PDT Times |
Title |
speaker |
| | |
Friday |
|
|
10:30 - 11:15 |
How to be the Best Adversary Simulator
|
Tim MalcomVetter |
10:15 - 10:30 |
Welcome and Introduction
|
Abhijith B R |
11:30 - 13:30 |
Adversary Booth
|
Dean Lawrence,Ethan Micha . . . |
11:30 - 17:30 |
Adversary Wars CTF
|
|
11:30 - 12:15 |
'Damn the exploits! Full speed ahead!' How naval f . . .
|
Christopher Cottrell |
12:15 - 12:30 |
Malware Emulation Attack Graphs
|
Jack Wells |
12:30 - 12:59 |
Hacked by Raspberia: Simulating a nationally disru . . .
|
Sanne Maasakkers |
13:15 - 13:45 |
Balancing the Scales of Just-Good-Enough
|
Frank Duff,Ian Davila |
14:30 - 17:30 |
Adversary Booth
|
Dean Lawrence,Ethan Micha . . . |
14:40 - 14:59 |
Exotic data exfiltration
|
Jean-Michel Amblat |
14:00 - 14:30 |
Master of Puppets: How to tamper the EDR?
|
Daniel Feichter |
15:00 - 16:59 |
Building Adversary Chains Like an Operator
|
David Hunt,Stephan Wampou . . . |
17:15 - 17:15 |
Assessing Cyber Security ROI: Adversary simulation . . .
|
Ben Opel,Bryson Bort,Itzi . . . |
| | |
Saturday |
|
|
10:30 - 12:30 |
Adversary Booth
|
Dean Lawrence,Ethan Micha . . . |
10:30 - 17:30 |
Adversary Wars CTF
|
|
10:00 - 10:45 |
Drag us to Wonder Bad: a tale of how to be good pe . . .
|
Daniel Isler |
11:00 - 11:45 |
Nimbly Navigating a Nimiety of Nimplants: Writing . . .
|
Cas Van Cooten |
12:30 - 12:59 |
Python vs Modern Defenses
|
Diego Capriotti |
12:00 - 12:30 |
Control Validation Compass: Intelligence for Impro . . .
|
Scott Small |
13:00 - 13:59 |
Linux Threat Detection with Attack Range
|
Rod Soto,Teoderick Contre . . . |
14:30 - 17:30 |
Adversary Booth
|
Dean Lawrence,Ethan Micha . . . |
14:00 - 14:30 |
The Way of The Adversary
|
Phillip Wylie |
14:45 - 15:15 |
Down The Rabbit Hole: 10 Lessons Learned from a Ye . . .
|
Andrew Costis |
15:15 - 17:15 |
Attack and Defend with Adversary Emulation
|
Christopher Peacock,Jake . . . |
17:15 - 17:59 |
Who doesn’t like a little Spice? Emulation Matur . . .
|
Andy Grunt,Cat Self,Jamie . . . |
| | |
Sunday |
|
|
10:30 - 12:30 |
Adversary Booth
|
Dean Lawrence,Ethan Micha . . . |
10:30 - 13:30 |
Adversary Wars CTF
|
|
10:00 - 10:45 |
Don’t be trusted: Active Directory trust attacks
|
Jonas Bülow Knudsen,Mart . . . |
11:00 - 11:30 |
Helpful Principles in Adversarial Operations
|
Dan Borges |
11:30 - 11:59 |
Purple Teaming for Auditors and the Business
|
Alex Martirosyan |
12:00 - 12:30 |
Open Mic
|
|
12:30 - 12:59 |
Qemuno – An uninvited guest
|
Oleg Lerner |
13:00 - 13:15 |
Modern techniques used by Advanced Persistent Thre . . .
|
Or Yair |
PDT Times |
Title |
speaker |
| | |
Friday |
|
|
10:00 - 10:30 |
Blue Team Village Opening Ceremony
|
|
10:30 - 11:30 |
Obsidian Live: Eating the Elephant 1 byte at a Tim . . .
|
aviditas,ChocolateCoat |
10:30 - 11:30 |
Obsidian Forensics: Kill Chain 1 Endpoint Forensic . . .
|
Omenscan |
10:30 - 11:30 |
Obsidian CTH: Go Phish: Visualizing Basic Malice
|
SamunoskeX |
11:30 - 12:30 |
Obsidian: IR - It all starts here, scoping the inc . . .
|
ChocolateCoat |
11:30 - 12:30 |
Obsidian CTI: Generating Threat Intelligence from . . .
|
ttheveii0x,Stephanie G.,l . . . |
11:45 - 12:45 |
Malicious memory techniques on Windows and how to . . .
|
Connor Morley |
11:00 - 11:30 |
Attribution and Bias: My terrible mistakes in thre . . .
|
Seongsu Park |
11:00 - 12:30 |
Practical Dark Web Hunting using Automated Scripts
|
Apurv Singh Gautam |
13:00 - 13:59 |
Obsidian Forensics: KillChain1 - Adventures in Spl . . .
|
Wes Lambert,ExtremePaperC . . . |
13:00 - 13:59 |
Obsidian: IR - Mise En Place for Investigations
|
ChocolateCoat,aviditas,Co . . . |
13:00 - 13:59 |
Obsidian CTH: Hunting for Adversary's Schedule
|
Cyb3rHawk |
13:00 - 13:59 |
Improving security posture of MacOS and Linux with . . .
|
Michael Epping,Mark Morow . . . |
13:00 - 14:30 |
Ransomware ATT&CK and Defense
|
Daniel Chen,Esther Matut, . . . |
14:00 - 14:59 |
Obsidian CTH Live: Killchain 1 Walkthrough
|
|
14:00 - 14:59 |
Obsidian Forensics: The Importance of Sysmon for I . . .
|
ExtremePaperClip |
14:00 - 14:59 |
Obsidian REM: Long Walks On The Beach: Analyzing C . . .
|
Alison N |
14:15 - 15:15 |
Lend me your IR's!
|
Matt Scheurer |
15:00 - 15:59 |
Heavyweights: Threat Hunting at Scale
|
Sherrod DeGrippo,Ashlee B . . . |
15:30 - 16:30 |
Malware Hunting - Discovering techniques in PDF ma . . .
|
Filipi Pires |
16:00 - 16:59 |
Take Your Security Skills From Good to Better to B . . .
|
Tanisha O'Donoghue,Kimber . . . |
16:45 - 16:59 |
YARA Rules to Rule them All
|
Saurabh Chaudhary |
17:00 - 17:59 |
Blue Teaming Cloud: Security Engineering for Cloud . . .
|
John Orleans,Misstech,Cas . . . |
| | |
Saturday |
|
|
10:30 - 11:30 |
Obsidian Forensics: KillChain3 - Continued Adventu . . .
