• 5
  • 5min web audit: Security in the startup world

    Evan Johnson
    Sat, 16:30 - 16:55
    Stable Talks
  • A
  • A Brief History of Exploitation

    Devin Cook
    Fri, 19:00 - 19:25
    Stable Talks
  • A Bug or Malware? Catastrophic consequences either way.

    Benjamin Holland, Kothari
    Sun, 10:00 - 10:50
    Track 4
  • Abusing Active Directory in Post-Exploitation

    Carlos Perez
    Fri, 13:00 - 13:50
    Track 1
  • Active Directory: Real Defense for Domain Admins

    Jason Lang
    Sat, 16:00 - 16:50
    Track 2
  • Advanced Incident Response with Bro

    Liam Randall
    Sun, 16:00 - 16:50
    Track 3
  • Advanced Red Teaming: All your Badge Are Belong To Us

    Eric Smith
    Fri, 18:00 - 18:50
    Track 1
  • A girl, some passion, and some tech stuff

    Sam Kinch, Johnny Long, Branden Miller, Emily Miller
    Fri, 12:30 - 12:55
    Stable Talks
  • A Guided Tour of the Internet Ghetto :: Introduction to Tor Hidden Services

    Brent Huston
    Fri, 13:00 - 13:50
    Track 2
  • All Your Base Still Belong To Us: Physical Penetration Testing Tales From The Trenches

    Harry Regan, Valerie Thomas
    Sat, 12:00 - 12:50
    Track 1
  • Am I an Imposter?

    Warren Kopp
    Sun, 14:00 - 14:25
    Stable Talks
  • Analyzing Weak Areas of the Federal Cloud Security Program

    Vinny Troia
    Sun, 09:00 - 09:50
    Track 3
  • Application Whitelisting: Be Careful Where The Silver Bullet Is Aimed

    David McCartney
    Fri, 19:00 - 19:50
    Track 4
  • Are you a Beefeater -- focused on protecting your crown jewels?

    Jack D. Nichelson
    Sun, 16:00 - 16:50
    Track 4
  • Are You a Janitor- Or a Cleaner

    Matt Hoy, John Stauffacher
    Sat, 13:00 - 13:50
    Track 3
  • Around the world in 80 cons

    Jayson E. Street
    Sat, 13:00 - 13:50
    Track 2
  • Attacking Microsoft Kerberos: Kicking the Guard Dog of Hades

    Tim Medin
    Sat, 18:00 - 18:50
    Track 1
  • Attack Paths

    Eve Adams, Johnny Xmas
    Sat, 09:00 - 09:50
    Track 2
  • Attacks and Countermeasures: Advanced Network Traffic Manipulation

    Matt Kelly, Ryan Reynolds
    Sun, 14:00 - 14:50
    Track 1
  • A Year in the (Backdoor) Factory

    Joshua Pitts
    Fri, 15:00 - 15:50
    Track 1
  • B
  • Back by popular demand -- Adaptive Penetration Testing Part Two

    David Kennedy, Kevin Mitnick
    Fri, 10:30 - 11:10
    Track 1
  • Bad Advice- Unintended Consequences- and Broken Paradigms

    Steve Werby
    Sun, 15:00 - 15:50
    Track 2
  • Ball and Chain (A New Paradigm in Stored Password Security)

    Benjamin Donnelly, Tim Tomes
    Fri, 16:00 - 16:50
    Track 1
  • Bending and Twisting Networks

     
    Sun, 13:00 - 13:50
    Track 3
  • Bridging the gap between red and blue

    David Kennedy, Jamie Murdock
    Sun, 14:00 - 14:50
    Track 3
  • Building a Modern Security Engineering Organization

    Zane Lackey
    Sat, 15:30 - 15:55
    Stable Talks
  • Building a Web Application Vulnerability Management Program

    Jason Pubal
    Sun, 12:30 - 12:55
    Stable Talks
  • Building Better Botnets with IPv6

    Code24
    Sun, 14:00 - 14:50
    Track 2
  • Burp For All Languages

    Tom Steele
    Fri, 14:00 - 14:50
    Track 3
  • Bypassing Internet Explorer’s XSS Filter

