• 2
  • 2FA-Enabled Fraud: Dissecting Operation High Roller

    Dave Marcus
    Fri, 18:00 - 18:50
    Track 3 - Fix Me
  • 4
  • 4140 Ways Your Alarm System Can Fail

    Keith Howell, Babak Javadi
    Sat, 17:00 - 17:50
    Track 4 - The 3-Way
  • A
  • Active Directory Reconnaissance, Attacks, and Post-Exploitation

    Evan Anderson
    Sun, 09:30 - 09:55
    Track 5 - Stable Talks
  • A Fool’s Game: Building an Awareness & Training Program

    Bill Gardener, Branden Miller
    Sat, 14:00 - 14:50
    Track 3 - Teach Me
  • Alice in Exploit Redirection-land – A trip down the rabbit hole

    Nathan Magniez
    Sun, 13:00 - 13:25
    Track 5 - Stable Talks
  • Ambush – Catching Intruders At Any Point

    Matt Weeks
    Sun, 09:00 - 09:50
    Track 2 - Fix Me
  • Android in the Healthcare Workplace: A Case Study

    Thomas Richards
    Sat, 09:30 - 09:55
    Track 5 - Stable Talks
  • An Introduction to Reverse Engineering with Ida Pro Free

    Nancy Snoke
    Sat, 18:00 - 18:25
    Track 5 - Stable Talks
  • Appearance Hacking 101: The Art of Everyday Camouflage

    Valerie Thomas
    Sun, 13:30 - 13:55
    Track 5 - Stable Talks
  • Are You HIPAA to the Jive?: How Focus on HIPAA Compliance Over Better Security Practices Hurts Us All

    Magen Hughes
    Sat, 17:30 - 17:55
    Track 5 - Stable Talks
  • B
  • Becoming Mallory – How to Win Creds and Influence Devices

    Eric Milam
    Sun, 13:00 - 13:50
    Track 4 - The 3-Way
  • Beyond Strings – Memory Analysis during Incident Response

    J. Brett Cunningham
    Sat, 14:30 - 14:55
    Track 5 - Stable Talks
  • Black Ops

    Dan Kaminsky
    Fri, 14:30 - 15:45
    Track 1 - Break Me
  • Breaking into Security

    Justin Brown, Frank Hackett
    Sat, 16:30 - 16:55
    Track 5 - Stable Talks
  • Building a Database Security Program

    Matt Presson
    Sun, 13:00 - 13:50
    Track 2 - Fix Me
  • Building Dictionaries and Destroying Hashes Using Amazon EC2

    Randy Todd, Steve Werby
    Sun, 09:00 - 09:50
    Track 4 - The 3-Way
  • Building Security into your Mobile Application

    Rick Hayes, Karthik Rangarajan
    Sat, 09:00 - 09:50
    Track 2 - Fix Me
  • Building the Next Generation IDS with OSINT

    Chris Centore, Jason Gunnoe
    Sat, 14:00 - 14:50
    Track 2 - Fix Me
  • Business Ramifications of Internet’s unclean conflicts

    Rockie Brockway
    Fri, 18:00 - 18:25
    Track 5 - Stable Talks
  • BYOD: “Bring Your Own Doom or Sane Business Decision?”

    Krypt3ia, Rafal Los, Heather Pilkington, Robert, Boris Sverdlik
    Fri, 19:30 - 19:55
    Track 5 - Stable Talks
  • C
  • Closing Ceremonies

     
    Sun, 16:00 - 16:50
    Track 1 - Break Me
  • Collecting Underpants To Win Your Network

    Ryan Linn, Mike Ryan
    Fri, 21:00 - 21:50
    Track 3 - Fix Me
  • Cookie Cadger: Taking Cookie Hijacking To A New Level

    Matthew Sullivan
    Sun, 09:00 - 09:50
    Track 1 - Break Me
  • CounterSploit! (MSF as a defense platform)

    John Seely
    Sat, 13:30 - 13:55
    Track 5 - Stable Talks
  • Creating A Powerful User Defense Against Attackers

    Benjamin Mauch
    Sat, 16:00 - 16:50
    Track 2 - Fix Me
  • Current Trends in Computer Law

    Matthew Perry
    Sun, 15:00 - 15:50
    Track 3 - Teach Me
  • Cyber Fast Track: from the trenches

    Peiter Zatko
    Fri, 16:00 - 16:50
    Track 1 - Break Me
  • D
  • Dirty Little Secrets Part 2

    Rob Fuller, Chris Gates, Raphael Mudge
    Fri, 19:00 - 19:50
    Track 1 - Break Me
  • Dirty Red Team Tricks II

