Difference between revisions of "Schedule"
From BruCON 2016
Security4all (talk | contribs) |
Security4all (talk | contribs) |
||
Line 25: | Line 25: | ||
| height="26" | 9:00 | | height="26" | 9:00 | ||
| rowspan="2" | [[Presentations#Trusted_Cryptography | Trusted Cryptography]] | | rowspan="2" | [[Presentations#Trusted_Cryptography | Trusted Cryptography]] | ||
− | | rowspan="4" | Digital ID #1 | + | | rowspan="4" | [[Workshops#Digital_ID | Digital ID #1]] |
− | | rowspan="4" | Physical Locks #1 | + | | rowspan="4" | [[Workshops#Physical_locks_by_Toool | Physical Locks #1]] |
| rowspan="2" | [[Presentations#Social_engineering_for_penetration_testers | Social engineering for penetration testers]] | | rowspan="2" | [[Presentations#Social_engineering_for_penetration_testers | Social engineering for penetration testers]] | ||
− | | rowspan="4" | Arduino Workshop #2 | + | | rowspan="4" | [[Workshops#Arduino:_how_we_made_the_beerduino | Arduino Workshop #2]] |
− | | rowspan="4" | Wireless Security #2 | + | | rowspan="4" | [[Workshops#Wireless_auditing | Wireless Security #2]] |
|- style="font-size:11pt" align="center" | |- style="font-size:11pt" align="center" | ||
Line 54: | Line 54: | ||
| height="29" | 11:30 | | height="29" | 11:30 | ||
| rowspan="2" | [[Presentations#How_to_prepare.2C_coordinate_and_conduct_a_cyber_attack | How to prepare, coordinate and conduct a cyber attack]] | | rowspan="2" | [[Presentations#How_to_prepare.2C_coordinate_and_conduct_a_cyber_attack | How to prepare, coordinate and conduct a cyber attack]] | ||
− | | rowspan="4" | Arduino Workshop #1 | + | | rowspan="4" |[[Workshops#Arduino:_how_we_made_the_beerduino | Arduino Workshop #1]] |
− | | rowspan="4" | JTAG Workshop #1 | + | | rowspan="4" | [[Workshops#JTAG| JTAG Workshop #1]] |
| rowspan="2" | [[Presentations#A_new_web_attack_vector:_Script_Fragmentation | A new web attack vector: Script Fragmentation]] | | rowspan="2" | [[Presentations#A_new_web_attack_vector:_Script_Fragmentation | A new web attack vector: Script Fragmentation]] | ||
− | | rowspan="4" | Digital ID #2 | + | | rowspan="4" | [[Workshops#Digital_ID | Digital ID #2]] |
− | | rowspan="4" | VOIP #2 | + | | rowspan="4" | [[Workshops#Auditing_VOIP | VOIP #2]] |
|- style="font-size:11pt" align="center" | |- style="font-size:11pt" align="center" | ||
Line 89: | Line 89: | ||
| rowspan="2" | [[Lightning_Talks#Lightning_talks_day_1| Lightning Talks #1]] | | rowspan="2" | [[Lightning_Talks#Lightning_talks_day_1| Lightning Talks #1]] | ||
| rowspan="2" | [[Open_Source_Information_Gathering | Open Source Information Gathering]] | | rowspan="2" | [[Open_Source_Information_Gathering | Open Source Information Gathering]] | ||
− | | rowspan="4" | JTAG Workshop #2 | + | | rowspan="4" | [[Workshops#JTAG| JTAG Workshop #2]] |
+ | |||
| rowspan="2" |[[Lightning_Talks#Lightning_talks_day_2| Lightning Talks #2]] | | rowspan="2" |[[Lightning_Talks#Lightning_talks_day_2| Lightning Talks #2]] | ||
Line 118: | Line 119: | ||
| height="40" | 17:00 | | height="40" | 17:00 | ||
| rowspan="2" | [[Presentations#Knowing_Me_Knowing_You_.28The_dangers_of_social_networks.29 | Knowing Me Knowing You (The dangers of social networks)]] | | rowspan="2" | [[Presentations#Knowing_Me_Knowing_You_.28The_dangers_of_social_networks.29 | Knowing Me Knowing You (The dangers of social networks)]] | ||
− | | rowspan="4" | Wireless Security #1 | + | | rowspan="4" | [[Workshops#Wireless_auditing | Wireless Security #1]] |
− | | rowspan="4" | VOIP #1 | + | | rowspan="4" | [[Workshops#Auditing_VOIP | VOIP #1]] |
+ | |||
| rowspan="2" | [[Presentations#Transition_to_IPv6_on_the_Internet:_Threats_and_Mitigation_Techniques | Transition to IPv6 on the Internet: Threats and Mitigation Techniques]] | | rowspan="2" | [[Presentations#Transition_to_IPv6_on_the_Internet:_Threats_and_Mitigation_Techniques | Transition to IPv6 on the Internet: Threats and Mitigation Techniques]] | ||
− | | rowspan="4" | Physical Locks #2 | + | | rowspan="4" | [[Workshops#Physical_locks_by_Toool | Physical Locks #2]] |
| rowspan="4" | TBD | | rowspan="4" | TBD | ||
Revision as of 12:17, 2 July 2009
- Wednesday 16/09 - Thursday 17/09: see Training
- Friday 18/09 - Saturday 19/09: Workshops + Presentations + Lightning Talks
Conference doors and registration will be open at 8:00 on Friday
Click here to see the complete Alphabetical list of speakers
Click here to see the complete Alphabetical list of presentations