    Carlos Munoz
    Fri, 19:00 - 19:50
    Track 1
  • C
  • C3CM: Defeating the Command- Control- and Communications of Digital Assailants

    Russ McRee
    Fri, 19:00 - 19:50
    Track 2
  • Call of Community: Modern Warfare

    Matt Johnson, Ben Ten
    Sun, 14:30 - 14:55
    Stable Talks
  • Cat Herding in the Wild Wild West: What I Learned Running A Hackercon CFP

    Nathaniel Husted
    Sat, 09:30 - 09:55
    Stable Talks
  • Chicken of the APT: Understanding Targeted Attackers with Incubation!

    Kyle Wilhoit
    Sun, 12:00 - 12:50
    Track 3
  • Closing Ceremonies

     
    Sun, 17:00 - 17:50
    Track 1
  • CMS Hacking Tricks

    Greg Foss
    Sun, 15:00 - 15:50
    Track 3
  • Code Insecurity or Code in Security

    Mano Paul
    Fri, 18:00 - 18:50
    Track 2
  • Control Flow Graph Based Virus Scanning

    Douglas Goddard
    Sun, 13:00 - 13:50
    Track 4
  • D
  • DDoS Botnet: 1000 Knives and a Scalpel!

    Joshua D. Abraham
    Sat, 16:00 - 16:50
    Track 1
  • Defensive talks NOT 'sexy'? What's sexier than catching an attack like Target- APT- SET or your Pen Tester? Let me show you some sexy logging

    Michael Gough
    Sun, 15:30 - 15:55
    Stable Talks
  • DNS-Based Authentication of Named Entities (DANE): Can we fix our broken CA model?

    Tony Cargile
    Fri, 16:00 - 16:50
    Track 4
  • Dolla Dolla Bump Key

    Chris Sistrunk
    Sun, 09:00 - 09:25
    Stable Talks
  • E
  • Electronic locks in firearms -- Oh My!

    Travis Hartman, Will Roberson
    Sat, 19:00 - 19:25
    Stable Talks
  • Ethical Control: Ethics and Privacy in a Target-Rich Environment

    James Jardine, Kevin Johnson
    Sat, 10:00 - 10:50
    Track 3
  • Et tu- Kerberos?

    Christopher Campbell
    Fri, 17:00 - 17:50
    Track 1
  • Everybody gets clickjacked: Hard knock lessons on bug bounties

    Jonathan Cran
    Sun, 15:00 - 15:50
    Track 4
  • Exploiting Browsers Like A Boss w/ WhiteLightning!

    Bryce Kunz
    Fri, 17:00 - 17:50
    Track 4
  • Exploring Layer 2 Network Security in Virtualized Environments

    Ronny L. Bull, Dr. Jeanna N. Matthews
    Sat, 17:00 - 17:50
    Track 3
  • F
  • Fighting Back Against SSL Inspection

    Jacob Thompson
    Sun, 13:00 - 13:25
    Stable Talks
  • G
  • Gender Differences in Social Engineering: Does Sex Matter?

    Shannon Sistrunk, Will Tarkington
    Sun, 10:00 - 10:25
    Stable Talks
  • GET A Grip on Your Hustle: Glassdoor Exfil Toolkit

    Chris Hodges, Parker Schmitt, Kyle Stone
    Fri, 15:00 - 15:50
    Track 4
  • Getting Windows to Play with Itself: A Pen Tester's Guide to Windows API Abuse

    Brady Bloxham
    Sun, 10:00 - 10:50
    Track 1
  • Girl… Fault Interrupted

    Maggie Jauregui
    Sat, 18:00 - 18:50
    Track 4
  • Give me your data! Obtaining sensitive data without breaking in

    Dave Chronister
    Sat, 12:00 - 12:50
    Track 4
  • Gone in 60 minutes -- Practical Approach to Hacking an Enterprise with Yasuo

    Stephen Hall, Saurabh Harit
    Sat, 18:00 - 18:25
    Stable Talks
  • GROK

    atlas
    Sat, 15:00 - 15:50
    Track 3
  • H
  • Hackers Are People Too

    Amanda Berlin
    Sat, 09:00 - 09:50
    Track 3
  • Hacking Mainframes; Vulnerabilities in applications exposed over TN3270

    Dominic White
    Sun, 12:00 - 12:50
    Track 2
  • Hacking the media for fame and profit

    Jen Ellis, Steve Ragan
    Sat, 12:00 - 12:25
    Stable Talks
  • Hacking your way into the APRS Network on the Cheap

    Mark Lenigan
    Sun, 12:00 - 12:25
    Stable Talks
  • Hardware Tamper Resistance: Why and How?

