10:00 |
Rook
|
Injecting Simplicity not SQL |
Molina
|
Top 10 Things IT is Doing to Enable CyberCrime |
|
11:00 |
Linn
|
Multi-Player MetaSploit |
Gragido
|
Through the rabbit hole: An Expose of Darknets and the Onion Routed Underground |
|
12:00 |
Pogue
|
Sniper Forensics - One Shot, One Kill |
Kim
|
Mobilizing the PCI Resistance: Lessons Learned From Fighting Prior Wars (SOX-404) |
|
13:00 |
Hollowell,
Lytle
|
CDCC |
Hay,
Nickerson
|
Building Bridges - Forcing Hackers and Business to Hug it Out |
|
14:00 |
Correll,
Corrons
|
Catch That Butterfly: Stopping Mariposa & Revealing a Growing Underground Network of Amateur Hackers |
Phatak
|
ExploitHub: Arming the Pen Testers to Plug the Holes |
|
15:00 |
Kennedy
|
SET 0.6 release with special PHUKD Key |
Judge,
Maynor
|
The Dark side of Twitter, Measuring and Analyzing Malicious Activity on Twitter |
|
16:00 |
Frank^2
|
Fuck Tools, Do It yourself Jerk |
Grecs
|
Infosec Communities for Career Success: Understanding, Participating, and Cooking One Up |
|
17:00 |
Abraham
|
Fierce v2 |
Sokoly
|
Infosec Young and Restless |
|
18:00 |
MacLeod
|
Stupid IP Tables Tricks |
Arlen,
Corman,
Fagan,
Honeywell,
Jacobs,
Lewis,
Los
|
INFOSEC Mentoring, Mentee-ing Panel |
10:00 |
Shah
|
Mobile Hackery |
Corman,
Daniel,
Fisher,
Moore
|
InfoSec Speed Debates |
|
11:00 |
egyp7
|
Beyond r57 |
Sumner
|
Social Network Special Ops: Extending data visualization tools for faster Pwnage |
|
12:00 |
Moore
|
Fun with VxWorks |
Breedijk,
Southham
|
The road to hell is paved with best practices |
|
13:00 |
Ottenheimer
|
KeyPad Bypass Hacks |
Potter
|
How to Make Network Diagrams that Don't Suck |
|
14:00 |
Lanier
|
It Melts In Your Hand: An Overview of Security (Failures) In Mobile Applications |
Smith
|
Roman Profiles : The 6 Mistakes of |
|
15:00 |
Kelly
|
A mechanics view of SQL injection |
Smith
|
Social Engineering the CFP Process |
|
16:00 |
Marlinspike
|
How technology killed my heroes, and why they will never be born again |
Roberts
|
Planes, Trains and Automobiles (OK, Cars and Buses) |
|
17:00 |
Gironda
|
App Assessments Reloaded |
Ross
|
Who Owns the Internet? AKA: Where did all that cyberspace go? |
This "Old School" schedule is an automatically-generated evolution of a manually-generated hack Darth Null has been using at ShmooCon since 2007. It won't work too well for a large conference, like DEFCON, but for smaller events like ShmooCon or BlackHat DC, it might be useful.
Simply print this out at whatever scale is most helpful to you. For example, for ShmooCon: print at 65%, fold Friday and Sunday back behind Saturday, and laminate, for a two-sided 3" x 4" card that you can keep in your shirt pocket.