• 9
  • 99 Reasons Your Perimeter Is Leaking - Evolution of C&C

    John Askew
    Sat, 15:00 - 15:50
    Kentucky F & G - Track 4
  • A
  • Abusing IoT Medical Devices For Your Precious Health Records

    Nick Delewski, Saurabh Harit
    Fri, 14:00 - 14:50
    Kentucky E - Track 3
  • A “Crash” Course in Exploiting Buffer Overflows (Live Demos!)

    Parker Garrison
    Sat, 16:00 - 16:50
    Marriott VII, VIII, IX, X - Track 2
  • Advanced Deception Technology Through Behavioral Biometrics

    Curt Barnard, Dawud Gordon
    Sun, 09:30 - 09:55
    Kentucky C & D - Stable
  • Android App Penetration Testing 101

    Derek Banks, Joff Thyer
    Fri, 16:00 - 16:50
    Marriott I & II - Track 1
  • An Inconvenient Truth: Evading the Ransomware Protection in Windows 10

    Soya Aoyama
    Sat, 15:30 - 15:55
    Kentucky C & D - Stable
  • App-o-Lockalypse now!

    Oddvar Moe
    Sat, 10:00 - 10:50
    Marriott VII, VIII, IX, X - Track 2
  • A Process is No One: Hunting for Token Manipulation

    Jared Atkinson, Robby Winchester
    Fri, 12:30 - 12:55
    Kentucky C & D - Stable
  • Attacking Azure Environments with PowerShell

    Karl Fosaaen
    Sun, 11:30 - 11:55
    Kentucky C & D - Stable
  • B
  • Blue Blood Injection: Transitioning Red to Purple

    Lsly Ayyy
    Sun, 12:00 - 12:25
    Kentucky C & D - Stable
  • Breaking Into Your Building: A Hackers Guide to Unauthorized Access

    Tim Roberts, Brent White
    Sun, 10:00 - 10:50
    Kentucky F & G - Track 4
  • Brutal Blogging - Go for the Jugular

    Kate Brew
    Sat, 16:00 - 16:25
    Kentucky C & D - Stable
  • Bug Hunting in RouterOS

    Jacob Baines
    Sun, 09:00 - 09:50
    Kentucky F & G - Track 4
  • Building an Empire with (Iron)Python

    Jim Shaver
    Sat, 09:00 - 09:50
    Marriott I & II - Track 1
  • Bypassing Port-Security In 2018: Defeating MacSEC and 802.1x-2010

    Gabriel Ryan
    Sun, 14:00 - 14:50
    Marriott VII, VIII, IX, X - Track 2
  • C
  • Changing Our Mindset From Technical To Psychological Defenses

    Andrew Kalat
    Sun, 14:00 - 14:50
    Marriott I & II - Track 1
  • Clippy for the Dark Web: Looks Like You’re Trying to Buy Some Dank Kush, Can I Help You With That?

    Emma Zaballos
    Fri, 13:30 - 13:55
    Kentucky C & D - Stable
  • Cloud Computing Therapy Session

    Andy Cooper, Cara Marie
    Sat, 14:00 - 14:50
    Marriott I & II - Track 1
  • Cloud Forensics: Putting The Bits Back Together

    Brandon Sherman
    Sun, 10:00 - 10:50
    Kentucky E - Track 3
  • Code Execution with JDK Scripting Tools & Nashorn Javascript Engine

    Brett Hawkins
    Sat, 17:00 - 17:50
    Kentucky F & G - Track 4
  • Community Based Career Development or How to Get More than a T-Shirt When Participating as part of the Community

    Cindy Jones, Kristen Renner, Kathryn Seymour, Kathleen Smith, Magen Wu
    Sat, 18:00 - 18:50
    Kentucky E - Track 3
  • Comparing apples to Apple

    Adam Mathis
    Sun, 13:00 - 13:25
    Kentucky C & D - Stable
  • CTFs: Leveling Up Through Competition

    Alex Flores
    Sat, 13:00 - 13:25
    Kentucky C & D - Stable
  • Cyber Intelligence: There Are No Rules, and No Certainties

    Coleman Kane
    Sun, 12:00 - 12:50
    Marriott I & II - Track 1
  • D
  • Decision Analysis Applications in Threat Analysis Frameworks

    Emily Shawgo
    Sat, 09:30 - 09:55
    Kentucky C & D - Stable
  • Deploying Deceptive Systems: Luring Attackers from the Shadows

