• Friday, September 22
  • Opening Ceremonies

     
    Fri, 08:30 - 08:55
    Track 1 - Break Me
  • Subverting Trust in Windows - A Case Study of the "How" and "Why" of Engaging in Security Research

    Matthew Graeber
    Fri, 09:00 - 09:50
    Track 1 - Break Me
  • I had my mom break into a prison, then we had pie.

    John Strand
    Fri, 10:00 - 10:50
    Track 1 - Break Me
  • So you want to be a Social Engineer

    Chris Hadnagy
    Fri, 12:00 - 12:50
    Track 1 - Break Me
  • Here Be Dragons: The Unexplored Land of Active Directory ACLs

    Andy Robbins, Will Schroeder, Rohan Vazarkar
    Fri, 13:00 - 13:50
    Track 1 - Break Me
  • TBD

    John Cramb, Josh Schwartz
    Fri, 14:00 - 14:50
    Track 1 - Break Me
  • Invoke-CradleCrafter: Moar PowerShell obFUsk8tion & Detection (@('Tech','niques') -Join'')

    Daniel Bohannon
    Fri, 15:00 - 15:50
    Track 1 - Break Me
  • PSAmsi - An offensive PowerShell module for interacting with the Anti-Malware Scan Interface in Windows 10

    Ryan Cobb
    Fri, 16:00 - 16:50
    Track 1 - Break Me
  • An ACE in the Hole: Stealthy Host Persistence via Security Descriptors

    Lee Christensen, Matt Nelson, Will Schroeder
    Fri, 17:00 - 17:55
    Track 1 - Break Me
  • War Stories on Embedded Security: Pentesting, IoT, Building Managers, and how to do Better

    Jared DeMott
    Fri, 18:00 - 18:55
    Track 1 - Break Me
  • Saturday, September 23
  • Return From The Underworld - The Future Of Red Team Kerberos

    Mitchell Hennigan, Jim Shaver
    Sat, 09:00 - 09:50
    Track 1 - Break Me
  • Memory-Based Library Loading: Someone Did That Already.

    Casey Rosini
    Sat, 10:00 - 10:50
    Track 1 - Break Me
  • Building the DeathStar: getting Domain Admin with a push of a button (a.k.a. how I almost automated myself out of a job)

    Marcello Salvati
    Sat, 12:00 - 12:50
    Track 1 - Break Me
  • Modern Evasion Techniques

    Jason Lang
    Sat, 13:00 - 13:50
    Track 1 - Break Me
  • FM, and Bluetooth, and Wifi... Oh My!

    Aaron Lafferty
    Sat, 14:00 - 14:50
    Track 1 - Break Me
  • Detect Me If You Can

    Ben Ten
    Sat, 15:00 - 15:50
    Track 1 - Break Me
  • Full-Contact Recon

    savant, int0x80
    Sat, 16:00 - 16:50
    Track 1 - Break Me
  • Not a Security Boundary: Bypassing User Account Control

    Matt Nelson
    Sat, 17:00 - 17:50
    Track 1 - Break Me
  • Victim Machine has joined #general: Using Third Party APIs as C&C Infrastructure.

    Stephen Hilt, Lord Alfred Remorin
    Sat, 18:00 - 18:50
    Track 1 - Break Me
  • Sunday, September 24
  • Aiding Static Analysis: Discovering Vulnerabilities in Binary Targets through Knowledge Graph Inferences

    John Toterhi
    Sun, 10:00 - 10:50
    Track 1 - Break Me
  • Evading Autoruns

    Chris Bisnett, Kyle Hanslovan
    Sun, 11:00 - 11:50
    Track 1 - Break Me
  • MitM Digital Subscriber Lines

    Marcus Gruber, Marco Lux
    Sun, 12:00 - 12:50
    Track 1 - Break Me
  • Jumping the Fence: Comparison and Improvements for Existing Jump Oriented Programming Tools

    John Dunlap
    Sun, 13:00 - 13:50
    Track 1 - Break Me
  • Closing Ceremony

     
    Sun, 14:30 - 15:30
    Track 1 - Break Me