Social Engineering At Work – How to use positive influence to gain management buy-in for anything
Red Mirror: Bringing Telemetry to Red Teaming
Goodbye Obfuscation, Hello Invisi-Shell: Hiding Your Powershell Script in Plain Sight
Bug Hunting in RouterOS
Patching: Show me where it hurts
Advanced Deception Technology Through Behavioral Biometrics
Ham Radio 4 Hackers
Two-Factor, Too Furious: Evading (and Protecting) Evolving MFA Schemes
Cloud Forensics: Putting The Bits Back Together
Breaking Into Your Building: A Hackers Guide to Unauthorized Access
We are all on the spectrum: What my 10-year-old taught me about leading teams
No Place Like Home: Real Estate OSINT and OPSec Fails
Getting Control of Your Vendors Before They Take You Down
IoT: Not Even Your Bed Is Safe
Killsuit: The Equation Group's Swiss Army knife for persistence, evasion, and data exfil
The making of an iOS 11 jailbreak: Kiddie to kernel hacker in 14 sleepless nights.
The Layer2 Nightmare
Attacking Azure Environments with PowerShell
Cyber Intelligence: There Are No Rules, and No Certainties
Fingerprinting Encrypted Channels for Detection
The MS Office Magic Show
Who Watches the Watcher? Detecting Hypervisor Introspection from Unprivileged Guests
Blue Blood Injection: Transitioning Red to Purple
Mirai, Satori, OMG, and Owari - IoT Botnets Oh My
Getting Started in CCDC
On the Nose: Bypassing Huawei's Fingerprint authentication by exploiting the TrustZone
Living off the land: enterprise post-exploitation
Pwning in the Sandbox: OSX Macro Exploitation & Beyond
Comparing apples to Apple
How online dating made me better at threat modeling
Changing Our Mindset From Technical To Psychological Defenses
Bypassing Port-Security In 2018: Defeating MacSEC and 802.1x-2010
Hillbilly Storytime: Pentest Fails
IOCs Today, Intelligence-Led Security Tomorrow
Threat Hunting with a Raspberry Pi
M&A Defense and Integration – All that Glitters is not Gold
Opening Ceremony