BSidesLV 2015 - Tuesday, August 4
08:30
Albright, Trost
Deploying, Managing, and Leveraging Honeypots in the Enterprise using Open Source Tools
Soullié
Pentesting PLCs 101
10:00
Graham, Nather
(Un)Keynote: INCITE CLUB: WendyLady vs. ErrataRob or, “Fly THIS Sideways!”
11:00
Bitton, Yavo
Injection on Steroids: Code-less Code Injections and 0-Day Techniques
Ellis
Barely Legal: the Hacker’s Guide to Cybersecurity Legislation
Bassett
Verum - How Skynet Started as a Context Graph
Smith
Practical Application Whitelisting Evasion
Thorsheim
A Security/Usability Review of Wordpress 2FA Plugins
St. Vincent
Speaking Metrics to Executives
Foss
Underground Wi-Fi Hacking for Web Pentesters
Corman, Percoco
I Am The Cavalry Track Introduction and Overview
11:30
Rioux, Wysopal
The story of L0phtCrack
Johnson
Dropping hell0days: Business Interaction for Security Professionals - Or Anyone Else
Elazari
Hack the Future
12:00
Butterick, Ishiguro, Nelson, Wasti
Getting the data out using social media
Sancho
When steganography stops being cool
Pustell
Practice Safe Cyber: The Miseducation of American Students on Internet Safety
Nickerson
Leading in a "Do"-ocracy
14:00
Fawaz, Rogers, Rogers
An introduction of the Kobra, a client for the Badger version 2.0, providing tactical situational awareness, physical tampering protection, and automatic process mitigation
Steele
Pentesting with Docker
Bowne
Violent Python
Chapman
Exploit Kit Shenanigans: They’re Cheeky!
Schwartau
Analogue Network Security
Herley
Pushing on String: Adventures in the 'Don't Care' Regions of Password Strength
Young
The Internet of ... Mainframes?! WTF?
Jernigan, Sorensen
Check That Certificate
Healey
#radBIOS: Wireless networking with audio
Erven, Woods
State of Medical Device Cyber Safety
14:30
Vandenaweele
The Journey To ICS
Erven, Woods
How can we ensure safer Medical Devices?
15:00
Leibowitz
NSA Playset: Bridging the Airgap without Radios
Friedman
Don’t hate the Disclosure, Hate the Vulnerability: How the government is bringing researchers and vendors together to talk vulnerability disclosure.
Corpron, Redman
What would fix passwords? Some weekly password audits. Pretty graphs to prove it! (A Haiku)
Baggett, Douglas
What's New Pussycat: Recent Improvements to Powercat
Gershman
Catching Linux Post-Exploitation with Auditd
Sweet
I Amateur Radio (And So Can You!)
15:30
Cuthbert, Heinrich
Breachego
Louden
Adding +10 Security to Your Scrum Agile Environment
16:00
Handorf, Handorf (II), Handorf (III)
How to WCTF
17:00
Rodzon
How Portal Can Change Your Security Forever
Bratus, Torrey
Crema: A LangSec-inspired Language
Sweet
Hacking Our Way Into Hacking
Løge
Tell Me Who You Are, and I Will Tell You Your Lock Pattern
koivisto
Fight back – raising awareness @infosec
Corman, Smith
State of Automotive Cyber Safety
17:30
Novella
Scrutinizing WPA2 Password Generating Algorithms in Wireless Routers
Kartsioukas
What the heck is this radio stuff, anyway?
Corman, Nickerson
How can we ensure safer Automobiles?
18:00
Merrill
Your Electronic Device, Please: Understanding the Border Search Exception & Electronic Devices
Biasini
Angler Lurking in the Domain Shadows
Chio
Making & Breaking Machine Learning Anomaly Detectors in Real Life
Egan
Poppin' (Digital) Locks
Corman, Daniel, McKeay, p0lr, Sumner, Thomas
Stress, Burnout, Rinse, Repeat
Davison
SIEMple technology
18:30
Dulkin
Privileges in the Real World: Securing Password Management
Pidawekar
How I learnt hacking in highschool
BSidesLV 2015 - Wednesday, August 5
08:30
Kochkov, Morin
Radare2 an open source reverse engineering framework
Koniaris
You Hack, We Capture: Attack Analysis with Honeypots
10:00
Ballenthin, Graeber, Teodorescu
WhyMI so Sexy? WMI Attacks, Real-Time Defense, and Advanced Forensic Analysis
Gritzo
A hackers guide to using the YubiKey - how to add inexpensive 2-factor authentication to your next project.
Pevzner, Reich
Have I seen you before?
Fenton
Security Questions Considered Harmful
Gandrud, Wass
All You Need Is One: A ClickOnce Love Story
Tazz
ZOMG It's OSINT Heaven!
Marpet
Introduction to the Career Track
10:10
Woods
Being the Paid Expert in the Room: Consulting for a Company or On Your Own
10:30
Špaček
I Forgot My Password
Clemenko
Classic Misdirection: Social Engineering to Counter Surveillance
Kinne, Kitchen