    Kevin Gennuso
    Sat, 12:00 - 12:50
    Kentucky E - Track 3
  • Detecting WMI exploitation

    Michael Gough
    Fri, 15:00 - 15:50
    Kentucky E - Track 3
  • Dexter: the friendly forensics expert on the Coinbase security team

    Hayden Parker
    Sat, 16:00 - 16:50
    Marriott I & II - Track 1
  • Disaster Strikes: A Hacker's Cook book

    Carlos Perez, Jose Quinones
    Sat, 09:00 - 09:50
    Kentucky F & G - Track 4
  • Draw a Bigger Circle: InfoSec Evolves

    Cheryl Biswas
    Fri, 17:00 - 17:50
    Marriott I & II - Track 1
  • Driving Away Social Anxiety

    Joey Maresca
    Sat, 12:00 - 12:25
    Kentucky C & D - Stable
  • E
  • Escoteric Hashcat Attacks

    Evilmog
    Fri, 14:30 - 14:55
    Kentucky C & D - Stable
  • Everything Else I Learned About Security I Learned From Hip-Hop

    Paul Asadoorian
    Fri, 14:00 - 14:50
    Marriott I & II - Track 1
  • Extending Burp to Find Struts and XXE Vulnerabilities

    Chris Elgee
    Sat, 14:00 - 14:25
    Kentucky C & D - Stable
  • F
  • Fingerprinting Encrypted Channels for Detection

    John B. Althouse
    Sun, 12:00 - 12:50
    Marriott VII, VIII, IX, X - Track 2
  • Foxtrot C2: A Journey of Payload Delivery

    Dimitry Snezhkov
    Fri, 17:30 - 17:55
    Kentucky C & D - Stable
  • From Workstation to Domain Admin: Why Secure Administration Isn't Secure and How to Fix It

    Sean Metcalf
    Fri, 13:00 - 13:50
    Marriott VII, VIII, IX, X - Track 2
  • Fuzz your smartphone from 4G base station side

    Tso-Jen Liu
    Fri, 13:00 - 13:25
    Kentucky C & D - Stable
  • G
  • Getting Control of Your Vendors Before They Take You Down

    Dan Browder
    Sun, 11:00 - 11:50
    Marriott I & II - Track 1
  • Getting Started in CCDC

    Russell Nielsen
    Sun, 13:00 - 13:50
    Marriott I & II - Track 1
  • Going on a Printer Safari – Hunting Zebra Printers

    James Edge
    Sat, 17:00 - 17:50
    Marriott I & II - Track 1
  • Goodbye Obfuscation, Hello Invisi-Shell: Hiding Your Powershell Script in Plain Sight

    Omer Yair
    Sun, 09:00 - 09:50
    Kentucky E - Track 3
  • Gryffindor | Pure JavaScript, Covert Exploitation

    Matthew Toussain
    Fri, 16:00 - 16:50
    Kentucky E - Track 3
  • H
  • Hackers, Hugs, & Drugs: Mental Health in Infosec

    Amanda Berlin
    Fri, 15:00 - 15:50
    Marriott I & II - Track 1
  • Hacking Mobile Applications with Frida

    David Coursey
    Sat, 12:00 - 12:50
    Kentucky F & G - Track 4
  • Ham Radio 4 Hackers

    Devin Noel, Eric Watkins
    Sun, 10:00 - 10:50
    Marriott I & II - Track 1
  • Hardware Slashing, Smashing, and Reconstructing for Root access

    Deral Heiland
    Sat, 09:00 - 09:50
    Marriott VII, VIII, IX, X - Track 2
  • Hey! I found a vulnerability – now what?

    Lisa Bradley, CRob
    Fri, 17:00 - 17:25
    Kentucky C & D - Stable
  • Hillbilly Storytime: Pentest Fails

    Adam Compton
    Sun, 14:00 - 14:50
    Kentucky E - Track 3
  • How online dating made me better at threat modeling

    Isaiah Sarju
    Sun, 13:30 - 13:55
    Kentucky C & D - Stable
  • How Russian Cyber Propaganda Really Works

    Jonathan Nichols
    Sat, 10:00 - 10:25
    Kentucky C & D - Stable
  • How to influence security technology in kiwi underpants

    Benjamin Delpy
    Fri, 09:00 - 09:50
    Marriott I & II - Keynote
  • How to put on a Con for Fun and (Non) Profit

