SEARCH
TOOLBOX
LANGUAGES
Difference between revisions of "Schedule"

Difference between revisions of "Schedule"

From BruCON 2016

Jump to: navigation, search
Line 92: Line 92:
 
   padding:0in 5.4pt 0in 5.4pt'>
 
   padding:0in 5.4pt 0in 5.4pt'>
 
   <p class=MsoNormal align=center style='text-align:center'><b><span
 
   <p class=MsoNormal align=center style='text-align:center'><b><span
   lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>Trusted
+
   lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'> [[Presentations#Trusted_Cryptography | Trusted Cryptography]]</span></b></p>
  Cryptography</span></b></p>
 
 
   </td>
 
   </td>
 
   <td width=84 rowspan=2 style='width:63.0pt;border-top:none;border-left:none;
 
   <td width=84 rowspan=2 style='width:63.0pt;border-top:none;border-left:none;
Line 105: Line 104:
 
   background:#CCCCCC;padding:0in 5.4pt 0in 5.4pt'>
 
   background:#CCCCCC;padding:0in 5.4pt 0in 5.4pt'>
 
   <p class=MsoNormal align=center style='text-align:center'><span lang=EN-GB
 
   <p class=MsoNormal align=center style='text-align:center'><span lang=EN-GB
   style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>Lockpicking workshop
+
   style='font-size:9.0pt;font-family:"Verdana","sans-serif"'> [[Workshops#Physical_locks_by_Toool | Lockpicking #1]]</span></p>
  #1</span></p>
 
 
   </td>
 
   </td>
 
   <td width=204 colspan=2 rowspan=2 style='width:153.0pt;border-top:none;
 
   <td width=204 colspan=2 rowspan=2 style='width:153.0pt;border-top:none;
Line 112: Line 110:
 
   padding:0in 5.4pt 0in 5.4pt'>
 
   padding:0in 5.4pt 0in 5.4pt'>
 
   <p class=MsoNormal align=center style='text-align:center'><b><span
 
   <p class=MsoNormal align=center style='text-align:center'><b><span
   lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>Social
+
   lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Presentations#Social_engineering_for_penetration_testers  | Social engineering for penetration testers]]</span></b></p>
  Engineering for Penetration Testers</span></b></p>
 
 
   </td>
 
   </td>
 
   <td width=96 rowspan=4 style='width:1.0in;border-top:none;border-left:none;
 
   <td width=96 rowspan=4 style='width:1.0in;border-top:none;border-left:none;
Line 119: Line 116:
 
   background:#CCCCCC;padding:0in 5.4pt 0in 5.4pt'>
 
   background:#CCCCCC;padding:0in 5.4pt 0in 5.4pt'>
 
   <p class=MsoNormal align=center style='text-align:center'><span lang=EN-GB
 
   <p class=MsoNormal align=center style='text-align:center'><span lang=EN-GB
   style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>Arduino workshop
+
   style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Workshops#Arduino:_how_we_made_the_beerduino | Arduino Workshop #2]]</span></p>
  #2</span></p>
 
 
   </td>
 
   </td>
 
   <td width=84 rowspan=4 style='width:63.0pt;border-top:none;border-left:none;
 
   <td width=84 rowspan=4 style='width:63.0pt;border-top:none;border-left:none;
Line 126: Line 122:
 
   background:#CCCCCC;padding:0in 5.4pt 0in 5.4pt'>
 
   background:#CCCCCC;padding:0in 5.4pt 0in 5.4pt'>
 
   <p class=MsoNormal align=center style='text-align:center'><span lang=EN-GB
 
   <p class=MsoNormal align=center style='text-align:center'><span lang=EN-GB
   style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>Wireless workshop
+
   style='font-size:9.0pt;font-family:"Verdana","sans-serif"'> [[Workshops#Wireless_auditing | Wireless Security #2]]</span></p>
  #2</span></p>
 
 
   </td>
 
   </td>
 
  </tr>
 
  </tr>
Line 147: Line 142:
 
   padding:0in 5.4pt 0in 5.4pt'>
 
   padding:0in 5.4pt 0in 5.4pt'>
 
   <p class=MsoNormal align=center style='text-align:center'><b><span
 
   <p class=MsoNormal align=center style='text-align:center'><b><span
   lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>SQL
+
   lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Presentations#SQL_Injection_-_how_far_does_the_rabbit_hole_go.3F | SQL Injection - how far does the rabbit hole go?]]</span></b></p>
  Injection, how far does the rabbit hole go</span></b></p>
 
