DerbyCon V - Unity - Friday, September 25
00:00
Roberts
Security Hopscotch
Webb
HardenedBSD Internals
08:30
Welcome to the Family - Intro
09:00
Harbinger
People Buy You
10:00
Johnson, Kennedy, Moussouris, Nickerson, Skoudis, Strand
Keynote Panel - Information Security Today and in the Future
12:00
Domas
The M/o/Vfuscator - Turning ‘Mov’ into a Soul-crushing RE Nightmare
Maresca
APT Cyber Cloud of the Internet of Things
Holmes
When A Powerful Platform Benefits Both Attackers and Defenders: Secure Enhancements to Scripting Hosts in Windows 10
Viss
How Not to Infosec
Berlin
Shooting Phish in a Barrel and Other Fish Related Puns
12:30
Alexander
Don’t Laugh - I Dare You!
13:00
Scott
And You Shall Know Me By My Trail of Documentation
Brotherston
Stealthier Attacks and Smarter Defending with TLS Fingerprinting
Gough
A Deep Look into a Chinese Advanced Attack - Michael Gough
Hopper
Python for InfoSec
Drapala
Marketers are Friends - Not Food
13:30
Block
Blue Team Starter Kit
14:00
DeMott, Wojtczuk
Gadgets Zoo: Bypassing Control Flow Guard in Windows 10
Foss
Honeypots for Active Defense
Ten, Wu
Pavlovian Security: How to Change the Way Your Users Respond When the Bell Rings
Kuntz
Dog the Freaking (OSINT) Bounty Hunter - Helping Law Enforcement Catch Criminals For (Mostly) Fun - And (Probably No) Profit
Voloch
Simplified SIEM Use Case Management
14:30
Burbage
Bypassing 2Factor Auth with Android Trojans
15:00
Delpy, Duckwall, Metcalf
Red vs. Blue: Modern Active Directory Attacks & Defense
Beddome
Manufactorum Terminatus - The Attack and Defense of Industrial Manufacturers
Man
The State of Information Security Today
Perry
Current Trends in Computer Law
McEvoy
Putting the Management into Vulnerability Management (or - YOU’VE GOT BEARS!!!)
15:30
Shetty
Moving Target Defense - Learning from Hackers
16:00
Beardsley, Cook, Lee, Maloney
Metasploit Town Hall
Cordle, Gardner
High Stake Target: Lo-Tech Attack
Ortega, Wu
Learning Through Mentorship
Herraiz, Whitehead
Spanking the Monkey (or How Pentesters Can Do It Better!)
Lochner, Rogers
Malfunction’s Functions : Automated Static Malware Analysis Using Function Level Signatures
16:30
Brockway
We Owe You Nothing
17:00
Wayne
Red Teaming Enemy of the State
Perez
Operating in the Shadows
Schearer
The Law of Drones
Ajnachakra
On Defending Against Doxxing
Menerick
Backdooring Git
17:30
Saunders
Detecting Phishing Attacks with DNS Reconnaissance
18:00
Finisterre
$helling Out (Getting Root) on a ‘Smart Drone’
Wharton
Getting Started with PowerShell
McNeil, Owen
The Phony Pony: Phreaks Blazed The Way
McIntyre
Practical Windows Kernel Exploitation
White
Hacking Web Apps
18:30
Vann
Sticky Honey Pots
19:00
Compton, Gershman
Phishing: Going from Recon to Creds
Smith, Stone
HackerQue
Coggin
Hijacking Label Switched Networks in the Cloud
Leeth
Top Ten is Old Skool - Meet the New Age of AppSec
19:30
Herman
Cryptography and You
DerbyCon V - Unity - Saturday, September 26
09:00
Schwartz
Pwning People Personally
Tomes
OSINT for AppSec: Recon-ng and Beyond
Branch, McLaughlin
Mobile Application Reverse Engineering: Under the Hood
Miller
Hacking for Homeschoolers
Schwalm
Stacking the Virtual Deck: Attacks by Predicting RNGs
09:30
Aldrich, Holland
Homebrewing for Hackers
10:00
Drake
Stagefright: Scary Code in the Heart of Android
Brown
Hacking Virtual Appliances
Banks, Furham, Strand, Thyer
Introducing the RITA VM: Hunting for Bad Guys on Your Network For Free with Math.
Karmic, Rabczak
Going AUTH the Rails on a Crazy Train
Fuller, Ramsey
Stealthy and Persistent Back Door for Z- Wave Gateways
10:30
Pyorre
Building a Better Honeypot Network
12:00
Hadnagy
Dec0ding Humans Live
Schipp
ISLET: An Attempt to Improve Linux-based Software Training
Street
Breaking in Bad (I’m The One Who Doesn’t Knock)
Halfpap
Bugspray - The 802.15.4 Attack Surface
Scheurer
Surveillance Using Spare Stuff
12:30
Caudill
Crypto 101: An Intro to Real-World Crypto
13:00
Ten
Gray Hat PowerShell
Paul
CyberSecurity Alphabets - Hacker Edition
Sempf