|
Wes Lambert,Omenscan,Extr . . . |
10:30 - 11:30 |
Obsidian: IR - OODA! An hour in incident responder . . .
|
juju43 |
10:30 - 11:30 |
Obsidian CTH: Sniffing Compromise: Hunting for Blo . . .
|
CerealKiller |
11:30 - 12:30 |
Obsidian Forensics: Kill Chain 3 Endpoint Forensic . . .
|
Omenscan |
11:30 - 12:30 |
Obsidian CTI: Operationalizing Threat Intelligence
|
l00sid,Stephanie G.,tthev . . . |
11:00 - 11:59 |
Threat Hunt Trilogy: A Beast in the Shadow!
|
Dr. Meisam Eslahi |
11:00 - 14:59 |
Web Shell Hunting
|
Joe Schottman |
12:15 - 12:45 |
Even my Dad is a Threat Modeler!
|
Sarthak Taneja |
13:00 - 13:59 |
Obsidian CTH Live: Killchain 3 Walkthrough
|
|
13:00 - 13:59 |
Obsidian: IR - Final Reporting Made Exciting*
|
aviditas,CountZ3r0 |
13:00 - 13:59 |
Obsidian REM: Phishing In The Morning: An Abundanc . . .
|
Alison N |
13:00 - 13:59 |
The DFIR Report Homecoming Parade Panel
|
Kostas,ICSNick - Nicklas . . . |
14:00 - 14:59 |
Obsidian Live: May We Have the OODA Loops?
|
CountZ3r0,juju43 |
14:30 - 14:59 |
Obsidian Forensics: Creating a custom Velociraptor . . .
|
Wes Lambert,Omenscan |
14:00 - 14:59 |
Obsidian Forensics: Using Chainsaw to Identify Mal . . .
|
Danny D. Henderson Jr (B4 . . . |
14:00 - 14:59 |
Obsidian CTH: The Logs are Gone?
|
ExtremePaperClip |
14:15 - 14:45 |
Hunting Malicious Office Macros
|
Anton Ovrutsky |
15:00 - 15:59 |
Challenges in Control Validation
|
Jake Williams,Kristen Cot . . . |
15:00 - 15:15 |
Horusec - Brazilian SAST help World
|
Gilmar Esteves |
16:00 - 16:59 |
Making Your SOC Suck Less
|
Alissa Torres,Carson Zimm . . . |
17:00 - 17:59 |
Latest and Greatest in Incident Response
|
Lauren Proehl,Jess,LitMoo . . . |
| | |
Sunday |
|
|
11:00 - 11:59 |
Backdoors & Breaches, Back to the Stone Age!
|
|
12:00 - 12:59 |
Project Obsidian: Panel Discussion
|
|
13:00 - 13:59 |
Blue Team Village Closing Ceremony
|
|
PDT Times |
Title |
speaker |
| | |
Friday |
|
|
10:30 - 10:59 |
Back to School! Hello RSA... and beyond!
|
Mike Guirao |
11:00 - 11:30 |
Positive Identification of Least Significant Bit I . . .
|
Michael Pelosi |
11:30 - 11:59 |
OPAQUE is Not Magic
|
Steve Thomas |
12:00 - 12:30 |
PSA: Doorbell Cameras Have Mics, Too
|
Matthew Guariglia,Yael Gr . . . |
13:00 - 13:30 |
Reflections on 9 Years of CPV
|
Whitney Merrill |
13:30 - 13:59 |
How to Respond to Data Subject Access Requests
|
Irene Mo |
14:00 - 14:30 |
Securing and Standardizing Data Rights Requests wi . . .
|
Dazza Greenwood,Ginny Fah . . . |
14:30 - 14:59 |
The Multiverse of Madness: Navigating the 50-State . . .
|
Anthony Hendricks |
15:00 - 15:30 |
ID theft insurance - The Emperor’s new clothes?
|
Per Thorsheim |
16:00 - 16:45 |
Once More Unto the Breach: Federal Regulators' Res . . .
|
Alexis Goldstein,Erie Mey . . . |
16:45 - 17:30 |
Owned or pwned? No peekin' or tweakin'!
|
Nick Vidal,Richard Zak |
17:30 - 17:59 |
[T]OTPs are not as secure as you might believe
|
Santiago Kantorowicz |
| | |
Saturday |
|
|
10:45 - 11:30 |
PII: The Privacy Zombie
|
Alisha Kloc |
11:30 - 12:30 |
Jailed By a Google Search Part 2: Abortion Surveil . . .
|
Kate Bertash |
13:00 - 13:45 |
Cryptle: a secure multi-party Wordle clone with En . . .
|
Nick Vidal,Richard Zak,To . . . |
13:45 - 14:30 |
Exploring Unprecedented Avenues for Data Harvestin . . .
|
Gonzalo Munilla Garrido,V . . . |
14:30 - 14:59 |
The deadly state of surveillance capitalism in hea . . .
|
Andrea Downing,Mike Mitte . . . |
15:30 - 16:15 |
Capturing Chaos: Harvesting Environmental Entropy
|
Carey Parker |
16:15 - 16:59 |
Toto, I’ve a feeling we’re not on a VPN anymor . . .
|
Jonathan Tomek |
17:00 - 17:59 |
Pursuing Phone Privacy Protection [WORKSHOP]
|
Matt Nash,Mauricio Tavare . . . |
| | |
Sunday |
|
|
10:30 - 10:59 |
XR Technology Has 99 Problems and Privacy is Sever . . .
|
Calli Schroeder,Suchi Pah . . . |
11:00 - 11:30 |
Voldrakus: Using Consent String Steganography to E . . .
|
Kaileigh McCrea |
11:30 - 11:59 |
Finding Crypto: Inventorying Cryptographic Operati . . .
|
Kevin Lai |
12:00 - 12:30 |
Surviving and Designing for Survivors
|
Avi Zajac |
13:30 - 14:15 |
Cryptosploit
|
Benjamin Hendel,Matt Cheu . . . |
13:00 - 13:30 |
Introducing the Abusability Testing Framework (V1)
|
Avi Zajac,Ji Su Yoo,Nicol . . . |
14:15 - 14:59 |
AES-GCM common pitfalls and how to work around the . . .
|
Santiago Kantorowicz |
PDT Times |
Title |
speaker |
| | |
Thursday |
|
|
07:00 - 19:59 |
Human Registration Open
|
|
08:00 - 14:30 |
Merch (formerly swag) Area Open -- README
|
|
| | |
Friday |
|
|
08:00 - 18:59 |
Human Registration Open
|
|
08:00 - 22:59 |
Lost and Found Department Open (Generally)
|
|
09:00 - 15:59 |
Merch (formerly swag) Area Open -- README
|
|
10:00 - 10:45 |
Old Malware, New tools: Ghidra and Commodore 64, w . . .