 
   </td>
 
   </td>
 
   <td width=84 rowspan=2 style='width:63.0pt;border-top:none;border-left:none;
 
   <td width=84 rowspan=2 style='width:63.0pt;border-top:none;border-left:none;
Line 155: Line 149:
 
   <p class=MsoNormal align=center style='text-align:center'><b><span
 
   <p class=MsoNormal align=center style='text-align:center'><b><span
 
   lang=EN-GB style='font-size:9.0pt;font-family:"Arial","sans-serif";
 
   lang=EN-GB style='font-size:9.0pt;font-family:"Arial","sans-serif";
   color:red'>Hex FACTOR INTRO</span></b></p>
+
   color:red'>[[Challenge | The Hex Factor Intro workshop]]</span></b></p>
 
   </td>
 
   </td>
 
   <td width=204 colspan=2 rowspan=2 style='width:153.0pt;border-top:none;
 
   <td width=204 colspan=2 rowspan=2 style='width:153.0pt;border-top:none;
Line 161: Line 155:
 
   padding:0in 5.4pt 0in 5.4pt'>
 
   padding:0in 5.4pt 0in 5.4pt'>
 
   <p class=MsoNormal align=center style='text-align:center'><b><span
 
   <p class=MsoNormal align=center style='text-align:center'><b><span
   lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>Dispelling
+
   lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Presentations#.E2.80.9CI_am_walking_through_a_city_made_of_glass_and_I_have_a_bag_full_of_rocks.E2.80.9D_.28Dispelling_the_myths_and_discussing_the_facts_Global_Cyber-Warfare.29 | Dispelling the myths and discussing the facts Global Cyber-Warfare]]</span></b></p>
  the myths and discussing the facts of Global Cyber-Warfare</span></b></p>
 
 
   </td>
 
   </td>
 
  </tr>
 
  </tr>
Line 203: Line 196:
 
   padding:0in 5.4pt 0in 5.4pt'>
 
   padding:0in 5.4pt 0in 5.4pt'>
 
   <p class=MsoNormal align=center style='text-align:center'><b><span
 
   <p class=MsoNormal align=center style='text-align:center'><b><span
   lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>How to
+
   lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'> [[Presentations#How_to_prepare.2C_coordinate_and_conduct_a_cyber_attack | How to prepare, coordinate and conduct a cyber attack]]</span></b></p>
  prepare,coordinate and conduct a cyberattack</span></b></p>
 
 
   </td>
 
   </td>
 
   <td width=84 rowspan=4 style='width:63.0pt;border-top:none;border-left:none;
 
   <td width=84 rowspan=4 style='width:63.0pt;border-top:none;border-left:none;
Line 210: Line 202:
 
   background:#CCCCCC;padding:0in 5.4pt 0in 5.4pt'>
 
   background:#CCCCCC;padding:0in 5.4pt 0in 5.4pt'>
 
   <p class=MsoNormal align=center style='text-align:center'><span lang=EN-GB
 
   <p class=MsoNormal align=center style='text-align:center'><span lang=EN-GB
   style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>Arduino workshop
+
   style='font-size:9.0pt;font-family:"Verdana","sans-serif"'> [[Workshops#Arduino:_how_we_made_the_beerduino | Arduino Workshop #1]]</span></p>
  #1</span></p>
 
 
   </td>
 
   </td>
 
   <td width=96 rowspan=4 style='width:1.0in;border-top:none;border-left:none;
 
   <td width=96 rowspan=4 style='width:1.0in;border-top:none;border-left:none;
Line 217: Line 208:
 
   background:#CCCCCC;padding:0in 5.4pt 0in 5.4pt'>
 
   background:#CCCCCC;padding:0in 5.4pt 0in 5.4pt'>
 
   <p class=MsoNormal align=center style='text-align:center'><span lang=EN-GB
 
   <p class=MsoNormal align=center style='text-align:center'><span lang=EN-GB
   style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>Digital ID
+
   style='font-size:9.0pt;font-family:"Verdana","sans-serif"'> [[Workshops#Digital_ID | Digital ID #1]]</span></p>
  workshop #1</span></p>
 
 
   </td>
 
   </td>
 
   <td width=204 colspan=2 rowspan=2 style='width:153.0pt;border-top:none;
 
