(→Collective Malicious PDF Analysis) |
|||
Line 100: | Line 100: | ||
|} | |} | ||
− | == | + | ==Script Kiddie Hacking Techniques== |
− | by ''' | + | by '''Ellen Moar & Colin McLean''' |
+ | |||
+ | |||
+ | ==The Web Application Hacking Toolchain== | ||
+ | by '''Jason Haddix - jhaddix''' | ||
+ | |||
+ | {| border='1px' | ||
+ | ! !! '''Monday''' | ||
+ | ! '''Tuesday''' | ||
+ | |- | ||
+ | | #1 | ||
+ | | | ||
+ | | | ||
+ | |- | ||
+ | | #2 | ||
+ | | | ||
+ | | | ||
+ | |- | ||
+ | | #3 | ||
+ | | | ||
+ | | | ||
+ | |- | ||
+ | | #4 | ||
+ | | | ||
+ | | | ||
+ | |- | ||
+ | | #5 | ||
+ | | | ||
+ | | | ||
+ | |- | ||
+ | | #6 | ||
+ | | | ||
+ | | | ||
+ | |- | ||
+ | | #7 | ||
+ | | | ||
+ | | | ||
+ | |- | ||
+ | | #8 | ||
+ | | | ||
+ | | | ||
+ | |- | ||
+ | | #9 | ||
+ | | | ||
+ | | | ||
+ | |- | ||
+ | | #10 | ||
+ | | | ||
+ | | | ||
+ | |- | ||
+ | | #11 | ||
+ | | | ||
+ | | | ||
+ | |- | ||
+ | | #12 | ||
+ | | | ||
+ | | | ||
+ | |- | ||
+ | | #13 | ||
+ | | | ||
+ | | | ||
+ | |- | ||
+ | | #14 | ||
+ | | | ||
+ | | | ||
+ | |- | ||
+ | | #15 | ||
+ | | | ||
+ | | | ||
+ | |- | ||
+ | | #16 | ||
+ | | | ||
+ | | | ||
+ | |- | ||
+ | | #17 | ||
+ | | | ||
+ | | | ||
+ | |- | ||
+ | | #18 | ||
+ | | | ||
+ | | | ||
+ | |- | ||
+ | | #19 | ||
+ | | | ||
+ | | | ||
+ | |- | ||
+ | | #20 | ||
+ | | | ||
+ | | | ||
+ | |- | ||
+ | | ### | ||
+ | | '''COMPLETE'''<br>No more people, thanks! | ||
+ | | '''COMPLETE'''<br>No more people, thanks! | ||
+ | |- | ||
+ | |} | ||
+ | |||
+ | ==White Hat Shellcode: Not for Exploits== | ||
+ | by '''Didier Stevens''' | ||
+ | |||
+ | {| border='1px' | ||
+ | ! !! '''Monday''' | ||
+ | ! '''Tuesday''' | ||
+ | |- | ||
+ | | #1 | ||
+ | | | ||
+ | | | ||
+ | |- | ||
+ | | #2 | ||
+ | | | ||
+ | | | ||
+ | |- | ||
+ | | #3 | ||
+ | | | ||
+ | | | ||
+ | |- | ||
+ | | #4 | ||
+ | | | ||
+ | | | ||
+ | |- | ||
+ | | #5 | ||
+ | | | ||
+ | | | ||
+ | |- | ||
+ | | #6 | ||
+ | | | ||
+ | | | ||
+ | |- | ||
+ | | #7 | ||
+ | | | ||
+ | | | ||
+ | |- | ||
+ | | #8 | ||
+ | | | ||
+ | | | ||
+ | |- | ||
+ | | #9 | ||
+ | | | ||
+ | | | ||
+ | |- | ||
+ | | #10 | ||
+ | | | ||
+ | | | ||
+ | |- | ||
+ | | #11 | ||
+ | | | ||
+ | | | ||
+ | |- | ||
+ | | #12 | ||
+ | | | ||
+ | | | ||
+ | |- | ||
+ | | #13 | ||
+ | | | ||
+ | | | ||
+ | |- | ||
+ | | #14 | ||
+ | | | ||
+ | | | ||
+ | |- | ||
+ | | #15 | ||
+ | | | ||
+ | | | ||
+ | |- | ||
+ | | #16 | ||
+ | | | ||
+ | | | ||
+ | |- | ||
+ | | #17 | ||
+ | | | ||
+ | | | ||
+ | |- | ||
+ | | #18 | ||
+ | | | ||
+ | | | ||
+ | |- | ||
+ | | #19 | ||
+ | | | ||
+ | | | ||
+ | |- | ||
+ | | #20 | ||
+ | | | ||
+ | | | ||
+ | |- | ||
+ | | ### | ||
+ | | '''COMPLETE'''<br>No more people, thanks! | ||
+ | | '''COMPLETE'''<br>No more people, thanks! | ||
+ | |- | ||
+ | |} | ||
+ | |||
+ | ==WiFi malware for Fun and Profit== | ||
+ | by '''Vivek Ramachandran''' | ||
+ | |||
+ | {| border='1px' | ||
+ | ! !! '''Monday''' | ||
+ | ! '''Tuesday''' | ||
+ | |- | ||
+ | | #1 | ||
+ | | | ||
+ | | | ||
+ | |- | ||
+ | | #2 | ||
+ | | | ||
+ | | | ||
+ | |- | ||
+ | | #3 | ||
+ | | | ||
+ | | | ||
+ | |- | ||
+ | | #4 | ||
+ | | | ||
+ | | | ||
+ | |- | ||
+ | | #5 | ||
+ | | | ||
+ | | | ||
+ | |- | ||
+ | | #6 | ||
+ | | | ||
+ | | | ||
+ | |- | ||
+ | | #7 | ||
+ | | | ||
+ | | | ||
+ | |- | ||
+ | | #8 | ||
+ | | | ||
+ | | | ||
+ | |- | ||
+ | | #9 | ||
+ | | | ||
+ | | | ||
+ | |- | ||
+ | | #10 | ||
+ | | | ||
+ | | | ||
+ | |- | ||
+ | | #11 | ||
+ | | | ||
+ | | | ||
+ | |- | ||
+ | | #12 | ||
+ | | | ||
+ | | | ||
+ | |- | ||
+ | | #13 | ||
+ | | | ||