|
Cesare Pizzi |
10:00 - 10:20 |
Computer Hacks in the Russia-Ukraine War
|
Kenneth Geers |
10:30 - 11:15 |
OopsSec -The bad, the worst and the ugly of APT’ . . .
|
Tomer Bar |
10:00 - 10:45 |
Panel - "So It's your first DEF CON" - How to get . . .
|
DEF CON Goons |
10:00 - 11:15 |
Panel - DEF CON Policy Dept - What is it, and what . . .
|
DEF CON Policy Dept,The D . . . |
10:00 - 17:59 |
Vendor Area Open
|
|
10:00 - 17:59 |
Memorial Room Open
|
|
10:00 - 17:59 |
Village Areas Open (Generally)
|
|
11:00 - 11:45 |
The PACMAN Attack: Breaking PAC on the Apple M1 wi . . .
|
Joseph Ravichandran |
11:30 - 11:50 |
Running Rootkits Like A Nation-State Hacker
|
Omri Misgav |
11:00 - 11:45 |
The Dark Tangent & Mkfactor - Welcome to DEF CON . . .
|
Michael Whiteley (Mkfacto . . . |
11:30 - 12:15 |
A Policy Fireside Chat with the National Cyber Dir . . .
|
Kim Zetter,Chris Inglis |
12:00 - 12:45 |
Avoiding Memory Scanners: Customizing Malware to E . . .
|
Kyle Avery |
12:00 - 12:45 |
One Bootloader to Load Them All
|
Jesse Michael,Mickey Shka . . . |
12:00 - 12:45 |
Glitched on Earth by humans: A Black-Box Security . . .
|
Lennert Wouters |
12:30 - 13:15 |
Global Challenges, Global Approaches in Cyber Poli . . .
|
Gaurav Keerthi,Lily Newma . . . |
13:00 - 13:20 |
Backdooring Pickles: A decade only made things wor . . .
|
ColdwaterQ |
13:30 - 13:50 |
Weaponizing Windows Syscalls as Modern, 32-bit She . . .
|
Tarek Abdelmotaleb,Dr. Br . . . |
13:00 - 13:45 |
You’re <strike>Muted</strike>Rooted
|
Patrick Wardle |
13:00 - 13:45 |
Emoji Shellcoding: 🛠️, 🧌, and 🤯
|
Georges-Axel Jaloyan,Hadr . . . |
13:30 - 14:15 |
A Policy Fireside Chat with Jay Healey
|
Jason Healey,Fahmida Rash . . . |
14:00 - 14:45 |
Process injection: breaking all macOS security lay . . .
|
Thijs Alkemade |
14:00 - 14:20 |
Phreaking 2.0 - Abusing Microsoft Teams Direct Rou . . .
|
Moritz Abrell |
14:30 - 15:15 |
Trace me if you can: Bypassing Linux Syscall Traci . . .
|
Rex Guo,Junyuan Zeng |
14:00 - 14:45 |
Space Jam: Exploring Radio Frequency Attacks in Ou . . .
|
James Pavur |
14:30 - 15:15 |
Leak The Planet: Veritatem cognoscere non pereat m . . .
|
Xan North,Emma Best |
15:00 - 15:45 |
LSASS Shtinkering: Abusing Windows Error Reporting . . .
|
Asaf Gilboa,Ron Ben Yitzh . . . |
15:30 - 16:15 |
Browser-Powered Desync Attacks: A New Frontier in . . .
|
James Kettle |
15:00 - 15:45 |
Exploring the hidden attack surface of OEM IoT dev . . .
|
Octavio Gianatiempo,Octav . . . |
15:30 - 16:15 |
How Russia is trying to block Tor
|
Roger Dingledine |
16:00 - 16:45 |
Wireless Keystroke Injection (WKI) via Bluetooth L . . .
|
Jose Pico,Fernando Perera |
16:30 - 17:15 |
A dead man’s full-yet-responsible-disclosure sys . . .
|
Yolan Romailler |
16:00 - 16:45 |
Hacking ISPs with Point-to-Pwn Protocol over Ether . . .
|
Gal Zror |
16:30 - 17:15 |
The Internet’s role in sanctions enforcement: Ru . . .
|
Bill Woodcock |
17:00 - 17:45 |
Let's Dance in the Cache - Destabilizing Hash Tabl . . .
|
Orange Tsai |
17:30 - 17:50 |
Deanonymization of TOR HTTP hidden services
|
Ionut Cernica |
17:00 - 17:45 |
Hunting Bugs in The Tropics
|
Daniel Jensen |
17:30 - 18:15 |
Walk This Way: What Run D.M.C. and Aerosmith Can T . . .
|
Jen Easterly,The Dark Tan . . . |
18:00 - 18:45 |
Pulling Passwords out of Configuration Manager: Pr . . .
|
Christopher Panayi |
18:00 - 18:45 |
Tear Down this Zywall: Breaking Open Zyxel Encrypt . . .
|
Jay Lagorio |
18:00 - 18:45 |
Killer Hertz
|
Chris Rock |
18:30 - 18:50 |
Dragon Tails: Supply-side Security and Internation . . .
|
Trey Herr,Stewart Scott |
| | |
Saturday |
|
|
08:00 - 22:59 |
Lost and Found Department Open (Generally)
|
|
09:00 - 18:59 |
Human Registration Open
|
|
09:00 - 15:59 |
Merch (formerly swag) Area Open -- README
|
|
10:00 - 10:45 |
Scaling the Security Researcher to Eliminate OSS V . . .
|
Jonathan Leitschuh |
10:00 - 10:45 |
Literal Self-Pwning: Why Patients - and Their Advo . . .
|
Cory Doctorow,Christian " . . . |
10:00 - 11:15 |
Brazil Redux: Short Circuiting Tech-Enabled Dystop . . .
|
Kyle Wiens,Corynne McSher . . . |
10:00 - 17:59 |
Vendor Area Open
|
|
10:00 - 17:59 |
Memorial Room Open
|
|
10:00 - 17:59 |
Village Areas Open (Generally)
|
|
11:00 - 11:45 |
No-Code Malware: Windows 11 At Your Service
|
Michael Bargury |
11:00 - 11:45 |
How To Get MUMPS Thirty Years Later (or, Hacking T . . .
|
Zachary Minneker |
11:30 - 12:15 |
Reversing the Original Xbox Live Protocols
|
Tristan Miller |
11:00 - 11:45 |
My First Hack Was in 1958 (Then A Career in Rock . . .
