Opening Ceremony
Opening Keynote - Presented by Ed Skoudis
DerbyCon Story Time Panel
Dynamic Risk Taking and Social Engineering
Using Next Generation Fuzzing Tools: Fixing Bugs and Writing Memory Corruption Exploits
“How do I detect technique X in Windows?” Applied Methodology to Definitively Answer this Question
To CORS! The cause of, and solution to, your SPA problems!
Not A Security Boundary: Breaking Forest Trusts
Enabling The Future (Panel)
42: The answer to life, the universe, and everything offensive security
kubered - Recipes for C2 Operations on Kubernetes
Testing Endpoint Protection: How Anyone Can Bypass Next Gen AV
Adventures in Azure Privilege Escalation
Breaking & Entering via SDR, or How I defeated Wiegend over UHF/VHF, or your apartment isn't safe...
Assessing IoT Surveillance - Arlo
Next-gen IoT botnets - leveraging cloud implementations for shells on 500k IoTs
Attacking with Automation: How Office 365 automation provides another new risk to the cloud
Quiet Time
Red Team Level over 9000! Fusing the powah of .NET with a scripting language of your choosing: introducing BYOI (Bring Your own Interpreter) payloads.
Active Directory Security: Beyond the Easy Button
Incident response on macOS
I sim(ulate), therefore i catch: enhancing detection engineering with adversary simulation
Adversarial Emulation
Closing Ceremony