14:30 |
Potter
|
Opening Remarks and Rants |
15:30 |
Bowers
|
How to Own A Building: Exploiting the Physical World With BacNET and the BacNET Attack Framework |
16:00 |
Young
|
Mainframed: The Secrets Inside That Black Box |
16:30 |
Baggett,
Williams
|
Wipe The Drive!!! - Techniques For Malware Persistence |
17:00 |
Medin
|
Apple iOS Certificate Tomfoolery |
17:30 |
O'Connor,
Tomes
|
Hide And Seek, Post-Exploitation Style |
18:00 |
Fisher
|
Bringing The Sexy Back To...Defense In Depth |
18:30 |
Blaze,
Eagle,
Invisigoth,
Marcus,
Schearer
|
Hackers get Schooled: Learning Lessons from Academia |
20:05 |
Chubirka,
Reck
|
Thin Slicing a Black Swan: A Search for the Unknowns |
20:25 |
Weidman
|
When Did the Smartphone Pentest Framework Get Awesome? |
20:45 |
Steele
|
ShellSquid: Distributed Shells With Node |
21:05 |
Neulist
|
If You Can Open The Terminal, You Can Capture The Flag: CTF for Everyone |
21:25 |
Klein
|
Becoming a Time Lord – Implications of Attacking Time Sources |
21:45 |
Nather
|
Swinging Security Style: An Immodest Proposal |
10:00 |
Matheson,
Nighswander,
Randall,
Thorson,
Wiens
|
Running a CTF: Panel and Discussion on the Art of Hacker Gaming |
Graham
|
C10M – Defending the Internet At Scale |
|
Mende,
Turbing
|
Paparazzi Over IP |
|
11:00 |
Anthony,
Reed
|
DIY: Using Trust To Secure Embedded Projects |
Miller,
Wick
|
Moloch: A New And Free Way To Index Your Packet Capture Repository |
|
Joyce
|
Openstack Security Brief |
|
12:00 |
Rash
|
Generalized Single Packet Authorization For Cloud Computing Environments |
Bratus,
Patterson
|
From "Shotgun Parsers" to Better Software Stacks |
|
Hofmann,
Kerr
|
The Computer Fraud and Abuse Act: Swartz, Auernheimer, and Beyond |
|
14:00 |
Harman
|
Malware Analysis: Collaboration, Automation & Training |
Bigman,
Ferraiolo,
McGovern,
Rosen
|
Bright Shiny Things = Why We Need Intelligent Data Access Controls |
|
Zimmerman
|
Ten Strategies of a World-Class Computer Security Incident Response Team |
|
15:00 |
Faynberg
|
Armor For Your Android Apps |
Schuetz
|
Protecting Sensitive Information on iOS Devices |
|
Aestetix
|
Beyond Nymwars: An Analysis Of The Online Identity Battleground |
|
16:00 |
Ryan
|
How Smart Is Bluetooth Smart? |
Khan,
Shields
|
Chopshop: Busting The Gh0St |
|
Pitchford
|
The Cloud - Storms On The Horizon |
|
17:00 |
Potter,
Potter
|
0wn The Con |
Caceres
|
PunkSPIDER: An Open Source, Scalable Distributed Fuzzing Project Targeting The Entire Internet |
|
Bowes
|
Crypto: You're Doing It Wrong |
|
18:35 |
Hinkel
|
Drones: Augmenting your cyber attack tool bag with aerial weapon systems |
18:55 |
Profanick
|
Managed Service Providers: Pwn One and Done |
19:15 |
Campbell
|
No Tools? No Problem! Building a PowerShell Botnet |
19:35 |
Willis
|
Extending the 20 Critical Security Controls to Gap Assessments and Security Maturity Modelling |
19:55 |
Gardener
|
Protecting Big Data From Cyber APT in the Cloud |
20:15 |
Goodspeed
|
Writing a Thumbdrive for Active Disk Antiforensics |
10:00 |
Pisano
|
Identity-Based Internet Protocol Network |
Randall
|
NSM And More With Bro Network Monitor |
|
Schearer
|
These Go to Eleven: When the Law Goes Too Far |
|
11:00 |
Moulton
|
Forensics - ExFat Bastardized for Cameras |
Bangert,
Bratus
|
Page Fault Liberation Army Or Better Security Through Trapping |
|
Hardy
|
Hacking As An Act Of War |
|
12:00 |
Hudak
|
Mastiff: Automated Static Analysis Framework |
Atlas,
Cutaway
|
Attacking Scada Wireless Systems For Fun And Profit - And Fixing |
|
Russell
|
Ka-Ching! How To Make Real Money |
|
13:30 |
Barnum,
Wilson
|
Is Practical Information Sharing Possible? |
14:30 |
Potter
|
Closing Remarks |
This "Old School" schedule is an automatically-generated evolution of a manually-generated hack Darth Null has been using at ShmooCon since 2007. It won't work too well for a large conference, like DEFCON, but for smaller events like ShmooCon or BlackHat DC, it might be useful.
Simply print this out at whatever scale is most helpful to you. For example, for ShmooCon: print at 65%, fold Friday and Sunday back behind Saturday, and laminate, for a two-sided 3" x 4" card that you can keep in your shirt pocket.