From BruCON 2015
Jump to: navigation, search
(BruCON 0x07 Line-Up)
 
(332 intermediate revisions by 10 users not shown)
Line 1: Line 1:
  Friday 18/09 - Thursday 19/09  : Workshops + Presentations + Lightning Talks
+
__NOTOC__
 +
{| border="1" width="100%" style="text-align:center;"
 +
| The completed schedule is available on '''http://sched.brucon.org/grid-full'''
 +
|-
 +
|}
  
Doors and registration will be open at 8:00 on Friday
+
=General Information=
  
== Current talks ==
+
* '''Registrations start at 8h30!'''
 +
* Typically workshops run for 2 consecutive speaking slots (ca. 2 hours), but some of them are even longer
 +
* Workshop rooms in the location '''Novotel Ghent (Orval, Chimay, La Trappe)''' are 5 minutes walking from the main venue
 +
* Workshop seats are limited. '''Reserved seats get in until 5 min before the workshop. After that it is first come, first in.'''
 +
* Read our important instructions on [[how to use SCHED.org]]!
 +
* This schedule is subject to change, check back regularly.
  
The agenda is probably not the final agenda of the conference as it may slightly change. Please check regularly the website for any updates!
+
=BruCON 0x07 Line-Up=
Friday 18.09.2009 Saturday 19.09.2009
 
  
{| width="590" border="0"
+
'''Keynotes'''
|- valign="top"
+
* Dave Kennedy, Co-founder of TrustedSec and Binary Defense Systems. Co-author of the book "Metasploit: The Penetration Testers Guide," the creator of the Social-Engineer Toolkit (SET), and Artillery
| colspan="2" width="33%" | <font size="2">'''Friday 18.09.2009 '''</font>
+
* Shyama Rose is an accomplished Information Security visionary strategist with a 15-year track record for assessing risks and building ground-up security initiatives for Fortune 100 companies.
| colspan="2" width="33%" | <font size="2">'''Friday 18.09.2009 '''</font>
 
| colspan="2" width="33%" | <font size="2">'''Saturday 19.09.2009'''</font>
 
| colspan="2" width="33%" | <font size="2">'''Saturday 19.09.2009'''</font>
 
|- valign="top"
 
| width="9%" | <font size="2" face="Arial">8:00</font>
 
| width="24%" |
 
<font size="2" >'''[[List#Workshops|Workshops''']]</font>
 
  
<font size="2"></font>
 
| width="9%" | <font size="2">9:00</font>
 
| width="24%" |
 
<font size="2">'''[[]]'''</font>
 
  
<font size="2"></font>
+
'''Talks'''
| width="9%" | <font size="2">9:00</font>
+
* Willi Ballenthin and Jon Tomczak - Shims For The Win: Case study and investigative techniques for hijacked Application Compatibility Infrastructure
| width="24%" |
+
* Alexandre Dulaunoy and Pieter-Jan Moreels - cve-search - A free software to collect, search and analyse common vulnerabilities and exposures in software
<font size="2">'''[[]'''</font>
+
* L. Grecs - Creating REAL Threat Intelligence ... with Evernote
 +
* Alejandro Hernandez - Brain Waves Surfing - (In)Security in EEG (Electroencephalography) Technologies
 +
* Mark Hillick - Levelling Up Security @ Riot Games
 +
* Ryan Kazanciyan and Matt Hastings - Desired state: compromise
 +
* Dhia Mahjoub and Thomas Mathew - Unified DNS View to Track Threats
 +
* David Mortman - SSO: It's the SAML SAML Situation (With Apologies to Mötley Crüe)
 +
* Rushikesh Nandedkar and Amrita Iyer - The .11 Veil, Camouflage & Covert!!! /*Invisible Wifi, Revealed */
 +
* Chris Nickerson - Nightmares of a Pentester
 +
* Kuba Sendor - OSXCollector: Automated forensic evidence collection & analysis for OS X
 +
* Richard Thieme - Hacking as Practice for Transplanetary Life in the 21st Century: How Hackers Frame the Pictures in Which Others Live
 +
* Mathy Vanhoef - Advanced WiFi Attacks using Commodity Hardware
  
