BSidesLV 2018 - Tuesday, August 7
08:00
Cheung
Introduction to Cryptographic Attacks
Rajguru
Mobile Application Hacking - Master Class
Murphy
Intro to Industrial Control System Network Analysis
Forshaw
Windows Internals and Local Attack Surface Analysis using Powershell
Randall
Network Security Monitoring
10:00
Christy
Cold Case Cyber Investigations: Catfishing Cooper and Other Ops
11:00
Daniel
The Best of Security BSides Now and Then: Ten Years of Mixes
Compton
Hillbilly Storytime - Pentest Fails
11:20
Christy
Keynote Q&A; and Meet & Greet with Jim Christy
11:30
Nickels, Wunder
ATT&CKing; the Status Quo: Improving Threat Intel and Cyber Defense with MITRE ATT&CK;
Ellis, Everette, Friedman, Merrill
Who Wants to Be A Regulator: The IoT Security Game Show
Chalupowski
The Chrome Crusader
TBD
Rashid
Get on the Eye Level: Tailoring the Security Talk
Hawes
101 ways to fail at getting value out of your investments in security analytics, and how not to do that
Carhart
Lesley Carhart Kicks Off Hire Ground
Intro Session
12:00
Devost
From Hacker to Serial Entreprenuer
Resume Review & Career Coaching
14:00
Kajiloti, Lechtik
SiliVaccine: North Korea's Weapon of Mass Detection
Kubecka
How to Start a Cyber War: Lessons from Brussels -EU Cyber Warfare Exercises
Chang
Active Directory Password Blacklisting
Barnard
Who Watches the Watchers?: Understanding the Internet's Background Noise
Sanders
An Introduction to Machine Learning and Deep Learning
Cox, Ellis, Gallagher, Ragan, Wagenseil
Engaging the Media: Know Your Target
Terp
Social engineering at scale, for fun
Wylie
Deep Dive into NMAP & Network Scanning
cole
Snake Oil & The Security Industry
14:30
Wieczorek
You're Good and You Should Feel Good
K
Implementing the Three Cs of Courtesy, Clarity, and Comprehension to Optimize End User Engagement
15:00
Barnhart-Magen, Caltum
JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and face recognition - and frankly, everywhere else
Cucci, Medina
Red Teaming a Manufacturing Network (Without Crashing It)
Mog
Anatomy of NTLMv1/NTLMv1-SSP
Campbell
Lessons Learned by the WordPress Security Team
Mager
Stop and Step Away from the Data: Rapid Anomaly Detection via Ransom Note File Classification
White
The Long Way Around – from Software Engineering to Cyber Security (How Choosing Wrong Turned out to be Right)
Gallagher, Ragan, Thomson, Wagenseil
Engaging the Media: Telling Your Story
Gish-Johnson
Building A Teaching / Improvement Focused SOC
Suresh
A peek into the cyber security of the aviation Industry.
15:30
Kashefipour
Modern Political Warfare: A Look at Strategy and TTPs
17:00
Arvanaghi
Attacking Ethereum dApps
Everette
An Encyclopedia of Wiretaps
Shaked
Fighting Fraud in the Trenches
Grant
Sight beyond sight: Detecting phishing with computer vision.
Friedman, Grindal, Wilkerson
A Good Day to Die? IoT End of Life
Carey
Legendary Defender - The Voltron Analogy
Corman, Ellis, Graham, Nickerson
That Buzzword Bingo Rapid Debates Panel Thing
17:30
Mude
Redefining the Hacker
Neely
Not your Grandpa's Password Policy
18:00
Siman
Serverless Infections: Malware Just Found a New Home
Adams, Greco, Matthews
You're just complaining because you're guilty: A Guide for Citizens and Hackers to Adversarial Testing of Software Used In the Criminal Justice System
Abrams, Butler
The Effect of Constraints on the Number of Viable Permutations of Passwords
Carlsson, Harris
Catch me, Yes we can! -Pwning Social Engineers using Natural Language Processing Techniques in real-time
Fernandez, Handley, Rides
What Did We Learn from Today? (Recruiter Panel)
Alli, Corman, Radcliffe, Schwartz
Cyber Safety Disclosure
Bryan
Vulnerability Management 101: Practical Experience and Recommendations
18:30
Schwartz
What is Agile and how can I use it well?
BSidesLV 2018 - Wednesday, August 8
08:00
FORTRAN
Evil Mainframe Hacking Mini
Herrald, Kovar, Stoner
Advanced APT Hunting with Splunk
Ryan, Whitehead
Advanced Wireless Attacks Against Enterprise Networks
Momot
Ham Crams and Exams
10:00
Wylie
Your taxes are being leaked
Warfield
All Your Cloud Are Belong To Us - Hunting Compromise in Azure
Sweet
Using Lockpicking to Teach Authentication Concepts
