• Florentine A

  • Tuesday, July 25
  • GO Forth And Reverse

    Tim Strazzere
    Tue, 11:30 - 12:25
    Breaking Ground
  • Koadic C3 - Windows COM Command & Control Framework

    Aleph _Naught, zerosum0x0
    Tue, 14:00 - 14:55
    Breaking Ground
  • The Black Art of Wireless Post-Exploitation: Bypassing Port-Based Access Controls Using Indirect Wireless Pivots

    Gabriel Ryan
    Tue, 15:00 - 15:55
    Breaking Ground
  • Microservices And FaaS For Offensive Security

    Ryan Baxendale
    Tue, 17:00 - 17:25
    Breaking Ground
  • Zero Trust Networks: In Theory and in Practice

    Doug Barth, Evan Gilman
    Tue, 17:30 - 18:25
    Breaking Ground
  • SniffAir – An Open-Source Framework for Wireless Security Assessments

    Steven Darracott, Matthew Eidelberg
    Tue, 18:30 - 18:55
    Breaking Ground
  • Writing Malware Without Writing Code

    Gal Bitensky
    Tue, 19:00 - 19:25
    Breaking Ground
  • YARA-as-a-Service (YaaS): Real-Time Serverless Malware Detection

    Austin Byers
    Tue, 19:30 - 19:55
    Breaking Ground
  • Wednesday, July 26
  • CheckPlease - Payload-Agnostic Implant Security

    Brandon Arvanaghi, Christopher Truncer
    Wed, 10:00 - 10:55
    Breaking Ground
  • Network Forensic Analysis in an Encrypted World

    Will Peteroy, Justin Warner
    Wed, 11:00 - 11:55
    Breaking Ground
  • Abusing Webhooks for Command and Control

    Dimitry Snezhkov
    Wed, 12:00 - 12:25
    Breaking Ground
  • SECSMASH: Using Security Products to own the Enterprise'

    Kevin Dick, Steven Flores
    Wed, 14:00 - 14:55
    Breaking Ground
  • Modern Internet-Scale Network Reconnaissance

    underflow
    Wed, 15:00 - 15:55
    Breaking Ground
  • Vaccination - An Anti-Honeypot Approach

    Gal Bitensky
    Wed, 17:00 - 17:55
    Breaking Ground
  • Lessons from the front lines: New York City Cyber Command

    Colin Ahern
    Wed, 18:00 - 18:55
    Breaking Ground