+ | | | ||
+ | |- | ||
+ | | #14 | ||
+ | | | ||
+ | | | ||
+ | |- | ||
+ | | #15 | ||
+ | | | ||
+ | | | ||
+ | |- | ||
+ | | #16 | ||
+ | | | ||
+ | | | ||
+ | |- | ||
+ | | #17 | ||
+ | | | ||
+ | | | ||
+ | |- | ||
+ | | #18 | ||
+ | | | ||
+ | | | ||
+ | |- | ||
+ | | #19 | ||
+ | | | ||
+ | | | ||
+ | |- | ||
+ | | #20 | ||
+ | | | ||
+ | | | ||
+ | |- | ||
+ | | ### | ||
+ | | '''COMPLETE'''<br>No more people, thanks! | ||
+ | | '''COMPLETE'''<br>No more people, thanks! | ||
+ | |- | ||
+ | |} | ||
+ | |||
+ | ==Cisco VoIP insecurity workshop== | ||
+ | by '''Sandro Gauci and Joffrey Czarny aka Sn0rkY''' | ||
+ | |||
+ | ==Beer brewing workshop== | ||
+ | by '''Machtelt Garrels''' | ||
+ | |||
+ | ==Lock Picking 101== | ||
+ | by '''Walter Belgers (TOOOL)''' | ||
+ | |||
+ | ==Hacking your conference badge== | ||
+ | by '''OpenAMD Crew''' | ||
+ | |||
+ | ==Agnitio: the security code review Swiss army knife== | ||
+ | by '''David Rook aka Securityninja''' |
Revision as of 22:45, 11 September 2011
Regsitration is not yet open. Come back later for more information
To prevent chaos for our workshops, we kindly ask you to register on this page (actual name or nickname)
Most workshops will be given on both days so you have 2 options.
Arrive early (5 minutes before start).
Even if you don't have a spot, drop by to see if anybody didn't show up.
Lists will be closed at midnight the day before.
If you didn't get a chance to register in time but the list isn't full yet, come and try your luck.
Contents
- 1 Collective Malicious PDF Analysis
- 2 Script Kiddie Hacking Techniques
- 3 The Web Application Hacking Toolchain
- 4 White Hat Shellcode: Not for Exploits
- 5 WiFi malware for Fun and Profit
- 6 Cisco VoIP insecurity workshop
- 7 Beer brewing workshop
- 8 Lock Picking 101
- 9 Hacking your conference badge
- 10 Agnitio: the security code review Swiss army knife
Collective Malicious PDF Analysis
by(Brandon Dixon - x0ner)
Monday | Tuesday | |
---|---|---|
#1 | ||
#2 | ||
#3 | ||
#4 | ||
#5 | ||
#6 | ||
#7 | ||
#8 | ||
#9 | ||
#10 | ||
#11 | ||
#12 | ||
#13 | ||
#14 | ||
#15 | ||
#16 | ||
#17 | ||
#18 | ||
#19 | ||
#20 | ||
### | COMPLETE No more people, thanks! |
COMPLETE No more people, thanks! |
Script Kiddie Hacking Techniques
by Ellen Moar & Colin McLean
The Web Application Hacking Toolchain
by Jason Haddix - jhaddix
Monday | Tuesday | |
---|---|---|
#1 | ||
#2 | ||
#3 | ||
#4 | ||
#5 | ||
#6 | ||
#7 | ||
#8 | ||
#9 | ||
#10 | ||
#11 | ||
#12 | ||
#13 | ||
#14 | ||
#15 | ||
#16 | ||
#17 | ||
#18 | ||
#19 | ||
#20 | ||
### | COMPLETE No more people, thanks! |
COMPLETE No more people, thanks! |
White Hat Shellcode: Not for Exploits
by Didier Stevens
Monday | Tuesday | |
---|---|---|
#1 | ||
#2 | ||
#3 | ||
#4 | ||
#5 | ||
#6 | ||
#7 | ||
#8 | ||
#9 | ||
#10 | ||
#11 | ||
#12 | ||
#13 | ||
#14 | ||
#15 | ||
#16 | ||
#17 | ||
#18 | ||
#19 | ||
#20 | ||
### | COMPLETE No more people, thanks! |
COMPLETE No more people, thanks! |
WiFi malware for Fun and Profit
by Vivek Ramachandran
Monday | Tuesday | |
---|---|---|
#1 | ||
#2 | ||
#3 | ||
#4 | ||
#5 | ||
#6 | ||
#7 | ||
#8 | ||
#9 | ||
#10 | ||
#11 | ||
#12 | ||
#13 | ||
#14 | ||
#15 | ||
#16 | ||
#17 | ||
#18 | ||
#19 | ||
#20 | ||
### | COMPLETE No more people, thanks! |
COMPLETE No more people, thanks! |
Cisco VoIP insecurity workshop
by Sandro Gauci and Joffrey Czarny aka Sn0rkY
Beer brewing workshop
by Machtelt Garrels
Lock Picking 101
by Walter Belgers (TOOOL)
Hacking your conference badge
by OpenAMD Crew
Agnitio: the security code review Swiss army knife
by David Rook aka Securityninja