• 4
  • 42: The answer to life, the universe, and everything offensive security

    Nick Landers, Will Pearce
    Sat, 09:00 - 09:45
    Track 1
  • A
  • Active Directory Security: Beyond the Easy Button

    Sean Metcalf
    Sun, 11:00 - 11:45
    Track 1
  • Adventures in Azure Privilege Escalation

    Karl Fosaaen
    Sat, 13:00 - 13:45
    Track 1
  • Adventures in systemd injection

    Stuart McMurray
    Sun, 10:00 - 10:30
    Stable Talks
  • Adversarial Emulation

    Bryson Bort
    Sun, 14:00 - 14:45
    Track 1
  • API Keys, Now What?Taking the Pen Test Into the Amazon Cloud

    Jim Shaver
    Sat, 17:00 - 17:45
    Track 2
  • Are you ready to leverage DevSecOps? Get ready and use it for good.

    Nicole Schwartz
    Sat, 16:30 - 17:00
    Stable Talks
  • Assessing IoT Surveillance - Arlo

    Jimi Sebree
    Sat, 15:00 - 15:45
    Track 1
  • Assumed Breach: A Better Model for Penetration Testing

    Mike Saunders
    Sat, 12:00 - 12:45
    Track 3
  • Attacking with Automation: How Office 365 automation provides another new risk to the cloud

    Trent Lo
    Sat, 17:00 - 17:45
    Track 1
  • Automated Dylib Hijacking

    Jimi Sebree
    Fri, 17:30 - 18:00
    Stable Talks
  • Automating Hashtopolis

    EvilMog
    Sun, 13:00 - 13:30
    Stable Talks
  • Azure Sentinel - A first look at Microsoft's SIEM Solution

    Carl Hertz
    Fri, 14:00 - 14:45
    Track 3
  • B
  • Behavioral Security and Offensive Psychology at Scale

    Samantha Davison, Josh Schwartz
    Fri, 15:00 - 15:45
    Track 3
  • BloodHound From Red to Blue

    Mathieu Saulnier
    Fri, 13:00 - 13:45
    Track 3
  • BloodHound: Head to Tail

    Andy Robbins, Rohan Vazarkar
    Sat, 15:00 - 15:45
    Track 2
  • Breaking & Entering via SDR, or How I defeated Wiegend over UHF/VHF, or your apartment isn't safe...

    Tim Shelton
    Sat, 14:00 - 14:45
    Track 1
  • Build your own multi-user password manager using open source software

    Kevin Bong, Michael Vieau
    Sat, 10:00 - 10:30
    Stable Talks
  • Bypassing MacOS Detections With Swift

    Cedric Owens
    Fri, 12:00 - 12:30
    Stable Talks
  • C
  • Catching Cyber Criminals – Investigative techniques to identify modern threat actors and the clues they leave behind during data breaches

    Vinny Troia
    Sat, 09:00 - 09:45
    Track 3
  • Choose Your Own TTX: Redefining the Incident Response Table Top Exercise

    Jamison Budacki
    Sat, 14:30 - 15:00
    Stable Talks
  • Closing Ceremony

     
    Sun, 15:30 - 16:30
    Track 1
  • Collect All the Data - Protect All the Things

    Aaron Rosenmund
    Sat, 09:00 - 09:45
    Track 2
  • COM Hijacking Techniques

    David Tulis
    Sat, 10:00 - 10:45
    Track 3
  • Confessions of an IT / OT Marriage Counselor

    Lesley Carhart
    Sat, 18:00 - 18:30
    Stable Talks
  • Cyber false flags and adversarial counterintelligence, oh my…

    Jacob Williams
    Fri, 17:00 - 17:45
    Track 3
  • D
  • Defeating Next-Gen AV and EDR: Using Old (And New) Tricks on New Dogs

    Steve Eisen, Nick Lehman
    Fri, 15:00 - 15:45
    Track 2
  • DerbyCon Story Time Panel

    Dustin Heywood and others
    Fri, 10:00 - 10:45
    Track 1
  • Designing & building a stealth C2 LDAP channel

    Rindert Kramer
    Fri, 14:00 - 14:30
    Stable Talks
  • Dynamic Risk Taking and Social Engineering

    Chris Hadnagy
    Fri, 12:00 - 12:45
    Track 1
  • E
  • Early Detection Through Deception

    Jason Nester
    Sat, 12:00 - 12:30
    Stable Talks
  • Empathy as a Service to Create a Culture of Security

    Tracy Maleeff
    Sun, 13:00 - 13:45
    Track 2
  • Enabling The Future (Panel)

    Scott Angelo, Kevin Baker, David Kennedy, Jess Walpole
    Fri, 17:00 - 17:45
    Track 1
  • Endpoint Detection Super Powers on the cheap, with Sysmon

    Olaf Hartong
    Sun, 12:00 - 12:30
    Stable Talks
  • F
  • Five Mistakes We Wish Users Would Stop Making

    Amanda Berlin, Lesley Carhart, Chelle Clements, Lee Neely, April C. Wright
    Sat, 16:00 - 16:45
    Track 3
  • Frag, You're It - Hacking Laser Tag

    Eric Escobar
    Sun, 10:30 - 11:00
    Stable Talks
  • Full Steam Ahead: Serverless Hacking 101

    Tal Melamed
    Sat, 15:00 - 15:45
    Track 3
  • G
  • Getting dirty on the CANBUS

    Justin Herman
    Fri, 17:00 - 17:30
    Stable Talks
  • Getting the most out of your covert physical security assessment - A Client’s Guide

    Tim Roberts, Brent White
    Fri, 16:30 - 17:00
    Stable Talks
  • H
  • Hacking Humans: Addressing Vulnerabilities in the Advancing Medical Device Landscape

    Gabrielle Hempel
    Fri, 15:30 - 16:00
    Stable Talks
  • Hacking While Blind.

