Build It! and Firetalks
Opening Remarks and Rants
How to Own A Building: Exploiting the Physical World With BacNET and the BacNET Attack Framework
Mainframed: The Secrets Inside That Black Box
Wipe The Drive!!! - Techniques For Malware Persistence
Apple iOS Certificate Tomfoolery
Hide And Seek, Post-Exploitation Style
Bringing The Sexy Back To...Defense In Depth
Hackers get Schooled: Learning Lessons from Academia
Thin Slicing a Black Swan: A Search for the Unknowns
When Did the Smartphone Pentest Framework Get Awesome?
ShellSquid: Distributed Shells With Node
If You Can Open The Terminal, You Can Capture The Flag: CTF for Everyone
Becoming a Time Lord – Implications of Attacking Time Sources
Swinging Security Style: An Immodest Proposal
Running a CTF: Panel and Discussion on the Art of Hacker Gaming
DIY: Using Trust To Secure Embedded Projects
Generalized Single Packet Authorization For Cloud Computing Environments
Malware Analysis: Collaboration, Automation & Training
Armor For Your Android Apps
How Smart Is Bluetooth Smart?
0wn The Con
Drones: Augmenting your cyber attack tool bag with aerial weapon systems
Managed Service Providers: Pwn One and Done
No Tools? No Problem! Building a PowerShell Botnet
Extending the 20 Critical Security Controls to Gap Assessments and Security Maturity Modelling
Protecting Big Data From Cyber APT in the Cloud
Writing a Thumbdrive for Active Disk Antiforensics
Identity-Based Internet Protocol Network
Forensics - ExFat Bastardized for Cameras
Mastiff: Automated Static Analysis Framework
Is Practical Information Sharing Possible?
Closing Remarks