DerbyCon 2.0 - The Reunion - Friday, September 28
12:00
Opening Ceremony
12:30
Moss
TBA
13:30
Moore
The Wild West
14:30
Kaminsky
Black Ops
16:00
Zatko
Cyber Fast Track: from the trenches
18:00
Street
Securing the Internet: YOU’re doing it wrong. (An INFOSEC Intervention)
Scott
Rescuing the Prince of Persia from the Sands of Time
Marcus
2FA-Enabled Fraud: Dissecting Operation High Roller
Los
House of Cards
Brockway
Business Ramifications of Internet’s unclean conflicts
18:30
Santana
How I Owned Your Vending Machine
19:00
Fuller, Gates, Mudge
Dirty Little Secrets Part 2
Hadnagy
Nonverbal Human Hacking
Farina
The Hacker Ethos meets The FOSS Ethos
Daniel
How screwed are we?
Crowley, Savage
The Patsy Proxy: Getting others to do your dirty work
19:30
Krypt3ia, Los, Pilkington, Robert, Sverdlik
BYOD: “Bring Your Own Doom or Sane Business Decision?”
20:00
Amit
SexyDefense – The Red Team tore you a new one. NOW WHAT?
egyp7
Privilege Escalation with the Metasploit Framework
Pesce, Wigley
Hacking Survival: So. You want to compute post-apocalypse?
Arlen
Doubt – Deceit – Deficiency and Decency – a Decade of Disillusionment
Wrightson
The Art and Science of Hacking Any Target
20:30
Behrens, Toews
Rapid Blind SQL Injection Exploitation with BBQSQL
21:00
Perez
DNS Reconnaissance
Gaudet
Pentesting for non-pentesters: learning through virtual machines
Linn, Ryan
Collecting Underpants To Win Your Network
Gamblin
Is it time for another firewall or a security awareness program?
DerbyCon 2.0 - The Reunion - Saturday, September 29
09:00
Campbell, Duckwall
“Puff, Puff, Pass: Getting the Most Out of Your Hash” An Intro to Linux Post-Exploitation Fun With Windows Hashes
Hayes, Rangarajan
Building Security into your Mobile Application
Schearer
Flex Your Rights: The Constitution & Political Activism in the Hacker Community
Domas
The Future of RE: Dynamic Binary Visualization
Young
ISO8583: How to pentest when given a target that is not your “normal” target.
09:30
Richards
Android in the Healthcare Workplace: A Case Study
10:00
Harbinger
Social Engineering Defense Contractors on LinkedIN & Facebook: Who’s plugged in to your employees?
int0x80
Moar Anti-Forensics – Moar Louise
Smith
Penetration Testing from a Hot Tub Time Machine
Eston, Johnson
Social Zombies: Rise of the Mobile Dead
Siegel
Nice to Meet You
10:30
Haywood
Introduction to Metasploit Post Exploitation Modules
11:00
Long
The Evolution of HFC
Potter
Security Epistemology: Beliefs, Truth, and Knowledge in the Infosec Community
Nickerson
Tactical Surveillance: Look at me now!
Jezorek, Sverdlik, Yerrid
It’s Not Your Perimeter, It’s You That Sucks!
Tomes
Next Generation Web Reconnaissance
11:30
Cowen
Running a successful Red Team
13:00
Fasel
Pwned in 60 Seconds, From Network Guest To Windows Domain Admin
More
Pen Testing Security Vendors
Murdock
How to create a one man SOC
Heiland
Format String Vulnerabilities 101
Profanick
Managed Service Providers: Pwn One and Done
13:30
Seely
CounterSploit! (MSF as a defense platform)
14:00
Elkins
Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
Centore, Gunnoe
Building the Next Generation IDS with OSINT
Gardener, Miller
A Fool’s Game: Building an Awareness & Training Program
Huston
Information Overload, Future Shock, IBM & The Nature of Modern Crime
Robble, Thomas
Off-Grid Communications with Android: Meshing the Mobile World
14:30
Cunningham
Beyond Strings – Memory Analysis during Incident Response
15:00
Atlas
RfCat: subghz or bust!
Haddix
Pentesting iOS Applications
Crowley, Vinecombe
Vulnerability Spidey Sense – Demystifying Pen Testing Intuition
Charles
Security Vulnerability Assessments – Process and Best Practices
Sevey
Ma and Pa Sleep with the Door Unlocked: A Look at Information Security in the Small Business
15:30
Merdinger
