Black Hat USA 2010 - Wednesday, July 28
08:50
Moss
Welcome & Introduction to Black Hat USA 2010
09:00
Keynote
10:00
Le
Payload Already Inside: Data Re-Use for ROP exploits
Engel, Hill, Stender
Attacking Kerberos Deployments
Feinstein, Jarmoc, King
The Emperor Has No Clothes: Insecurities in Security Infrastructure
Oh
ExploitSpotting: Locating Vulnerabilities Out Of Vendor Patches Automatically
Grugq
Base Jumping: Attacking GSM Base Station Systems and Mobile Phone Base Bands
Boni, Cushman, Litchfield, Stamos, Stewart
Optimizing the Security Researcher and CSO Relationship
Huang, Sima
Drivesploit: Circumventing both automated AND manual drive-by-download detection
Ilyas, Percoco
Malware Freak Show 2010: The Client-Side Boogaloo
Meiners, Sor
WPA Migration Mode: WEP is back to haunt you…
Nagy
Industrial Bug Mining - Extracting, Grading and Enriching the Ore of Exploits
Panel
Cloud Security Alliance Summit
11:15
Waisman
Aleatory Persistent Threat
Azubel, Ochoa
Understanding the Windows SMB NTLM Weak Nonce Vulnerability
Cummins, Pollet
Electricity for Free? The Dirty Underbelly of SCADA and Smart Meters
Johnson, Miller
Crash Analysis using BitBlaze
Kane-Parry
More Bugs In More Places: Secure Development On Moble Platforms
Beckstrom, Kaminsky, Mockapetris, Silva, Weatherford
Systemic DNS Vulnerabilities and Risk Management: A Discussion With the Experts
Ames, Lai, Smith
Balancing the Pwn Trade Deficit
Hoglund
Malware Attribution: Tracking Cyber Spies and Digital Criminals
Paget
Extreme-range RFID tracking
Beek
Virtual Forensics
13:45
Vries
Hacking Java Clients
Elrod, Keltner
Adventures in Limited User Post Exploitation
Arlen
SCADA and ICS for Security Experts: How to avoid Cyberdouchery
Jack
Jackpotting Automated Teller Machines Redux
Lineberry, Richardson, Wyatt
These Aren't the Permissions You're Looking For
Hayden
Cyber war...Are we at war? And if we are, how should we fight it?
Hayden, Rodriguez
One on One Interview with General (Ret.) Michael V. Hayden
Sumner
Social Networking Special Ops: Extending Data Visualization Tools for faster Pwnage
Daswani
mod_antimalware: A Novel Apache Module for Containing web-based Malware Infections
Mende, Rey
Burning Asgard - What happens when Loki breaks free
Allen, Umadas
Network Stream Debugging with Mallory
15:15
Grenier, Johnson
Harder, Better, Faster, Stronger: Semi-Auto Vulnerability Research
b
Standing on the Shoulders of the Blue Monster: Hardening Windows Applications
Kaminsky
Black Ops Of Fundamental Defense: Web Edition
Suiche
Blue Screen Of the Death is Dead.
Iozzo, Kornau, Weinmann
Everybody be cool this is a roppery!
Elefant, Hathaway, Hayden, Maughan, Mitchell, Rodriguez
Security Innovation Network: Connecting Buyers, Builders, and the Research Community
Parker
Finger Pointing for Fun, Profit and War?
Thomas
BlindElephant: WebApp Fingerprinting and Vulnerability Inferencing
Lawson, Nelson
Exploiting Timing Attacks in Widespread Systems
Dabirsiaghi
JavaSnoop: How to Hack Anything Written in Java
Bankston, Fennelly, Klein, Manson, Ohm, Opsahl, Panel, Salgado, Thieme
Hacker Court
16:45
Croce
SAP Backdoors: A Ghost at the Heart of Your Business
Hutton, Miller
Ushering in the Post-GRC World: Applied Threat Modeling
Keltner, Moyer
Wardriving the Smart Grid: Practical Approaches to Attacking Utility Packet Radios
Hering, Mahaffey
App Attack: Surviving the Mobile Application Explosion
Reception: Security Innovation Network
Ryan
Getting In Bed With Robin Sage
Fifield, Vaskovitch
Mastering the Nmap Scripting Engine
Born
PSUDP: A Passive Approach to Network-Wide Covert Communication
Patterson, Sassaman
Exploiting the Forest with Trees
Black Hat USA 2010 - Thursday, July 29
10:00
Wielgoszewski
Constricting the Web: Offensive Python for Web Hackers
Marlinspike
New Threats to Privacy: From TIA to Google
Yerazunis