    Mike Fry, Bill Gardner, Rick Hayes, Benny Karnes, John Moore, Matt Perry, Justin Rogosky, Steve Truax
    Sat, 15:00 - 15:50
    Kentucky E - Track 3
  • How to test Network Investigative Techniques(NITs) used by the FBI

    Dr. Matthew Miller
    Sat, 13:00 - 13:50
    Marriott I & II - Track 1
  • I
  • I Can Be Apple, and So Can You

    Joshua Pitts
    Fri, 12:00 - 12:50
    Marriott VII, VIII, IX, X - Track 2
  • In-Memory Persistence: Terminate & Stay Resident Redux

    Scott Lundgren
    Fri, 17:00 - 17:50
    Kentucky F & G - Track 4
  • Instant Response: Making IR faster than you thought possible!

    Mick Douglas, Josh Johnson
    Fri, 17:00 - 17:50
    Kentucky E - Track 3
  • Introduction to x86 Assembly

    DazzleCatDuo
    Sat, 14:30 - 14:55
    Kentucky C & D - Stable
  • Invoke-DOSfuscation: Techniques FOR %F IN (-style) DO (S-level CMD Obfuscation)

    Daniel Bohannon
    Sat, 13:00 - 13:50
    Marriott VII, VIII, IX, X - Track 2
  • Invoke-EmpireHound - Merging BloodHound & Empire for Enhanced Red Team Workflow

    Walter Legowski
    Fri, 12:00 - 12:50
    Kentucky E - Track 3
  • IOCs Today, Intelligence-Led Security Tomorrow

    Katie Kusjanovic, Matthew Shelton
    Sun, 14:00 - 14:50
    Kentucky F & G - Track 4
  • IoT: Not Even Your Bed Is Safe

    Darby Mullen
    Sun, 11:00 - 11:50
    Marriott VII, VIII, IX, X - Track 2
  • IronPython... omfg

    Marcello Salvati
    Fri, 17:00 - 17:50
    Marriott VII, VIII, IX, X - Track 2
  • IRS, HR, Microsoft and your Grandma: What they all have in common

    Chris Hadnagy, Cat Murdock
    Fri, 12:00 - 12:50
    Marriott I & II - Track 1
  • J
  • Jump Into IOT Hacking with the Damn Vulnerable Habit Helper Device

    Nancy Snoke, Phoenix Snoke
    Fri, 16:00 - 16:50
    Kentucky F & G - Track 4
  • Just Let Yourself In

    David Boyd
    Sat, 15:00 - 15:50
    Marriott VII, VIII, IX, X - Track 2
  • K
  • Killsuit: The Equation Group's Swiss Army knife for persistence, evasion, and data exfil

    Francisco Donoso
    Sun, 11:00 - 11:50
    Kentucky E - Track 3
  • L
  • Lessons Learned by the WordPress Security Team

    Aaron D Campbell
    Fri, 16:00 - 16:50
    Marriott VII, VIII, IX, X - Track 2
  • Living in a Secure Container, Down by the River

    Jack Mannino
    Sat, 17:00 - 17:50
    Marriott VII, VIII, IX, X - Track 2
  • Living off the land: enterprise post-exploitation

    Adam Reiser
    Sun, 13:00 - 13:50
    Kentucky E - Track 3
  • #
  • #LOLBins - Nothing to LOL about!

    Oddvar Moe
    Fri, 13:00 - 13:50
    Marriott I & II - Track 1
  • #LOL They Placed Their DMZ in the Cloud: Easy Pwnage or Disruptive Protection

    Carl Alexander
    Fri, 16:00 - 16:25
    Kentucky C & D - Stable
  • M
  • M&A Defense and Integration – All that Glitters is not Gold

    Sara Leal, Jason Morrow
    Sun, 14:30 - 14:55
    Kentucky C & D - Stable
  • Maintaining post-exploitation opsec in a world with EDR

    Martin Roberts, Michael Roberts
    Fri, 16:30 - 16:55
    Kentucky C & D - Stable
  • Make Me Your Dark Web Personal Shopper!

