10:00 |
Payne
|
Keynote |
Duncan
|
Traffic Analysis Workshop 2018 |
|
Demick,
III
|
Binary Reverse Engineering for Beginners |
|
Hiring Village |
||
11:30 |
Wong
|
To AI or Not to AI? What the US Military Needs for Fighting Cyber Wars |
Stacey
|
Preparing for Incident Handling and Response within Industrial Control Networks |
|
12:00 |
Metcalf
|
FailTime: Failing towards Success |
Edwards
|
TItle: Getting Saucy with APFS! - The State of Apple’s New File System |
|
14:00 |
Bordonaro,
Gephart,
Ruthenberg
|
Basic Offensive Application of MOF Files in WMI Scripting |
Roth
|
An Open Source Malware Classifier and Dataset |
|
14:30 |
Hedglin
|
Counting Down to Skynet |
15:00 |
Serper
|
How we reverse engineered OSX/Pirrit, got legal threats and survived |
Slowik
|
Threat Activity Attribution: Differentiating the Who from the How |
|
16:00 |
Kerr,
Rodriquez
|
Quantify your hunt: not your parents’ red teaming |
Misher
|
Breaking and Entering: Lessons Learned from a Federal Penetration Tester |
|
17:00 |
Limbago
|
Internet Anarchy & The Global March toward Data Localization |
Grant
|
Powershell Deobfuscation: Putting the toothpaste back in the tube |
10:00 |
Germain,
Mosley
|
Effective Monitoring for Operational Security |
Ahuja
|
Plight at the end of the Tunnel |
|
Hughes,
Parakesyan,
Quach
|
Threat Hunting with ELK |
|
Hazelton,
Terpandjian
|
Cloud Busting: Understanding Cloud-Based Digital Forensics |
|
10:30 |
Grunzweig
|
Rise of the Miners |
Noerenberg
|
Malware Analysis and Automation using Binary Ninja |
|
12:00 |
Callahan,
Marini,
Shirley,
Thomas
|
Keynote - Between a SOC and a Hard Place Panel |
14:00 |
Mathis
|
Using Atomic Red Team to Test Endpoint Solutions |
Andrzejewski
|
Exercise Your SOC: How to run an effective SOC response simulation |
|
15:00 |
Adams,
Myers
|
Adding Simulated Users to Your Pentesting Lab with PowerShell |
Connell
|
Building a Predictive Pipeline to Rapidly Detect Phishing Domains |
|
16:00 | Closing Ceremony |
This "Old School" schedule is an automatically-generated evolution of a manually-generated hack Darth Null has been using at ShmooCon since 2007. It won't work too well for a large conference, like DEFCON, but for smaller events like ShmooCon or BlackHat DC, it might be useful.
Simply print this out at whatever scale is most helpful to you. For example, for ShmooCon: print at 65%, fold Friday and Sunday back behind Saturday, and laminate, for a two-sided 3" x 4" card that you can keep in your shirt pocket.