chrome_Extension_Exploitation_.282h.29 Kyle Osborn & K. Kotowicz]
 
| rowspan="2" |[http://2012.brucon.org/index.php/Talks_and_workshops#Biosshadow.2C_Matt_Erasmus.2C_Benson_-_The_PANIC_Project Biosshadow, Matt Erasmus & Benson]
 
| rowspan="2" |
 
|-
 
!|17:30
 
|
 
|[http://2012.brucon.org/index.php/Talks_and_workshops#.28Keynote.29_Ed_Skoudis_-_Letting_Loose_the_Dogs_of_.28cyber.29_War Ed Skoudis]
 
|
 
|- bgcolor="#CCCCCC"
 
!|18:30
 
|Dinner
 
|
 
|
 
|
 
|
 
|-
 
!|19:30
 
|
 
| [http://2012.brucon.org/index.php/Talks_and_workshops#Mathy_Vanhoef_-_New_flaws_in_WPA-TKIP Mathy Vanhoef]
 
| rowspan="2" |
 
| rowspan="2" |
 
| rowspan="2" |
 
|-
 
!|20:30
 
|
 
| [http://2012.brucon.org/index.php/Talks_and_workshops#Carlos_Garcia_-_How_I_met_your_pointer_.28Hijacking_client_software_for_fuzz_and_profit.29 Carlos Garcia Prado]
 
|-
 
!|21:30
 
|Close
 
|
 
|
 
|
 
|
 
|-
 
!|22:00
 
|Doors closed
 
|
 
|
 
|
 
|
 
|-
 
|}
 

Latest revision as of 13:33, 18 October 2016

The completed schedule is available on http://sched.brucon.org/grid-full


General Information

  • Registrations start at 8h30!
  • Typically workshops run for 2 consecutive speaking slots (ca. 2 hours), but some of them are even longer
  • Workshop rooms in the location Novotel Ghent (Orval, Chimay, La Trappe) are 5 minutes walking from the main venue
  • Workshop seats are limited. Reserved seats get in until 5 min before the workshop. After that it is first come, first in.
  • Read our important instructions on how to use SCHED.org!
  • This schedule is subject to change, check back regularly.

Talks:

* Building a Successful Internal Adversarial Simulation Team - Chris Nickerson and Chris Gates
* What Does the Perfect Door or Padlock Look Like? - Deviant Ollam
* New Adventures in Active Defense, Offensive Countermeasures and Hacking Back - John Strand
* NO EASY BREACH:Challenges and Lessons Learned from an Epic Investigation - Matthew Dunwoody
* Decepticon The Rise and Evolution of an Intelligent Evil Twin…!!! - Rushikesh Nandedkar, Amrita Iyer and Krishnakant Patil
* Hello to the Dark Side: Understanding YOUR Adversaries without All Those Expensive Threat Intel Tools" - L. Grecs
* Security through design - Making security better by designing for people - Jelle Niemantsverdriet
* Esoteric Web Application Vulnerabilities - Andres Riancho
* Invoke-Obfuscation: PowerShell obFUsk8tion Techniques - Daniel Bohannon
* Virtual Terminals, POS Security and becoming a billionaire overnight - Grigorios Fragkos
* Hacking KPN: Lessons from the trenches - Jeremy Goldstein and Bouke van Laethem
* Scraping leaky browsers for fun and passwords - Stefaan Truijen, Adrian Toma
* Smart Sheriff, Dumb Idea. The wild west of government assisted parenting - Abraham Aranguren, and Fabian Fäßler
* Anti-Forensics AF - DualCore


Workshops:

* The Control Things Workshop - Justin Searle
* Hacking The Enterprise - Nathan Magniez and Wim Remes
* Brewcon - Chris Lytle
* Hunting Malware with osquery at scale - Erik Waher, Jackie Bow, and Nick Anderson
* Analyzing Malicious Office Documents - Didier Stevens
* Incident Response Workshop - Maxim Deweerdt and Erik Van Buggenhout
* Crowdsourced Malware Triage - Sergei Frankoff and Sean Wilson
* How to securely build your own IoT enabling embedded systems - Jens Devloo, Jean-Georges Valle and Vito Rallo
* 802.11 Leakage: How passive interception leads to active exploitation - Solomon Sonya
* Putting a lock around your containers with Docker Security Primitives - Nils De Moor


Final times for talks are still being finalised.