• A
  • A Deep Look into a Chinese Advanced Attack - Michael Gough

    Michael Gough
    Fri, 13:00 - 13:50
    Track 3 - Teach Me
  • And You Shall Know Me By My Trail of Documentation

    Jason Scott
    Fri, 13:00 - 13:50
    Track 1 - Break Me
  • Ansible. And Why it Works for Me.

    Charles Yost
    Sat, 17:00 - 17:25
    Track 5 - Stable Talks
  • APT Cyber Cloud of the Internet of Things

    Joey Maresca
    Fri, 12:00 - 12:50
    Track 2 - Fix Me
  • A Survey of Powershell Enabled Malware

    Tyler Halfpop
    Sat, 14:30 - 14:55
    Track 5 - Stable Talks
  • Attacking Packing: Captain Hook Beats Down on Peter Packer

    Nick Cano, Vadim Kotov
    Sat, 16:00 - 16:50
    Track 4 - The 3-Way
  • B
  • Backdooring Git

    John Menerick
    Fri, 17:00 - 17:25
    Track 5 - Stable Talks
  • Blue Team Army - It’s *Your* Network - Defend It!

    Mick Douglas, Jamie Murdock
    Sun, 10:00 - 10:50
    Track 3 - Teach Me
  • Blue Team Starter Kit

    Timothy De Block
    Fri, 13:30 - 13:55
    Track 5 - Stable Talks
  • Breaking in Bad (I’m The One Who Doesn’t Knock)

    Jayson E. Street
    Sat, 12:00 - 12:50
    Track 3 - Teach Me
  • Bugspray - The 802.15.4 Attack Surface

    Bryan Halfpap
    Sat, 12:00 - 12:50
    Track 4 - The 3-Way
  • Building a Better Honeypot Network

    Josh Pyorre
    Sat, 10:30 - 10:55
    Track 5 - Stable Talks
  • Building a Brain for Infosec

    Jason Montgomery, Ryan Sevey
    Sat, 16:00 - 16:50
    Track 2 - Fix Me
  • Bypassing 2Factor Auth with Android Trojans

    Paul Burbage
    Fri, 14:30 - 14:55
    Track 5 - Stable Talks
  • Bypass Surgery: Abusing Content Delivery Networks With Server-Side-Request Forgery (SSRF), Flash, and DNS

    Michael Brooks, Matthew Bryant
    Sat, 14:00 - 14:50
    Track 4 - The 3-Way
  • C
  • Circles & Boxes - Drawing SecArch into Your Program

    Chris Robinson
    Sun, 10:00 - 10:50
    Track 4 - The 3-Way
  • Closing Ceremonies

     
    Sun, 14:30 - 15:30
    Track 1 - Break Me
  • Confessions of a Crypto Cluster Operator

    Dustin Heywood
    Sun, 13:30 - 14:20
    Track 4 - The 3-Way
  • Credential Assessment: Mapping Privilege Escalation at Scale

    Matt Weeks
    Sat, 18:00 - 18:50
    Track 1 - Break Me
  • Crypto 101: An Intro to Real-World Crypto

    Adam Caudill
    Sat, 12:30 - 12:55
    Track 5 - Stable Talks
  • Cryptography and You

    Justin Herman
    Fri, 19:30 - 19:55
    Track 5 - Stable Talks
  • Current Trends in Computer Law

    Matthew Perry
    Fri, 15:00 - 15:50
    Track 4 - The 3-Way
  • CyberSecurity Alphabets - Hacker Edition

    Reuben A. Paul
    Sat, 13:00 - 13:50
    Track 2 - Fix Me
  • D
  • Dec0ding Humans Live

    Chris Hadnagy
    Sat, 12:00 - 12:50
    Track 1 - Break Me
  • Detecting Phishing Attacks with DNS Reconnaissance

    Mike Saunders
    Fri, 17:30 - 17:55
    Track 5 - Stable Talks
  • Developers: Care and Feeding

    Bill Sempf
    Sat, 13:00 - 13:50
    Track 3 - Teach Me
  • Disecting Wassenaar

    Tyler Pitchford
    Sun, 11:00 - 11:50
    Track 4 - The 3-Way
  • DNS Miner - A Semi-Automatic Incident Response and Threat Intelligence Tool for Small - Over Worked Security Teams

    AJ Leece, Doug Leece
    Sun, 10:00 - 10:50
    Track 2 - Fix Me
  • Dog the Freaking (OSINT) Bounty Hunter - Helping Law Enforcement Catch Criminals For (Mostly) Fun - And (Probably No) Profit

    Dennis Kuntz
    Fri, 14:00 - 14:50
    Track 4 - The 3-Way
  • Don’t Laugh - I Dare You!

