Difference between revisions of "Workshop Registration"
From BruCON 2016
(→Beer brewing workshop) |
(→White Hat Shellcode: Not for Exploits) |
||
Line 281: | Line 281: | ||
|- | |- | ||
| #20 | | #20 | ||
+ | | | ||
+ | | | ||
+ | |- | ||
+ | | #21 | ||
+ | | | ||
+ | | | ||
+ | |- | ||
+ | | #22 | ||
+ | | | ||
+ | | | ||
+ | |- | ||
+ | | #23 | ||
+ | | | ||
+ | | | ||
+ | |- | ||
+ | | #24 | ||
+ | | | ||
+ | | | ||
+ | |- | ||
+ | | #25 | ||
| | | | ||
| | | |
Revision as of 22:50, 11 September 2011
Regsitration is not yet open. Come back later for more information
To prevent chaos for our workshops, we kindly ask you to register on this page (actual name or nickname)
Most workshops will be given on both days so you have 2 options.
Arrive early (5 minutes before start).
Even if you don't have a spot, drop by to see if anybody didn't show up.
Lists will be closed at midnight the day before.
If you didn't get a chance to register in time but the list isn't full yet, come and try your luck.
Contents
- 1 Collective Malicious PDF Analysis
- 2 Script Kiddie Hacking Techniques
- 3 The Web Application Hacking Toolchain
- 4 White Hat Shellcode: Not for Exploits
- 5 WiFi malware for Fun and Profit
- 6 Cisco VoIP insecurity workshop
- 7 Beer brewing workshop
- 8 Lock Picking 101
- 9 Hacking your conference badge
- 10 Agnitio: the security code review Swiss army knife
Collective Malicious PDF Analysis
by(Brandon Dixon - x0ner)
Monday | Tuesday | |
---|---|---|
#1 | ||
#2 | ||
#3 | ||
#4 | ||
#5 | ||
#6 | ||
#7 | ||
#8 | ||
#9 | ||
#10 | ||
#11 | ||
#12 | ||
#13 | ||
#14 | ||
#15 | ||
#16 | ||
#17 | ||
#18 | ||
#19 | ||
#20 | ||
### | COMPLETE No more people, thanks! |
COMPLETE No more people, thanks! |
Script Kiddie Hacking Techniques
by Ellen Moar & Colin McLean
The Web Application Hacking Toolchain
by Jason Haddix - jhaddix
Monday | Tuesday | |
---|---|---|
#1 | ||
#2 | ||
#3 | ||
#4 | ||
#5 | ||
#6 | ||
#7 | ||
#8 | ||
#9 | ||
#10 | ||
#11 | ||
#12 | ||
#13 | ||
#14 | ||
#15 | ||
#16 | ||
#17 | ||
#18 | ||
#19 | ||
#20 | ||
### | COMPLETE No more people, thanks! |
COMPLETE No more people, thanks! |
White Hat Shellcode: Not for Exploits
by Didier Stevens
Monday | Tuesday | |
---|---|---|
#1 | ||
#2 | ||
#3 | ||
#4 | ||
#5 | ||
#6 | ||
#7 | ||
#8 | ||
#9 | ||
#10 | ||
#11 | ||
#12 | ||
#13 | ||
#14 | ||
#15 | ||
#16 | ||
#17 | ||
#18 | ||
#19 | ||
#20 | ||
#21 | ||
#22 | ||
#23 | ||
#24 | ||
#25 | ||
### | COMPLETE No more people, thanks! |
COMPLETE No more people, thanks! |
WiFi malware for Fun and Profit
by Vivek Ramachandran
Monday | Tuesday | |
---|---|---|
#1 | ||
#2 | ||
#3 | ||
#4 | ||
#5 | ||
#6 | ||
#7 | ||
#8 | ||
#9 | ||
#10 | ||
#11 | ||
#12 | ||
#13 | ||
#14 | ||
#15 | ||
#16 | ||
#17 | ||
#18 | ||
#19 | ||
#20 | ||
### | COMPLETE No more people, thanks! |
COMPLETE No more people, thanks! |
Cisco VoIP insecurity workshop
by Sandro Gauci and Joffrey Czarny aka Sn0rkY
Tuesday | |
---|---|
#1 | |
#2 | |
#3 | |
#4 | |
#5 | |
#6 | |
#7 | |
#8 | |
#9 | |
#10 | |
#11 | |
#12 | |
#13 | |
#14 | |
#15 | |
#16 | |
#17 | |
#18 | |
#19 | |
#20 | |
### | COMPLETE No more people, thanks! |
Beer brewing workshop
by Machtelt Garrels
Monday | |
---|---|
#1 | |
#2 | |
#3 | |
#4 | |
#5 | |
#6 | |
#7 | |
#8 | |
#9 | |
#10 | |
#11 | |
#12 | |
#13 | |
#14 | |
#15 | |
#16 | |
#17 | |
#18 | |
#19 | |
#20 | |
#21 | |
#22 | |
#23 | |
#24 | |
#25 | |
#26 | |
#27 | |
#28 | |
#29 | |
#30 | |
### | COMPLETE No more people, thanks! |
Lock Picking 101
by Walter Belgers (TOOOL)
Hacking your conference badge
by OpenAMD Crew
Agnitio: the security code review Swiss army knife
by David Rook aka Securityninja