From BruCON 2015
Jump to: navigation, search
(Collective Malicious PDF Analysis)
Line 100: Line 100:
 
|}
 
|}
  
==   ==
+
==Script Kiddie Hacking Techniques==
by '''   '''
+
by '''Ellen Moar & Colin McLean'''
 +
 
 +
 
 +
==The Web Application Hacking Toolchain==
 +
by '''Jason Haddix - jhaddix'''
 +
 
 +
{| border='1px'
 +
!  !!  '''Monday'''
 +
! '''Tuesday'''
 +
|-
 +
| #1
 +
|
 +
|
 +
|-
 +
| #2
 +
|
 +
|
 +
|-
 +
| #3
 +
|
 +
|
 +
|-
 +
| #4
 +
|
 +
|
 +
|-
 +
| #5
 +
|
 +
|
 +
|-
 +
| #6
 +
|
 +
|
 +
|-
 +
| #7
 +
|
 +
|
 +
|-
 +
| #8
 +
|
 +
|
 +
|-
 +
| #9
 +
|
 +
|
 +
|-
 +
| #10
 +
|
 +
|
 +
|-
 +
| #11
 +
|
 +
|
 +
|-
 +
| #12
 +
|
 +
|
 +
|-
 +
| #13
 +
|
 +
|
 +
|-
 +
| #14
 +
|
 +
|
 +
|-
 +
| #15
 +
|
 +
|
 +
|-
 +
| #16
 +
|
 +
|
 +
|-
 +
| #17
 +
|
 +
|
 +
|-
 +
| #18
 +
|
 +
|
 +
|-
 +
| #19
 +
|
 +
|
 +
|-
 +
| #20
 +
|
 +
|
 +
|-
 +
| ###
 +
| '''COMPLETE'''<br>No more people, thanks!
 +
| '''COMPLETE'''<br>No more people, thanks!
 +
|-
 +
|}
 +
 
 +
==White Hat Shellcode: Not for Exploits==
 +
by '''Didier Stevens'''
 +
 
 +
{| border='1px'
 +
!  !!  '''Monday'''
 +
! '''Tuesday'''
 +
|-
 +
| #1
 +
|
 +
|
 +
|-
 +
| #2
 +
|
 +
|
 +
|-
 +
| #3
 +
|
 +
|
 +
|-
 +
| #4
 +
|
 +
|
 +
|-
 +
| #5
 +
|
 +
|
 +
|-
 +
| #6
 +
|
 +
|
 +
|-
 +
| #7
 +
|
 +
|
 +
|-
 +
| #8
 +
|
 +
|
 +
|-
 +
| #9
 +
|
 +
|
 +
|-
 +
| #10
 +
|
 +
|
 +
|-
 +
| #11
 +
|
 +
|
 +
|-
 +
| #12
 +
|
 +
|
 +
|-
 +
| #13
 +
|
 +
|
 +
|-
 +
| #14
 +
|
 +
|
 +
|-
 +
| #15
 +
|
 +
|
 +
|-
 +
| #16
 +
|
 +
|
 +
|-
 +
| #17
 +
|
 +
|
 +
|-
 +
| #18
 +
|
 +
|
 +
|-
 +
| #19
 +
|
 +
|
 +
|-
 +
| #20
 +
|
 +
|
 +
|-
 +
| ###
 +
| '''COMPLETE'''<br>No more people, thanks!
 +
| '''COMPLETE'''<br>No more people, thanks!
 +
|-
 +
|}
 +
 
