DerbyCon 9.0 - Finish Line - Friday, September 6
08:30
Opening Ceremony
09:00
Skoudis
Opening Keynote - Presented by Ed Skoudis
10:00
others
DerbyCon Story Time Panel
12:00
Hadnagy
Dynamic Risk Taking and Social Engineering
Barry, Cook, Kienow, Martin
Metasploit Town Hall Finale
Strand
Well, what have we here? A year of cyber deception, attribution and making attackers rethink their life choices.
Owens
Bypassing MacOS Detections With Swift
12:30
Lewis
IPv6 Security Considerations - For When "Just Turn It Off" Isn't Good Enough
13:00
DeMott, Stigerwalt
Using Next Generation Fuzzing Tools: Fixing Bugs and Writing Memory Corruption Exploits
Street
I PWN thee, I PWN thee not!
Saulnier
BloodHound From Red to Blue
Basu
Offensive Machine Learning for Pentesters and Red Teams
13:30
Bingham
SCADA: What the next Stuxnet will look like and how to prevent it
14:00
Graeber
“How do I detect technique X in Windows?” Applied Methodology to Definitively Answer this Question
Elkins
Scientific computing for information security – forging the missing link
Hertz
Azure Sentinel - A first look at Microsoft's SIEM Solution
Kramer
Designing & building a stealth C2 LDAP channel
14:30
Jr
There's No Place like (DUAL)Homed.
15:00
Cody, Tomes
To CORS! The cause of, and solution to, your SPA problems!
Eisen, Lehman
Defeating Next-Gen AV and EDR: Using Old (And New) Tricks on New Dogs
Davison, Schwartz
Behavioral Security and Offensive Psychology at Scale
Peterman
Modlishka - Is a Mantis Eating 2FA's Lunch?
15:30
Hempel
Hacking Humans: Addressing Vulnerabilities in the Advancing Medical Device Landscape
16:00
Christensen, Schroeder
Not A Security Boundary: Breaking Forest Trusts
Baggett
The Hackers Apprentice
Holmes
PowerShell Security: Looking Back from the Inside
Olsen
It Must Be Fancy Bear!
16:30
Roberts, White
Getting the most out of your covert physical security assessment - A Client’s Guide
17:00
Angelo, Baker, Kennedy, Walpole
Enabling The Future (Panel)
Smith
How to Tell the C-Level Their Baby is Ugly
Williams
Cyber false flags and adversarial counterintelligence, oh my…
Herman
Getting dirty on the CANBUS
17:30
Sebree
Automated Dylib Hijacking
18:00
Lakhan, Moe
Phishing past Mail Protection Controls using Azure Information Protection (AIP)
DerbyCon 9.0 - Finish Line - Saturday, September 7
09:00
Landers, Pearce
42: The answer to life, the universe, and everything offensive security
Rosenmund
Collect All the Data - Protect All the Things
Troia
Catching Cyber Criminals – Investigative techniques to identify modern threat actors and the clues they leave behind during data breaches
Matthews
The $19.95 anonymous cyber profile
09:30
Condon
Prepare to Be Boarded! A Tale of Kubernetes, Plunder, and Cryptobooty
10:00
Holden, Suto
kubered - Recipes for C2 Operations on Kubernetes
Griffith, Wright
Lying in Wait: Discovering and Exploiting Weaknesses in Automated Discovery Actions
Tulis
COM Hijacking Techniques
Bong, Vieau
Build your own multi-user password manager using open source software
10:30
Ruff
No class, Low Tech, High damage
12:00
Gennuso
Testing Endpoint Protection: How Anyone Can Bypass Next Gen AV
Heiland
Inter-chip communication - Testing end-to-end security on IoT
Saunders
Assumed Breach: A Better Model for Penetration Testing
Nester
Early Detection Through Deception
12:30
Tabellion
The quest for 10g IDS
13:00
Fosaaen
Adventures in Azure Privilege Escalation
Szymanski
REST in Peace: Abusing GraphQL to Attack Underlying Infrastructure
Gibble, Haigh, Sikorski, Tully
StringSifter: Learning to Rank Strings Output for Speedier Malware Analysis
Douglas, Petersen
Swagger Defense
13:30
