From BruCON 2015
Jump to: navigation, search
(Keynote Speakers)
(BruCON 0x07 Line-Up)
 
(221 intermediate revisions by 6 users not shown)
Line 1: Line 1:
=Keynote Speakers=
+
__NOTOC__
 +
{| border="1" width="100%" style="text-align:center;"
 +
| The completed schedule is available on '''http://sched.brucon.org/grid-full'''
 +
|-
 +
|}
  
'''Haroon Meer (Thinkst.com, South-Africa) -- You and your research'''
+
=General Information=
  
Haroon is a well-known security researcher who has recently started his own venture with Thinkst.com, an applied research company. He is also involved with ZACON, a security conference in South-Africa.
+
* '''Registrations start at 8h30!'''
Haroon is a frequent speaker at conferences such as Blackhat, Defcon, etc.
+
* Typically workshops run for 2 consecutive speaking slots (ca. 2 hours), but some of them are even longer
 +
* Workshop rooms in the location '''Novotel Ghent (Orval, Chimay, La Trappe)''' are 5 minutes walking from the main venue
 +
* Workshop seats are limited. '''Reserved seats get in until 5 min before the workshop. After that it is first come, first in.'''
 +
* Read our important instructions on [[how to use SCHED.org]]!
 +
* This schedule is subject to change, check back regularly.
  
What does it take to do quality research? What stops you from being a one-hit wonder? Is there an age limit to productive hackery? What are the key ingredients needed and how can you up your chances of doing great work? In a talk unabashedly stolen from far greater minds we hope to answer these questions and discuss their repercussions.
+
=BruCON 0x07 Line-Up=
 
 
 
'''Alex Hutton (Verizon Business, United States)'''
 
  
Alex is a principal in the Verizon Business RISK intelligence team and has been one of the driving forces behind the VERIS (Verizon Risk Information Sharing) Framework and their yearly Databreach Investigations Report (DBIR). He is involved with the SIRA podcast and frequently presents on risk management and data-driven security at conferences such as Blackhat and Source.
+
'''Keynotes'''
 +
* Dave Kennedy, Co-founder of TrustedSec and Binary Defense Systems. Co-author of the book "Metasploit: The Penetration Testers Guide," the creator of the Social-Engineer Toolkit (SET), and Artillery
 +
* Shyama Rose is an accomplished Information Security visionary strategist with a 15-year track record for assessing risks and building ground-up security initiatives for Fortune 100 companies.
  
'''Jaron Lanier (Microsoft, United States)'''
 
  
Jaron is a pioneer in the realm of virtual reality and currently works as a principal architect for Microsoft’s Extreme Computing lab. He is the author of the 2010 bestseller “you are not a gadget” and has given talks at conferences around the world on virtual reality and the impact of social networks and web 2.0.
+
'''Talks'''
 +
* Willi Ballenthin and Jon Tomczak - Shims For The Win: Case study and investigative techniques for hijacked Application Compatibility Infrastructure
 +
* Alexandre Dulaunoy and Pieter-Jan Moreels - cve-search - A free software to collect, search and analyse common vulnerabilities and exposures in software
 +
* L. Grecs - Creating REAL Threat Intelligence ... with Evernote
 +
* Alejandro Hernandez - Brain Waves Surfing - (In)Security in EEG (Electroencephalography) Technologies
 +
* Mark Hillick - Levelling Up Security @ Riot Games
 +
* Ryan Kazanciyan and Matt Hastings - Desired state: compromise
 +
* Dhia Mahjoub and Thomas Mathew - Unified DNS View to Track Threats
 +
* David Mortman - SSO: It's the SAML SAML Situation (With Apologies to Mötley Crüe)
 +
* Rushikesh Nandedkar and Amrita Iyer - The .11 Veil, Camouflage & Covert!!! /*Invisible Wifi, Revealed */
 +
* Chris Nickerson - Nightmares of a Pentester
 +
* Kuba Sendor - OSXCollector: Automated forensic evidence collection & analysis for OS X
 +
* Richard Thieme - Hacking as Practice for Transplanetary Life in the 21st Century: How Hackers Frame the Pictures in Which Others Live
 +
* Mathy Vanhoef - Advanced WiFi Attacks using Commodity Hardware
  
'''Due to time constraints Jaron will not be able to attend the conference. Instead we are organizing for him to deliver his keynote talk through a video link. We're still privileged to have Jaron on-board for our 2011 edition!'''
 