   <td width=204 colspan=2 rowspan=2 style='width:153.0pt;border-top:none;
Line 224: Line 214:
 
   padding:0in 5.4pt 0in 5.4pt'>
 
   padding:0in 5.4pt 0in 5.4pt'>
 
   <p class=MsoNormal align=center style='text-align:center'><b><span
 
   <p class=MsoNormal align=center style='text-align:center'><b><span
   lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>Script
+
   lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'> [[Presentations#A_new_web_attack_vector:_Script_Fragmentation |  A new web attack vector: Script Fragmentation]]</span></b></p>
  Fragmentation, a new web attack vector</span></b></p>
 
 
   </td>
 
   </td>
 
   <td width=96 rowspan=4 style='width:1.0in;border-top:none;border-left:none;
 
   <td width=96 rowspan=4 style='width:1.0in;border-top:none;border-left:none;
Line 231: Line 220:
 
   background:#CCCCCC;padding:0in 5.4pt 0in 5.4pt'>
 
   background:#CCCCCC;padding:0in 5.4pt 0in 5.4pt'>
 
   <p class=MsoNormal align=center style='text-align:center'><span lang=EN-GB
 
   <p class=MsoNormal align=center style='text-align:center'><span lang=EN-GB
   style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>Digital ID
+
   style='font-size:9.0pt;font-family:"Verdana","sans-serif"'> [[Workshops#Digital_ID | Digital ID #2]]</span></p>
  workshop #2</span></p>
 
 
   </td>
 
   </td>
 
   <td width=84 rowspan=4 style='width:63.0pt;border-top:none;border-left:none;
 
   <td width=84 rowspan=4 style='width:63.0pt;border-top:none;border-left:none;
Line 238: Line 226:
 
   background:#CCCCCC;padding:0in 5.4pt 0in 5.4pt'>
 
   background:#CCCCCC;padding:0in 5.4pt 0in 5.4pt'>
 
   <p class=MsoNormal align=center style='text-align:center'><span lang=EN-GB
 
   <p class=MsoNormal align=center style='text-align:center'><span lang=EN-GB
   style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>VoIP workshop#2</span></p>
+
   style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Workshops#Auditing_VOIP | VOIP #2]]</span></p>
 
   </td>
 
   </td>
 
  </tr>
 
  </tr>
Line 258: Line 246:
 
   padding:0in 5.4pt 0in 5.4pt'>
 
   padding:0in 5.4pt 0in 5.4pt'>
 
   <p class=MsoNormal align=center style='text-align:center'><b><span
 
   <p class=MsoNormal align=center style='text-align:center'><b><span
   lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>Transitioning
+
   lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Presentations#Transition_to_IPv6_on_the_Internet:_Threats_and_Mitigation_Techniques | Transition to IPv6 on the Internet: Threats and Mitigation Techniques]]</span></b></p>
  to Ipv6 on the Internet: Threats and mitigation techniques</span></b></p>
 
 
   </td>
 
   </td>
 
   <td width=204 colspan=2 rowspan=2 style='width:153.0pt;border-top:none;
 
   <td width=204 colspan=2 rowspan=2 style='width:153.0pt;border-top:none;
Line 265: Line 252:
 
   padding:0in 5.4pt 0in 5.4pt'>
 
   padding:0in 5.4pt 0in 5.4pt'>
 
   <p class=MsoNormal align=center style='text-align:center'><b><span
 
   <p class=MsoNormal align=center style='text-align:center'><b><span
   lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>Botnets,
+
   lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'> [[Presentations#Botnets.2C_Ransomware.2C_Malware.2C_and_Stuff.21 | Botnets, Ransomware, Malware, and Stuff!]]</span></b></p>
  Ransomware, Malware and stuff</span></b></p>
 
 
   </td>
 
   </td>
 
  </tr>
 
  </tr>
Line 314: Line 300:
 
   padding:0in 5.4pt 0in 5.4pt'>
 
   padding:0in 5.4pt 0in 5.4pt'>
 
   <p class=MsoNormal align=center style='text-align:center'><b><span
 
   <p class=MsoNormal align=center style='text-align:center'><b><span
   lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>Rage
+
   lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Presentations#Rage_Against_The_Kiosk | Rage Against The Kiosk]]</span></b></p>
  against the kiosk</span></b></p>
 