    Raphael Mudge
    Sun, 10:00 - 10:50
    Track 3 - Teach Me
  • DNS Reconnaissance

    Carlos Perez
    Fri, 21:00 - 21:50
    Track 1 - Break Me
  • Doubt – Deceit – Deficiency and Decency – a Decade of Disillusionment

    James Arlen
    Fri, 20:00 - 20:50
    Track 4 - The 3-Way
  • Doxing and Anti-Doxing: Information Reconnaissance for the Stalker and the Stalked

    Jason Andress
    Sat, 18:30 - 18:55
    Track 5 - Stable Talks
  • E
  • Easy Cracking with NetLM Downgrade Attacks

    Dave Howard
    Sun, 14:00 - 14:50
    Track 1 - Break Me
  • Easy Passwords = Easy Break-Ins

    Jake Garlie, Chris Murrey
    Sun, 11:00 - 11:25
    Track 5 - Stable Talks
  • Everything they told me about security was wrong

    Paul Asadoorian, John Strand
    Sun, 10:00 - 10:50
    Track 1 - Break Me
  • Everything you wanted to know about Academia (But were too afraid to ask)

    Nathaniel Husted
    Sat, 16:00 - 16:50
    Track 3 - Teach Me
  • Exploit Development with Ruby – An Intro

    Rick Flores
    Sat, 18:00 - 18:50
    Track 3 - Teach Me
  • F
  • Flex Your Rights: The Constitution & Political Activism in the Hacker Community

    Michael Schearer
    Sat, 09:00 - 09:50
    Track 3 - Teach Me
  • Format String Vulnerabilities 101

    Deral Heiland
    Sat, 13:00 - 13:50
    Track 4 - The 3-Way
  • G
  • Ghost in the Wires: The Unbelievable True Story of Kevin Mitnick’s Life as a the World’s Most Wanted Computer Hacker

    Kevin Mitnick
    Sun, 10:00 - 10:50
    Track 2 - Fix Me
  • H
  • Hacking Survival: So. You want to compute post-apocalypse?

    Larry Pesce, Darren Wigley
    Fri, 20:00 - 20:50
    Track 3 - Fix Me
  • Hack Your Way Into A DoD Security Clearance

    Thomas Hoffecker
    Sun, 10:30 - 10:55
    Track 5 - Stable Talks
  • House of Cards

    Rafal Los
    Fri, 18:00 - 18:50
    Track 4 - The 3-Way
  • How I Learned To Stop Worrying and Love the Smart Meter

    Spencer McIntyre
    Sun, 14:30 - 14:55
    Track 5 - Stable Talks
  • How I Owned Your Vending Machine

    Luis Santana
    Fri, 18:30 - 18:55
    Track 5 - Stable Talks
  • How screwed are we?

    Jack Daniel
    Fri, 19:00 - 19:50
    Track 4 - The 3-Way
  • How to create a one man SOC

    Jamie Murdock
    Sat, 13:00 - 13:50
    Track 3 - Teach Me
  • Hunting Evil

    Bart Hopper
    Sat, 17:00 - 17:50
    Track 2 - Fix Me
  • I
  • Information Overload, Future Shock, IBM & The Nature of Modern Crime

    Brent Huston
    Sat, 14:00 - 14:50
    Track 4 - The 3-Way
  • Introducing the Smartphone Pentest Framework

    Georgia Weidman
    Sat, 16:00 - 16:50
    Track 1 - Break Me
  • Introduction to Metasploit Post Exploitation Modules

    Stephen Haywood
    Sat, 10:30 - 10:55
    Track 5 - Stable Talks
  • Intro to Linux System Hardening, and Applying it to BackTrack Linux

    Chris Jenks
    Sun, 13:00 - 13:50
    Track 3 - Teach Me
  • Is it time for another firewall or a security awareness program?

    Jerry Gamblin
    Fri, 21:00 - 21:50
    Track 4 - The 3-Way
  • ISO8583: How to pentest when given a target that is not your “normal” target.

    David Young
    Sat, 09:00 - 09:25
    Track 5 - Stable Talks
  • It’s Not Your Perimeter, It’s You That Sucks!

