15:00 |
Fleischer
|
Opening Remarks |
16:00 |
Greenstadt,
Johanson
|
Open Vulture - Scavenging the Friendly Skies Open Source UAV Platform |
16:30 |
Ligh,
Smith
|
Building the 2008 and 2009 ShmooBall Launchers |
17:00 |
Janansky
|
The Day Spam Stopped (The Srizbi Botnet Takedown) |
17:30 |
Adams,
Hartstein,
MobileDisco
|
Automated Mapping of Large Binary Objects |
18:00 |
Davis
|
Decoding the SmartKey |
18:30 |
Corman,
Dahn,
Shubina
|
Watching the Watcher: The Prevalence of Third-party Web Tracking |
19:00 |
Chuvakin,
Conti,
Daniel
|
Keynote |
10:00 |
Corbari
|
Phishing Statistics and Intuitive Enumeration of Hosts and Roles |
Kennedy,
valanx
|
Exploring Novel Ways in Building Botnets |
|
Dispensa
|
Radio Reconnaissance in Penetration Testing - All Your RF Are Belong to Us |
|
11:00 |
Maynor,
Zaborowski
|
Building an All-Channel Bluetooth Monitor |
Devers
|
Pulling a John Connor: Defeating Android |
|
Bailey,
McRee
|
Fail 2.0: Further Musings on Attacking Social Networks |
|
12:00 |
Miller,
Neely
|
Next Generation Wireless Recon, Visualizing the Airwaves |
Li
|
Hack the Genome! The Age of Bimolecular Cryptology |
|
Bratus
|
Stranger in a Strange Land: Reflections on a Linux Guy's First Year at Microsoft |
|
14:00 |
Endgrain
|
Man in the Middling Everything with The Middler |
Abraham
|
Blinded by Flash: Widespread Security Risks Flash Developers Don't See |
|
Reguly
|
They Took My Laptop! U.S. Search and Seizure Explained |
|
15:00 |
Cates,
Gates
|
Building Wireless Sensor Hardware and Software |
Wolf
|
802.11 ObgYn or "Spread Your Spectrum" |
|
Dabirsiaghi
|
The Gentlemen's Agreement: Pwning Friends Legally for Fun, ????, and Profit |
|
16:00 |
Calca,
Day,
Palazon
|
Off the Shelf Security Meeting Crime with an Open Mind |
Kennedy,
valanx
|
All Your Packets are Belong To Us: Attacking Backbone Technologies |
|
Lockheed
|
Security vs. Usability: False Paradigms of Lazyness |
|
17:00 |
Chapman,
Cowan
|
The OWASP AntiSamy Project |
O'Toole
|
The Fast-Track Suite: Advanced Penetration Techniques Made Easy |
|
Ragsdale
|
Storming the Ivy Tower: How to Hack Your Way into Academia |
10:00 |
Daniel
|
Enough with the Insanity: Dictionary Based Rainbow Tables |
Moulton,
Ray
|
Re-Playing with (Blind) SQL Injection |
|
Vega
|
Ten Cool Things You Didn't Know About Your Hard Drive! |
|
11:00 |
Holt
|
EDL Cloning for $250 |
Blazakis
|
RFID Unplugged |
|
Chéron
|
Solve this Cipher and Win! |
|
12:00 |
Palka
|
Jsunpack: An Automatic JavaScript Unpacker |
0wn the Con |
||
Banks,
Bregenzer
|
Reinterpreting the Disclosure Debate for Web Infections |
|
13:30 |
Fleischer,
Gourneau,
Jagdale,
Lauer
|
Are bad times good for security professionals? |
14:00 |
Fleischer
|
Closing Remarks |
This "Old School" schedule is an automatically-generated evolution of a manually-generated hack Darth Null has been using at ShmooCon since 2007. It won't work too well for a large conference, like DEFCON, but for smaller events like ShmooCon or BlackHat DC, it might be useful.
Simply print this out at whatever scale is most helpful to you. For example, for ShmooCon: print at 65%, fold Friday and Sunday back behind Saturday, and laminate, for a two-sided 3" x 4" card that you can keep in your shirt pocket.