 
   </td>
 
   </td>
 
   <td width=84 rowspan=4 style='width:63.0pt;border-top:none;border-left:none;
 
   <td width=84 rowspan=4 style='width:63.0pt;border-top:none;border-left:none;
Line 328: Line 313:
 
   background:#CCCCCC;padding:0in 5.4pt 0in 5.4pt'>
 
   background:#CCCCCC;padding:0in 5.4pt 0in 5.4pt'>
 
   <p class=MsoNormal align=center style='text-align:center'><span lang=EN-GB
 
   <p class=MsoNormal align=center style='text-align:center'><span lang=EN-GB
   style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>Lightning Talks #1</span></p>
+
   style='font-size:9.0pt;font-family:"Verdana","sans-serif"'> [[Lightning_Talks#Lightning_talks_day_1| Lightning Talks #1]]</span></p>
 
   </td>
 
   </td>
 
   <td width=204 colspan=2 rowspan=2 style='width:153.0pt;border-top:none;
 
   <td width=204 colspan=2 rowspan=2 style='width:153.0pt;border-top:none;
Line 334: Line 319:
 
   padding:0in 5.4pt 0in 5.4pt'>
 
   padding:0in 5.4pt 0in 5.4pt'>
 
   <p class=MsoNormal align=center style='text-align:center'><b><span
 
   <p class=MsoNormal align=center style='text-align:center'><b><span
   lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>Open
+
   lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Open_Source_Information_Gathering | Open Source Information Gathering]]</span></b></p>
  Source information Gathering</span></b></p>
 
 
   </td>
 
   </td>
 
   <td width=96 rowspan=4 style='width:1.0in;border-top:none;border-left:none;
 
   <td width=96 rowspan=4 style='width:1.0in;border-top:none;border-left:none;
Line 341: Line 325:
 
   background:#CCCCCC;padding:0in 5.4pt 0in 5.4pt'>
 
   background:#CCCCCC;padding:0in 5.4pt 0in 5.4pt'>
 
   <p class=MsoNormal align=center style='text-align:center'><span lang=EN-GB
 
   <p class=MsoNormal align=center style='text-align:center'><span lang=EN-GB
   style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>JTAG workshop</span></p>
+
   style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Workshops#JTAG| JTAG Workshop #2]]</span></p>
 
   </td>
 
   </td>
 
   <td width=84 rowspan=2 style='width:63.0pt;border-top:none;border-left:none;
 
   <td width=84 rowspan=2 style='width:63.0pt;border-top:none;border-left:none;
Line 347: Line 331:
 
   background:#CCCCCC;padding:0in 5.4pt 0in 5.4pt'>
 
   background:#CCCCCC;padding:0in 5.4pt 0in 5.4pt'>
 
   <p class=MsoNormal align=center style='text-align:center'><span lang=EN-GB
 
   <p class=MsoNormal align=center style='text-align:center'><span lang=EN-GB
   style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>Lightning Talks #2</span></p>
+
   style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Lightning_Talks#Lightning_talks_day_2| Lightning Talks #2]]
 +
 
 +
</span></p>
 
   </td>
 
   </td>
 
  </tr>
 
  </tr>
Line 367: Line 353:
 
   padding:0in 5.4pt 0in 5.4pt'>
 
   padding:0in 5.4pt 0in 5.4pt'>
 
   <p class=MsoNormal align=center style='text-align:center'><b><span
 
   <p class=MsoNormal align=center style='text-align:center'><b><span
   lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>All
+
   lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Presentations#All_Your_Packets_Are_Belong_to_Us_-_Attacking_Backbone_Technologies | All Your Packets Are Belong to Us - Attacking Backbone Technologies]]</span></b></p>
  your packets are belong to us – Attacking Backbone Technologies</span></b></p>
 
 
   </td>
 
   </td>
 
   <td width=96 rowspan=2 style='width:1.0in;border-top:none;border-left:none;
 
   <td width=96 rowspan=2 style='width:1.0in;border-top:none;border-left:none;
Line 381: Line 366:
 
   padding:0in 5.4pt 0in 5.4pt'>
 
   padding:0in 5.4pt 0in 5.4pt'>
 
   <p class=MsoNormal align=center style='text-align:center'><b><span
 
   <p class=MsoNormal align=center style='text-align:center'><b><span
   lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>Red and
+
   lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'> [[Presentations#Red_and_Tiger_Team | Red and Tiger Team]]</span></b></p>
  Tiger Team</span></b></p>
 