    Joe B
    Sat, 14:00 - 14:30
    Stable Talks
  • “
  • “How do I detect technique X in Windows?” Applied Methodology to Definitively Answer this Question

    Matthew Graeber
    Fri, 14:00 - 14:45
    Track 1
  • H
  • How to cook a five star meal from the convenience of your hotel room

    Micah K Brown
    Sun, 14:00 - 14:30
    Stable Talks
  • How to Give the Gift That Keeps on Giving - Your Knowledge

    Jason Blanchard
    Sun, 10:00 - 10:45
    Track 2
  • How to Tell the C-Level Their Baby is Ugly

    Heather Smith
    Fri, 17:00 - 17:45
    Track 2
  • Hunting Phish Kits

    Josh Rickard
    Sat, 15:00 - 15:30
    Stable Talks
  • Hunting Webshells: Tracking TwoFace

    Josh Bryant, Robert Falcone
    Sun, 12:00 - 12:45
    Track 3
  • I
  • Improving CACTUSTORCH payloads

    Ryan Linn
    Sun, 13:00 - 13:45
    Track 3
  • Incident response on macOS

    Thomas Reed
    Sun, 12:00 - 12:45
    Track 1
  • Inter-chip communication - Testing end-to-end security on IoT

    Deral Heiland
    Sat, 12:00 - 12:45
    Track 2
  • Invoke-GreatBirdOfCommonKnowledge - Gathering what is scattered with ATT&CK, an Atomic Bird, and a bit of homegrown PowerShell...

    Walter Legowski
    Sun, 09:30 - 10:00
    Stable Talks
  • IPv6 Security Considerations - For When "Just Turn It Off" Isn't Good Enough

    Jason Lewis
    Fri, 12:30 - 13:00
    Stable Talks
  • I PWN thee, I PWN thee not!

    Jayson E. Street
    Fri, 13:00 - 13:45
    Track 2
  • I sim(ulate), therefore i catch: enhancing detection engineering with adversary simulation

    Mauricio Velazco
    Sun, 13:00 - 13:45
    Track 1
  • It Must Be Fancy Bear!

    Xena Olsen
    Fri, 16:00 - 16:30
    Stable Talks
  • K
  • Kerberoasting Revisited

    Will Schroeder
    Sat, 13:30 - 14:00
    Stable Talks
  • kubered - Recipes for C2 Operations on Kubernetes

    Jeff Holden, Larry Suto
    Sat, 10:00 - 10:45
    Track 1
  • L
  • Lying in Wait: Discovering and Exploiting Weaknesses in Automated Discovery Actions

    Jacob Griffith, Timothy Wright
    Sat, 10:00 - 10:45
    Track 2
  • M
  • Metasploit Town Hall Finale

    Pearce Barry, Brent Cook, Matt Kienow, Jeffrey Martin
    Fri, 12:00 - 12:45
    Track 2
  • Modlishka - Is a Mantis Eating 2FA's Lunch?

    Lance Peterman
    Fri, 15:00 - 15:30
    Stable Talks
  • More Quiet Time

     
    Sun, 14:00 - 14:45
    Track 3
  • .
  • .NET Manifesto - Win Friends and Influence the Loader

    Casey Smith
    Sat, 17:30 - 18:00
    Stable Talks
  • N
  • Next-gen IoT botnets - leveraging cloud implementations for shells on 500k IoTs

    Alex Balan
    Sat, 16:00 - 16:45
    Track 1
  • No class, Low Tech, High damage

    Tom Ruff
    Sat, 10:30 - 11:00
    Stable Talks
  • Not A Security Boundary: Breaking Forest Trusts

    Lee Christensen, Will Schroeder
    Fri, 16:00 - 16:45
    Track 1
  • O
  • Offensive Machine Learning for Pentesters and Red Teams

    Tamaghna Basu
    Fri, 13:00 - 13:30
    Stable Talks
  • Old Tools, New Tricks: Hacking WebSockets

    Nick Defoe, Michael Fowl
    Sun, 11:30 - 12:00
    Stable Talks
  • One woman's journey to CISO leveraging Social Engineering

    Kate Mullin
    Sat, 15:30 - 16:00
    Stable Talks
  • Opening Ceremony

     
    Fri, 08:30 - 09:00
    Track 1
  • Opening Keynote - Presented by Ed Skoudis

    Ed Skoudis
    Fri, 09:00 - 09:45
    Track 1
  • P
  • Phishing past Mail Protection Controls using Azure Information Protection (AIP)

