From BruCON 2015
Jump to: navigation, search
(Cisco VoIP insecurity workshop)
(Beer brewing workshop)
Line 456: Line 456:
 
==Beer brewing workshop==
 
==Beer brewing workshop==
 
by '''Machtelt Garrels'''
 
by '''Machtelt Garrels'''
 +
 +
{| border='1px'
 +
!  !!  '''Monday'''
 +
|-
 +
| #1
 +
|
 +
|-
 +
| #2
 +
|
 +
|-
 +
| #3
 +
|
 +
|-
 +
| #4
 +
|
 +
|-
 +
| #5
 +
|
 +
|-
 +
| #6
 +
|
 +
|-
 +
| #7
 +
|
 +
|-
 +
| #8
 +
|
 +
|-
 +
| #9
 +
|
 +
|-
 +
| #10
 +
|
 +
|-
 +
| #11
 +
|
 +
|-
 +
| #12
 +
|
 +
|-
 +
| #13
 +
|
 +
|-
 +
| #14
 +
|
 +
|-
 +
| #15
 +
|
 +
|-
 +
| #16
 +
|
 +
|-
 +
| #17
 +
|
 +
|-
 +
| #18
 +
|
 +
|-
 +
| #19
 +
|
 +
|-
 +
| #20
 +
|
 +
|-
 +
| #21
 +
|
 +
|-
 +
| #22
 +
|
 +
|-
 +
| #23
 +
|
 +
|-
 +
| #24
 +
|
 +
|-
 +
| #25
 +
|
 +
|-
 +
| #26
 +
|
 +
|-
 +
| #27
 +
|
 +
|-
 +
| #28
 +
|
 +
|-
 +
| #29
 +
|
 +
|-
 +
| #30
 +
|
 +
|-
 +
| ###
 +
| '''COMPLETE'''<br>No more people, thanks!
 +
|-
 +
|}
  
 
==Lock Picking 101==
 
==Lock Picking 101==

Revision as of 22:49, 11 September 2011

Regsitration is not yet open. Come back later for more information

To prevent chaos for our workshops, we kindly ask you to register on this page (actual name or nickname)

Most workshops will be given on both days so you have 2 options.
Arrive early (5 minutes before start).
Even if you don't have a spot, drop by to see if anybody didn't show up.

Lists will be closed at midnight the day before.
If you didn't get a chance to register in time but the list isn't full yet, come and try your luck.

Collective Malicious PDF Analysis

by(Brandon Dixon - x0ner)

Monday Tuesday
#1
#2
#3
#4
#5
#6
#7
#8
#9
#10
#11
#12
#13
#14
#15
#16
#17
#18
#19
#20
### COMPLETE
No more people, thanks!
COMPLETE
No more people, thanks!

Script Kiddie Hacking Techniques

by Ellen Moar & Colin McLean


The Web Application Hacking Toolchain

by Jason Haddix - jhaddix

Monday Tuesday
#1
#2
#3
#4
#5
#6
#7
#8
#9
#10
#11
#12
#13
#14
#15
#16
#17
#18
#19
#20
### COMPLETE
No more people, thanks!
COMPLETE
No more people, thanks!

White Hat Shellcode: Not for Exploits

by Didier Stevens

Monday Tuesday
#1
#2
#3
#4
#5
#6
#7
#8
#9
#10
#11
#12
#13
#14
#15
#16
#17
#18
#19
#20
### COMPLETE
No more people, thanks!
COMPLETE
No more people, thanks!

WiFi malware for Fun and Profit

by Vivek Ramachandran

Monday Tuesday
#1
#2
#3
#4
#5
#6
#7
#8
#9
#10
#11
#12
#13
#14
#15
#16
#17
#18
#19
#20
### COMPLETE
No more people, thanks!
COMPLETE
No more people, thanks!

Cisco VoIP insecurity workshop

by Sandro Gauci and Joffrey Czarny aka Sn0rkY

Tuesday
#1
#2
#3
#4
#5
#6
#7
#8
#9
#10
#11
#12
#13
#14
#15
#16
#17
#18
#19
#20
### COMPLETE
No more people, thanks!

Beer brewing workshop

by Machtelt Garrels

Monday
#1
#2
#3
#4
#5
#6
#7
#8
#9
#10
#11
#12
#13
#14
#15
#16
#17
#18
#19
#20
#21
#22
#23
#24
#25
#26
#27
#28
#29
#30
### COMPLETE
No more people, thanks!

Lock Picking 101

by Walter Belgers (TOOOL)

Hacking your conference badge

by OpenAMD Crew

Agnitio: the security code review Swiss army knife

by David Rook aka Securityninja