SEARCH
TOOLBOX
LANGUAGES
Difference between revisions of "Schedule"

Difference between revisions of "Schedule"

From BruCON 2016

Jump to: navigation, search
 
(89 intermediate revisions by 6 users not shown)
Line 1: Line 1:
 
__NOTOC__
 
__NOTOC__
 
 
{| border="1" width="100%" style="text-align:center;"
 
{| border="1" width="100%" style="text-align:center;"
| The complete schedule is available on '''http://sched.brucon.org/grid-full'''
+
| The completed schedule is available on '''http://sched.brucon.org/grid-full'''
 
|-
 
|-
 
|}
 
|}
  
 +
 
=General Information=
 
=General Information=
  
 
* '''Registrations start at 8h30!'''
 
* '''Registrations start at 8h30!'''
* Registration for workshops will be possible '''at the venue, please be there in time!!'''
+
* Typically workshops run for 2 consecutive speaking slots (ca. 2 hours), but some of them are even longer
** we have a varied audience. Some of you are on twitter, some read the blog, some do neither. As each workshop has limited seats available, we want to give everybody the same chance to register for the workshop of their choice.
+
* Workshop rooms in the location '''Novotel Ghent (Orval, Chimay, La Trappe)''' are 5 minutes walking from the main venue
* Workshops run for 2 consecutive speaking slots (ca. 2 hours)
+
* Workshop seats are limited. '''Reserved seats get in until 5 min before the workshop. After that it is first come, first in.'''
* Workshop rooms in the location '''Novotel Ghent (Orval, Chimay, La Trappe)''' are 10 minutes walking from the main venue
+
* Read our important instructions on [[how to use SCHED.org]]!
* This schedule is subject to change, check back regularly.
+
* This schedule is subject to change, check back regularly.  
  
=Current list of speakers=
+
'''Talks:'''
  
'''Keynotes'''
+
* Building a Successful Internal Adversarial Simulation Team - Chris Nickerson and Chris Gates
* Dave Aitel - Founder of Immunity, Inc.
+
* What Does the Perfect Door or Padlock Look Like? - Deviant Ollam
* Dan Guido - CEO of Trail of Bits
+
* New Adventures in Active Defense, Offensive Countermeasures and Hacking Back - John Strand
 +
* NO EASY BREACH:Challenges and Lessons Learned from an Epic Investigation - Matthew Dunwoody
 +
* Decepticon The Rise and Evolution of an Intelligent Evil Twin…!!! - Rushikesh Nandedkar, Amrita Iyer and Krishnakant Patil
 +
* Hello to the Dark Side: Understanding YOUR Adversaries without All Those Expensive Threat Intel Tools" - L. Grecs
 +
* Security through design - Making security better by designing for people - Jelle Niemantsverdriet
 +
* Esoteric Web Application Vulnerabilities - Andres Riancho
 +
* Invoke-Obfuscation: PowerShell obFUsk8tion Techniques - Daniel Bohannon
 +
* Virtual Terminals, POS Security and becoming a billionaire overnight - Grigorios Fragkos
 +
* Hacking KPN: Lessons from the trenches - Jeremy Goldstein and Bouke van Laethem
 +
* Scraping leaky browsers for fun and passwords - Stefaan Truijen, Adrian Toma
 +
* Smart Sheriff, Dumb Idea. The wild west of government assisted parenting - Abraham Aranguren, and Fabian Fäßler
 +
* Anti-Forensics AF - DualCore
  
'''Talks'''
 
* Alex Hutton, David Mortman, Kris Buytaert, Patrick Debois - A panel on DevOPS and Security
 
* Aloria - .NET: The Framework, the Myth, the Legend
 
* Arron Finnon - NIDS/NIPS : What is the OSNIF project?
 
* David Perez, Jose Pico - Geolocation of GSM mobile devices, even if they do not want to be found.
 
* Erin Jacobs, Zack Fasel - Taking the BDSM out of PCI-DSS through open-source solutions
 
* Jake Valletta - CobraDroid
 
* Robert Graham - Data-plane networking
 
* Russ Gideon - Paint by Numbers vs. Monet
 
* Stephan Chenette - Building Custom Android Malware for Penetration Testing
 
* Tiago Balgan Henriques, Tiago Martins, João Gouveia - Realtime analysis and visualization of internet status : from malware to compromised machines.
 