    Matt Jezorek, Boris Sverdlik, KC Yerrid
    Sat, 11:00 - 11:50
    Track 4 - The 3-Way
  • M
  • Ma and Pa Sleep with the Door Unlocked: A Look at Information Security in the Small Business

    Ryan Sevey
    Sat, 15:00 - 15:25
    Track 5 - Stable Talks
  • Managed Service Providers: Pwn One and Done

    Damian Profanick
    Sat, 13:00 - 13:25
    Track 5 - Stable Talks
  • Maturing The Penetration Testing Profession

    David McGuire
    Sun, 11:00 - 11:50
    Track 4 - The 3-Way
  • Medical Device Security: Current State of the Art

    Shawn Merdinger
    Sat, 15:30 - 15:55
    Track 5 - Stable Talks
  • Moar Anti-Forensics – Moar Louise

    int0x80
    Sat, 10:00 - 10:50
    Track 2 - Fix Me
  • N
  • Next Generation Web Reconnaissance

    Tim Tomes
    Sat, 11:00 - 11:25
    Track 5 - Stable Talks
  • Nice to Meet You

    James Siegel
    Sat, 10:00 - 10:25
    Track 5 - Stable Talks
  • Nonverbal Human Hacking

    Chris Hadnagy
    Fri, 19:00 - 19:50
    Track 2 - Fix Me
  • O
  • Off-Grid Communications with Android: Meshing the Mobile World

    Jeff Robble, Josh Thomas
    Sat, 14:00 - 14:25
    Track 5 - Stable Talks
  • Opening Ceremony

     
    Fri, 12:00 - 12:30
    Track 1 - Break Me
  • P
  • Penetration Testing from a Hot Tub Time Machine

    Eric Smith
    Sat, 10:00 - 10:50
    Track 3 - Teach Me
  • Pentesting for non-pentesters: learning through virtual machines

    Sam Gaudet
    Fri, 21:00 - 21:50
    Track 2 - Fix Me
  • Pentesting iOS Applications

    Jason Haddix
    Sat, 15:00 - 15:50
    Track 2 - Fix Me
  • Pen Testing Security Vendors

    Josh More
    Sat, 13:00 - 13:50
    Track 2 - Fix Me
  • PHP Website Security, Attack Analysis, & Mitigations

    Grecs
    Sun, 11:30 - 11:55
    Track 5 - Stable Talks
  • Physical Drive-By Downloads

    Kyle Osborne
    Sat, 18:00 - 18:50
    Track 1 - Break Me
  • Privilege Escalation with the Metasploit Framework

    egyp7
    Fri, 20:00 - 20:50
    Track 2 - Fix Me
  • Professional Pen Testing and Learning From Your Mistakes

    Adam Compton
    Sun, 10:00 - 10:25
    Track 5 - Stable Talks
  • “
  • “Puff, Puff, Pass: Getting the Most Out of Your Hash” An Intro to Linux Post-Exploitation Fun With Windows Hashes

    Chris Campbell, Alva Duckwall
    Sat, 09:00 - 09:50
    Track 1 - Break Me
  • P
  • Pwned in 60 Seconds, From Network Guest To Windows Domain Admin

    Zack Fasel
    Sat, 13:00 - 13:50
    Track 1 - Break Me
  • R
  • Rapid Blind SQL Injection Exploitation with BBQSQL

    Scott Behrens, Ben Toews
    Fri, 20:30 - 20:55
    Track 5 - Stable Talks
  • Rescuing the Prince of Persia from the Sands of Time

    Jason Scott
    Fri, 18:00 - 18:50
    Track 2 - Fix Me
  • RfCat: subghz or bust!

    Atlas
    Sat, 15:00 - 15:50
    Track 1 - Break Me
  • Running a successful Red Team

    Dave Cowen
    Sat, 11:30 - 11:55
    Track 5 - Stable Talks
  • S
  • Securing the Internet: YOU’re doing it wrong. (An INFOSEC Intervention)

    Jayson E. Street
    Fri, 18:00 - 18:50
    Track 1 - Break Me
  • Security Epistemology: Beliefs, Truth, and Knowledge in the Infosec Community

    Bruce Potter
    Sat, 11:00 - 11:50
    Track 2 - Fix Me
  • Security Onion: Network Security Monitoring in Minutes

    Doug Burks
    Sat, 18:00 - 18:50
    Track 2 - Fix Me
  • Security Vulnerability Assessments – Process and Best Practices

    Kellep Charles
    Sat, 15:00 - 15:50
    Track 4 - The 3-Way
  • SE me, SE you

    Leonard Isham
    Sun, 15:00 - 15:50
    Track 4 - The 3-Way
  • Separating Security Intelligence from Security FUD

    Joshua Marpet
    Sun, 09:00 - 09:50
    Track 3 - Teach Me
  • SexyDefense – The Red Team tore you a new one. NOW WHAT?

    Iftach Ian Amit
    Fri, 20:00 - 20:50
    Track 1 - Break Me
  • SH5ARK ATTACK- taking a byte out of HTML5!

