10:00 |
Daniel
|
Keynote: The State of Security BSides |
11:00 |
Weeks
|
Ambush - Catching Intruders at Any Point |
Fomal
|
How I managed to break into the InfoSec World with only a tweet and an email |
|
Krick
|
Arizona Craigslist Hookers (and other dating website shenanigans) |
|
12:00 |
Rowley
|
Max Level Web App Security |
Keene
|
Breaking Microsoft Dynamics Great Plains - an insiders guide |
|
Westin
|
When Devices Rat Us Out |
|
14:00 |
Ottenheimer
|
Big Data's Fourth V: Or why we'll never find the Loch Ness Monster |
Ghote
|
Lotus Notes Password Hash Redux |
|
TBA day of Conference |
||
15:00 |
Moore
|
Empirical Exploitation |
McIntyre
|
How I Learned To Stop Worrying And Love The Smart Meter |
|
Dallas
|
Why have we not fixed the ID problem |
|
16:00 |
Lytle
|
Puzzle Competitions and You |
Campbell
|
Shot With Your Own Gun: How Appliances are Used Against You |
|
int0x80
|
TBA day of Conference |
|
17:00 |
Patel
|
Introducing 'Android Security Evaluation Framework' - ASEF |
Asmus,
Widak
|
Mirror Mirror -- Reflected PDF Attacks Using SQL Injection |
|
Moore
|
Global Loot |
|
18:00 |
Gold
|
RFID LOL |
Weidman
|
Introducing the Smartphone Penetration Testing Framework |
|
Amit
|
Sexy Defense |
10:00 |
Mudge
|
Force Multipliers for Red Team Operations |
Young
|
Mainframed: The Forgotten Fortress |
|
Montoro,
Santos
|
Mobile Snitch - Devices telling the world about you |
|
11:00 |
Hay,
Johansen
|
Applications and Cloud and Hackers, Oh My! |
Williams
|
Metrics that Suck Even Less |
|
TBA day of Conference |
||
12:00 |
O'Connor
|
Reticle: Dropping an Intelligent F-BOMB |
Constantine
|
The Leverage of Language, or: How I realized Information Theory could save Information Security |
|
TBA day of Conference |
||
14:00 |
Cornell,
Sokol
|
The Magic of Symbiotic Security: Creating an Ecosystem of Security Systems |
Ding
|
The Blooming Social Media Economics Built on 'Fake' Identities |
|
Kennedy
|
Secret Pentesting Techniques... Shh...... |
|
15:00 |
Lester,
Tartaro
|
Occupy Burp Suite: Informing the 99% of what the 1%'ers are knowingly taking advantage of |
Lightning Talks |
||
Fakhoury,
Hofmann,
Opsahl,
Stoltz,
Timm
|
Ask the EFF |
|
16:00 |
DC-949
|
Stiltwalker: Round 2 |
Blue
|
TBA day of Conference |
|
17:00 |
Jones
|
The Badmin Project (Na-na-nanana Na-na-nanana BADMIN) |
Bryan
|
Router of Darkness, Techniques for Embedded System Hacking |
|
18:00 | IPv6 Panel / Drinking Game |
|
Legion303
|
Making Lockpicks the Legion303 Way |
This "Old School" schedule is an automatically-generated evolution of a manually-generated hack Darth Null has been using at ShmooCon since 2007. It won't work too well for a large conference, like DEFCON, but for smaller events like ShmooCon or BlackHat DC, it might be useful.
Simply print this out at whatever scale is most helpful to you. For example, for ShmooCon: print at 65%, fold Friday and Sunday back behind Saturday, and laminate, for a two-sided 3" x 4" card that you can keep in your shirt pocket.