* Vaagn Toukharian - HTTP Time Bandit
 
  
'''Workshops'''
+
'''Workshops:'''
* Carlos G. Prado - Automating RE with Python
 
* Christopher Lytle - Crypto by example - A hands-on cryptography workshop
 
* Didier Stevens - Advanced Excel Hacking
 
* Ioannis Koniaris - Analyzing Internet Attacks with Honeypots
 
* Matt Erasmus, Eireann Leverett - Foundational Packetry: Using the internet on God mode
 
* Sandro Melo - Kudo : Post Mortem Forensic Analysis with FLOSS tools 2.0
 
* The Cuckoo Team - Cuckoo
 
* Willi Ballenthin/Michael Sikorski - Winter Cluster: Building a malware 'agglomerator'
 
* DJ Jackalope, Keith Myers, Count Ninjula - DJ Workshop
 
  
 +
* The Control Things Workshop - Justin Searle
 +
* Hacking The Enterprise - Nathan Magniez and Wim Remes
 +
* Brewcon - Chris Lytle
 +
* Hunting Malware with osquery at scale - Erik Waher, Jackie Bow, and Nick Anderson
 +
* Analyzing Malicious Office Documents - Didier Stevens
 +
* Incident Response Workshop - Maxim Deweerdt and Erik Van Buggenhout
 +
* Crowdsourced Malware Triage - Sergei Frankoff and Sean Wilson
 +
* How to securely build your own IoT enabling embedded systems - Jens Devloo, Jean-Georges Valle and Vito Rallo
 +
* 802.11 Leakage: How passive interception leads to active exploitation - Solomon Sonya
 +
* Putting a lock around your containers with Docker Security Primitives - Nils De Moor
  
<!--
 
{| border="1px solid" style="text-align:center;"
 
|- bgcolor="#CCCCCC"
 
!|Time
 
!|Lounge
 
!|Westvleteren (main track)
 
!|Westmalle (workshops)
 
!|Orval (@Pand!)
 
!|Chimay (@Pand!)
 
!|La Trappe
 
|- bgcolor="#CCCCCC"
 
!|8:30
 
|Registration
 
|
 
|
 
|
 
|
 
|
 
|-
 
!|9:00
 
|Breakfast
 
|
 
|
 
|
 
|
 
|
 
|-
 
!|9:50
 
|
 
|Welcome (Seba & Wim)
 
|rowspan="2" | Streaming from Westvleteren
 
|
 
|
 
|The Hex Factor (continuously)
 
|-
 
!|10:00
 
|
 
|Keynote (Katie Moussouris)
 
|
 
|
 
|
 
|-
 
!|11:00
 
|
 
|[http://2012.brucon.org/index.php/Talks_and_workshops#Meredith_L._Patterson_and_Sergey_Bratus_-_LangSec Meredith L. Patterson and Sergey Bratus]
 
| rowspan="2" | Windows x64: The Essentials ([http://2012.brucon.org/index.php/Talks_and_workshops#Didier_Stevens_-_Windows_x64:_The_Essentials_.282h.29 Didier Stevens])
 
|
 
|
 
|
 
|-
 
!|12:00
 
|
 
|The Defense RESTs: Automation and APIs for Improving Security ([http://2012.brucon.org/index.php/Talks_and_workshops#David_Mortman_-_The_Defense_RESTs:_Automation_and_APIs_for_Improving_Security David Mortman])
 
|
 
|
 
|
 
|- bgcolor="#CCCCCC"
 
