SEARCH
TOOLBOX
LANGUAGES
Difference between revisions of "Schedule"

Difference between revisions of "Schedule"

From BruCON 2016

Jump to: navigation, search
Line 25: Line 25:
 
| height="26" | 9:00
 
| height="26" | 9:00
 
| rowspan="2" | [[Presentations#Trusted_Cryptography | Trusted Cryptography]]
 
| rowspan="2" | [[Presentations#Trusted_Cryptography | Trusted Cryptography]]
| rowspan="4" | Digital ID #1
+
| rowspan="4" | [[Workshops#Digital_ID | Digital ID #1]]
| rowspan="4" | Physical Locks #1
+
| rowspan="4" | [[Workshops#Physical_locks_by_Toool | Physical Locks #1]]
 
| rowspan="2" | [[Presentations#Social_engineering_for_penetration_testers  | Social engineering for penetration testers]]
 
| rowspan="2" | [[Presentations#Social_engineering_for_penetration_testers  | Social engineering for penetration testers]]
| rowspan="4" | Arduino Workshop #2
+
| rowspan="4" | [[Workshops#Arduino:_how_we_made_the_beerduino | Arduino Workshop #2]]
| rowspan="4" | Wireless Security #2
+
| rowspan="4" | [[Workshops#Wireless_auditing | Wireless Security #2]]
  
 
|- style="font-size:11pt" align="center"
 
|- style="font-size:11pt" align="center"
Line 54: Line 54:
 
| height="29" | 11:30
 
| height="29" | 11:30
 
| rowspan="2" | [[Presentations#How_to_prepare.2C_coordinate_and_conduct_a_cyber_attack | How to prepare, coordinate and conduct a cyber attack]]
 
| rowspan="2" | [[Presentations#How_to_prepare.2C_coordinate_and_conduct_a_cyber_attack | How to prepare, coordinate and conduct a cyber attack]]
| rowspan="4" | Arduino Workshop #1
+
| rowspan="4" |[[Workshops#Arduino:_how_we_made_the_beerduino | Arduino Workshop #1]]
| rowspan="4" | JTAG Workshop #1
+
| rowspan="4" | [[Workshops#JTAG| JTAG Workshop #1]]
 
| rowspan="2" | [[Presentations#A_new_web_attack_vector:_Script_Fragmentation |  A new web attack vector: Script Fragmentation]]
 
| rowspan="2" | [[Presentations#A_new_web_attack_vector:_Script_Fragmentation |  A new web attack vector: Script Fragmentation]]
| rowspan="4" | Digital ID #2
+
| rowspan="4" |  [[Workshops#Digital_ID | Digital ID #2]]
| rowspan="4" | VOIP #2
+
| rowspan="4" | [[Workshops#Auditing_VOIP | VOIP #2]]
  
 
|- style="font-size:11pt" align="center"
 
|- style="font-size:11pt" align="center"
Line 89: Line 89:
 
| rowspan="2" | [[Lightning_Talks#Lightning_talks_day_1| Lightning Talks #1]]
 
| rowspan="2" | [[Lightning_Talks#Lightning_talks_day_1| Lightning Talks #1]]
 
| rowspan="2" | [[Open_Source_Information_Gathering | Open Source Information Gathering]]
 
| rowspan="2" | [[Open_Source_Information_Gathering | Open Source Information Gathering]]
| rowspan="4" | JTAG Workshop #2
+
| rowspan="4" | [[Workshops#JTAG| JTAG Workshop #2]]
 +
 
 
| rowspan="2" |[[Lightning_Talks#Lightning_talks_day_2| Lightning Talks #2]]
 
| rowspan="2" |[[Lightning_Talks#Lightning_talks_day_2| Lightning Talks #2]]
  
Line 118: Line 119:
 
| height="40" | 17:00
 
| height="40" | 17:00
 
| rowspan="2" | [[Presentations#Knowing_Me_Knowing_You_.28The_dangers_of_social_networks.29 | Knowing Me Knowing You (The dangers of social networks)]]
 
| rowspan="2" | [[Presentations#Knowing_Me_Knowing_You_.28The_dangers_of_social_networks.29 | Knowing Me Knowing You (The dangers of social networks)]]
| rowspan="4" | Wireless Security #1
+
| rowspan="4" |  [[Workshops#Wireless_auditing | Wireless Security #1]]
| rowspan="4" | VOIP #1
+
| rowspan="4" |  [[Workshops#Auditing_VOIP | VOIP #1]]
 +
 
 
| rowspan="2" | [[Presentations#Transition_to_IPv6_on_the_Internet:_Threats_and_Mitigation_Techniques | Transition to IPv6 on the Internet: Threats and Mitigation Techniques]]
 
| rowspan="2" | [[Presentations#Transition_to_IPv6_on_the_Internet:_Threats_and_Mitigation_Techniques | Transition to IPv6 on the Internet: Threats and Mitigation Techniques]]
| rowspan="4" | Physical Locks #2
+
| rowspan="4" |  [[Workshops#Physical_locks_by_Toool | Physical Locks #2]]
 
| rowspan="4" | TBD
 
| rowspan="4" | TBD
  

Revision as of 12:17, 2 July 2009

  • Wednesday 16/09 - Thursday 17/09: see Training
  • Friday 18/09 - Saturday 19/09: Workshops + Presentations + Lightning Talks

Conference doors and registration will be open at 8:00 on Friday

Click here to see the complete Alphabetical list of speakers
Click here to see the complete Alphabetical list of presentations

Schedule

Hour Speaker Track Workshop Track #1 Workshop Track #2 Speaker Track Workshop Track #1 Workshop Track #2
9:00 Trusted Cryptography Digital ID #1 Physical Locks #1 Social engineering for penetration testers Arduino Workshop #2 Wireless Security #2
9:30
10:00 SQL Injection - how far does the rabbit hole go? “I am walking through a city made of glass and I have a bag full of rocks” (Dispelling the myths and discussing the facts Global Cyber-Warfare)
10:30
11:00 Break Break Break Break Break Break
11:30 How to prepare, coordinate and conduct a cyber attack Arduino Workshop #1 JTAG Workshop #1 A new web attack vector: Script Fragmentation Digital ID #2 VOIP #2
12:00
12:30 Malicious Markup - I thought you were my friend - cycle 3 Botnets, Ransomware, Malware, and Stuff!
13:00
13:30 Lunch Lunch Lunch Lunch Lunch Lunch
14:00
14:30 Rage Against The Kiosk TBD Lightning Talks #1 Open Source Information Gathering JTAG Workshop #2 Lightning Talks #2


15:00
15:30 All Your Packets Are Belong to Us - Attacking Backbone Technologies TBD Red and Tiger Team TBD
16:00
16:30 Break Break Break Break Break Break
17:00 Knowing Me Knowing You (The dangers of social networks) Wireless Security #1 VOIP #1 Transition to IPv6 on the Internet: Threats and Mitigation Techniques Physical Locks #2 TBD
17:30
18:00 Building Hackerspaces Everywhere The Frogs Who Desired A King: A Virtualization and Cloud Computing Security Fable Set To Interpretive Dance
18:30
19:00 Dinner Break Dinner Break Dinner Break Dinner Break Dinner Break Dinner Break
19:30
20:00 Auction Auction Auction Brucon Afterparty Brucon Afterparty Brucon Afterparty
20:30
21:00      
21:30      
22:00      
22:30      
23:00      
23:30      
0:00