|
Winn Schwartau |
12:00 - 12:45 |
All Roads leads to GKE's Host : 4+ Ways to Escape
|
Billy Jheng,Muhammad ALif . . . |
12:00 - 12:20 |
The Evil PLC Attack: Weaponizing PLCs
|
Sharon Brizinov |
12:30 - 13:15 |
Analyzing PIPEDREAM: Challenges in testing an ICS . . .
|
Jimmy Wylie |
12:30 - 12:50 |
The hitchhacker’s guide to iPhone Lightning & JT . . .
|
stacksmashing |
12:00 - 12:20 |
Tracking Military Ghost Helicopters over our Natio . . .
|
Andrew Logan |
12:30 - 13:15 |
UFOs, Alien Life, and the Least Untruthful Things . . .
|
Richard Thieme |
13:00 - 13:45 |
Exploring Ancient Ruins to Find Modern Bugs: Disco . . .
|
Ben Barnea,Ophir Harpaz |
13:30 - 14:15 |
Do Not Trust the ASA, Trojans!
|
Jacob Baines |
13:00 - 13:45 |
Chromebook Breakout: Escaping Jail, with your frie . . .
|
Jimi Allee |
13:30 - 14:15 |
HACK THE HEMISPHERE! How we (legally) broadcasted . . .
|
Andrew Green,Karl Koscher |
14:00 - 14:45 |
The COW (Container On Windows) Who Escaped the Sil . . .
|
Eran Segal |
14:30 - 15:15 |
Doing the Impossible: How I Found Mainframe Buffer . . .
|
Jake Labelle |
14:00 - 14:45 |
OpenCola. The AntiSocial Network
|
John Midgley |
14:30 - 14:50 |
Digging into Xiaomi’s TEE to get to Chinese mone . . .
|
Slava Makkaveev |
15:00 - 15:45 |
You Have One New Appwntment - Hacking Proprietary . . .
|
Eugene Lim |
15:30 - 16:15 |
Perimeter Breached! Hacking an Access Control Syst . . .
|
Steve Povolny,Sam Quinn |
15:00 - 15:20 |
Déjà Vu: Uncovering Stolen Algorithms in Commerc . . .
|
Patrick Wardle,Tom McGuir . . . |
15:30 - 15:50 |
Automotive Ethernet Fuzzing: From purchasing ECU t . . .
|
Jonghyuk Song,Soohwan Oh, . . . |
15:00 - 15:20 |
The Big Rick: How I Rickrolled My High School Dist . . .
|
Minh Duong |
15:30 - 16:15 |
Tor: Darknet Opsec By a Veteran Darknet Vendor & t . . .
|
Sam Bent |
16:00 - 16:45 |
Low Code High Risk: Enterprise Domination via Low . . .
|
Michael Bargury |
16:30 - 17:15 |
Defeating Moving Elements in High Security Keys
|
Bill Graydon |
16:00 - 16:45 |
Trailer Shouting: Talking PLC4TRUCKS Remotely with . . .
|
Chris Poore,Ben Gardiner |
16:30 - 17:15 |
Why did you lose the last PS5 restock to a bot Top . . .
|
Arik |
17:00 - 17:45 |
Internal Server Error: Exploiting Inter-Process Co . . .
|
Martin Doyhenard |
17:30 - 18:15 |
Black-Box Assessment of Smart Cards
|
Daniel Crowley |
17:00 - 17:45 |
Hacking The Farm: Breaking Badly Into Agricultural . . .
|
Sick Codes |
17:30 - 18:15 |
Crossing the KASM -- a webapp pentest story
|
Samuel Erb,Justin Gardner |
18:00 - 18:45 |
The CSRF Resurrections! Starring the Unholy Trinit . . .
|
Dongsung Kim |
18:30 - 18:50 |
Digital Skeleton Keys - We’ve got a bone to pick . . .
|
Micsen,Miana E Windall |
| | |
Sunday |
|
|
08:00 - 15:59 |
Lost and Found Department Open (Generally)
|
|
10:00 - 15:59 |
Human Registration Open
|
|
10:00 - 15:59 |
Vendor Area Open
|
|
10:00 - 11:59 |
Memorial Room Open
|
|
10:00 - 14:59 |
Village Areas Open (Generally)
|
|
11:00 - 11:45 |
Save The Environment (Variable): Hijacking Legitim . . .
|
Wietze Beukema |
11:00 - 11:45 |
STrace - A DTrace on windows reimplementation.
|
Stephen Eckels |
11:00 - 11:45 |
Exploitation in the era of formal verification: a . . .
|
Adam 'pi3' Zabrocki,Alex . . . |
11:00 - 11:45 |
emulation-driven reverse-engineering for finding v . . .
|
atlas |
12:00 - 12:45 |
PreAuth RCE Chains on an MDM: KACE SMA
|
Jeffrey Hofmann |
12:00 - 12:45 |
Defaults - the faults. Bypassing android permissio . . .
|
Nikita Kurtin |
12:00 - 12:45 |
The Call is Coming From Inside The Cluster: Mistak . . .
|
Will Kline,Dagan Henderso . . . |
12:00 - 12:45 |
Taking a Dump In The Cloud
|
Flangvik,Melvin Langvik |
13:00 - 13:45 |
ElectroVolt: Pwning popular desktop apps while unc . . .
|
Max Garrett,Aaditya Puran . . . |
13:00 - 13:45 |
The Journey From an Isolated Container to Cluster . . .
|
Aviv Sasson |
13:00 - 13:45 |
Less SmartScreen More Caffeine – ClickOnce (Ab)U . . .
|
Nick Powers,Steven Flores |
13:00 - 13:45 |
RingHopper – Hopping from User-space to God Mode
|
Benny Zeltser,Jonathan Lu . . . |
14:00 - 15:15 |
Contest Closing Ceremonies & Awards
|
Grifter |
14:00 - 14:45 |
Solana JIT: Lessons from fuzzing a smart-contract . . .
|
Thomas Roth |
15:30 - 17:30 |
DEF CON Closing Ceremonies & Awards
|
The Dark Tangent |
PDT Times |
Title |
speaker |
| | |
Friday |
|
|
10:00 - 11:55 |
TheAllCommander
|
Matthew Handy |
10:00 - 11:55 |
Access Undenied on AWS
|
Noam Dahan |
10:00 - 11:55 |
Vajra - Your Weapon To Cloud
|
Raunak Parmar |
10:00 - 11:55 |
FISSURE: The RF Framework
|
Christopher Poore |
10:00 - 11:55 |
Zuthaka: A Command & Controls (C2s) integration fr . . .
