• Tuesday, August 6
  • Windows Breakout and Privilege Escalation

    Rohan Durve
    Tue, 08:00 - 17:55
    Training Ground
  • Malware Traffic Analysis Workshop

    Brad Duncan
    Tue, 08:00 - 17:55
    Training Ground
  • Reverse Engineering Android Apps

    Elizabeth Biddlecome, Sam Bowne
    Tue, 08:00 - 11:55
    Training Ground
  • Knowing the Unknown: Using PCAP to Break Down Application-Layer Protocols

    David Pearson
    Tue, 08:00 - 11:55
    Training Ground
  • Hands-on: How to Use CALDERA's Chain Mode

    David Hunt, Alexander Manners
    Tue, 14:00 - 17:55
    Training Ground
  • Active Directory security: 8 (very) low hanging fruits and how to smash those attack paths

    Nicolas Daubresse, Remi Escourrou
    Tue, 14:00 - 17:55
    Training Ground
  • Wednesday, August 7
  • Hacking the STORM

    Kevin King, Justin Whitehead
    Wed, 08:00 - 17:55
    Training Ground
  • Using Wireshark for Incident Response and Threat Hunting

    Michael Wylie
    Wed, 08:00 - 17:55
    Training Ground
  • Introduction to Cryptographic Attacks

    Matt Cheung
    Wed, 08:00 - 11:55
    Training Ground
  • Linux Hardening - The Easy Way

    Guy Barnhart-Magen
    Wed, 08:00 - 11:55
    Training Ground
  • Tournament: The Ultimate Secure Coding Throw Down

    Steve Allor, Jim Manico
    Wed, 08:00 - 11:55
    Training Ground
  • Finding Evil with Mitre ATT&CK and the Elastic Stack

    Kent Brake, Matteo Rebeschini
    Wed, 14:00 - 17:55
    Training Ground
  • Pentesting ICS 102

    Arnaud Soullie, Alexandrine Torrents
    Wed, 14:00 - 17:55
    Training Ground
  • Hands on Hacking The OWASP TOP 10 and beyond

    Christopher Simon Hanlon
    Wed, 14:00 - 17:55
    Training Ground