• 09:00
  • “Puff, Puff, Pass: Getting the Most Out of Your Hash” An Intro to Linux Post-Exploitation Fun With Windows Hashes

    Chris Campbell, Alva Duckwall
    Sat, 09:00 - 09:50
    Track 1 - Break Me
  • Building Security into your Mobile Application

    Rick Hayes, Karthik Rangarajan
    Sat, 09:00 - 09:50
    Track 2 - Fix Me
  • Flex Your Rights: The Constitution & Political Activism in the Hacker Community

    Michael Schearer
    Sat, 09:00 - 09:50
    Track 3 - Teach Me
  • The Future of RE: Dynamic Binary Visualization

    Christopher Domas
    Sat, 09:00 - 09:50
    Track 4 - The 3-Way
  • ISO8583: How to pentest when given a target that is not your “normal” target.

    David Young
    Sat, 09:00 - 09:25
    Track 5 - Stable Talks
  • 09:30
  • Android in the Healthcare Workplace: A Case Study

    Thomas Richards
    Sat, 09:30 - 09:55
    Track 5 - Stable Talks
  • 10:00
  • Social Engineering Defense Contractors on LinkedIN & Facebook: Who’s plugged in to your employees?

    Jordan Harbinger
    Sat, 10:00 - 10:50
    Track 1 - Break Me
  • Moar Anti-Forensics – Moar Louise

    int0x80
    Sat, 10:00 - 10:50
    Track 2 - Fix Me
  • Penetration Testing from a Hot Tub Time Machine

    Eric Smith
    Sat, 10:00 - 10:50
    Track 3 - Teach Me
  • Social Zombies: Rise of the Mobile Dead

    Tom Eston, Kevin Johnson
    Sat, 10:00 - 10:50
    Track 4 - The 3-Way
  • Nice to Meet You

    James Siegel
    Sat, 10:00 - 10:25
    Track 5 - Stable Talks
  • 10:30
  • Introduction to Metasploit Post Exploitation Modules

    Stephen Haywood
    Sat, 10:30 - 10:55
    Track 5 - Stable Talks
  • 11:00
  • The Evolution of HFC

    Johnny Long
    Sat, 11:00 - 11:50
    Track 1 - Break Me
  • Security Epistemology: Beliefs, Truth, and Knowledge in the Infosec Community

    Bruce Potter
    Sat, 11:00 - 11:50
    Track 2 - Fix Me
  • Tactical Surveillance: Look at me now!

    Chris Nickerson
    Sat, 11:00 - 11:50
    Track 3 - Teach Me
  • It’s Not Your Perimeter, It’s You That Sucks!

    Matt Jezorek, Boris Sverdlik, KC Yerrid
    Sat, 11:00 - 11:50
    Track 4 - The 3-Way
  • Next Generation Web Reconnaissance

    Tim Tomes
    Sat, 11:00 - 11:25
    Track 5 - Stable Talks
  • 11:30
  • Running a successful Red Team

    Dave Cowen
    Sat, 11:30 - 11:55
    Track 5 - Stable Talks
  • 13:00
  • Pwned in 60 Seconds, From Network Guest To Windows Domain Admin

    Zack Fasel
    Sat, 13:00 - 13:50
    Track 1 - Break Me
  • Pen Testing Security Vendors

    Josh More
    Sat, 13:00 - 13:50
    Track 2 - Fix Me
  • How to create a one man SOC

    Jamie Murdock
    Sat, 13:00 - 13:50
    Track 3 - Teach Me
  • Format String Vulnerabilities 101

    Deral Heiland
    Sat, 13:00 - 13:50
    Track 4 - The 3-Way
  • Managed Service Providers: Pwn One and Done

    Damian Profanick
    Sat, 13:00 - 13:25
    Track 5 - Stable Talks
  • 13:30
  • CounterSploit! (MSF as a defense platform)

    John Seely
    Sat, 13:30 - 13:55
    Track 5 - Stable Talks
  • 14:00
  • Simple Security Defense to Thwart an Army of Cyber Ninja Warriors

    Ryan Elkins
    Sat, 14:00 - 14:50
    Track 1 - Break Me
  • Building the Next Generation IDS with OSINT

    Chris Centore, Jason Gunnoe
    Sat, 14:00 - 14:50
    Track 2 - Fix Me
  • A Fool’s Game: Building an Awareness & Training Program

    Bill Gardener, Branden Miller
    Sat, 14:00 - 14:50
    Track 3 - Teach Me
  • Information Overload, Future Shock, IBM & The Nature of Modern Crime