|
Lucas Bonastre,Alberto He . . . |
12:00 - 13:55 |
Packet Sender
|
Dan Nagle |
12:00 - 13:55 |
Wakanda Land
|
Stephen Kofi Asamoah |
12:00 - 13:55 |
AzureGoat: Damn Vulnerable Azure Infrastructure
|
Nishant Sharma,Rachna Umr . . . |
12:00 - 13:55 |
EMBA - Open-Source Firmware Security Testing
|
Michael Messner,Pascal Ec . . . |
12:00 - 13:55 |
Mercury
|
David McGrew,Brandon Enri . . . |
14:00 - 15:55 |
CyberPeace Builders
|
Adrien Ogee |
14:00 - 15:55 |
AWSGoat : A Damn Vulnerable AWS Infrastructure
|
Jeswin Mathai,Sanjeev Mah . . . |
14:00 - 15:55 |
AADInternals: The Ultimate Azure AD Hacking Toolki . . .
|
Nestori Syynimaa |
14:00 - 15:55 |
PCILeech and MemProcFS
|
Ulf Frisk,Ian Vitek |
14:00 - 15:55 |
Badrats: Initial Access Made Easy
|
Kevin Clark,Dominic “Cr . . . |
| | |
Saturday |
|
|
10:00 - 11:55 |
Empire 4.0 and Beyond
|
Vincent "Vinnybod" Rose,A . . . |
10:00 - 11:55 |
Memfini - A systemwide memory monitor interface fo . . .
|
Shubham Dubey,Rishal Dwiv . . . |
10:00 - 11:55 |
svachal + machinescli
|
Ankur Tyagi |
10:00 - 11:55 |
Injectyll-HIDe: Pushing the Future of Hardware Imp . . .
|
Jonathan Fischer,Jeremy M . . . |
10:00 - 11:55 |
EDR detection mechanisms and bypass techniques wit . . .
|
Thomas Diot,Maxime Meigna . . . |
12:00 - 13:55 |
alsanna
|
Jason Johnson |
12:00 - 13:55 |
unblob - towards efficient firmware extraction
|
Quentin Kaiser,Florian Lu . . . |
12:00 - 13:55 |
PMR - PT & VA Management & Reporting
|
Abdul Alanazi,Musaed Bin . . . |
12:00 - 13:55 |
Defensive 5G
|
Eric Mair,Ryan Ashley |
12:00 - 13:55 |
SharpSCCM
|
Chris Thompson,Duane Mich . . . |
14:00 - 15:55 |
OpenTDF
|
Paul Flynn,Cassandra Bail . . . |
14:00 - 15:55 |
Control Validation Compass – Threat Modeling Aid . . .
|
Scott Small |
14:00 - 15:55 |
ResidueFree
|
Logan Arkema |
14:00 - 15:55 |
hls4ml - Open Source Machine Learning Accelerators . . .
|
Ben Hawks,Andres Meza |
14:00 - 15:55 |
Xavier Memory Analysis Framework
|
Solomon Sonya |
PDT Times |
Title |
speaker |
| | |
Friday |
|
|
10:00 - 10:59 |
Ohm, how do I get into ICS?
|
Dennis Skarr,Josephine Ho . . . |
10:00 - 17:59 |
CISA and Idaho National Lab Escape Room
|
|
10:00 - 17:59 |
Fantom5 SeaTF CTF
|
|
10:00 - 17:59 |
Hack the Plan[e]t CTF
|
|
10:00 - 17:59 |
DDS Hack-the-Microgrid
|
|
11:30 - 11:59 |
CRITICAL FINDING: Lessons Learned from Dozens of I . . .
|
Miriam Lorbert,Nate Pelz |
11:00 - 11:30 |
Closing a Security Gap in the Industrial Infrastru . . .
|
Dawn Cappelli |
12:00 - 12:59 |
Understanding Modbus TCP and the GRACE Console [[M . . .
|
Dave Burke |
13:00 - 16:59 |
Maritime Hacking Boundary Adventure
|
|
13:00 - 13:59 |
The USCG's Maritime Cybersecurity Strategy [[marit . . .
|
RADM John Mauger |
14:00 - 14:59 |
Exposing aberrant network behaviors within ICS env . . .
|
Chet Hosmer,Mike Raggo |
15:00 - 15:30 |
Wind Energy Cybersecurity: Novel Environments faci . . .
|
Meg Egan |
15:30 - 15:59 |
Power Flow 101 for hackers and analysts
|
Stefan Stephenson-Moe |
16:00 - 16:59 |
Research and Deliverables on Utilizing an Academic . . .
|
Casey O'Brien |
17:00 - 17:30 |
Why aren’t you automating?
|
Don C.Weber |
17:30 - 17:59 |
Stop worrying about Nation-States and Zero-Days; l . . .
|
Vivek Ponnada |
| | |
Saturday |
|
|
10:00 - 10:59 |
Industry 4.0 and the MTS of the Future – Converg . . .
|
Zac Staples |
10:00 - 17:59 |
CISA and Idaho National Lab Escape Room
|
|
10:00 - 17:59 |
Fantom5 SeaTF CTF
|
|
10:00 - 17:59 |
Hack the Plan[e]t CTF
|
|
10:00 - 17:59 |
DDS Hack-the-Microgrid
|
|
11:00 - 11:30 |
Describing Maritime Cyber work roles Using the NIC . . .
|
Tyson B. Meadors |
11:30 - 11:59 |
Taking MITRE ATT&CK for ICS to Sea
|
Tyson B. Meadors |
12:00 - 12:59 |
Understanding AIS Protocols and the GRACE Console . . .
|
Gary Kessler |
13:00 - 13:30 |
We Promise Not to Brick It... But If We Do...
|
Marissa Costa,Todd Keller |
13:30 - 13:59 |
Cyber Physical Lab Environment for Maritime Cyber . . .
|
Wesley Andrews |
13:00 - 16:59 |
Maritime Hacking Boundary Adventure
|
|
14:00 - 14:59 |
Keeping Beer Cold: Attackers, ICS and Cross-Sector . . .
|
Tim Chase,Jaquar Harris,J . . . |
15:00 - 15:59 |
The Perfect Storm: Deception, Manipulation, and Ob . . .
|
Rae Baker |
16:00 - 16:59 |
The Geopolitical Implications of the Escalation an . . .
|
Gary Kessler,Tyson B. Mea . . . |
17:00 - 17:59 |
Thrice Is Nice: Evaluating the Ukrainian Power Eve . . .
|
Joe Slowik |
18:30 - 21:59 |
ICS Village Charity BBQ
|
|
| | |
Sunday |
|
|
10:00 - 10:59 |
Tales from the trenches - why organizations strugg . . .
