10:30 |
Keanini
|
Boyd's OODA and General Predator/Prey theory |
Nather
|
How Government Accountability Conflicts With Citizen Privacy (and Why It's Your Fault) |
|
Ely
|
Exploiting Management For Fun and Profit - or - "Management is not stupid, you are" |
|
11:30 |
Smith
|
Are There Still Wolves Among Us? |
Roberts
|
Planes keep falling on my head |
|
Donarski
|
Weaponizing The Smartphone: Deploying The Perfect WMD |
|
12:30 |
Kelley,
Kennedy
|
Using the Teensy for so much more... |
Rook
|
Agnitio: the security code review Swiss army knife. Its static analysis, but not as we know it |
|
Ristic
|
A study of what really breaks SSL |
|
13:30 |
Towne
|
Vulnerability Research Circa 1851 |
Ottenheimer
|
2011: A Cloud Odyssey |
|
Vandevanter
|
Distributed Denial of Service Attacks for Whitehats |
|
14:30 |
Los
|
Pentultimate Hack - Manipulating Layers 8 & 9 of the OSI Model (Management & Budget) |
Mein
|
All about the Benjamins -- Google's vulnerability reward programs |
|
Kotler
|
Sounds Like Botnet |
|
15:30 |
Johansen,
Osborne
|
Hacking Google Chrome OS |
Gostom,
Marpet
|
Smile for the Grenade! Camera go Bang! |
|
Cowen
|
Anti Anti Forensics |
|
16:30 |
Cortesi
|
UDID pwnage (0day for iOS) |
Grecs
|
How to Win Followers and Influence Friends: Hacking Twitter to Boost Your Security Career |
|
Fox
|
Tell Me Your Secrets - Tales of Social Engineering and The Human Mind |
10:30 |
Baskin
|
Walking the Green Mile: How to Get Fired After a Security Incident |
Barrera,
Sokol
|
How to Hide Your Pr0n |
|
Vedaa
|
Fuck the Penetration Testing Execution Standard (PTES) |
|
11:30 |
Zatko
|
Cyber Fast Track |
Weidman
|
Transparent Botnet Command and Control for Smartphones over SMS |
|
Baker
|
Living the Dream! - Info Sec Style |
|
12:30 |
Bannedit,
egyp7
|
Long Beard's Guide to Exploit Dev |
warezjoe
|
Wireless’ dirty sisters: The other RF you aren’t looking at and why you are going to get hurt! |
|
Mahbubani
|
Cognitive Intelligence and Network Analysis |
|
13:30 |
Beresford
|
Siemens / SCADA 0day |
Mimoso,
Petermann,
Shafer,
Wilson
|
InfoSex Sells: The Impact Of The Media And Public Opinion On Security |
|
Shpantzer
|
Cultural Cues from High Risk Professions |
|
14:30 |
Amit
|
Advanced data exfiltration - the way Q would have done it |
Abraham
|
Hacking webapps is more fun when the end result is a shell! |
|
Deacon
|
Info Sec Institute: What College Never Will Teach You |
|
15:30 |
Moore
|
Something Awesome™ |
Corman,
Daniel,
McKeay,
Shpantzer,
Thayer
|
Better to burn out than to fade away? |
|
Friedli
|
THE 99¢ HEART SURGEON DILEMMA (How to fix penetration testing.) |
|
16:30 |
Jay,
Shane
|
How to pass audits with non-compliant systems |
Manning,
Poulson,
Riley,
Ross
|
How (not) to run a Bsides |
|
Bratus
|
Exploiting the Hard-Working DWARF |
This "Old School" schedule is an automatically-generated evolution of a manually-generated hack Darth Null has been using at ShmooCon since 2007. It won't work too well for a large conference, like DEFCON, but for smaller events like ShmooCon or BlackHat DC, it might be useful.
Simply print this out at whatever scale is most helpful to you. For example, for ShmooCon: print at 65%, fold Friday and Sunday back behind Saturday, and laminate, for a two-sided 3" x 4" card that you can keep in your shirt pocket.