    Brent Huston
    Sat, 14:00 - 14:50
    Track 4 - The 3-Way
  • Off-Grid Communications with Android: Meshing the Mobile World

    Jeff Robble, Josh Thomas
    Sat, 14:00 - 14:25
    Track 5 - Stable Talks
  • 14:30
  • Beyond Strings – Memory Analysis during Incident Response

    J. Brett Cunningham
    Sat, 14:30 - 14:55
    Track 5 - Stable Talks
  • 15:00
  • RfCat: subghz or bust!

    Atlas
    Sat, 15:00 - 15:50
    Track 1 - Break Me
  • Pentesting iOS Applications

    Jason Haddix
    Sat, 15:00 - 15:50
    Track 2 - Fix Me
  • Vulnerability Spidey Sense – Demystifying Pen Testing Intuition

    Dan Crowley, Chris Vinecombe
    Sat, 15:00 - 15:50
    Track 3 - Teach Me
  • Security Vulnerability Assessments – Process and Best Practices

    Kellep Charles
    Sat, 15:00 - 15:50
    Track 4 - The 3-Way
  • Ma and Pa Sleep with the Door Unlocked: A Look at Information Security in the Small Business

    Ryan Sevey
    Sat, 15:00 - 15:25
    Track 5 - Stable Talks
  • 15:30
  • Medical Device Security: Current State of the Art

    Shawn Merdinger
    Sat, 15:30 - 15:55
    Track 5 - Stable Talks
  • 16:00
  • Introducing the Smartphone Pentest Framework

    Georgia Weidman
    Sat, 16:00 - 16:50
    Track 1 - Break Me
  • Creating A Powerful User Defense Against Attackers

    Benjamin Mauch
    Sat, 16:00 - 16:50
    Track 2 - Fix Me
  • Everything you wanted to know about Academia (But were too afraid to ask)

    Nathaniel Husted
    Sat, 16:00 - 16:50
    Track 3 - Teach Me
  • So you got yourself an InfoSec Manager job. Great! Now what?

    John Woods
    Sat, 16:00 - 16:50
    Track 4 - The 3-Way
  • We go in over the phone lines, pop the firewall, drop in the hydra and wait for the money” and other movie lines that fail.

    Gus Fritschie, Nazia Khan
    Sat, 16:00 - 16:25
    Track 5 - Stable Talks
  • 16:30
  • Breaking into Security

    Justin Brown, Frank Hackett
    Sat, 16:30 - 16:55
    Track 5 - Stable Talks
  • 17:00
  • The Badmin project: (Na-na-nanana Na-na-nanana BADMIN)

    Gillis Jones
    Sat, 17:00 - 17:50
    Track 1 - Break Me
  • Hunting Evil

    Bart Hopper
    Sat, 17:00 - 17:50
    Track 2 - Fix Me
  • What locksport can teach us about security

    Bill Sempf
    Sat, 17:00 - 17:50
    Track 3 - Teach Me
  • 4140 Ways Your Alarm System Can Fail

    Keith Howell, Babak Javadi
    Sat, 17:00 - 17:50
    Track 4 - The 3-Way
  • 17:30
  • Are You HIPAA to the Jive?: How Focus on HIPAA Compliance Over Better Security Practices Hurts Us All

    Magen Hughes
    Sat, 17:30 - 17:55
    Track 5 - Stable Talks
  • 18:00
  • Physical Drive-By Downloads

    Kyle Osborne
    Sat, 18:00 - 18:50
    Track 1 - Break Me
  • Security Onion: Network Security Monitoring in Minutes

    Doug Burks
    Sat, 18:00 - 18:50
    Track 2 - Fix Me
  • Exploit Development with Ruby – An Intro

    Rick Flores
    Sat, 18:00 - 18:50
    Track 3 - Teach Me
  • SH5ARK ATTACK- taking a byte out of HTML5!

    Tony DeLaGrange, Jason Wood
    Sat, 18:00 - 18:50
    Track 4 - The 3-Way
  • An Introduction to Reverse Engineering with Ida Pro Free

    Nancy Snoke
    Sat, 18:00 - 18:25
    Track 5 - Stable Talks
  • 18:30
  • Doxing and Anti-Doxing: Information Reconnaissance for the Stalker and the Stalked

    Jason Andress
    Sat, 18:30 - 18:55
    Track 5 - Stable Talks
  • 21:00
  • Party (until 1 am)

     
    Sat, 21:00 - 23:59
    Track 1 - Break Me