    Carl Alexander
    Fri, 12:30 - 12:55
    Track 5 - Stable Talks
  • Dynamic Analysis of Flash Files

    Jacob Thompson
    Sat, 15:00 - 15:50
    Track 4 - The 3-Way
  • F
  • Fingerprinting the Modern Digital Footprint

    Arian Evans
    Sat, 14:00 - 14:50
    Track 3 - Teach Me
  • Five Hardware Hacking Projects Under $30

    Kevin Bong, Michael Vieau
    Sun, 12:30 - 13:20
    Track 4 - The 3-Way
  • G
  • Gadgets Zoo: Bypassing Control Flow Guard in Windows 10

    Jared DeMott, Rafal Wojtczuk
    Fri, 14:00 - 14:50
    Track 1 - Break Me
  • Geeks Need Basements!

    Kathleen Veach
    Sat, 18:30 - 18:55
    Track 5 - Stable Talks
  • Getting Started with PowerShell

    Michael Wharton
    Fri, 18:00 - 18:50
    Track 2 - Fix Me
  • Gnuradio Demystifying RF Black Magic

    Matthew O’Gorman
    Sun, 13:30 - 14:20
    Track 1 - Break Me
  • Going AUTH the Rails on a Crazy Train

    Jeff Karmic, Tomek Rabczak
    Sat, 10:00 - 10:50
    Track 4 - The 3-Way
  • Gray Hat PowerShell

    Ben Ten
    Sat, 13:00 - 13:50
    Track 1 - Break Me
  • H
  • HackerQue

    Michael Smith, Kyle Stone
    Fri, 19:00 - 19:50
    Track 3 - Teach Me
  • Hackers vs. Defenders: Can the Defender Ever Stop Playing Catch Up and Win?

    Mano Paul
    Sat, 15:00 - 15:50
    Track 1 - Break Me
  • Hacking for Homeschoolers

    Branden Miller
    Sat, 09:00 - 09:50
    Track 4 - The 3-Way
  • Hacking the Next Generation

    David Schwartzberg
    Sat, 13:30 - 13:55
    Track 5 - Stable Talks
  • Hacking Virtual Appliances

    Jeremy Brown
    Sat, 10:00 - 10:50
    Track 2 - Fix Me
  • Hacking Web Apps

    Brent White
    Fri, 18:00 - 18:25
    Track 5 - Stable Talks
  • Hack My Derby

    Nate Lager
    Sun, 10:30 - 10:55
    Track 5 - Stable Talks
  • HardenedBSD Internals

    Shawn Webb
    Fri, 00:00 - 00:00
     
  • HARdy HAR HAR HAR: HAR File Collection and Analysis for Malware

    Robert Simmons
    Sat, 18:00 - 18:50
    Track 4 - The 3-Way
  • $
  • $helling Out (Getting Root) on a ‘Smart Drone’

    Kevin Finisterre
    Fri, 18:00 - 18:50
    Track 1 - Break Me
  • H
  • HFC Update

    Johnny Long, Henry Wanjala
    Sat, 17:00 - 17:50
    Track 4 - The 3-Way
  • High Stake Target: Lo-Tech Attack

    Kevin Cordle, Bill Gardner
    Fri, 16:00 - 16:50
    Track 2 - Fix Me
  • Hijacking Label Switched Networks in the Cloud

    Paul Coggin
    Fri, 19:00 - 19:50
    Track 4 - The 3-Way
  • Homebrewing for Hackers

    Amber Aldrich, Benjamin Holland
    Sat, 09:30 - 09:55
    Track 5 - Stable Talks
  • Honeypots for Active Defense

    Greg Foss
    Fri, 14:00 - 14:50
    Track 2 - Fix Me
  • How I Stopped Worrying and Learned to Love InfraOps

    Karthik Rangarajan, Daniel Tobin
    Sun, 09:00 - 09:50
    Track 3 - Teach Me
  • How Not to Infosec

    Viss
    Fri, 12:00 - 12:50
    Track 4 - The 3-Way
  • How to Build Your Own Covert SIGINT Vehicle

    Drew Porter
    Sat, 17:00 - 17:50
    Track 2 - Fix Me
  • Hunting Unicorns and Jerks - Irrational, Defensible, or Necessary?