!|13:00
 
|Lunch
 
|
 
|
 
|
 
|
 
|
 
|-
 
!|14:00
 
|
 
|Satellite Hacking ([http://2012.brucon.org/index.php/Talks_and_workshops#Paul_Marsh_-_Satellite_Hacking Paul Marsh])
 
| rowspan="2" |Clearing the Red Forest ([http://2012.brucon.org/index.php/Talks_and_workshops#Michael_Sikorski_.26_William_Ballenthin_-_Clearing_the_Red_Forest_.284h.29 Michael Sikorski & Willi Ballenthin])
 
| rowspan="2" |Introducing OWTF ([http://2012.brucon.org/index.php/Talks_and_workshops#Abraham_Aranguren_-_Introducing_OWTF_.284hr.29 Abraham Aranguren])
 
| rowspan="2" |Hacking with Python ([http://2012.brucon.org/index.php/Talks_and_workshops#Vivek_Ramachandran_-_Hacking_with_Python_.282hr.29 Vivek Ramachandran])
 
| rowspan="2" |Build your own arduino clone for controlling servo motors ([http://2012.brucon.org/index.php/Talks_and_workshops#fbz_-_Hardware_Hacking fbz])
 
|-
 
!|15:00
 
|
 
|Security of National eID (smartcard-based) Web Applications ([http://2012.brucon.org/index.php/Talks_and_workshops#Raul_Siles_-_Security_of_National_eID_.28smartcard-based.29_Web_Applications Raul Siles])
 
|- bgcolor="#CCCCCC"
 
!|16:00
 
|Coffee break
 
|
 
|
 
|
 
|
 
|
 
|-
 
!|16:30
 
| rowspan="2" | [http://2012.brucon.org/index.php/Talks_and_workshops#Beer_Hacking_workshop Beer Workshop]
 
| Moar Anti-Forensics for the Louise ([http://2012.brucon.org/index.php/Talks_and_workshops#int0x80_.28of_Dual_Core.29_-_Moar_Anti-Forensics_for_the_Louise int0x80])
 
| rowspan="2" |Clearing the Red Forest ([http://2012.brucon.org/index.php/Talks_and_workshops#Michael_Sikorski_.26_William_Ballenthin_-_Clearing_the_Red_Forest_.284h.29 Michael Sikorski & Willi Ballenthin])
 
| rowspan="2" |Introducing OWTF ([http://2012.brucon.org/index.php/Talks_and_workshops#Abraham_Aranguren_-_Introducing_OWTF_.284hr.29 Abraham Aranguren])
 
| rowspan = "2" | [http://2012.brucon.org/index.php/Talks_and_workshops#Walter_Belgers_.28TOOOL.29_-_Lockpicking TOOOL (lockpicking)]
 
| rowspan = "2" |
 
|-
 
!|17:30
 
|pMap, the silent killer ([http://2012.brucon.org/index.php/Talks_and_workshops#Gregory_Pickett_-_pMap.2C_the_silent_killer Gregory Pickett])
 
|- bgcolor="#CCCCCC"
 
!|18:30
 
|Dinner
 
|
 
|
 
|
 
|
 
|
 
|-
 
!|19:30
 
|[http://2012.brucon.org/index.php/Talks_and_workshops#Joernchen.2C_Astera_.26_Mumpi_-_DJ_Workshop_.282h.29 DJ Workshop]
 
|"Cyberwar" : Not What We Were Expecting ([http://2012.brucon.org/index.php/Talks_and_workshops#Josh_Corman_and_Jericho_-_.22Cyberwar.22_:_Not_What_We_Were_Expecting Josh Corman & Jericho])
 
|Streaming from Westvleteren
 
|
 
|
 
|
 
|-
 
!|20:30
 
|[http://2012.brucon.org/index.php/Talks_and_workshops#Joernchen.2C_Astera_.26_Mumpi_-_DJ_Workshop_.282h.29 DJ Workshop]
 
|Recent Advances in IPv6 Security ([http://2012.brucon.org/index.php/Talks_and_workshops#Fernando_Gont_-_Recent_Advances_in_IPv6_Security Fernando Gont])
 
|Streaming from Westvleteren
 
|
 
|
 
|
 
|-
 
!|21:30
 
|Close
 
|
 
|
 
|
 
|
 
|
 
|-
 
!|22:00
 
|Doors closed
 
|
 
|
 
|
 
|
 
|
 
|-
 
|}
 
  
==Day 2 : Friday September 27th==
 
{| border="1px solid" style="text-align:center;"
 
|- bgcolor="#CCCCCC"
 