|
Vivek Ponnada |
10:00 - 12:59 |
CISA and Idaho National Lab Escape Room
|
|
10:00 - 12:59 |
Fantom5 SeaTF CTF
|
|
10:00 - 12:59 |
Hack the Plan[e]t CTF
|
|
10:00 - 12:59 |
DDS Hack-the-Microgrid
|
|
11:00 - 11:59 |
OT:ICEFALL - Revisiting a decade of OT insecure-by . . .
|
Jos Wetzels |
12:00 - 12:59 |
Understanding CAN Bus and the GRACE Console [[Mari . . .
|
Dave Burke |
13:00 - 13:59 |
Spear Vishing / VoIP Poisoning - Maritime and Land
|
Travis Juhr |
14:00 - 14:30 |
Navigating the High Seas When Dealing with Cyberse . . .
|
Daniel Garrie |
PDT Times |
Title |
speaker |
| | |
Friday |
|
|
12:00 - 13:45 |
Red Teaming the Open Source Software Supply Chain
|
Allan Friedman,Aeva Black |
12:00 - 13:45 |
Hacking law is for hackers - how recent changes to . . .
|
Harley Geiger,Leonard Bai . . . |
14:00 - 15:59 |
Meet the Feds: ONCO Edition
|
|
14:00 - 15:45 |
Emerging Technical Cyber Policy Topics
|
Kurt Opsahl,Luiz Eduardo, . . . |
14:00 - 15:45 |
Emerging Cybersecurity Policy Topics
|
|
16:00 - 17:45 |
Election Security Bridge Building
|
Michael Ross,Jack Cable,T . . . |
16:00 - 17:45 |
Moving Regulation Upstream - An Increasing focus o . . .
|
Jen Ellis,Adam Dobell,Irf . . . |
19:00 - 20:15 |
Fireside Policy Chats
|
Leonard Bailey |
19:00 - 19:59 |
Meet the Feds: CISA Edition (Lounge)
|
CISA Staff |
20:30 - 21:45 |
Fireside Policy Chats
|
Gaurav Keerthi |
20:00 - 21:59 |
Meet the Feds: DHS Edition (Lounge)
|
DHS Staff |
| | |
Saturday |
|
|
10:00 - 11:45 |
Hacking Operational Collaboration
|
David Forscey,Brianna McC . . . |
10:00 - 11:45 |
Imagining a cyber policy crisis: Storytelling and . . .
|
Nina Kollars,Safa Shahwan . . . |
12:00 - 13:45 |
Hacking Aviation Policy
|
Timothy Weston,Ayan Islam . . . |
12:00 - 13:45 |
Addressing the gap in assessing (or measuring) the . . .
|
Adrien Ogee |
14:00 - 15:45 |
Confronting Reality in Cyberspace: Foreign Policy . . .
|
Neal Pollard,Jason Healey . . . |
14:00 - 15:45 |
Return-Oriented Policy Making for Open Source and . . .
|
Trey Herr,Eric Mill,Harry . . . |
16:00 - 17:45 |
International Government Action Against Ransomware
|
Adam Dobell,Irfan Hemani, . . . |
16:00 - 16:59 |
Right Hand, Meet Left Hand: The Cybersecurity Impl . . .
|
Cathy Gellis |
17:15 - 18:15 |
Thinking About Election Security: Annual Debrief ( . . .
|
Cathy Gellis |
19:00 - 21:59 |
D0 N0 H4RM: A Healthcare Security Conversation (Lo . . .
|
Seeyew Mo,Alissa Knight,J . . . |
19:00 - 20:15 |
Fireside Policy Chats
|
Emma Best,Xan North |
20:30 - 21:59 |
Fireside Policy Chats
|
Chris Painter |
| | |
Sunday |
|
|
10:00 - 11:45 |
Improving International Vulnerability Disclosure: . . .
|
Christopher Robinson,Stew . . . |
10:00 - 11:45 |
Better Policies for Better Lives: Hacker Input to . . .
|
Peter Stephens |
12:00 - 13:45 |
Offensive Cyber Industry Roundtable
|
Winnona DeSombre,Matt Hol . . . |
12:00 - 13:45 |
Protect Our Pentest Tools! Perks and Hurdles in Di . . .
|
Liz Wharton,Casey Ellis,O . . . |
14:00 - 14:59 |
ONCD Cybersecurity Strategy Workshop
|
Jason Healey,Samantha Jen . . . |
14:00 - 14:59 |
The Exploding Wireless Attack Surface: Policy cons . . .
|
Linton Wells |
PDT Times |
Title |
speaker |
| | |
Friday |
|
|
11:00 - 11:59 |
Red Team Village Keynote Panel
|
John Hammond,Alh4zr3d,Rya . . . |
12:00 - 15:59 |
Dip Your Toes in Infrastructure Testing: A Hands o . . .
|
Andrew Sutters,Jules Riga . . . |
13:00 - 13:59 |
Attack and Defend with the Command and Control (C2 . . .
|
Jake Williams |
13:00 - 13:59 |
HackerOps
|
Ralph May |
13:00 - 13:59 |
OSINT Skills Lab Challenge
|
Lee McWhorter,Sandra Stib . . . |
13:00 - 13:59 |
Quiet Recon: Gathering everything you need with LD . . .
|
Cory Wolff |
14:00 - 14:59 |
Cyber Resilience Bootcamp
|
Ron Taylor |
14:00 - 14:59 |
HackerOps
|
Ralph May |
14:00 - 14:59 |
OSINT Skills Lab Challenge
|
Lee McWhorter,Sandra Stib . . . |
15:00 - 15:59 |
Cyber Resilience Bootcamp
|
Ron Taylor |
15:00 - 15:59 |
HackerOps
|
Ralph May |
15:00 - 15:59 |
Hacking WebApps with WebSploit Labs
|
Omar Santos |
15:00 - 15:59 |
OSINT Skills Lab Challenge
|
Lee McWhorter,Sandra Stib . . . |
16:00 - 16:59 |
HackerOps
|
Ralph May |
16:00 - 16:59 |
Hacking APIs: How to break the chains of the web
|
Corey Ball |
16:00 - 16:59 |
Hacking WebApps with WebSploit Labs
|
Omar Santos |
16:00 - 16:59 |
OSINT Skills Lab Challenge
|
Lee McWhorter,Sandra Stib . . . |
| | |
Saturday |
|
|
10:00 - 10:59 |
Container and Kubernetes Offense
|
Michael Mitchell |
10:00 - 10:59 |
Cyber Resilience Bootcamp
|
Ron Taylor |
10:00 - 10:59 |
HackerOps
|
Ralph May |
10:00 - 10:59 |
OSINT Skills Lab Challenge
|
Lee McWhorter,Sandra Stib . . . |
11:00 - 11:59 |
Container and Kubernetes Offense
|
Michael Mitchell |
11:00 - 11:59 |
Cyber Resilience Bootcamp
|
Ron Taylor |
11:00 - 11:59 |
HackerOps
|
Ralph May |
11:00 - 11:59 |
OSINT Skills Lab Challenge
|
Lee McWhorter,Sandra Stib . . . |
11:00 - 11:59 |
Phishing With Phineas (Again) - Steroid Boosted Ha . . .