<font size="2" ></font>
 
|- valign="top"
 
| width="9%" | <font size="2" ></font>
 
| width="24%" |
 
<font size="2"></font>
 
  
<font size="2"></font>
+
'''5by5'''
| width="9%" | <font size="2" >9:50</font>
 
| width="24%" |
 
<font size="2">'''[[]]'''</font>
 
  
<font size="2"></font>
+
This edition, there will not be a 5by5, but we will revive the project next edition
| width="9%" | <font size="2" >9:50</font>
 
| width="24%" |
 
<font size="2">'''[[]]'''</font>
 
  
<font size="2"></font>
 
|- valign="top"
 
| width="9%" | <font size="2">10:40</font>
 
| width="24%" | <font size="2">Refreshment Break</font>
 
| width="9%" | <font size="2">10:40</font>
 
| width="24%" | <font size="2">Refreshment Break</font>
 
| width="9%" | <font size="2">10:40</font>
 
| width="24%" | <font size="2">Refreshment Break</font>
 
|- valign="top"
 
| width="9%" | <font size="2"></font>
 
| width="24%" |
 
<font size="2"></font>
 
  
<font size="2"></font>
+
'''Workshops'''
| width="9%" | <font size="2">11:00</font>
+
* Pieter Danhieux and Erik Van Buggenhout - Hands-on Incident Response Workshop
| width="24%" |
+
* Sergei Frankoff and Sean Wilson - Crowdsourced Malware Triage Workshop - Making Sense of Malware with a Browser and a Notepad
<font size="2">'''[[]]'''</font>
+
* Prateek Gianchandani - iOS application pentesting
 +
* Chris Lytle - Hands-On Old School Cryptography
 +
* Chris Lytle and Matt Jakubowski - BrewCon
 +
* Nathan Magniez - Wireless Assessment Bootcamp 101
 +
* Vito Rallo - Kernel Tales: Security Testing of aarch64 Android Kernels
 +
* Arnaud Soullie - Pentesting ICS 101 (@ICS Village)
 +
* Didier Stevens - A Hands On Introduction To Software Defined Radio
 +
* Javier Marcos and Ted Reed - Intrusion detection on Linux and OS X with osquery (https://osquery.io)
 +
* Ocean Lam, Count Ninjula and Keith Myers - DJ workshop
  
<font size="2"></font>
 
| width="9%" | <font size="2">11:00</font>
 
| width="24%" |
 
<font size="2">'''[[]]'''</font>
 
  
<font size="2"></font>
+
'''Villages'''
|- valign="top"
+
* ICS Village
| width="9%" | <font size="2" face="Arial"></font>
+
* Hak4kidz - Hacking conference for children (Sunday 4-Oct)
| width="24%" |
 
<font size="2"></font>
 
  
<font size="2"></font>
 
| width="9%" | <font size="2" face="Arial">11:50</font>
 
| width="24%" |
 
<font size="2">'''[[]]'''</font>
 
  
<font size="2"></font>
+
'''Sounds'''
| width="9%" | <font size="2" face="Arial">11:50</font>
+
* Ocean Lam (Hong Kong)
| width="24%" |
+
* Count Ninjula (Los Angeles)
<font size="2">'''[[]]'''</font>
+
* Keith Myers (Los Angeles)
 
+
* keroSerene (Serene Han, pianist)
<font size="2"></font>
 
|- valign="top"
 
| width="9%" | <font size="2">12:40</font>
 
| width="24%" | <font size="2">Lunch Break</font>
 
| width="9%" | <font size="2">12:40</font>
 
| width="24%" | <font size="2">Lunch Break</font>
 
| width="9%" | <font size="2">12:40</font>
 
| width="24%" | <font size="2">Lunch Break</font>
 
|- valign="top"
 
| width="9%" | <font size="2"></font>
 
| width="24%" | <font size="2"></font>
 
| width="9%" | <font size="2">13:30</font>
 
| width="24%" | <font size="2">'''[[LightningTalks|Lightning talks]]'''</font>
 
| width="9%" | <font size="2"></font>
 
| width="24%" | <font size="2"></font>
 
|- valign="top"
 
| width="9%" | <font size="2">14:00</font>
 
| width="24%" |
 
<font size="2">'''[[List#Workshops|Workshops]]'''</font>
 
 
 
<font size="2"></font>
 
| width="9%" | <font size="2">14:00</font>
 
| width="24%" |
 
<font size="2">'''[[]]'''</font>
 
 
 
<font size="2"></font>
 
| width="9%" | <font size="2">14:00</font>
 
| width="24%" |
 
<font size="2">'''[[]]'''</font>
 
 
 
<font size="2"></font>
 
|- valign="top"
 
| width="9%" | <font size="2"></font>
 
| width="24%" |
 
<font size="2"></font>
 
 
 
<font size="2"></font>
 
| width="9%" | <font size="2">14:50</font>
 
| width="24%" |
 
<font size="2" >'''[[]]'''</font>
 
 
 
<font size="2"></font>
 
| width="9%" | <font size="2">14:50</font>
 
| width="24%" |
 
<font size="2" >'''[[]]'''</font>
 
 
 
<font size="2"></font>
 
 
 
|- valign="top"
 
| width="9%" | <font size="2">15:40</font>
 
| width="24%" | <font size="2">Refreshment Break</font>
 
| width="9%" | <font size="2">15:40</font>
 
| width="24%" | <font size="2">Refreshment Break</font>
 
| width="9%" | <font size="2">15:40</font>
 
| width="24%" | <font size="2">Refreshment Break</font>
 
 
 
|- valign="top"
 
| width="9%" | <font size="2" ></font>
 
| width="24%" |
 
<font size="2"></font>
 
 
 