    Steve Werby
    Sun, 12:30 - 13:20
    Track 3 - Teach Me
  • I
  • InfoSec Big Picture and Some Quick Wins

    Schuyler Dorsey
    Sat, 18:00 - 18:50
    Track 3 - Teach Me
  • Intercepting USB Traffic for Attack and Defense

    Brandon Wilson
    Sat, 18:00 - 18:25
    Track 5 - Stable Talks
  • Introducing the RITA VM: Hunting for Bad Guys on Your Network For Free with Math.

    Derek Banks, Brian Furham, John Strand, Joff Thyer
    Sat, 10:00 - 10:50
    Track 3 - Teach Me
  • Intro to x86

    Stephanie Preston
    Sat, 19:00 - 19:25
    Track 5 - Stable Talks
  • Intrusion Hunting for the Masses - A Practical Guide

    David Sharpe
    Sun, 13:30 - 14:20
    Track 2 - Fix Me
  • Invasion of the Hash Snatchers

    Martin Bos, Eric Milam
    Sun, 11:00 - 11:50
    Track 2 - Fix Me
  • ISLET: An Attempt to Improve Linux-based Software Training

    Jon Schipp
    Sat, 12:00 - 12:50
    Track 2 - Fix Me
  • Is That a Router in Your Pocket or Are You Trying to P0wn Me?

    Kevin Bong, Michael Vieau
    Sun, 09:00 - 09:50
    Track 1 - Break Me
  • K
  • Keynote Panel - Information Security Today and in the Future

    Kevin Johnson, David Kennedy, Katie Moussouris, Chris Nickerson, Ed Skoudis, John Strand
    Fri, 10:00 - 10:50
    Track 1 - Break Me
  • L
  • Latest Tools in Automotive Hacking

    Craig Smith
    Sat, 16:30 - 16:55
    Track 5 - Stable Talks
  • Learning Mainframe Hacking: Where the Hell Did All My Free Time Go?

    Chad Rikansrud
    Sat, 17:30 - 17:55
    Track 5 - Stable Talks
  • Learning Through Mentorship

    Michael Ortega, Magen Wu
    Fri, 16:00 - 16:50
    Track 3 - Teach Me
  • LongTail SSH Attack Analysis

    Eric Wedaa
    Sun, 11:00 - 11:50
    Track 3 - Teach Me
  • Losing Battles - Winning Wars - Active Defense Rebooted

    Rafal Los
    Sat, 14:00 - 14:50
    Track 2 - Fix Me
  • M
  • Malfunction’s Functions : Automated Static Malware Analysis Using Function Level Signatures

    Jeramy Lochner, Matthew Rogers
    Fri, 16:00 - 16:25
    Track 5 - Stable Talks
  • Malware is Hard. Let’s Go Shopping!

    Richard Wartell
    Sun, 09:30 - 09:55
    Track 5 - Stable Talks
  • Manufactorum Terminatus - The Attack and Defense of Industrial Manufacturers

    Noah Beddome
    Fri, 15:00 - 15:50
    Track 2 - Fix Me
  • Marketers are Friends - Not Food

    Kara Drapala
    Fri, 13:00 - 13:25
    Track 5 - Stable Talks
  • Medical Devices: Pwnage and Honeypots

    Mark Collao, Scott Erven
    Sat, 16:00 - 16:50
    Track 1 - Break Me
  • Metasploit Town Hall

    Tod Beardsley, Brent Cook, James Lee, David Maloney
    Fri, 16:00 - 16:50
    Track 1 - Break Me
  • Mobile Application Reverse Engineering: Under the Hood

    Drew Branch, Billy McLaughlin
    Sat, 09:00 - 09:50
    Track 3 - Teach Me
  • Moving Target Defense - Learning from Hackers

    Sachin Shetty
    Fri, 15:30 - 15:55
    Track 5 - Stable Talks
  • My Password Cracking Brings All the Hashes to the Yard.