    Hans Lakhan, Oddvar Moe
    Fri, 18:00 - 18:30
    Stable Talks
  • PowerShell Security: Looking Back from the Inside

    Lee Holmes
    Fri, 16:00 - 16:45
    Track 3
  • Practical Heuristic Exploitation

    Kelly Villanueva
    Sat, 14:00 - 14:45
    Track 3
  • Prepare to Be Boarded! A Tale of Kubernetes, Plunder, and Cryptobooty

    James Condon
    Sat, 09:30 - 10:00
    Stable Talks
  • Product Security Shouldn't be Painful

    Wim Remes
    Sun, 11:00 - 11:45
    Track 3
  • Python Two birds with one stone

    Andy Cooper
    Sun, 09:00 - 09:30
    Stable Talks
  • Q
  • Quiet Time

     
    Sun, 09:00 - 09:45
    Track 1
  • R
  • Red Team Level over 9000! Fusing the powah of .NET with a scripting language of your choosing: introducing BYOI (Bring Your own Interpreter) payloads.

    Marcello Salvati
    Sun, 10:00 - 10:45
    Track 1
  • Red Team Methodology: A Naked Look

    Jason Lang
    Sat, 16:00 - 16:45
    Track 2
  • REST in Peace: Abusing GraphQL to Attack Underlying Infrastructure

    Matthew Szymanski
    Sat, 13:00 - 13:45
    Track 2
  • RFID sniffing, under your nose and in your face!

    Rich Rumble
    Sun, 10:00 - 10:45
    Track 3
  • Rise of the Machines // using machine learning with GRC

    Justin Leapline, Rick Yocum
    Sun, 09:00 - 09:45
    Track 2
  • S
  • SCADA: What the next Stuxnet will look like and how to prevent it

    Joseph Bingham
    Fri, 13:30 - 14:00
    Stable Talks
  • Scientific computing for information security – forging the missing link

    Ryan Elkins
    Fri, 14:00 - 14:45
    Track 2
  • Shadow IT in the Cloud

    Marisa Dyer, Jessica Hazelrigg
    Sat, 17:00 - 17:30
    Stable Talks
  • SharPersist: Windows Persistence Toolkit in C#

    Brett Hawkins
    Sat, 16:00 - 16:30
    Stable Talks
  • Social Engineering in Non-Linear Warfare

    Bill Gardner
    Sun, 13:30 - 14:00
    Stable Talks
  • SS7 for INFOSEC

    Paul Coggin
    Sun, 12:00 - 12:45
    Track 2
  • Still More Quiet Time

     
    Sun, 12:30 - 13:00
    Stable Talks
  • StringSifter: Learning to Rank Strings Output for Speedier Malware Analysis

    Jay Gibble, Matthew Haigh, Michael Sikorski, Philip Tully
    Sat, 13:00 - 13:45
    Track 3
  • Swagger Defense

    Mick Douglas, Pete Petersen
    Sat, 13:00 - 13:30
    Stable Talks
  • T
  • Testing Endpoint Protection: How Anyone Can Bypass Next Gen AV

    Kevin Gennuso
    Sat, 12:00 - 12:45
    Track 1
  • The $19.95 anonymous cyber profile

    Patrick Matthews
    Sat, 09:00 - 09:30
    Stable Talks
  • The “Art” of The BEC - What Three Years of Fighting Has Taught Us

    Ronnie Tokazowski
    Sat, 14:00 - 14:45
    Track 2
  • The Backup Operators Guide to the Galaxy

    Dave Mayer
    Sun, 11:00 - 11:45
    Track 2
  • The Hackers Apprentice

    Mark Baggett
    Fri, 16:00 - 16:45
    Track 2
  • The quest for 10g IDS

    Harold Tabellion
    Sat, 12:30 - 13:00
    Stable Talks
  • There's No Place like (DUAL)Homed.

    David E Young Jr
    Fri, 14:30 - 15:00
    Stable Talks
  • To CORS! The cause of, and solution to, your SPA problems!

    Kevin Cody, Tim Tomes
    Fri, 15:00 - 15:45
    Track 1
  • U
  • Unix: the Other White Meat

    David Boyd, Adam Compton
    Sun, 09:00 - 09:45
    Track 3
  • Using Next Generation Fuzzing Tools: Fixing Bugs and Writing Memory Corruption Exploits

    Jared DeMott, John Stigerwalt
    Fri, 13:00 - 13:45
    Track 1
  • V
  • Virtual Smart Cards for Lab Environments

    Eddie David
    Sun, 14:30 - 15:00
    Stable Talks
  • W
  • Waking up the data engineer in you!

    Jared Atkinson
    Sun, 11:00 - 11:30
    Stable Talks
  • Welcome to the Jumble: Improving RDP Tooling for Malware Analysis and Pentesting

    Émilio Gonzalez, Francis Labelle
    Sun, 14:00 - 14:45
    Track 2
  • Well, what have we here? A year of cyber deception, attribution and making attackers rethink their life choices.

    John Strand
    Fri, 12:00 - 12:45
    Track 3