• Friday, August 5
  • The History and Evolution of Computer Viruses

     
    Fri, 10:00 - 10:50
    Track 2 - Track 2
  • Physical Memory Forensics for Cache

    Jamie Butler
    Fri, 11:00 - 11:50
    Track 2 - Track 2
  • From Printer To Pwnd: Leveraging Multifunction Printers During Penetration Testing

    Deral Heiland
    Fri, 12:00 - 12:50
    Track 2 - Track 2
  • I'm Your MAC(b)Daddy

    Grayson Lenik
    Fri, 13:00 - 13:50
    Track 2 - Track 2
  • What Time Are You Anyway?

    Michael Robinson
    Fri, 14:00 - 14:50
    Track 2 - Track 2
  • Covert Post-Exploitation Forensics With Metasploit

    Wesley McGrew
    Fri, 15:00 - 15:50
    Track 2 - Track 2
  • Mamma Don't Let Your Babies Grow Up to be Pen Testers

    Patrick Engebretson, Dr. Josh Pauli
    Fri, 16:00 - 16:50
    Track 2 - Track 2
  • Are You In Yet? The CISO's View of Pentesting

    Shrdlu
    Fri, 17:00 - 17:20
    Track 2 - Track 2
  • Gone in 60 Minutes: Stealing Sensitive Data from Thousands of Systems Simultaneously with OpenDLP

    Andrew Gavin
    Fri, 17:30 - 17:50
    Track 2 - Track 2
  • Bosses love Excel, Hackers too.

    Chema Alonso, Juan Garrido
    Fri, 18:00 - 18:50
    Track 2 - Track 2
  • We owe it all to the Hackers

     
    Fri, 19:00 - 19:50
    Track 2 - Track 2
  • Saturday, August 6
  • Don't Drop the SOAP: Real World Web Service Testing for Web Hackers

    Joshua D. Abraham, Tom Eston, Kevin Johnson
    Sat, 10:00 - 10:50
    Track 2 - Track 2
  • Smartfuzzing The Web: Carpe Vestra Foramina

    Justin Engler, Gregory Fleischer, Nathan Hamiel, Seth Law
    Sat, 11:00 - 11:50
    Track 2 - Track 2
  • Web Application Analysis With Owasp Hatkit

    Patrik Karlsson, Martin Holst Swende
    Sat, 13:00 - 13:50
    Track 2 - Track 2
  • Bulletproofing The Cloud: Are We Any Closer To Security?

    Ramon Gomez
    Sat, 14:00 - 14:50
    Track 2 - Track 2
  • Abusing HTML5

    Ming Chow
    Sat, 15:00 - 15:50
    Track 2 - Track 2
  • Getting F***** On the River

    Gus Fritschie, Mike Wright
    Sat, 16:00 - 16:50
    Track 2 - Track 2
  • Network Security Podcast Meetup

     
    Sat, 17:00 - 17:50
    Track 2 - Track 2
  • Big Brother on the Big Screen: Fact/Fiction?

    Nicole Ozer
    Sat, 18:00 - 19:50
    Track 2 - Track 2
  • Sunday, August 7
  • PIG: Finding Truffles Without Leaving A Trace

    Ryan Linn
    Sun, 10:00 - 10:50
    Track 2 - Track 2
  • Port Scanning Without Sending Packets

    Gregory Pickett
    Sun, 11:00 - 11:50
    Track 2 - Track 2
  • Cipherspaces/Darknets: An Overview Of Attack Strategies

    Adrian Crenshaw
    Sun, 12:00 - 12:50
    Track 2 - Track 2
  • Taking Your Ball And Going Home; Building Your Own Secure Storage Space That Mirrors Dropbox's

    Phil Cryer
    Sun, 13:00 - 13:20
    Track 2 - Track 2
  • Steganography and Cryptography 101

    Neil Weitzel
    Sun, 13:30 - 13:50
    Track 2 - Track 2
  • Pervasive Cloaking

    William Manning
    Sun, 14:00 - 14:20
    Track 2 - Track 2
  • Tracking the Trackers: How Our Browsing History Is Leaking into the Cloud

    Brian Kennish
    Sun, 14:30 - 14:50
    Track 2 - Track 2
  • Speaking with Cryptographic Oracles

    Dan Crowley
    Sun, 15:00 - 15:50
    Track 2 - Track 2
  • VDLDS — All Your Voice Are Belong To Us

    Ganesh Devarajan, Don LeBert
    Sun, 16:00 - 16:50
    Track 2 - Track 2
  • Virtualization under attack: Breaking out of KVM

    Nelson Elhage
    Sun, 17:00 - 17:50
    Track 2 - Track 2