    Ryan Lackey
    Sat, 18:00 - 18:50
    Track 3
  • Hiding the breadcrumbs: Forensics and anti-forensics on SAP systems

    Juan Perez-Etchegoyen
    Fri, 16:00 - 16:25
    Stable Talks
  • How building a better hacker accidentally built a better defender

    Casey Ellis
    Sat, 16:00 - 16:50
    Track 3
  • How not to suck at pen testing

    John Strand
    Fri, 15:00 - 15:50
    Track 2
  • How to Give the Best Pen Test of Your Life

    Ed Skoudis
    Fri, 09:45 - 10:25
    Track 1
  • How to Secure and Sys Admin Windows like a Boss.

    Jim Kennedy
    Sat, 10:00 - 10:50
    Track 2
  • How to Stop a Hack

    Jason Samide
    Sat, 10:00 - 10:25
    Stable Talks
  • Human Trafficking in the Digital Age

    Chris Jenks
    Sat, 09:00 - 09:25
    Stable Talks
  • Hunting Malware on Linux Production Servers: The Windigo Backstory

    Oliver Bilodeau
    Fri, 19:30 - 19:55
    Stable Talks
  • I
  • I Am The Cavalry: Year [0]

    Space Rogue, Beau Woods
    Fri, 16:00 - 16:50
    Track 3
  • If it fits- it sniffs: Adventures in WarShipping

    Larry Pesce
    Fri, 12:00 - 12:50
    Track 1
  • Information Security Team Management: How to keep your edge while embracing the dark side

    Stephen C Gay
    Sat, 16:00 - 16:25
    Stable Talks
  • InfoSec -- from the mouth of babes (or an 8 year old)

    Reuben A. Paul
    Fri, 13:00 - 13:25
    Stable Talks
  • Interceptor: A PowerShell SSL MITM Script

    Casey Smith
    Sat, 09:00 - 09:50
    Track 1
  • Interns Down for What?

    Tony Turner
    Sat, 14:30 - 14:55
    Stable Talks
  • Introducting Network-Socut: Defending The Soft Center of Your Network

    Bill Gardner, Shawn Jordan, Aedan Somerville
    Sun, 09:00 - 09:50
    Track 1
  • Introduction to System Hardening

    Eddie David
    Sun, 10:30 - 10:55
    Stable Talks
  • i r web app hacking (and so can you!)

    Brandon Perry
    Sat, 15:00 - 15:25
    Stable Talks
  • It’s Not Easy Being Purple

    Amanda Berlin, Royce Davis, Bill Gardner, Brandon McCann, Eric Milam, Valerie Thomas
    Sun, 12:00 - 12:50
    Track 4
  • J
  • Just What The Doctor Ordered?

    Scott Erven
    Sat, 14:00 - 14:50
    Track 4
  • M
  • Macro Malware Lives! -- Putting the sexy back into MS-Office document macros

    Joff Thyer
    Sat, 17:00 - 17:50
    Track 4
  • Mainframes, Mopeds and Mischief: A PenTester's Year in Review

    Tyler Wrightson
    Fri, 16:00 - 16:50
    Track 2
  • Making BadUSB Work For You

    Adam Caudill, Brandon Wilson
    Fri, 17:00 - 17:25
    Stable Talks
  • Making Mongo Cry-Attacking NoSQL for Pen Testers

    Russell Butturini
    Sat, 09:00 - 09:50
    Track 4
  • Mirage — Next Gen Honeyports

    Adam Crompton, Mick Douglas
    Sat, 14:00 - 14:50
    Track 2
  • More New Shiny in the Metasploit Framework

    Egypt
    Sat, 10:00 - 10:50
    Track 1
  • N
  • NeXpose For Automated Compromise Detection

    Luis Santana
    Fri, 12:00 - 12:25
    Stable Talks
  • NoSQL Injections: Moving Beyond ‘or ‘1’=’1′

    Matt Bromiley
    Fri, 14:00 - 14:25
    Stable Talks
  • O
  • Offensive Safe Words -- Exploiting a Bad Dom(admins’)

    Nathan Magniez
    Sun, 12:00 - 12:50
    Track 1
  • Ok -- so you’ve been pwned -- now what?