Fitzgerald
Not your Mother's Honeypot - Another name for Threat Intel
Yalon
(De)Serial Killers
Kumar, Shankar
Another one bites the dust: Failed experiments in infrastructure security analytics and lessons learned from fixing them
Murray
The Key to Managing High Performance Security Teams
Elkins
Stupid Hacker Tricks: Bridging Airgaps and Breaking Data Diodes
10:30
Ledoux
Building ambassadors to reduce friction, drive change, and get sh*t done
11:00
Gianarakis
iOS Runtime Hacking Crash Course
Clausen
Security Awareness Training Refresh
Fousekis
How I Met Your Password
Rich
Applied Quantitative Risk Analysis
Thomas
PowerShell Classification: Life, Learning, and Self-Discovery
Limbago
Increasing Retention Capacity
11:30
Moore, Turner, Wilkerson
Hacking the Public Policy API
12:00
Borges, Levinson
Tuning The Warp Drive with Laforge: New Tool for Building Security Competitions
nielsen
Where are the reinforcements?
Bitensky
Invoke-NoShell
Powell
Can data science deal with PAM?
14:00
Tariq
Securing Robots at Scale
Brule
Who Maed Dis; A beginners guide to malware provenance based on compiler type.
Croley
Abusing Password Reuse at Scale: Bcrypt and Beyond
Cole
Security and DevOps are really Best Friends
Tani, Tomonaga
Tracking Malicious Logon: Visualize and Analyze Active Directory Event Logs
Klein
Fast-track your Hacking Career – Why Take The Slow Lane?
Carmody, Corman, Manion, Millar, Trimble, Zuk
CVE CVSS NVD OMGWTFBBQ
Rex
Cruising the MJ Freeway: Examining a large breach in legal Cannabis
Gupta, Singh
Attack & Defense in AWS Environments
Espósito, Montoro
Endpoint Monitoring with Osquery and Kolide Fleet
Amirrezvani
Smart Contracts: Hello World
Momot, Prophet
How A Fortune 500 Company Suppressed Our Research Through Legal Threats
14:30
Jones, Renner, Smith, Wu
Community Career Panel or How to Get More than a TShirt Working at a Con
Pols
Unifying the Kill Chain
15:00
Gietzen
Pacu: Attack and Post-Exploitation in AWS
Cook
LibreSSL - Moving the Ecosystem Forward
Girardeau
Deploying WebAuthn at Dropbox Scale: Second Factor and Beyond
Biswas
Don't Bring Me Down: Are You Ready for Weaponized Botnets?
Shawgo
Decision Analysis Applications in Threat Analysis Frameworks
Forscey, Hall, Turner
Engaging Policymakers at the State Level
Karimi
Incorporating Human Intelligence (HUMINT) into An Information Security Team
Handorf
Why Can't We Be Friends? (Get Spotted With A Fed)
15:30
Marcelli
Looking for the perfect signature: an automatic YARA rules generation algorithm in the AI-era
Hanlon
Disabling Encryption to Access Confidential Data
17:00
Rodanant, Theimer, Wang
Overlooked tactics for attacking hardened Active Directory environment
Gibson
Solving for Somebody Else's Problem: Hacking Devs for Better Security
Danielson, Gurazada
Guardians of GitHub
Momot, Postnikoff
Hackademia: The 2018 Literature Review
Cooper, Rogers, Sheehy, Troy, Woods
Transforming Industries for Fun and Safety
Aguilar
Bypassing Antivirus Engines using Open Sourced Malleable C2 Software, MSFVenom, Powershell and a bit of Guile
Cardozo, Galparin, Opsahl, Sheard
Ask The EFF
17:30
Biswas
Firmware Security 101
18:00
Misgav, Yavo
Turning (Page) Tables - Bypassing advanced kernel mitigations using page tables manipulations
Minch
Watch Out For That Bus! (Personal Disaster Recovery Planning)
Vigo
Ransombile, yet another reason to ditch SMS
Manion, Metcalf
Arbitrary Albatross: Neutral Names for Vulnerabilities at Volume
Cavalry is ALL OF US
Lawrence
The current state of adversarial machine learning
18:30
Zahavi-Brunner
Treble or Trouble: Where Android's latest security enhancements help, and where they fail


Instructions

This "Old School" schedule is an automatically-generated evolution of a manually-generated hack Darth Null has been using at ShmooCon since 2007. It won't work too well for a large conference, like DEFCON, but for smaller events like ShmooCon or BlackHat DC, it might be useful.

Simply print this out at whatever scale is most helpful to you. For example, for ShmooCon: print at 65%, fold Friday and Sunday back behind Saturday, and laminate, for a two-sided 3" x 4" card that you can keep in your shirt pocket.