    Emma Zaballos
    Sat, 10:30 - 10:55
    Kentucky C & D - Stable
  • Mapping wifi networks and triggering on interesting traffic patterns

    Caleb Madrigal
    Sat, 13:30 - 13:55
    Kentucky C & D - Stable
  • Media hacks: an Infosec guide to dealing with journalists

    Sean Gallagher, Steve Ragan, Paul Wagenseil
    Sat, 10:00 - 10:50
    Kentucky E - Track 3
  • Metasploit Town Hall 0x4

    Adam Cammack, Brent Cook, Cody Pierce, Aaron Soto
    Sat, 17:00 - 17:50
    Kentucky E - Track 3
  • Mirai, Satori, OMG, and Owari - IoT Botnets Oh My

    Pete Arzamendi
    Sun, 12:30 - 12:55
    Kentucky C & D - Stable
  • MS17-010?

    zerosum0x0
    Fri, 14:00 - 14:50
    Marriott VII, VIII, IX, X - Track 2
  • N
  • Ninja Looting Like a Pirate

    infojanitor
    Sat, 10:00 - 10:50
    Kentucky F & G - Track 4
  • NOOb OSINT in 30 Minutes or less!

    Greg Simo
    Fri, 15:00 - 15:25
    Kentucky C & D - Stable
  • No Place Like Home: Real Estate OSINT and OPSec Fails

    John Bullinger
    Sun, 10:30 - 10:55
    Kentucky C & D - Stable
  • O
  • Offensive Browser Extension Development

    Michael Weber
    Fri, 14:00 - 14:50
    Kentucky F & G - Track 4
  • Off-grid coms and power

    Justin Herman
    Sat, 12:30 - 12:55
    Kentucky C & D - Stable
  • On the Nose: Bypassing Huawei's Fingerprint authentication by exploiting the TrustZone

    Nick Stephens
    Sun, 13:00 - 13:50
    Marriott VII, VIII, IX, X - Track 2
  • Opening Ceremonies

     
    Fri, 08:30 - 08:55
    Marriott I & II - Keynote
  • Opening Ceremony

     
    Sun, 15:30 - 16:30
    Marriott I & II - Keynote
  • OSX/Pirrit - Reverse engineering mac OSX malware and the legal department of the company who makes it

    Yuval Chuddy, Amit Serper, Niv Yona
    Sat, 12:00 - 12:50
    Marriott I & II - Track 1
  • P
  • Pacu: Attack and Post-Exploitation in AWS

    Spencer Gietzen
    Sat, 15:00 - 15:25
    Kentucky C & D - Stable
  • Panel Discussion - At a Glance: Information Security

    Lesley Carhart, David Kennedy, Ed Skoudis, John Strand
    Fri, 10:00 - 10:50
    Marriott I & II - Keynote
  • Patching: Show me where it hurts

    Cheryl Biswas
    Sun, 09:00 - 09:25
    Kentucky C & D - Stable
  • Perfect Storm: Taking the Helm of Kubernetes

    Ian Coldwater
    Sat, 14:00 - 14:50
    Kentucky E - Track 3
  • PHONOPTICON - leveraging low-rent mobile ad services to achieve state-actor level mass surveillance on a shoestring budget

    Mark Milhouse
    Sat, 18:00 - 18:50
    Kentucky F & G - Track 4
  • Protect Your Payloads: Modern Keying Techniques

    Leo Loobeek
    Fri, 15:00 - 15:50
    Kentucky F & G - Track 4
  • Pwning in the Sandbox: OSX Macro Exploitation & Beyond

    Danny Chrastil, Adam Gold
    Sun, 13:00 - 13:50
    Kentucky F & G - Track 4
  • R
  • Red Mirror: Bringing Telemetry to Red Teaming

    Zach Grace
    Sun, 09:00 - 09:50
    Marriott VII, VIII, IX, X - Track 2
  • Red Teaming gaps and musings

    Samuel Sayen
    Fri, 12:00 - 12:25
    Kentucky C & D - Stable
  • RFID Luggage Tags, IATA vs Real Life

    Daniel Lagos
    Fri, 15:30 - 15:55
    Kentucky C & D - Stable
  • Ridesharks

    Kaleb Brown
    Fri, 18:00 - 18:25
    Kentucky C & D - Stable
  • RID Hijacking: Maintaining Access on Windows Machines

    Sebastián Castro
    Sat, 16:30 - 16:55
    Kentucky C & D - Stable
  • S
  • SAEDY: Subversion and Espionage Directed Against You

    Judy Towers
    Sat, 10:00 - 10:50
    Marriott I & II - Track 1
  • Ship Hacking: a Primer for Today’s Pirate