!|Time
 
!|Lounge
 
!|Westvleteren (main track)
 
!|Westmalle (workshops)
 
!|Orval (@Pand)
 
!|La Trappe
 
|- bgcolor="#CCCCCC"
 
!|9:00
 
|Breakfast
 
|
 
|
 
|
 
|
 
|-
 
!|10:00
 
|
 
|We have you by the gadgets ([http://2012.brucon.org/index.php/Talks_and_workshops#Mickey_Shkatov_-_we_have_you_by_the_gadgets Mickey Shkatov])
 
|Streaming from Westvleteren
 
|
 
|
 
|-
 
!|11:00
 
|
 
|Introducing the Smartphone Penetration Testing Framework ([http://2012.brucon.org/index.php/Talks_and_workshops#Georgia_Weidman_-_Introducing_the_Smartphone_Penetration_Testing_Framework Georgia Weidman])
 
| rowspan="2" |Windows x64: The Essentials ([http://2012.brucon.org/index.php/Talks_and_workshops#Didier_Stevens_-_Windows_x64:_The_Essentials_.282h.29 Didier Stevens])
 
| rowspan="2" | [http://2012.brucon.org/index.php/Talks_and_workshops#Walter_Belgers_.28TOOOL.29_-_Lockpicking TOOOL (lockpicking)]
 
| rowspan="2" | The Hex Factor (continuously)
 
|-
 
!|12:00
 
|
 
|
 
|- bgcolor="#CCCCCC"
 
!|13:00
 
|Lunch
 
|
 
|
 
|
 
|
 
|-
 
!|14:00
 
|
 
|HTML5 - A Whole New Attack Vector ([http://2012.brucon.org/index.php/Talks_and_workshops#Robert_McArdle_-_HTML5_-_A_Whole_New_Attack_Vector Robert McArdle])
 
|[http://2012.brucon.org/index.php/Lightning_Talks Lightning talks]
 
| rowspan="2" |Hacking with Python ([http://2012.brucon.org/index.php/Talks_and_workshops#Vivek_Ramachandran_-_Hacking_with_Python_.282hr.29 Vivek Ramachandran])
 
| rowspan="2" |Build a quadrifilar helix antenna and use rtl-sdr to listen to NOAA weather satellites ([http://2012.brucon.org/index.php/Talks_and_workshops#fbz_-_Hardware_Hacking fbz])
 
|-
 
!|15:00
 
|
 
|A Million Mousetraps: Using Big Data and Little Loops to Build Better Defenses ([http://2012.brucon.org/index.php/Talks_and_workshops#Allison_Miller_-_A_Million_Mousetraps:_Using_Big_Data_and_Little_Loops_to_Build_Better_Defenses Allison Miller])
 
|Hiring! Looking for volunteer Cyber FireFighters and Innovative Cyber Security Measures ([http://2012.brucon.org/index.php/Talks_and_workshops#LSEC_-_Hiring.21_Looking_for_volunteer_Cyber_FireFighters_and_Innovative_Cyber_Security_Measures LSEC])
 
|- bgcolor="#CCCCCC"
 
!|16:00
 
|Coffee break
 
|
 
|
 
|
 
|
 
|-
 
!|16:30
 
|
 
|Uncovering SAP vulnerabilities: dissecting and breaking the Diag protocol ([http://2012.brucon.org/index.php/Talks_and_workshops#Martin_Gallo_-_Uncovering_SAP_vulnerabilities:_dissecting_and_breaking_the_Diag_protocol Martin Gallo])
 
| rowspan="2" |Advanced Chrome Extension Exploitation ([http://2012.brucon.org/index.php/Talks_and_workshops#Kyle_.27Kos.27_Osborn_.26_Krzysztof_Kotowicz_-_Advanced_Chrome_Extension_Exploitation_.282h.29 Kyle Osborn & K. Kotowicz])
 
| rowspan="2" |The PANIC Project ([http://2012.brucon.org/index.php/Talks_and_workshops#Biosshadow.2C_Matt_Erasmus.2C_Benson_-_The_PANIC_Project Biosshadow, Matt Erasmus & Benson])
 
|
 
|-
 
!|17:30
 
|
 
|Keynote ([http://2012.brucon.org/index.php/Talks_and_workshops#.28Keynote.29_Ed_Skoudis_-_Letting_Loose_the_Dogs_of_.28cyber.29_War Ed Skoudis])
 
|
 
|- bgcolor="#CCCCCC"
 