 +
==WiFi malware for Fun and Profit==
 +
by '''Vivek Ramachandran'''
 +
 
 +
{| border='1px'
 +
!  !!  '''Monday'''
 +
! '''Tuesday'''
 +
|-
 +
| #1
 +
|
 +
|
 +
|-
 +
| #2
 +
|
 +
|
 +
|-
 +
| #3
 +
|
 +
|
 +
|-
 +
| #4
 +
|
 +
|
 +
|-
 +
| #5
 +
|
 +
|
 +
|-
 +
| #6
 +
|
 +
|
 +
|-
 +
| #7
 +
|
 +
|
 +
|-
 +
| #8
 +
|
 +
|
 +
|-
 +
| #9
 +
|
 +
|
 +
|-
 +
| #10
 +
|
 +
|
 +
|-
 +
| #11
 +
|
 +
|
 +
|-
 +
| #12
 +
|
 +
|
 +
|-
 +
| #13
 +
|
 +
|
 +
|-
 +
| #14
 +
|
 +
|
 +
|-
 +
| #15
 +
|
 +
|
 +
|-
 +
| #16
 +
|
 +
|
 +
|-
 +
| #17
 +
|
 +
|
 +
|-
 +
| #18
 +
|
 +
|
 +
|-
 +
| #19
 +
|
 +
|
 +
|-
 +
| #20
 +
|
 +
|
 +
|-
 +
| ###
 +
| '''COMPLETE'''<br>No more people, thanks!
 +
| '''COMPLETE'''<br>No more people, thanks!
 +
|-
 +
|}
 +
 
 +
==Cisco VoIP insecurity workshop==
 +
by '''Sandro Gauci and Joffrey Czarny aka Sn0rkY'''
 +
 
 +
==Beer brewing workshop==
 +
by '''Machtelt Garrels'''
 +
 
 +
==Lock Picking 101==
 +
by '''Walter Belgers (TOOOL)'''
 +
 
 +
==Hacking your conference badge==
 +
by '''OpenAMD Crew'''
 +
 
 +
==Agnitio: the security code review Swiss army knife==
 +
by '''David Rook aka Securityninja'''

Revision as of 22:45, 11 September 2011

Regsitration is not yet open. Come back later for more information

To prevent chaos for our workshops, we kindly ask you to register on this page (actual name or nickname)

Most workshops will be given on both days so you have 2 options.
Arrive early (5 minutes before start).
Even if you don't have a spot, drop by to see if anybody didn't show up.

Lists will be closed at midnight the day before.
If you didn't get a chance to register in time but the list isn't full yet, come and try your luck.

Collective Malicious PDF Analysis

by(Brandon Dixon - x0ner)

Monday Tuesday
#1
#2
#3
#4
#5
#6
#7
#8
#9
#10
#11
#12
#13
#14
#15
#16
#17
#18
#19
#20
### COMPLETE
No more people, thanks!
COMPLETE
No more people, thanks!

Script Kiddie Hacking Techniques

by Ellen Moar & Colin McLean


The Web Application Hacking Toolchain

by Jason Haddix - jhaddix

Monday Tuesday
#1
#2
#3
#4
#5
#6
#7
#8
#9
#10
#11
#12
#13
#14
#15
#16
#17
#18
#19
#20
### COMPLETE
No more people, thanks!
COMPLETE
No more people, thanks!

White Hat Shellcode: Not for Exploits

by Didier Stevens

Monday Tuesday
#1
#2
#3
#4
#5
#6
#7
#8
#9
#10
#11
#12
#13
#14
#15
#16
#17
#18
#19
#20
### COMPLETE
No more people, thanks!
COMPLETE
No more people, thanks!

WiFi malware for Fun and Profit

by Vivek Ramachandran

Monday Tuesday
#1
#2
#3
#4
#5
#6
#7
#8
#9
#10
#11
#12
#13
#14
#15
#16
#17
#18
#19
#20
### COMPLETE
No more people, thanks!
COMPLETE
No more people, thanks!

Cisco VoIP insecurity workshop

by Sandro Gauci and Joffrey Czarny aka Sn0rkY

Beer brewing workshop

by Machtelt Garrels

Lock Picking 101

by Walter Belgers (TOOOL)

Hacking your conference badge

by OpenAMD Crew

Agnitio: the security code review Swiss army knife

by David Rook aka Securityninja