    Brian Olson, Brian Satira
    Sat, 16:00 - 16:50
    Kentucky F & G - Track 4
  • Silent Compromise: Social Engineering Fortune 500 Businesses

    Joe Gray
    Sat, 15:00 - 15:50
    Marriott I & II - Track 1
  • Social Engineering At Work – How to use positive influence to gain management buy-in for anything

    April C. Wright
    Sun, 09:00 - 09:50
    Marriott I & II - Track 1
  • So many pentesting tools from a $4 Arduino

    Kevin Bong, Michael Vieau
    Sat, 17:30 - 17:55
    Kentucky C & D - Stable
  • State of Win32k Security: Revisiting Insecure design

    Vishal Chauhan
    Fri, 13:00 - 13:50
    Kentucky F & G - Track 4
  • Synfuzz: Building a Grammar Based Re-targetable Test Generation Framework

    Joe Rozner
    Fri, 14:00 - 14:25
    Kentucky C & D - Stable
  • T
  • Tales From the Bug Mine - Highlights from the Android VRP

    Brian Claire Young
    Sat, 09:00 - 09:25
    Kentucky C & D - Stable
  • The History of the Future of Cyber-Education

    Winn Schwartau
    Fri, 12:00 - 12:50
    Kentucky F & G - Track 4
  • The Layer2 Nightmare

    Chris Mallz
    Sun, 11:00 - 11:25
    Kentucky C & D - Stable
  • The making of an iOS 11 jailbreak: Kiddie to kernel hacker in 14 sleepless nights.

    Bryce Bearchell
    Sun, 11:00 - 11:50
    Kentucky F & G - Track 4
  • The Money-Laundering Cannon: Real cash; Real Criminals; and Real Layoffs

    Arian Evans
    Sat, 13:00 - 13:50
    Kentucky E - Track 3
  • The MS Office Magic Show

    Pieter Ceelen, Stan Hegt
    Sun, 12:00 - 12:50
    Kentucky E - Track 3
  • The Unintended Risks of Trusting Active Directory

    Lee Christensen, Matt Nelson, Will Schroeder
    Fri, 15:00 - 15:50
    Marriott VII, VIII, IX, X - Track 2
  • Threat Hunting with a Raspberry Pi

    Jamie Murdock
    Sun, 14:00 - 14:25
    Kentucky C & D - Stable
  • Two-Factor, Too Furious: Evading (and Protecting) Evolving MFA Schemes

    Austin Baker, Doug Bienstock
    Sun, 10:00 - 10:50
    Marriott VII, VIII, IX, X - Track 2
  • U
  • Ubiquitous Shells

    Jon Gorenflo
    Sat, 14:00 - 14:50
    Kentucky F & G - Track 4
  • V
  • VBA Stomping - Advanced Malware Techniques

    Harold Ogden, Carrie Roberts, Kirk Sayre
    Sat, 09:00 - 09:50
    Kentucky E - Track 3
  • Victor or Victim? Strategies for Avoiding an InfoSec Cold War

    Jason Lang, Stuart McIntosh
    Sat, 13:00 - 13:50
    Kentucky F & G - Track 4
  • W
  • We are all on the spectrum: What my 10-year-old taught me about leading teams

    Carla A Raisler
    Sun, 10:00 - 10:25
    Kentucky C & D - Stable
  • WE ARE THE ARTILLERY: Using Google Fu To Take Down The Grids

    Krypt3ia, Chris Sistrunk, SynAckPwn
    Sat, 14:00 - 14:50
    Marriott VII, VIII, IX, X - Track 2
  • Web App 101: Getting the lay of the land

    Mike Saunders
    Sat, 12:00 - 12:50
    Marriott VII, VIII, IX, X - Track 2
  • Web app testing classroom in a box - the good, the bad and the ugly

    Chelle Clements, Jim McMurry, Lee Neely
    Sat, 16:00 - 16:50
    Kentucky E - Track 3
  • When Macs Come Under ATT&CK

    Richie Cyrus
    Fri, 13:00 - 13:50
    Kentucky E - Track 3
  • Who Watches the Watcher? Detecting Hypervisor Introspection from Unprivileged Guests

    Tomasz Tuzel
    Sun, 12:00 - 12:50
    Kentucky F & G - Track 4
  • Y
  • Your Training Data is Bad and You Should Feel Bad

    Ryan J. O'Grady
    Sat, 17:00 - 17:25
    Kentucky C & D - Stable