|
George Karantzas |
12:00 - 12:59 |
Container and Kubernetes Offense
|
Michael Mitchell |
12:00 - 12:59 |
HackerOps
|
Ralph May |
12:00 - 12:59 |
OSINT Skills Lab Challenge
|
Lee McWhorter,Sandra Stib . . . |
12:00 - 12:59 |
Quiet Recon: Gathering everything you need with LD . . .
|
Cory Wolff |
12:00 - 15:59 |
Hacking Active Directory
|
|
13:00 - 13:59 |
Cyber Resilience Bootcamp
|
Ron Taylor |
13:00 - 13:59 |
HackerOps
|
Ralph May |
13:00 - 13:59 |
Hacking WebApps with WebSploit Labs
|
Omar Santos |
13:00 - 13:59 |
How Most Internal Networks are Compromised: A Set . . .
|
Scott Brink |
14:00 - 14:59 |
AI Village + RTV Panel: The Use of AI/ML in Offens . . .
|
Omar Santos,Will Pearce,W . . . |
14:00 - 14:59 |
HackerOps
|
Ralph May |
14:00 - 14:59 |
Hacking APIs: How to break the chains of the web
|
Corey Ball |
14:00 - 14:59 |
How Most Internal Networks are Compromised: A Set . . .
|
Scott Brink |
14:00 - 14:59 |
Offensive Wireless Security 101
|
|
15:00 - 15:59 |
HackerOps
|
Ralph May |
15:00 - 15:59 |
Hacking APIs: How to break the chains of the web
|
Corey Ball |
15:00 - 15:59 |
Hacking WebApps with WebSploit Labs
|
Omar Santos |
15:00 - 15:59 |
How Most Internal Networks are Compromised: A Set . . .
|
Scott Brink |
16:00 - 16:59 |
Cyber Resilience Bootcamp
|
Ron Taylor |
16:00 - 16:59 |
HackerOps
|
Ralph May |
16:00 - 16:59 |
Hacking WebApps with WebSploit Labs
|
Omar Santos |
16:00 - 16:59 |
How Most Internal Networks are Compromised: A Set . . .
|
Scott Brink |
| | |
Sunday |
|
|
10:00 - 10:59 |
Hacking WebApps with WebSploit Labs
|
Omar Santos |
10:00 - 10:59 |
Intro to CTFs
|
|
10:00 - 10:59 |
Offensive Wireless Security 101
|
|
10:00 - 10:59 |
OSINT Skills Lab Challenge
|
Lee McWhorter,Sandra Stib . . . |
11:00 - 11:59 |
Cyber Resilience Bootcamp
|
Ron Taylor |
11:00 - 11:59 |
Hacking WebApps with WebSploit Labs
|
Omar Santos |
11:00 - 11:59 |
Intro to CTFs
|
|
11:00 - 11:59 |
OSINT Skills Lab Challenge
|
Lee McWhorter,Sandra Stib . . . |
PDT Times |
Title |
speaker |
| | |
Thursday |
|
|
09:00 - 17:59 |
Chillout Lounge (with entertainment)
|
djdead,Kampf,Merin MC,Pie . . . |
12:00 - 11:59 |
Friends of Bill W
|
|
16:00 - 17:59 |
Queercon Mixer
|
|
16:00 - 21:59 |
Toxic BBQ
|
|
17:00 - 16:59 |
Friends of Bill W
|
|
18:00 - 01:59 |
Thursday Opening Party - Entertainment
|
Archwisp,DJ St3rling,Dr. . . . |
18:00 - 20:59 |
DC702 Pwnagotchi Party
|
|
21:00 - 01:59 |
Hallway Monitor Party - Entertainment
|
CodexMafia,DotOrNot,Hecks . . . |
| | |
Friday |
|
|
06:00 - 05:59 |
DEF CON Bike Ride "CycleOverride"
|
|
09:00 - 17:59 |
Chillout Lounge (with entertainment)
|
djdead,Kampf,Merin MC,Pie . . . |
09:00 - 17:59 |
Chillout Lounge (with entertainment)
|
djdead,Kampf,Merin MC,Pie . . . |
09:00 - 17:59 |
Chillout Lounge (with entertainment)
|
djdead,Kampf,Merin MC,Pie . . . |
09:00 - 17:59 |
Chillout Lounge (with entertainment)
|
djdead,Kampf,Merin MC,Pie . . . |
11:00 - 10:59 |
No Starch Press - Book Signing - Craig Smith, The . . .
|
|
12:00 - 11:59 |
No Starch Press - Book Signing - Jasper van Wouden . . .
|
|
12:00 - 11:59 |
Friends of Bill W
|
|
13:00 - 12:59 |
No Starch Press - Book Signing - Fotios Chantzis, . . .
|
|
14:00 - 13:59 |
No Starch Press - Book Signing - Travis Goodspeed, . . .
|
|
15:30 - 16:30 |
EFF: Reproductive Justice in the Age of Surveillan . . .
|
Corynne McSherry,Daly Bar . . . |
16:00 - 17:59 |
Queercon Mixer
|
|
16:00 - 18:59 |
DC404/DC678/DC770/DC470 (Atlanta Metro) Meetup
|
|
16:00 - 18:59 |
DEF CON Holland DC3115 & DC3120 Group Meetup
|
|
17:00 - 19:59 |
Meet the Digital Lab at Consumer Reports
|
|
17:00 - 16:59 |
Friends of Bill W
|
|
18:00 - 01:59 |
Black & White Ball - Entertainment
|
Biolux,Dual Core,Icetre N . . . |
18:30 - 21:30 |
Girls Hack Village Meetup: Shoot Your Shot Network . . .