 
   </td>
 
   </td>
 
   <td width=84 rowspan=2 style='width:63.0pt;border-top:none;border-left:none;
 
   <td width=84 rowspan=2 style='width:63.0pt;border-top:none;border-left:none;
Line 429: Line 413:
 
   padding:0in 5.4pt 0in 5.4pt'>
 
   padding:0in 5.4pt 0in 5.4pt'>
 
   <p class=MsoNormal align=center style='text-align:center'><b><span
 
   <p class=MsoNormal align=center style='text-align:center'><b><span
   lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>Knowing
+
   lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Presentations#Knowing_Me_Knowing_You_.28The_dangers_of_social_networks.29 | Knowing Me Knowing You (The dangers of social networks)]]</span></b></p>
  me, knowing you – The danger of social networks</span></b></p>
 
 
   </td>
 
   </td>
 
   <td width=84 rowspan=4 style='width:63.0pt;border-top:none;border-left:none;
 
   <td width=84 rowspan=4 style='width:63.0pt;border-top:none;border-left:none;
Line 436: Line 419:
 
   background:#CCCCCC;padding:0in 5.4pt 0in 5.4pt'>
 
   background:#CCCCCC;padding:0in 5.4pt 0in 5.4pt'>
 
   <p class=MsoNormal align=center style='text-align:center'><span lang=EN-GB
 
   <p class=MsoNormal align=center style='text-align:center'><span lang=EN-GB
   style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>Wireless workshop
+
   style='font-size:9.0pt;font-family:"Verdana","sans-serif"'> [[Workshops#Wireless_auditing | Wireless Security #1]]</span></p>
  #1</span></p>
 
 
   </td>
 
   </td>
 
   <td width=96 rowspan=4 style='width:1.0in;border-top:none;border-left:none;
 
   <td width=96 rowspan=4 style='width:1.0in;border-top:none;border-left:none;
Line 443: Line 425:
 
   background:#CCCCCC;padding:0in 5.4pt 0in 5.4pt'>
 
   background:#CCCCCC;padding:0in 5.4pt 0in 5.4pt'>
 
   <p class=MsoNormal align=center style='text-align:center'><span lang=EN-GB
 
   <p class=MsoNormal align=center style='text-align:center'><span lang=EN-GB
   style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>VoIP workshop #1</span></p>
+
   style='font-size:9.0pt;font-family:"Verdana","sans-serif"'> [[Workshops#Auditing_VOIP | VOIP #1]]</span></p>
 
   </td>
 
   </td>
 
   <td width=204 colspan=2 rowspan=2 style='width:153.0pt;border-top:none;
 
   <td width=204 colspan=2 rowspan=2 style='width:153.0pt;border-top:none;
Line 449: Line 431:
 
   padding:0in 5.4pt 0in 5.4pt'>
 
   padding:0in 5.4pt 0in 5.4pt'>
 
   <p class=MsoNormal align=center style='text-align:center'><b><span
 
   <p class=MsoNormal align=center style='text-align:center'><b><span
   lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>Malicious
+
   lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Presentations#Malicious_Markup_-_I_thought_you_were_my_friend_-_cycle_3 | Malicious Markup - I thought you were my friend - cycle 3]]</span></b></p>
  Markup I thought you were my friend (cycle 3)</span></b></p>
 
 
   </td>
 
   </td>
 
   <td width=96 rowspan=4 style='width:1.0in;border-top:none;border-left:none;
 
   <td width=96 rowspan=4 style='width:1.0in;border-top:none;border-left:none;
Line 456: Line 437:
 
   background:#CCCCCC;padding:0in 5.4pt 0in 5.4pt'>
 
   background:#CCCCCC;padding:0in 5.4pt 0in 5.4pt'>
 
   <p class=MsoNormal align=center style='text-align:center'><span lang=EN-GB
 
   <p class=MsoNormal align=center style='text-align:center'><span lang=EN-GB
   style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>Lockpicking
+
   style='font-size:9.0pt;font-family:"Verdana","sans-serif"'> [[Workshops#Physical_locks_by_Toool | Lockpicking #2]]</span></p>
  workshop #2</span></p>
 
 
   </td>
 
   </td>
 
   <td width=84 rowspan=4 style='width:63.0pt;border-top:none;border-left:none;
 