WiFi Pineapple: Winning the WiFi Battlefield
Pogue
It’s All Geek to Me
10:50
McClintock
Securing the Everything Store: Challenges, Opportunities and Rewards
11:00
Chapman, Schwartz
TAPIOCA (TAPIOCA Automated Processing for IOC Analysis)
Schwartzberg
Haking the Next Generation
Roytman
Who Watches the Watchers? Metrics for Security Strategy
Paquet
Harvesting Passwords from Source Code, Scripts, and Code Repositories
Soto, Wahle
Bio-Hacking: Implantable chip attack vector
Compton, Gershman
Phishing: Going from Recon to Credentials
11:10
McDonald
Did you make a difference today?
11:30
LeSueur
Social Media in Incident Response Program
Ossmann
Better Spectrum Monitoring with Software Defined Radio
12:00
Mitsunari, Takesako
Backdooring MS Office documents with secret master keys
Hess
Advancing Internet Security Research with Big Data and Graph Databases
Segreti, Ur
Towards Standardizing Comparisons of Password Guessability
Kmetz
Cats and Mice - Ever evolving attackers and other game changerse
14:00
Schroeder, Warner
Building an Empire with PowerShell
Quix0te
Yes, you too can perform daring acts of Live Acquisition.
Bird, Shagla-McKotch
Intro to Data Science for Security
Bowne
Android App Security Auditing
Helming
Open Up A Can of OSINT On 'Em
Zaverucha
Stronger Password-Based Encryption Using I/O Hardness
Crowder
Fishing To Phishing - It’s all about slimy creatures.
Wharton
FAA, FTC, FCC - FU: How Three F'ing Agencies are Shaping Info Sec
Ramachandran
Wi-Door - Bind/Rev Shells for your Wi-Fi
Seeber
All Your RFz Are Belong to Me - Software Defined Radio Exploits
Marpet
Welcome back, Emcee sets tone for the afternoon
14:15
Rides
Interview Role Play
14:30
Thomas
Auth for Encrypted Services with Server Side APT
Miller
+10 Knowledge: Sharing What You Learn For the Benefit of the Everyman.
15:00
Tyers
For love of country: 15 years of Security Clearance Decisions
Purviance
Insider Tricks for Bug Bounty Success
Spilman
Blind Hashing
Althouse
Maximizing Bro Detection
Boone
Software-Defined Radio Signal Processing with a $5 Microcontroller.
15:15
Brezinski
Security Engineering At Amazon
15:30
Birr-Pixton
PBKDF2: Performance Matters
Czub
Embedding Web Apps in MITMProxy Scripts
16:15
Henry
Sue the Fed, Hack your FBI File
16:20
Marpet
Life at a Startup, Tales From the Trenches: The Good, the Bad and the Ugly
16:40
Brand
It’s Not Just Your Answer: Hacking Tech Interviews
17:00
Latter
Remote Access, the APT
Zupo
Rethink, Repurpose, Reuse... Rain Hell
Thomas
No More Fudge Factors and Made-up Shit: Performance Numbers That Mean Something
Hintz
Password Alert by Google
Amit
Actionable Threat Intelligence: ISIS, SuperBall, SuperFish, and your less magical 8-ball
Biswas
What Lurks in the Shadow
Pilkington
Infosec careers, myth vs. reality
17:20
Duren, Sheridan
Some things you just can’t find on Google.
17:30
Burnett
No More Graphical Passwords
Lee
Out of Denial: A 12-Step Program for Recovering Admins
17:40
UcedaVelez
Longevity in InfoSec – Turning Passion into Expertise & Respect
18:00
Asadoorian, Curran
Crash The IoT Train Yourself: Intentionally Vulnerable WRT (IV-WRT)
Sanabria
Why does InfoSec play bass? And other observations about hacker culture.
Mitchell
AI and CND - implications for security in the era of Artificial Intelligence
Marshall
How Secure Are Multi-Word Random Passphrases?
Cardozo, Kayyali, Opsahl
Ask the EFF
Lininger
Why We Can't Have Nice Things: Original Research on Conflict Resolution Styles in Information Security & Risk Management
Allen
Common Mistakes that Engineers make while Interviewing in a “Hot” market
18:30
Pirrwitz, Vantaggiato
Are You Sure That You Still Need Passwords?
Jakubowski
Serial Box - Primer for dealing with Serial and JTAG for basic hardware hacking
19:00
Marpet
Closing remarks and thanks from our Emcee


Instructions

This "Old School" schedule is an automatically-generated evolution of a manually-generated hack Darth Null has been using at ShmooCon since 2007. It won't work too well for a large conference, like DEFCON, but for smaller events like ShmooCon or BlackHat DC, it might be useful.

Simply print this out at whatever scale is most helpful to you. For example, for ShmooCon: print at 65%, fold Friday and Sunday back behind Saturday, and laminate, for a two-sided 3" x 4" card that you can keep in your shirt pocket.