Medical Device Security: Current State of the Art
16:00
Weidman
Introducing the Smartphone Pentest Framework
Mauch
Creating A Powerful User Defense Against Attackers
Husted
Everything you wanted to know about Academia (But were too afraid to ask)
Woods
So you got yourself an InfoSec Manager job. Great! Now what?
Fritschie, Khan
We go in over the phone lines, pop the firewall, drop in the hydra and wait for the money” and other movie lines that fail.
16:30
Brown, Hackett
Breaking into Security
17:00
Jones
The Badmin project: (Na-na-nanana Na-na-nanana BADMIN)
Hopper
Hunting Evil
Sempf
What locksport can teach us about security
Howell, Javadi
4140 Ways Your Alarm System Can Fail
17:30
Hughes
Are You HIPAA to the Jive?: How Focus on HIPAA Compliance Over Better Security Practices Hurts Us All
18:00
Osborne
Physical Drive-By Downloads
Burks
Security Onion: Network Security Monitoring in Minutes
Flores
Exploit Development with Ruby – An Intro
DeLaGrange, Wood
SH5ARK ATTACK- taking a byte out of HTML5!
Snoke
An Introduction to Reverse Engineering with Ida Pro Free
18:30
Andress
Doxing and Anti-Doxing: Information Reconnaissance for the Stalker and the Stalked
DerbyCon 2.0 - The Reunion - Sunday, September 30
09:00
Sullivan
Cookie Cadger: Taking Cookie Hijacking To A New Level
Weeks
Ambush – Catching Intruders At Any Point
Marpet
Separating Security Intelligence from Security FUD
Todd, Werby
Building Dictionaries and Destroying Hashes Using Amazon EC2
Cooper
Why Integgroll sucks at Python, and you can too!
09:30
Anderson
Active Directory Reconnaissance, Attacks, and Post-Exploitation
10:00
Asadoorian, Strand
Everything they told me about security was wrong
Mitnick
Ghost in the Wires: The Unbelievable True Story of Kevin Mitnick’s Life as a the World’s Most Wanted Computer Hacker
Mudge
Dirty Red Team Tricks II
Schuetz
Slow Down, Cowpoke: When Enthusiasm Outpaces Common Sense
Compton
Professional Pen Testing and Learning From Your Mistakes
10:30
Hoffecker
Hack Your Way Into A DoD Security Clearance
11:00
Beddome
The Devil's in the Details: A look at bad SE and how to do better
Sverdlik
You Can't Buy Security. Building an Open Sourced Information Security Program
Neulist
Write Your Own Tools With Python!
McGuire
Maturing The Penetration Testing Profession
Garlie, Murrey
Easy Passwords = Easy Break-Ins
11:30
Grecs
PHP Website Security, Attack Analysis, & Mitigations
13:00
James, MacDougall
Using McAfee Secure/TrustGuard as Attack Tools
Presson
Building a Database Security Program
Jenks
Intro to Linux System Hardening, and Applying it to BackTrack Linux
Milam
Becoming Mallory – How to Win Creds and Influence Devices
Magniez
Alice in Exploit Redirection-land – A trip down the rabbit hole
13:30
Thomas
Appearance Hacking 101: The Art of Everyday Camouflage
14:00
Howard
Easy Cracking with NetLM Downgrade Attacks
Tatro
Why Isn’t Everyone Pulling Security, This is Combat
Frisvold
Taming Skynet : Using the Cloud to Automate Baseline Scanning
Dunning, Silvers
Wielding Katana: A Live Security Suite
Pubal
SQL Injection 101
14:30
McIntyre
How I Learned To Stop Worrying and Love the Smart Meter
15:00
Spala, Tóth
Think differently about database hacking
Douglas
Sprinkler: IR
Perry
Current Trends in Computer Law
Isham
SE me, SE you
16:00
Closing Ceremonies


Instructions

This "Old School" schedule is an automatically-generated evolution of a manually-generated hack Darth Null has been using at ShmooCon since 2007. It won't work too well for a large conference, like DEFCON, but for smaller events like ShmooCon or BlackHat DC, it might be useful.

Simply print this out at whatever scale is most helpful to you. For example, for ShmooCon: print at 65%, fold Friday and Sunday back behind Saturday, and laminate, for a two-sided 3" x 4" card that you can keep in your shirt pocket.