   <td width=84 rowspan=4 style='width:63.0pt;border-top:none;border-left:none;
Line 484: Line 464:
 
   padding:0in 5.4pt 0in 5.4pt'>
 
   padding:0in 5.4pt 0in 5.4pt'>
 
   <p class=MsoNormal align=center style='text-align:center'><b><span
 
   <p class=MsoNormal align=center style='text-align:center'><b><span
   lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>Building
+
   lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Presentations#Building_Hackerspaces_Everywhere | Building Hackerspaces Everywhere]]</span></b></p>
  Hackerspaces Everywhere</span></b></p>
 
 
   </td>
 
   </td>
 
   <td width=204 colspan=2 rowspan=2 style='width:153.0pt;border-top:none;
 
   <td width=204 colspan=2 rowspan=2 style='width:153.0pt;border-top:none;
Line 491: Line 470:
 
   padding:0in 5.4pt 0in 5.4pt'>
 
   padding:0in 5.4pt 0in 5.4pt'>
 
   <p class=MsoNormal align=center style='text-align:center'><b><span
 
   <p class=MsoNormal align=center style='text-align:center'><b><span
   lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>The
+
   lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif"'>[[Presentations#The_Belgian_Beer_Lovers_Guide_to_Cloud_Security | The Belgian Beer Lovers Guide to Cloud Security ]]</span></b></p>
  Belgian Beer Lover’s guide to Cloud Security</span></b></p>
 
 
   </td>
 
   </td>
 
  </tr>
 
  </tr>
Line 521: Line 499:
 
   lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif";
 
   lang=EN-GB style='font-size:9.0pt;font-family:"Verdana","sans-serif";
 
   color:white'>DINNER BREAK &amp; </span></b><b><span lang=EN-GB
 
   color:white'>DINNER BREAK &amp; </span></b><b><span lang=EN-GB
   style='font-size:9.0pt;font-family:"Verdana","sans-serif";color:red'>Hex
+
   style='font-size:9.0pt;font-family:"Verdana","sans-serif";color:red'> & Hex
 
   Factor Contest winners</span></b></p>
 
   Factor Contest winners</span></b></p>
 
   </td>
 
   </td>

Revision as of 00:52, 9 September 2009

  • Wednesday 16/09 - Thursday 17/09: see Training
  • Friday 18/09 - Saturday 19/09: Workshops + Presentations + Lightning Talks

Conference doors and registration will be open at 8:00 on Friday

Click here to see the complete Alphabetical list of speakers
Click here to see the complete Alphabetical list of presentations

Schedule

 

Friday 18 September

Saturday 19 September

Hour

Track 1

Track 2

Track 3

Track 1

Track 2

Track 3

09:00

Trusted Cryptography

 

Lockpicking #1

Social engineering for penetration testers

Arduino Workshop #2

Wireless Security #2

09:30

10:00

SQL Injection - how far does the rabbit hole go?

The Hex Factor Intro workshop

Dispelling the myths and discussing the facts Global Cyber-Warfare

10:30

11:00

BREAK

BREAK

11:30

How to prepare, coordinate and conduct a cyber attack

Arduino Workshop #1

Digital ID #1

A new web attack vector: Script Fragmentation

Digital ID #2

VOIP #2

12:00

12:30

Transition to IPv6 on the Internet: Threats and Mitigation Techniques

Botnets, Ransomware, Malware, and Stuff!

13:00

13:30

LUNCH BREAK

LUNCH BREAK

14:00

14:30

Rage Against The Kiosk

Soldering workshop #1

Lightning Talks #1

Open Source Information Gathering

JTAG Workshop #2

Lightning Talks #2

15:00

15:30

All Your Packets Are Belong to Us - Attacking Backbone Technologies

BISI initiative update

Red and Tiger Team

 

16:00

16:30

BREAK

BREAK

17:00

Knowing Me Knowing You (The dangers of social networks)

Wireless Security #1

VOIP #1

Malicious Markup - I thought you were my friend - cycle 3

Lockpicking #2

Soldering workshop #2

17:30

18:00

Building Hackerspaces Everywhere

The Belgian Beer Lovers Guide to Cloud Security

18:30

19:00

DINNER BREAK & EFF AUCTION

DINNER BREAK & & Hex Factor Contest winners

19:30

20:00

Open HackerLounge

BruCON afterPARTY & Happy Hour

21:00

 

 

03:00