    Larry Pesce
    Sun, 12:30 - 13:20
    Track 2 - Fix Me
  • O
  • On Defending Against Doxxing

    Benjamin Brown Ajnachakra
    Fri, 17:00 - 17:50
    Track 4 - The 3-Way
  • Operating in the Shadows

    Carlos Perez
    Fri, 17:00 - 17:50
    Track 2 - Fix Me
  • OSINT for AppSec: Recon-ng and Beyond

    Tim Tomes
    Sat, 09:00 - 09:50
    Track 2 - Fix Me
  • P
  • Pavlovian Security: How to Change the Way Your Users Respond When the Bell Rings

    Ben Ten, Magen Wu
    Fri, 14:00 - 14:50
    Track 3 - Teach Me
  • People Buy You

    Jordan Harbinger
    Fri, 09:00 - 09:50
    Track 1 - Break Me
  • PHaaS - Phishing as a Service

    Raymond Gabler
    Sun, 09:00 - 09:50
    Track 4 - The 3-Way
  • Phishing: Going from Recon to Creds

    Adam Compton, Eric Gershman
    Fri, 19:00 - 19:50
    Track 1 - Break Me
  • Practical Attacks Against Multifactor

    Josh Stone
    Sat, 13:00 - 13:25
    Track 5 - Stable Talks
  • Practical Hardware Attacks Against Soho Routers & the Internet of Things

    Chase Schultz
    Sun, 11:00 - 11:50
    Track 1 - Break Me
  • Practical Windows Kernel Exploitation

    Spencer McIntyre
    Fri, 18:00 - 18:50
    Track 4 - The 3-Way
  • Putting the Management into Vulnerability Management (or - YOU’VE GOT BEARS!!!)

    Jesika McEvoy
    Fri, 15:00 - 15:25
    Track 5 - Stable Talks
  • Pwning People Personally

    Josh Schwartz
    Sat, 09:00 - 09:50
    Track 1 - Break Me
  • Python for InfoSec

    Bart Hopper
    Fri, 13:00 - 13:50
    Track 4 - The 3-Way
  • R
  • Red Teaming Enemy of the State

    Wayne
    Fri, 17:00 - 17:50
    Track 1 - Break Me
  • Red vs. Blue: Modern Active Directory Attacks & Defense

    Benjamin Delpy, Alva Duckwall, Sean Metcalf
    Fri, 15:00 - 15:50
    Track 1 - Break Me
  • S
  • Security Hopscotch

    Chris Roberts
    Fri, 00:00 - 00:50
    Track 3 - Teach Me
  • Shooting Phish in a Barrel and Other Fish Related Puns

    Amanda Berlin
    Fri, 12:00 - 12:25
    Track 5 - Stable Talks
  • Simplified SIEM Use Case Management

    Ryan Voloch
    Fri, 14:00 - 14:25
    Track 5 - Stable Talks
  • Social Media Risk Metrics. When OMGWTFBBQ Meets Risk Algorithms.

    Iftach Ian Amit, Alex Hutton
    Sat, 15:00 - 15:50
    Track 2 - Fix Me
  • Spanking the Monkey (or How Pentesters Can Do It Better!)

    Antonio Herraiz, Justin Whitehead
    Fri, 16:00 - 16:50
    Track 4 - The 3-Way
  • Spy Vs. Spy: How to Use Breakable Dependencies to Your Advantage

    Stacey Banks, Anne Henmi
    Sat, 19:30 - 19:55
    Track 5 - Stable Talks
  • Stacking the Virtual Deck: Attacks by Predicting RNGs

    Adam Schwalm
    Sat, 09:00 - 09:25
    Track 5 - Stable Talks
  • Stagefright: Scary Code in the Heart of Android

    Joshua Drake
    Sat, 10:00 - 10:50
    Track 1 - Break Me
  • Started from the bottom, now I’m here?: How to ruin your life by getting everything you ever wanted

    Chris Nickerson
    Sat, 16:00 - 16:50
    Track 3 - Teach Me
  • State of the Metasploit Framework