    Tony DeLaGrange, Jason Wood
    Sat, 18:00 - 18:50
    Track 4 - The 3-Way
  • Simple Security Defense to Thwart an Army of Cyber Ninja Warriors

    Ryan Elkins
    Sat, 14:00 - 14:50
    Track 1 - Break Me
  • Slow Down, Cowpoke: When Enthusiasm Outpaces Common Sense

    David Schuetz
    Sun, 10:00 - 10:50
    Track 4 - The 3-Way
  • Social Engineering Defense Contractors on LinkedIN & Facebook: Who’s plugged in to your employees?

    Jordan Harbinger
    Sat, 10:00 - 10:50
    Track 1 - Break Me
  • Social Zombies: Rise of the Mobile Dead

    Tom Eston, Kevin Johnson
    Sat, 10:00 - 10:50
    Track 4 - The 3-Way
  • So you got yourself an InfoSec Manager job. Great! Now what?

    John Woods
    Sat, 16:00 - 16:50
    Track 4 - The 3-Way
  • Sprinkler: IR

    Mick Douglas
    Sun, 15:00 - 15:50
    Track 2 - Fix Me
  • SQL Injection 101

    Jason Pubal
    Sun, 14:00 - 14:25
    Track 5 - Stable Talks
  • T
  • Tactical Surveillance: Look at me now!

    Chris Nickerson
    Sat, 11:00 - 11:50
    Track 3 - Teach Me
  • Taming Skynet : Using the Cloud to Automate Baseline Scanning

    Jason Frisvold
    Sun, 14:00 - 14:50
    Track 3 - Teach Me
  • TBA

    Jeff Moss
    Fri, 12:30 - 13:30
    Track 1
  • The Art and Science of Hacking Any Target

    Tyler Wrightson
    Fri, 20:00 - 20:25
    Track 5 - Stable Talks
  • The Badmin project: (Na-na-nanana Na-na-nanana BADMIN)

    Gillis Jones
    Sat, 17:00 - 17:50
    Track 1 - Break Me
  • The Devil's in the Details: A look at bad SE and how to do better

    Noah Beddome
    Sun, 11:00 - 11:50
    Track 1 - Break Me
  • The Evolution of HFC

    Johnny Long
    Sat, 11:00 - 11:50
    Track 1 - Break Me
  • The Future of RE: Dynamic Binary Visualization

    Christopher Domas
    Sat, 09:00 - 09:50
    Track 4 - The 3-Way
  • The Hacker Ethos meets The FOSS Ethos

    Rick Farina
    Fri, 19:00 - 19:50
    Track 3 - Fix Me
  • The Patsy Proxy: Getting others to do your dirty work

    Dan Crowley, Jennifer Savage
    Fri, 19:00 - 19:25
    Track 5 - Stable Talks
  • The Wild West

    HD Moore
    Fri, 13:30 - 14:30
    Track 1 - Break Me
  • Think differently about database hacking

    Ferenc Spala, László Tóth
    Sun, 15:00 - 15:50
    Track 1 - Break Me
  • U
  • Using McAfee Secure/TrustGuard as Attack Tools

    Jay James, Shane MacDougall
    Sun, 13:00 - 13:50
    Track 1 - Break Me
  • V
  • Vulnerability Spidey Sense – Demystifying Pen Testing Intuition

    Dan Crowley, Chris Vinecombe
    Sat, 15:00 - 15:50
    Track 3 - Teach Me
  • W
  • We go in over the phone lines, pop the firewall, drop in the hydra and wait for the money” and other movie lines that fail.

    Gus Fritschie, Nazia Khan
    Sat, 16:00 - 16:25
    Track 5 - Stable Talks
  • What locksport can teach us about security

    Bill Sempf
    Sat, 17:00 - 17:50
    Track 3 - Teach Me
  • Why Integgroll sucks at Python, and you can too!

    Andy Cooper
    Sun, 09:00 - 09:25
    Track 5 - Stable Talks
  • Why Isn’t Everyone Pulling Security, This is Combat

    Patrick Tatro
    Sun, 14:00 - 14:50
    Track 2 - Fix Me
  • Wielding Katana: A Live Security Suite

    JP Dunning, Chris Silvers
    Sun, 14:00 - 14:50
    Track 4 - The 3-Way
  • Write Your Own Tools With Python!

    Nicolle Neulist
    Sun, 11:00 - 11:50
    Track 3 - Teach Me
  • Y
  • You Can't Buy Security. Building an Open Sourced Information Security Program

    Boris Sverdlik
    Sun, 11:00 - 11:50
    Track 2 - Fix Me