Keeping the Good Stuff In: Confidential Information Firewalling with the CRM114 Spam Filter & Text Classifier
Meer
Memory Corruption Attacks: The (almost) Complete History...
Hoff
CLOUDINOMICON: Idempotent Infrastructure, Survivable Systems & Bringing Sexy Back to Info Centricity
CSI: TCP/IP
Kelley, Kennedy
Microsoft Powershell - It's time to own
Grossman
Breaking Browsers: Hacking Auto-Complete
Heffner
How to Hack Millions of Routers
Ristic
State of SSL on the Internet: 2010 Survey, Results and Conclusions Routers
Smith
pyREtic – Reversing obfuscated Python bytecode & live Python objects
Session
Regional Collegiate Cyberdefense Competition
11:15
Esser
Utilizing Code Reuse/Return Oriented Programming in PHP Web Application Exploits
Cross
Unauthorized Internet Wiretapping: Exploiting Lawful Intercept
Siddharth
Hacking Oracle From Web Apps
Ormandy, Tinnes
There's a party at Ring0 (and you're invited)
Bugher
Secure Use of Cloud Storage
Policy, Privacy, Deterrence and Cyber War
Shostack
Elevation of Privilege: The Easy way to Threat Model
Hypponen
You Will be Billed $90,000 for This Call
Hansen, Sokol
HTTPS Can Byte Me
Ollmann
Becoming the six-million-dollar man
Bratus, Conti
Voyage of the Reverser: A Visual Study of Binary Species
Kushner, Murray
Your Career = Your Business
13:45
Byrne, Henderson
GWT Security: Don’t Get Distracted by Bright Shiny Objects
Rad
The DMCA & ACTA vs. Academic & Professional Research: How Misuse of this Intellectual Property Legislation Chills Research, Disclosure and Innovation
Cerrudo
Token Kidnapping's Revenge
Zovi
Return-Oriented Exploitation
Criscione
Virtually Pwned: Pentesting Virtualization
Human Intel
Vixie
ISC SIE Passive DNS vs. Apache Cassandra
Cheatham, Raber
Reverse Engineering with Hardware Debuggers
FX
Blitzableiter - the Release
Smith
Defenseless in Depth
Pericin, Vuksan
TitanMist: Your First Step to Reversing Nirvana
Kushner, Murray
Things You Wanted To Know But Were Afraid To Ask About Managing Your Information Security Career
15:15
Kamkar
How I Met Your Girlfriend
Nohl
Attacking Phone Privacy
Fayó
Hacking and protecting Oracle Database Vault
Valasek
Understanding the Low- Fragmentation Heap: From Allocation to Exploitation
Anh
Virt-ICE: Next Generation Debugger for Malware Analysis
Ex-Fed Confessions
Cronin, Engebretson, Pauli
SpewPAL: How capturing and replaying attack traffic can save your IDS
Becherer
Hadoop Security Design? Just Add Kerberos? Really?
Harbour
The Black Art of Binary Hijacking
Shah
Hacking Browser's DOM - Exploiting Ajax and RIA
Henderson, Ocepek
Need a hug? I'm secure.
Kawach
NEPTUNE: Dissecting Web-based Malware via Browser and OS Instrumentation
Panel
ISSA
16:45
Creighton, Eng
Deconstructing ColdFusion
Bailey, DePetrillo
Carmen Sandiego is On the Run!
Sullivan
Cryptographic Agility: Defending Against the Sneakers Scenario
Shelton
Advanced AIX Heap Exploitation Methods
Wicherski
dirtbox: a Highly Scalable x86/Windows Emulator
Meet the Feds Reception
Slaviero
Lifting the Fog
Rushing
USB - HID, The Hacking Interface Design
Davis
Security is Not a Four Letter Word
Bursztein, Gourdin, Rydstedt
Bad Memories
Brown, Ragan
Lord of the Bing: Taking back search engine hacking from Google and Bing
Bolzoni, Schade
Goodware drugs for malware: on-the-fly malware analysis and containment


Instructions

This "Old School" schedule is an automatically-generated evolution of a manually-generated hack Darth Null has been using at ShmooCon since 2007. It won't work too well for a large conference, like DEFCON, but for smaller events like ShmooCon or BlackHat DC, it might be useful.

Simply print this out at whatever scale is most helpful to you. For example, for ShmooCon: print at 65%, fold Friday and Sunday back behind Saturday, and laminate, for a two-sided 3" x 4" card that you can keep in your shirt pocket.