0wn the Con
5G Protocol Vulnerabilities and Exploits
Adventures in Hardware Hacking or Building Expensive Tools on a Budget
Adversary Detection Pipelines: Finally Making Your Threat Intel Useful
Airplane Mode: Cybersecurity @ 30,000+ Feet
Amateur Radio Exams
Anti-Forensics for Fun and Privacy
A Wireless Journeyman’s Experience in Practical SIGINT
Banjo: An Android Disassembler for Binary Ninja
Battling Supermutants in the Phishing Wasteland
Between Two Moose
Chip Decapping on a Budget
Choose Your Own Adventure: Ransomware Response!
Cisco SMB Products — Critical Vulnerablities / 0-day Release
Closing Remarks
Command and KubeCTL: Real-World Kubernetes Security for Pentesters
Crossing the Border With Your Electronic Devices
Cybersecurity Clubs and You
DNS New World Order: QuadX! DoH! DoT! Da Fuq?
Do Unto Others: A Red Team Ethical Framework for Offensive Rules Of Engagement
Extracting an ELF From an ESP32
Face/Off: Action Plan for Perils & Privileges of Facial Recognition
Firetalks Opening
Flipping Bits on NSRL
Hacking Democracy: On Securing an Election
Hack the Stars
Knowing the UnFuzzed and Finding Bugs with Coverage Analysis
LABS: Infrastructure / Visualization
LABS: Log Collection / Aggregation
LABS: Networking / Core Services
LABS: Network Security
LABS: Security Operations Center
LABS: Threat Hunting / Log Correlation
LABS: Vulnerability Management
LABS: Wireless Network
Moose v. Woodchuck
Opening Remarks, Rumblings, Ruminations, and Rants
Playing the Short Game: The Effects of Data Breaches on Share Prices
Privacy Scores for iOS Apps
Project Everest: Fast, Correct, and Secure Software for Deployment Now!
Real World Zero Trust Implementation
Resistance Isn’t Futile: A Practical Approach to Prioritizing Defenses with Threat Modeling
Reverse Engineering Apple’s BLE Continuity Protocol for Tracking, OS Fingerprinting, and Behavioral Profiling
Robots and Privacy
SBOM: Screw it, We’ll Do it Live!
Security Researcher OPSEC
Software Mitigations for Hardware Vulnerabilities
Teen Hacks for Obfuscating Identity on Social Media
The Cyberlous Mrs. Maisel: A Comedic (and slightly terrifying) Introduction to Information Warfare
The Hacker’s Guide to Cybersecurity Policy in 2020
The Verilog to Verilog Decompiler
Think of the Kitten: The Truth About Section 230, the Law All the Cute Online Cat Pictures (And a Lot of Other Good Stuff) Depends On
Using Abusing the Freedom of Information Act
Using Android WebViews to Steal All the Files
Using OSINT for Human Rights and Victim Support
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Review Process From the Ground Up
Voight-Kampff for Email Addresses: Quantifying Email Address Reputation to Identify Spear-Phishing and Fraud
What if We Had TLS for Phone Numbers? An Introduction to SHAKEN/STIR
Whitelisting LD_PRELOAD for Fun and No Profit
Zoom 0-Day: How Not to Handle a Vulnerability Report