09:00 |
1000
|
Using the law to silence hackers and security researchers |
l0stkn0wledge
|
Winning isn't Everything: How Trolling can be as much Fun |
|
10:30 |
Martin
|
110 Years of Vulnerabilities |
11:30 |
Bitner,
Vazarkar
|
Antipwny: A Windows Based IDS/IPS for Metasploit |
12:30 |
Morin
|
Fuzzing 101 |
13:00 |
Keane
|
HTML 5 Security |
13:30 |
Clemenko
|
Playing the Forensics Game: Forensic Analysis of Gaming Applications For Fun and Profit |
14:00 |
Korzeb
|
How to Image a skyscraper. |
14:30 |
BTS
|
Project.Phree: Phucking the NSA |
15:30 |
Matwyshyn
|
"Reasonable" Information Security |
Infojanitor
|
Give Yourself A Hand |
|
16:00 | Panel: Cloud - Business and Academia - Bringing it all together |
|
16:30 |
Rege
|
Hackers Wanted: Creating an Interactive Cyberattack Playbook (Phase 1) |
17:00 |
Magniez
|
ANOTHER Log to Analyze - Utilizing DNS to detect Malware in Your Network |
09:00 |
Callaway
|
Uncloaking IP Addresses on IRC |
Handorf
|
Wireless Essentials |
|
10:30 |
Modell
|
Everything you ever wanted to know on how to start a Credit Union but were afraid to ask. |
11:00 |
Weiss
|
Hacking Benjamins |
13:00 |
Gibbs
|
Baking, even more, Clam(AV)s for Fun & Profit. |
13:30 |
Baskin
|
Introducing Intelligence Into Your Malware Analysis |
14:30 |
Rege
|
Hackers Wanted: Creating an Interactive Cyberattack Playbook (Phase 2) |
15:30 |
Oslick
|
Software Security: Game Day. |
This "Old School" schedule is an automatically-generated evolution of a manually-generated hack Darth Null has been using at ShmooCon since 2007. It won't work too well for a large conference, like DEFCON, but for smaller events like ShmooCon or BlackHat DC, it might be useful.
Simply print this out at whatever scale is most helpful to you. For example, for ShmooCon: print at 65%, fold Friday and Sunday back behind Saturday, and laminate, for a two-sided 3" x 4" card that you can keep in your shirt pocket.