    Jim Wojno
    Sun, 14:00 - 14:50
    Track 4
  • Once upon a time… (InfoSec History 101)

    Jack Daniel
    Sun, 10:00 - 10:50
    Track 2
  • Open Source Threat Intelligence: Developing a Threat intelligence program using open source tools and public sources

    Edward McCabe
    Sun, 09:00 - 09:50
    Track 2
  • P
  • PassCrackNet: When everything else fails- just crack hashes.

    Adam Ringwood
    Fri, 17:30 - 17:55
    Stable Talks
  • Passing the Torch: Old School Red Teaming- New School Tactics

    David McGuire, Will Schroeder
    Fri, 15:00 - 15:50
    Track 3
  • Patching the Human Vulns

    Leonard Isham, Moey
    Fri, 13:00 - 13:50
    Track 3
  • Penetrate your OWA

    Nate Power
    Sat, 13:30 - 13:55
    Stable Talks
  • Physical Security: From Locks to Dox

    Jess Hires
    Sun, 13:30 - 13:55
    Stable Talks
  • Planning for Failure

    Noah Beddome
    Fri, 15:00 - 15:25
    Stable Talks
  • powercat

    Mick Douglas
    Sat, 16:00 - 16:50
    Track 4
  • Powershell Drink the Kool-Aid

    Wayne Pruitt, Zack Wojton
    Sat, 15:00 - 15:50
    Track 4
  • Practical PowerShell Programming for Professional People

    Ben Ten
    Sat, 14:00 - 14:50
    Track 3
  • Proactive Application Security

    Karthik Rangarajan
    Sun, 10:00 - 10:50
    Track 3
  • Project SCEVRON: SCan EVrything with ruby RONin

    Derek Callaway
    Sat, 17:00 - 17:25
    Stable Talks
  • Protocol Me Maybe? How to Date SCADA

    Stephen Hilt
    Sun, 13:00 - 13:50
    Track 1
  • Q
  • Quantifying The Adversary: Introducing GuerillaSearch and GuerillaPivot

    Dave Marcus
    Fri, 14:00 - 14:50
    Track 1
  • R
  • RavenHID: Remote Badge Gathering -or- Why we sit in client bathrooms for hours

    Lucas Morris, Adam Zamora
    Sat, 14:00 - 14:25
    Stable Talks
  • Real World Intrusion Response

    David Sharpe, Katherine Trame
    Fri, 18:00 - 18:50
    Track 4
  • Red Teaming: Back and Forth, 5ever

    Josh Schwartz
    Fri, 14:00 - 14:50
    Track 2
  • Red white and blue. Making sense of Red Teaming for good.

    Iftach Ian Amit
    Sat, 12:00 - 12:50
    Track 2
  • S
  • Saving the world from the zombie apocalypse

     
    Fri, 09:00 - 09:40
    Track 1
  • Secrets of DNS

    Ron Bowes
    Fri, 13:00 - 13:50
    Track 4
  • Securing Your A$$ets from Espionage

    Stacey Banks
    Fri, 19:00 - 19:50
    Track 3
  • Shellcode Time: Come on Grab Your Friends

    Wartortell
    Sat, 14:00 - 14:50
    Track 1
  • Simple Network Management Pwnd

    Deral Heiland, Matt Kienow
    Sun, 16:00 - 16:50
    Track 2
  • Single Chip Microcontrollers: Beyond Arduino

    Tharon Hall
    Sun, 13:00 - 13:50
    Track 2
  • Snarf - Capitalizing on Man-in-the-Middle

    Victor Mata, Josh Stone
    Sat, 18:30 - 18:55
    Stable Talks
  • Snort & OpenAppID: How to Build an Open Source Next Generation Firewall

    Adam Hogan
    Fri, 14:00 - 14:50
    Track 4
  • Social Engineering your progeny to be hackers

    Simon Liles, Stuart Liles, Sydney Liles
    Fri, 18:30 - 18:55
    Stable Talks
  • Soft Skills for a Technical World

    Justin Herman
    Sat, 17:30 - 17:55
    Stable Talks
  • So You Want To Murder a Software Patent

    Jason Scott
    Fri, 12:00 - 12:50
    Track 3
  • Step On In, The Waters Fine!