<font size="2"></font>
 
| width="9%" | <font size="2">16:00</font>
 
| width="24%" |
 
<font size="2">'''[[ ]]'''</font>
 
 
 
<font size="2" ></font>
 
| width="9%" | <font size="2">16:00</font>
 
| width="24%" |
 
<font size="2">'''[[]]'''</font>
 
 
 
<font size="2" ></font>
 
 
 
|- valign="top"
 
| width="9%" | <font size="2" >17:00</font>
 
| width="24%" |
 
<font size="2"></font>
 
 
 
<font size="2" ></font>
 
| width="9%" | <font size="2" >16:50</font>
 
| width="24%" | <font size="2"></font>
 
 
 
<font size="2" ></font>
 
| width="9%" | <font size="2" >16:50</font>
 
| width="24%" | <font size="2"></font>
 
|}
 

Latest revision as of 08:38, 3 October 2015

The completed schedule is available on http://sched.brucon.org/grid-full

General Information

  • Registrations start at 8h30!
  • Typically workshops run for 2 consecutive speaking slots (ca. 2 hours), but some of them are even longer
  • Workshop rooms in the location Novotel Ghent (Orval, Chimay, La Trappe) are 5 minutes walking from the main venue
  • Workshop seats are limited. Reserved seats get in until 5 min before the workshop. After that it is first come, first in.
  • Read our important instructions on how to use SCHED.org!
  • This schedule is subject to change, check back regularly.

BruCON 0x07 Line-Up

Keynotes

  • Dave Kennedy, Co-founder of TrustedSec and Binary Defense Systems. Co-author of the book "Metasploit: The Penetration Testers Guide," the creator of the Social-Engineer Toolkit (SET), and Artillery
  • Shyama Rose is an accomplished Information Security visionary strategist with a 15-year track record for assessing risks and building ground-up security initiatives for Fortune 100 companies.


Talks

  • Willi Ballenthin and Jon Tomczak - Shims For The Win: Case study and investigative techniques for hijacked Application Compatibility Infrastructure
  • Alexandre Dulaunoy and Pieter-Jan Moreels - cve-search - A free software to collect, search and analyse common vulnerabilities and exposures in software
  • L. Grecs - Creating REAL Threat Intelligence ... with Evernote
  • Alejandro Hernandez - Brain Waves Surfing - (In)Security in EEG (Electroencephalography) Technologies
  • Mark Hillick - Levelling Up Security @ Riot Games
  • Ryan Kazanciyan and Matt Hastings - Desired state: compromise
  • Dhia Mahjoub and Thomas Mathew - Unified DNS View to Track Threats
  • David Mortman - SSO: It's the SAML SAML Situation (With Apologies to Mötley Crüe)
  • Rushikesh Nandedkar and Amrita Iyer - The .11 Veil, Camouflage & Covert!!! /*Invisible Wifi, Revealed */
  • Chris Nickerson - Nightmares of a Pentester
  • Kuba Sendor - OSXCollector: Automated forensic evidence collection & analysis for OS X
  • Richard Thieme - Hacking as Practice for Transplanetary Life in the 21st Century: How Hackers Frame the Pictures in Which Others Live
  • Mathy Vanhoef - Advanced WiFi Attacks using Commodity Hardware


5by5

This edition, there will not be a 5by5, but we will revive the project next edition


Workshops

  • Pieter Danhieux and Erik Van Buggenhout - Hands-on Incident Response Workshop
  • Sergei Frankoff and Sean Wilson - Crowdsourced Malware Triage Workshop - Making Sense of Malware with a Browser and a Notepad
  • Prateek Gianchandani - iOS application pentesting
  • Chris Lytle - Hands-On Old School Cryptography
  • Chris Lytle and Matt Jakubowski - BrewCon
  • Nathan Magniez - Wireless Assessment Bootcamp 101
  • Vito Rallo - Kernel Tales: Security Testing of aarch64 Android Kernels
  • Arnaud Soullie - Pentesting ICS 101 (@ICS Village)
  • Didier Stevens - A Hands On Introduction To Software Defined Radio
  • Javier Marcos and Ted Reed - Intrusion detection on Linux and OS X with osquery (https://osquery.io)
  • Ocean Lam, Count Ninjula and Keith Myers - DJ workshop


Villages

  • ICS Village
  • Hak4kidz - Hacking conference for children (Sunday 4-Oct)


Sounds

  • Ocean Lam (Hong Kong)
  • Count Ninjula (Los Angeles)
  • Keith Myers (Los Angeles)
  • keroSerene (Serene Han, pianist)