Schroeder
Kerberoasting Revisited
14:00
Shelton
Breaking & Entering via SDR, or How I defeated Wiegend over UHF/VHF, or your apartment isn't safe...
Tokazowski
The “Art” of The BEC - What Three Years of Fighting Has Taught Us
Villanueva
Practical Heuristic Exploitation
B
Hacking While Blind.
14:30
Budacki
Choose Your Own TTX: Redefining the Incident Response Table Top Exercise
15:00
Sebree
Assessing IoT Surveillance - Arlo
Robbins, Vazarkar
BloodHound: Head to Tail
Melamed
Full Steam Ahead: Serverless Hacking 101
Rickard
Hunting Phish Kits
15:30
Mullin
One woman's journey to CISO leveraging Social Engineering
16:00
Balan
Next-gen IoT botnets - leveraging cloud implementations for shells on 500k IoTs
Lang
Red Team Methodology: A Naked Look
Berlin, Carhart, Clements, Neely, Wright
Five Mistakes We Wish Users Would Stop Making
Hawkins
SharPersist: Windows Persistence Toolkit in C#
16:30
Schwartz
Are you ready to leverage DevSecOps? Get ready and use it for good.
17:00
Lo
Attacking with Automation: How Office 365 automation provides another new risk to the cloud
Shaver
API Keys, Now What?Taking the Pen Test Into the Amazon Cloud
Dyer, Hazelrigg
Shadow IT in the Cloud
17:30
Smith
.NET Manifesto - Win Friends and Influence the Loader
18:00
Carhart
Confessions of an IT / OT Marriage Counselor
DerbyCon 9.0 - Finish Line - Sunday, September 8
09:00
Quiet Time
Leapline, Yocum
Rise of the Machines // using machine learning with GRC
Boyd, Compton
Unix: the Other White Meat
Cooper
Python Two birds with one stone
09:30
Legowski
Invoke-GreatBirdOfCommonKnowledge - Gathering what is scattered with ATT&CK, an Atomic Bird, and a bit of homegrown PowerShell...
10:00
Salvati
Red Team Level over 9000! Fusing the powah of .NET with a scripting language of your choosing: introducing BYOI (Bring Your own Interpreter) payloads.
Blanchard
How to Give the Gift That Keeps on Giving - Your Knowledge
Rumble
RFID sniffing, under your nose and in your face!
McMurray
Adventures in systemd injection
10:30
Escobar
Frag, You're It - Hacking Laser Tag
11:00
Metcalf
Active Directory Security: Beyond the Easy Button
Mayer
The Backup Operators Guide to the Galaxy
Remes
Product Security Shouldn't be Painful
Atkinson
Waking up the data engineer in you!
11:30
Defoe, Fowl
Old Tools, New Tricks: Hacking WebSockets
12:00
Reed
Incident response on macOS
Coggin
SS7 for INFOSEC
Bryant, Falcone
Hunting Webshells: Tracking TwoFace
Hartong
Endpoint Detection Super Powers on the cheap, with Sysmon
12:30
Still More Quiet Time
13:00
Velazco
I sim(ulate), therefore i catch: enhancing detection engineering with adversary simulation
Maleeff
Empathy as a Service to Create a Culture of Security
Linn
Improving CACTUSTORCH payloads
EvilMog
Automating Hashtopolis
13:30
Gardner
Social Engineering in Non-Linear Warfare
14:00
Bort
Adversarial Emulation
Gonzalez, Labelle
Welcome to the Jumble: Improving RDP Tooling for Malware Analysis and Pentesting
More Quiet Time
Brown
How to cook a five star meal from the convenience of your hotel room
14:30
David
Virtual Smart Cards for Lab Environments
15:30
Closing Ceremony


Instructions

This "Old School" schedule is an automatically-generated evolution of a manually-generated hack Darth Null has been using at ShmooCon since 2007. It won't work too well for a large conference, like DEFCON, but for smaller events like ShmooCon or BlackHat DC, it might be useful.

Simply print this out at whatever scale is most helpful to you. For example, for ShmooCon: print at 65%, fold Friday and Sunday back behind Saturday, and laminate, for a two-sided 3" x 4" card that you can keep in your shirt pocket.