    Tom Moore
    Sat, 10:00 - 10:50
    Track 4
  • Subverting ML Detections for Fun and Profit

    Siva Kumar, Ram Shankar, John Walton
    Fri, 12:00 - 12:50
    Track 4
  • Surviving until Dawn

    Bart Hopper
    Sun, 09:00 - 09:50
    Track 4
  • SWF Seeking Lazy Admin for Cross Domain Action

    Seth Art
    Fri, 14:30 - 14:55
    Stable Talks
  • T
  • The Canary in the Cloud

    Scot Berner
    Sun, 15:00 - 15:25
    Stable Talks
  • The Human Buffer Overflow aka Amygdala Hijacking

    Chris Hadnagy
    Sat, 13:00 - 13:50
    Track 1
  • The Internet Of Insecure Things: 10 Most Wanted List

    Paul Asadoorian
    Sat, 15:00 - 15:50
    Track 1
  • The Multibillion Dollar Industry That’s Ignored

    Jason Montgomery, Ryan Sevey
    Fri, 17:00 - 17:50
    Track 2
  • The Road to Compliancy Success Plus Plus

    James Arlen
    Sat, 12:00 - 12:50
    Track 3
  • The Social Engineering Savants -- The Psychopathic Profile

    Kevin Miller
    Fri, 15:30 - 15:55
    Stable Talks
  • The Wireless World of the Internet of Things

    JP Dunning
    Sat, 17:00 - 17:50
    Track 2
  • They touched you WHERE? When trusting a security questionnaire isn’t enough!

    Zack Fasel, Erin Jacobs
    Sat, 15:00 - 15:50
    Track 2
  • Things Being a New Parent of Twins Teaches You About Security

    Rafal Los
    Sun, 16:00 - 16:50
    Track 1
  • Third Party Code: FIX ALL THE THINGS

    Jake Kouns, Kymberlee Price
    Sat, 13:00 - 13:50
    Track 4
  • Threat Modeling for Realz

    Bruce Potter
    Fri, 12:00 - 12:50
    Track 2
  • U
  • University Education In Security Panel

    Sam Bowne, Adrian Crenshaw, G. W. Ray Davidson III, PhD, Bill Gardner, Sam Liles
    Fri, 17:00 - 17:50
    Track 3
  • V
  • Vulnerability Assessment 2.0

    John Askew
    Fri, 18:00 - 18:25
    Stable Talks
  • W
  • We don’t need no stinking Internet.

    Greg Simo
    Sat, 10:30 - 10:55
    Stable Talks
  • Welcome to the Family

     
    Fri, 08:30 - 09:00
    Track 1
  • What Dungeons & Dragons Taught Me About INFOSEC

    Joey Maresca
    Sun, 09:30 - 09:55
    Stable Talks
  • What happened to the ‘A’? How to leverage BCP/DR for your Info Sec Program

    Moey
    Fri, 18:00 - 18:50
    Track 3
  • What to expect when you’re expecting…a pentest

    Martin Bos, Eric Milam
    Sun, 15:00 - 15:50
    Track 1
  • Why Aim for the Ground?

    Phillip Fitzpatrick
    Fri, 13:30 - 13:55
    Stable Talks
  • wifu^2

    cC, Cameron Maerz
    Sat, 17:00 - 17:50
    Track 1
  • Y
  • You’re in the butter zone now- baby.

    Chris Scott
    Fri, 16:30 - 16:55
    Stable Talks
  • Z
  • ZitMo NoM

    David Schwartzberg
    Sat, 13:00 - 13:25
    Stable Talks