• Friday, October 5
  • Red Teaming gaps and musings

    Samuel Sayen
    Fri, 12:00 - 12:25
    Kentucky C & D - Stable
  • A Process is No One: Hunting for Token Manipulation

    Jared Atkinson, Robby Winchester
    Fri, 12:30 - 12:55
    Kentucky C & D - Stable
  • Fuzz your smartphone from 4G base station side

    Tso-Jen Liu
    Fri, 13:00 - 13:25
    Kentucky C & D - Stable
  • Clippy for the Dark Web: Looks Like You’re Trying to Buy Some Dank Kush, Can I Help You With That?

    Emma Zaballos
    Fri, 13:30 - 13:55
    Kentucky C & D - Stable
  • Synfuzz: Building a Grammar Based Re-targetable Test Generation Framework

    Joe Rozner
    Fri, 14:00 - 14:25
    Kentucky C & D - Stable
  • Escoteric Hashcat Attacks

    Evilmog
    Fri, 14:30 - 14:55
    Kentucky C & D - Stable
  • NOOb OSINT in 30 Minutes or less!

    Greg Simo
    Fri, 15:00 - 15:25
    Kentucky C & D - Stable
  • RFID Luggage Tags, IATA vs Real Life

    Daniel Lagos
    Fri, 15:30 - 15:55
    Kentucky C & D - Stable
  • #LOL They Placed Their DMZ in the Cloud: Easy Pwnage or Disruptive Protection

    Carl Alexander
    Fri, 16:00 - 16:25
    Kentucky C & D - Stable
  • Maintaining post-exploitation opsec in a world with EDR

    Martin Roberts, Michael Roberts
    Fri, 16:30 - 16:55
    Kentucky C & D - Stable
  • Hey! I found a vulnerability – now what?

    Lisa Bradley, CRob
    Fri, 17:00 - 17:25
    Kentucky C & D - Stable
  • Foxtrot C2: A Journey of Payload Delivery

    Dimitry Snezhkov
    Fri, 17:30 - 17:55
    Kentucky C & D - Stable
  • Ridesharks

    Kaleb Brown
    Fri, 18:00 - 18:25
    Kentucky C & D - Stable
  • Saturday, October 6
  • Tales From the Bug Mine - Highlights from the Android VRP

    Brian Claire Young
    Sat, 09:00 - 09:25
    Kentucky C & D - Stable
  • Decision Analysis Applications in Threat Analysis Frameworks

    Emily Shawgo
    Sat, 09:30 - 09:55
    Kentucky C & D - Stable
  • How Russian Cyber Propaganda Really Works

    Jonathan Nichols
    Sat, 10:00 - 10:25
    Kentucky C & D - Stable
  • Make Me Your Dark Web Personal Shopper!

    Emma Zaballos
    Sat, 10:30 - 10:55
    Kentucky C & D - Stable
  • Driving Away Social Anxiety

    Joey Maresca
    Sat, 12:00 - 12:25
    Kentucky C & D - Stable
  • Off-grid coms and power

    Justin Herman
    Sat, 12:30 - 12:55
    Kentucky C & D - Stable
  • CTFs: Leveling Up Through Competition

    Alex Flores
    Sat, 13:00 - 13:25
    Kentucky C & D - Stable
  • Mapping wifi networks and triggering on interesting traffic patterns

    Caleb Madrigal
    Sat, 13:30 - 13:55
    Kentucky C & D - Stable
  • Extending Burp to Find Struts and XXE Vulnerabilities

    Chris Elgee
    Sat, 14:00 - 14:25
    Kentucky C & D - Stable
  • Introduction to x86 Assembly

    DazzleCatDuo
    Sat, 14:30 - 14:55
    Kentucky C & D - Stable
  • Pacu: Attack and Post-Exploitation in AWS

    Spencer Gietzen
    Sat, 15:00 - 15:25
    Kentucky C & D - Stable
  • An Inconvenient Truth: Evading the Ransomware Protection in Windows 10

    Soya Aoyama
    Sat, 15:30 - 15:55
    Kentucky C & D - Stable
  • Brutal Blogging - Go for the Jugular

    Kate Brew
    Sat, 16:00 - 16:25
    Kentucky C & D - Stable
  • RID Hijacking: Maintaining Access on Windows Machines

    Sebastián Castro
    Sat, 16:30 - 16:55
    Kentucky C & D - Stable
  • Your Training Data is Bad and You Should Feel Bad

    Ryan J. O'Grady
    Sat, 17:00 - 17:25
    Kentucky C & D - Stable
  • So many pentesting tools from a $4 Arduino

    Kevin Bong, Michael Vieau
    Sat, 17:30 - 17:55
    Kentucky C & D - Stable
  • Sunday, October 7
  • Patching: Show me where it hurts

    Cheryl Biswas
    Sun, 09:00 - 09:25
    Kentucky C & D - Stable
  • Advanced Deception Technology Through Behavioral Biometrics

    Curt Barnard, Dawud Gordon
    Sun, 09:30 - 09:55
    Kentucky C & D - Stable
  • We are all on the spectrum: What my 10-year-old taught me about leading teams

    Carla A Raisler
    Sun, 10:00 - 10:25
    Kentucky C & D - Stable
  • No Place Like Home: Real Estate OSINT and OPSec Fails

    John Bullinger
    Sun, 10:30 - 10:55
    Kentucky C & D - Stable
  • The Layer2 Nightmare

    Chris Mallz
    Sun, 11:00 - 11:25
    Kentucky C & D - Stable
  • Attacking Azure Environments with PowerShell

    Karl Fosaaen
    Sun, 11:30 - 11:55
    Kentucky C & D - Stable
  • Blue Blood Injection: Transitioning Red to Purple

    Lsly Ayyy
    Sun, 12:00 - 12:25
    Kentucky C & D - Stable
  • Mirai, Satori, OMG, and Owari - IoT Botnets Oh My

    Pete Arzamendi
    Sun, 12:30 - 12:55
    Kentucky C & D - Stable
  • Comparing apples to Apple

    Adam Mathis
    Sun, 13:00 - 13:25
    Kentucky C & D - Stable
  • How online dating made me better at threat modeling

    Isaiah Sarju
    Sun, 13:30 - 13:55
    Kentucky C & D - Stable
  • Threat Hunting with a Raspberry Pi

    Jamie Murdock
    Sun, 14:00 - 14:25
    Kentucky C & D - Stable
  • M&A Defense and Integration – All that Glitters is not Gold

    Sara Leal, Jason Morrow
    Sun, 14:30 - 14:55
    Kentucky C & D - Stable