|
|
18:00 - 17:59 |
Lawyers Meet
|
|
19:30 - 01:59 |
Hacker Karaoke
|
|
20:00 - 23:59 |
Movie Night Double Feature - Arrival & Real Genius
|
|
20:00 - 21:59 |
Hacker Jeopardy
|
|
20:00 - 21:59 |
Pilots and Hackers Meetup
|
|
20:00 - 22:59 |
BlueTeam Village Party
|
|
21:00 - 01:59 |
GOTHCON (#DCGOTHCON)
|
|
21:00 - 01:59 |
Hallway Monitor Party - Entertainment
|
CaptHz,DJ Scythe,DJ UNIT . . . |
22:00 - 00:59 |
Queercon Party
|
|
| | |
Saturday |
|
|
09:00 - 17:59 |
Chillout Lounge (with entertainment)
|
djdead,Kampf,Merin MC,Pie . . . |
09:00 - 17:59 |
Chillout Lounge (with entertainment)
|
djdead,Kampf,Merin MC,Pie . . . |
09:00 - 17:59 |
Chillout Lounge (with entertainment)
|
djdead,Kampf,Merin MC,Pie . . . |
09:00 - 17:59 |
Chillout Lounge (with entertainment)
|
djdead,Kampf,Merin MC,Pie . . . |
12:00 - 11:59 |
No Starch Press - Book Signing - Corey Ball, Hacki . . .
|
|
12:00 - 11:59 |
Friends of Bill W
|
|
13:00 - 12:59 |
No Starch Press - Book Signing - Joe Gray, Practic . . .
|
|
14:00 - 13:59 |
No Starch Press - Book Signing - Jon DiMaggio, The . . .
|
|
16:00 - 17:59 |
Queercon Mixer
|
|
17:00 - 18:59 |
Denial, Deception, and Drinks with Mitre Engage
|
|
17:00 - 16:59 |
Friends of Bill W
|
|
18:00 - 01:59 |
Night of the Ninjas - Entertainment
|
CTRL/rsm,Krisz Klink,Magi . . . |
19:30 - 00:59 |
BlanketFort Con
|
|
19:30 - 01:59 |
Hacker Karaoke
|
|
20:00 - 23:59 |
Movie Night Double Feature - The Conversation & Th . . .
|
|
20:30 - 23:59 |
Girls Hack Village 90’s House Party
|
|
20:00 - 21:59 |
Hacker Flairgrounds
|
|
20:00 - 21:59 |
Hacker Jeopardy
|
|
20:00 - 21:59 |
Meet the EFF
|
|
21:00 - 23:59 |
Arcade Party
|
|
21:00 - 01:59 |
VETCON
|
|
21:00 - 01:59 |
Hallway Monitor Party - Entertainment
|
Hanz Dwight,Hellacopta,Te . . . |
22:00 - 23:59 |
Whose Slide Is It Anyway? (WSIIA)
|
|
| | |
Sunday |
|
|
09:00 - 14:59 |
Chillout Lounge (with entertainment)
|
Merin MC,Pie & Darren,Rus . . . |
09:00 - 14:59 |
Chillout Lounge (with entertainment)
|
Merin MC,Pie & Darren,Rus . . . |
09:00 - 14:59 |
Chillout Lounge (with entertainment)
|
Merin MC,Pie & Darren,Rus . . . |
09:00 - 14:59 |
Chillout Lounge (with entertainment)
|
Merin MC,Pie & Darren,Rus . . . |
12:00 - 11:59 |
Friends of Bill W
|
|
PDT Times |
Title |
speaker |
| | |
Thursday |
|
|
09:00 - 12:59 |
The Purple Malware Development Approach
|
Mauricio Velazco,Olaf Har . . . |
09:00 - 12:59 |
Network Hacking 101
|
Ben Kurtz,Victor Graf |
09:00 - 12:59 |
Protect/hunt/respond with Fleet and osquery
|
Guillaume Ross,Kathy Satt . . . |
09:00 - 12:59 |
Hands-On TCP/IP Deep Dive with Wireshark - How thi . . .
|
Chris Greer |
14:00 - 17:59 |
Introduction to Software Defined Radios and RF Hac . . .
|
Rich |
14:00 - 17:59 |
Pentesting Industrial Control Systems 101: Capture . . .
|
Alexandrine Torrents,Arna . . . |
14:00 - 17:59 |
House of Heap Exploitation
|
Zachary Minneker,Maxwell . . . |
14:00 - 17:59 |
Introduction to Azure Security
|
Nishant Sharma,Jeswin Mat . . . |
| | |
Friday |
|
|
09:00 - 12:59 |
CICD security: A new eldorado
|
Gauthier Sebaux,Remi Esco . . . |
09:00 - 12:59 |
Finding Security Vulnerabilities Through Fuzzing
|
Hardik Shah |
09:00 - 12:59 |
Introduction to Cryptographic Attacks
|
Matt Cheung |
09:00 - 12:59 |
The Art of Modern Malware Analysis: Initial Infect . . .
|
Aaron Rosenmund,Josh Stro . . . |
09:00 - 12:59 |
DFIR Against the Digital Darkness: An Intro to For . . .
|
Michael Register,Michael . . . |
14:00 - 17:59 |
Hacking the Metal 2: Hardware and the Evolution of . . .
|
Eigentourist |
14:00 - 17:59 |
Hand On Mainframe Buffer Overflows - RCE Edition
|
Jake Labelle,Phil Young |
14:00 - 17:59 |
Securing Industrial Control Systems from the core: . . .
|
Alexandrine Torrents,Arna . . . |
14:00 - 17:59 |
FROM ZERO TO HERO IN A BLOCKCHAIN SECURITY
|
Dikla Barda,Oded Vanunu,R . . . |
14:00 - 17:59 |
Securing Smart Contracts
|
Elizabeth Biddlecome,Sam . . . |
| | |
Saturday |
|
|
09:00 - 12:59 |
Pivoting, Tunneling, and Redirection Master Class
|
Barrett Darnell,Wesley Th . . . |
09:00 - 12:59 |
Master Class: Delivering a New Construct in Advanc . . .
|
Solomon Sonya |
09:00 - 12:59 |
Dig Dug: The Lost Art of Network Tunneling
|
Cam,Eijah |
09:00 - 12:59 |
Windows Defence Evasion and Fortification Primitiv . . .
|
Paul Laîné,Rohan Durve |
09:00 - 12:59 |
CTF 101: Breaking into CTFs (or “The Petting Zoo . . .
|
Chris Forte,Robert Fitzpa . . . |
14:00 - 17:59 |
Hybrid Phishing Payloads: From Threat-actors to Yo . . .
|
Jon Christiansen,Magnus S . . . |
14:00 - 17:59 |
Creating and uncovering malicious containers.
|
Adrian Wood,David Mitchel . . . |
14:00 - 17:59 |
Evading Detection: A Beginner's Guide to Obfuscati . . .
|
Anthony "Cx01N" Rose,Vinc . . . |
14:00 - 17:59 |
Securing Web Apps
|
Elizabeth Biddlecome,Sam . . . |
14:00 - 17:59 |
Automated Debugging Under The Hood - Building A Pr . . .
|
Sean Wilson,Sergei Franko . . . |