SEARCH
TOOLBOX
LANGUAGES
Difference between revisions of "Schedule"

Difference between revisions of "Schedule"

From BruCON 2016

Jump to: navigation, search
(BruCON 0x06 Line-Up)
(BruCON 0x06 Line-Up)
Line 18: Line 18:
 
* [[Matthew Halchyshak]] and Joseph Tartaro - [[Cyber Necromancy: Resurrecting the Dead (Game Servers)]]
 
* [[Matthew Halchyshak]] and Joseph Tartaro - [[Cyber Necromancy: Resurrecting the Dead (Game Servers)]]
 
* [[Aaron Lemasters]] - [[Windows Crash Dump Exploration]]
 
* [[Aaron Lemasters]] - [[Windows Crash Dump Exploration]]
* Arne Swinnen and Alaeddine Mesbahi - One packer to rule them all: Empirical identification, comparison and circumvention of current Antivirus detection techniques
+
* [[Arne Swinnen]] and [[Alaeddine Mesbahi]] - [[One packer to rule them all: Empirical identification, comparison and circumvention of current Antivirus detection techniques]]
 
* [[Zoz]] and [[Joe Grand]] - [[The Projects Of Prototype This]]
 
* [[Zoz]] and [[Joe Grand]] - [[The Projects Of Prototype This]]
 
* Adam Schoeman - Data transforming your sewage into signatures - lessons learnt from building a hybrid honeypot named Amber
 
* Adam Schoeman - Data transforming your sewage into signatures - lessons learnt from building a hybrid honeypot named Amber

Revision as of 23:24, 26 August 2014


BruCON 0x06 Line-Up

Keynotes

  • Adam Shostack, Veteran startup CTO and author focused on bringing security and privacy to customers. Currently doing so at Microsoft.
  • Jennifer Minella, VP of Engineering & consulting CISO at Carolina Advanced Digital, Mindfulness Evangelist


Talks

Workshops

  • Philip Polstra - Autonomous Remote Hacking Drones (requirements)
  • Michael Sikorski - Counterfeiting the Pipes with FakeNet 2.0
  • Hal Pomeranz - Linux Forensics Workshop
  • Solomon Sonya - Splinter the RAT Attack: Create Your Own Botnet to Exploit the Network
  • Chris Lytle and Leigh Lytle - Old School Crypto
  • Willi Ballenthin - “EID 1102 - The audit log was cleared” won’t stop me: Advanced Windows Event Log Forensics
  • Wim Remes and Daniela Zapata - The dirty secrets of client-side exploitation and protection
  • Jake Valletta - Exploiting the Bells and Whistles: Uncovering OEM Vulnerabilities in Android
  • Vivek Ramachandran - Javascript for Pentesters with over 20 Challenges
  • Machtelt Garrels - Beer brewing workshop
  • DJ Jackalope - DJ workshop

Sounds