Developers: Care and Feeding
Ramirez
Unbillable: Exploiting Android in App Purchases
Stone
Practical Attacks Against Multifactor
13:30
Schwartzberg
Hacking the Next Generation
14:00
Ballenthin, Graeber, Teodorescu
WhyMI so Sexy? WMI Attacks - Real-Time Defense - and Advanced Forensic Analysis
Los
Losing Battles - Winning Wars - Active Defense Rebooted
Evans
Fingerprinting the Modern Digital Footprint
Brooks, Bryant
Bypass Surgery: Abusing Content Delivery Networks With Server-Side-Request Forgery (SSRF), Flash, and DNS
Segal
The Human Interface Device Attack Vector: Research and Development
14:30
Halfpop
A Survey of Powershell Enabled Malware
15:00
Paul
Hackers vs. Defenders: Can the Defender Ever Stop Playing Catch Up and Win?
Amit, Hutton
Social Media Risk Metrics. When OMGWTFBBQ Meets Risk Algorithms.
Potter
Surviving Your Startup
Thompson
Dynamic Analysis of Flash Files
Berner, Lang
Tool Drop: Free as in Beer
15:30
Foss, Hegal
Tactical Diversion-Driven Defense
16:00
Collao, Erven
Medical Devices: Pwnage and Honeypots
Montgomery, Sevey
Building a Brain for Infosec
Nickerson
Started from the bottom, now I’m here?: How to ruin your life by getting everything you ever wanted
Cano, Kotov
Attacking Packing: Captain Hook Beats Down on Peter Packer
David
Windows 10 Defense in Depth
16:30
Smith
Latest Tools in Automotive Hacking
17:00
Lee
State of the Metasploit Framework
Porter
How to Build Your Own Covert SIGINT Vehicle
Berthaume
Using Windows diagnostics for system compromise
Long, Wanjala
HFC Update
Yost
Ansible. And Why it Works for Me.
17:30
Rikansrud
Learning Mainframe Hacking: Where the Hell Did All My Free Time Go?
18:00
Weeks
Credential Assessment: Mapping Privilege Escalation at Scale
Dorsey
InfoSec Big Picture and Some Quick Wins
Simmons
HARdy HAR HAR HAR: HAR File Collection and Analysis for Malware
Wilson
Intercepting USB Traffic for Attack and Defense
18:30
Veach
Geeks Need Basements!
19:00
Preston
Intro to x86
19:30
Banks, Henmi
Spy Vs. Spy: How to Use Breakable Dependencies to Your Advantage
DerbyCon V - Unity - Sunday, September 27
09:00
Bong, Vieau
Is That a Router in Your Pocket or Are You Trying to P0wn Me?
McCabe
TBD
Rangarajan, Tobin
How I Stopped Worrying and Learned to Love InfraOps
Gabler
PHaaS - Phishing as a Service
Healey
Voltron: Defender of Your Inferiors
09:30
Wartell
Malware is Hard. Let’s Go Shopping!
10:00
Sullivan
The Little-Known Horrors of Web Application Session Management
Leece, Leece
DNS Miner - A Semi-Automatic Incident Response and Threat Intelligence Tool for Small - Over Worked Security Teams
Douglas, Murdock
Blue Team Army - It’s *Your* Network - Defend It!
Robinson
Circles & Boxes - Drawing SecArch into Your Program
Kennedy
The Pentesters Framework
10:30
Lager
Hack My Derby
11:00
Schultz
Practical Hardware Attacks Against Soho Routers & the Internet of Things
Bos, Milam
Invasion of the Hash Snatchers
Wedaa
LongTail SSH Attack Analysis
Pitchford
Disecting Wassenaar
12:30
Schladt
Stretching the Sandbox with Malware Feature Vectors
Pesce
My Password Cracking Brings All the Hashes to the Yard.
Werby
Hunting Unicorns and Jerks - Irrational, Defensible, or Necessary?
Bong, Vieau
Five Hardware Hacking Projects Under $30
13:30
O’Gorman
Gnuradio Demystifying RF Black Magic
Sharpe
Intrusion Hunting for the Masses - A Practical Guide
Ramgattie
The Problems with JNI Obfuscation in the Android Operating System
Heywood
Confessions of a Crypto Cluster Operator
14:30
Closing Ceremonies


Instructions

This "Old School" schedule is an automatically-generated evolution of a manually-generated hack Darth Null has been using at ShmooCon since 2007. It won't work too well for a large conference, like DEFCON, but for smaller events like ShmooCon or BlackHat DC, it might be useful.

Simply print this out at whatever scale is most helpful to you. For example, for ShmooCon: print at 65%, fold Friday and Sunday back behind Saturday, and laminate, for a two-sided 3" x 4" card that you can keep in your shirt pocket.