!|18:30
 
|Dinner
 
|
 
|
 
|
 
|
 
|-
 
!|19:30
 
|
 
|New flaws in WPA-TKIP ([http://2012.brucon.org/index.php/Talks_and_workshops#Mathy_Vanhoef_-_New_flaws_in_WPA-TKIP Mathy Vanhoef])
 
| rowspan="2" | Streaming from Westvleteren
 
|
 
|
 
|-
 
!|20:30
 
|
 
|How I met your pointer (Hijacking client software for fuzz and profit) ([http://2012.brucon.org/index.php/Talks_and_workshops#Carlos_Garcia_-_How_I_met_your_pointer_.28Hijacking_client_software_for_fuzz_and_profit.29 Carlos Garcia Prado])
 
|
 
|
 
|-
 
!|21:30
 
|Close
 
|
 
|
 
|
 
|
 
|-
 
!|22:00
 
|Doors closed
 
|
 
|
 
|
 
|
 
|-
 
|}
 
  
-->
+
Final times for talks are still being finalised.

Latest revision as of 13:33, 18 October 2016

The completed schedule is available on http://sched.brucon.org/grid-full


General Information

  • Registrations start at 8h30!
  • Typically workshops run for 2 consecutive speaking slots (ca. 2 hours), but some of them are even longer
  • Workshop rooms in the location Novotel Ghent (Orval, Chimay, La Trappe) are 5 minutes walking from the main venue
  • Workshop seats are limited. Reserved seats get in until 5 min before the workshop. After that it is first come, first in.
  • Read our important instructions on how to use SCHED.org!
  • This schedule is subject to change, check back regularly.

Talks:

* Building a Successful Internal Adversarial Simulation Team - Chris Nickerson and Chris Gates
* What Does the Perfect Door or Padlock Look Like? - Deviant Ollam
* New Adventures in Active Defense, Offensive Countermeasures and Hacking Back - John Strand
* NO EASY BREACH:Challenges and Lessons Learned from an Epic Investigation - Matthew Dunwoody
* Decepticon The Rise and Evolution of an Intelligent Evil Twin…!!! - Rushikesh Nandedkar, Amrita Iyer and Krishnakant Patil
* Hello to the Dark Side: Understanding YOUR Adversaries without All Those Expensive Threat Intel Tools" - L. Grecs
* Security through design - Making security better by designing for people - Jelle Niemantsverdriet
* Esoteric Web Application Vulnerabilities - Andres Riancho
* Invoke-Obfuscation: PowerShell obFUsk8tion Techniques - Daniel Bohannon
* Virtual Terminals, POS Security and becoming a billionaire overnight - Grigorios Fragkos
* Hacking KPN: Lessons from the trenches - Jeremy Goldstein and Bouke van Laethem
* Scraping leaky browsers for fun and passwords - Stefaan Truijen, Adrian Toma
* Smart Sheriff, Dumb Idea. The wild west of government assisted parenting - Abraham Aranguren, and Fabian Fäßler
* Anti-Forensics AF - DualCore


Workshops:

* The Control Things Workshop - Justin Searle
* Hacking The Enterprise - Nathan Magniez and Wim Remes
* Brewcon - Chris Lytle
* Hunting Malware with osquery at scale - Erik Waher, Jackie Bow, and Nick Anderson
* Analyzing Malicious Office Documents - Didier Stevens
* Incident Response Workshop - Maxim Deweerdt and Erik Van Buggenhout
* Crowdsourced Malware Triage - Sergei Frankoff and Sean Wilson
* How to securely build your own IoT enabling embedded systems - Jens Devloo, Jean-Georges Valle and Vito Rallo
* 802.11 Leakage: How passive interception leads to active exploitation - Solomon Sonya
* Putting a lock around your containers with Docker Security Primitives - Nils De Moor


Final times for talks are still being finalised.