    James Lee
    Sat, 17:00 - 17:50
    Track 1 - Break Me
  • Stealthier Attacks and Smarter Defending with TLS Fingerprinting

    Lee Brotherston
    Fri, 13:00 - 13:50
    Track 2 - Fix Me
  • Stealthy and Persistent Back Door for Z- Wave Gateways

    Jonathan Fuller, Ben Ramsey
    Sat, 10:00 - 10:25
    Track 5 - Stable Talks
  • Sticky Honey Pots

    Paul J. Vann
    Fri, 18:30 - 18:55
    Track 5 - Stable Talks
  • Stretching the Sandbox with Malware Feature Vectors

    Mike Schladt
    Sun, 12:30 - 13:20
    Track 1 - Break Me
  • Surveillance Using Spare Stuff

    Matt Scheurer
    Sat, 12:00 - 12:25
    Track 5 - Stable Talks
  • Surviving Your Startup

    Bruce Potter
    Sat, 15:00 - 15:50
    Track 3 - Teach Me
  • T
  • Tactical Diversion-Driven Defense

    Greg Foss, Tom Hegal
    Sat, 15:30 - 15:55
    Track 5 - Stable Talks
  • TBD

    Edward McCabe
    Sun, 09:00 - 09:50
    Track 2 - Fix Me
  • The Human Interface Device Attack Vector: Research and Development

    Alexander Livingston Segal
    Sat, 14:00 - 14:25
    Track 5 - Stable Talks
  • The Law of Drones

    Michael Schearer
    Fri, 17:00 - 17:50
    Track 3 - Teach Me
  • The Little-Known Horrors of Web Application Session Management

    Matthew Sullivan
    Sun, 10:00 - 10:50
    Track 1 - Break Me
  • The M/o/Vfuscator - Turning ‘Mov’ into a Soul-crushing RE Nightmare

    Christopher Domas
    Fri, 12:00 - 12:50
    Track 1 - Break Me
  • The Pentesters Framework

    David Kennedy
    Sun, 10:00 - 10:25
    Track 5 - Stable Talks
  • The Phony Pony: Phreaks Blazed The Way

    Patrick McNeil, Owen
    Fri, 18:00 - 18:50
    Track 3 - Teach Me
  • The Problems with JNI Obfuscation in the Android Operating System

    Rick Ramgattie
    Sun, 13:30 - 14:20
    Track 3 - Teach Me
  • The State of Information Security Today

    Jeff Man
    Fri, 15:00 - 15:50
    Track 3 - Teach Me
  • Tool Drop: Free as in Beer

    Scot Berner, Jason Lang
    Sat, 15:00 - 15:25
    Track 5 - Stable Talks
  • Top Ten is Old Skool - Meet the New Age of AppSec

    Andrew Leeth
    Fri, 19:00 - 19:25
    Track 5 - Stable Talks
  • U
  • Unbillable: Exploiting Android in App Purchases

    Alfredo Ramirez
    Sat, 13:00 - 13:50
    Track 4 - The 3-Way
  • Using Windows diagnostics for system compromise

    Nicholas Berthaume
    Sat, 17:00 - 17:50
    Track 3 - Teach Me
  • V
  • Voltron: Defender of Your Inferiors

    Richo Healey
    Sun, 09:00 - 09:25
    Track 5 - Stable Talks
  • W
  • Welcome to the Family - Intro

     
    Fri, 08:30 - 09:00
    Track 1 - Break Me
  • We Owe You Nothing

    Rockie Brockway
    Fri, 16:30 - 16:55
    Track 5 - Stable Talks
  • When A Powerful Platform Benefits Both Attackers and Defenders: Secure Enhancements to Scripting Hosts in Windows 10

    Lee Holmes
    Fri, 12:00 - 12:50
    Track 3 - Teach Me
  • WhyMI so Sexy? WMI Attacks - Real-Time Defense - and Advanced Forensic Analysis

    William Ballenthin, Matthew Graeber, Claudiu Teodorescu
    Sat, 14:00 - 14:50
    Track 1 - Break Me
  • Windows 10 Defense in Depth

    Eddie David
    Sat, 16:00 - 16:25
    Track 5 - Stable Talks