  
=Workshops=
+
'''5by5'''
  
 +
This edition, there will not be a 5by5, but we will revive the project next edition
  
'''Agnitio: the security code review Swiss army knife (David Rook - Security Ninja)'''
 
  
Its static analysis, but not as we know it
+
'''Workshops'''
 +
* Pieter Danhieux and Erik Van Buggenhout - Hands-on Incident Response Workshop
 +
* Sergei Frankoff and Sean Wilson - Crowdsourced Malware Triage Workshop - Making Sense of Malware with a Browser and a Notepad
 +
* Prateek Gianchandani - iOS application pentesting
 +
* Chris Lytle - Hands-On Old School Cryptography
 +
* Chris Lytle and Matt Jakubowski - BrewCon
 +
* Nathan Magniez - Wireless Assessment Bootcamp 101
 +
* Vito Rallo - Kernel Tales: Security Testing of aarch64 Android Kernels
 +
* Arnaud Soullie - Pentesting ICS 101 (@ICS Village)
 +
* Didier Stevens - A Hands On Introduction To Software Defined Radio
 +
* Javier Marcos and Ted Reed - Intrusion detection on Linux and OS X with osquery (https://osquery.io)
 +
* Ocean Lam, Count Ninjula and Keith Myers - DJ workshop
  
'''Collective Malicious PDF Analysis (Brandon Dixon - x0ner)'''
 
  
Going beyond one sample at a time
+
'''Villages'''
 +
* ICS Village
 +
* Hak4kidz - Hacking conference for children (Sunday 4-Oct)
  
'''Script Kiddie Hacking Techniques (Ellen Moar & Colin McLean)'''
 
  
How a script kiddie can copy and paste their way to effective hacks
+
'''Sounds'''
 
+
* Ocean Lam (Hong Kong)
'''The Web Application Hacking Toolchain (Jason Haddix - jhaddix)'''
+
* Count Ninjula (Los Angeles)
 
+
* Keith Myers (Los Angeles)
web hacking made better
+
* keroSerene (Serene Han, pianist)
 
 
'''White Hat Shellcode: Not for Exploits (Didier Stevens)'''
 
 
 
Learn to use shellcode for defense
 
 
 
'''Beer brewing (TBD)'''
 
 
 
'''Lockpicking (TBD)'''
 
 
 
'''VOIP (TBD)'''
 
 
 
'''RFID (TBD)'''
 
 
 
=Presentations=
 
 
 
 
 
''' Ripping Out Code: Practical Attack Surface Reduction for Open Source Systems (Craig Balding)'''
 
 
 
'''Abusing Locality in Shared Web Hosting (Nick Nikiforakis - nikifor)'''
 
 
 
'''Botnet Identification and remediation (Barry Irwin)'''
 
 
 
Cleaning up in your own back yard
 
 
 
'''Botnets and Browsers - Brothers in a Ghost Shell (Aditya K Sood)'''
 
 
 
'''iOS Data Protection Internals (Andrey Belenko)'''
 
 
 
'''The 99¢ heart surgeon dilemma (Stefan Friedli)'''
 
 
 
How to fix penetration testing
 
 
 
'''Pushing in, leaving a present, and pulling out without anybody noticing (Ian Amit)'''
 
 
 
Data Exfiltration in highly secure environments
 
 
 
'''Social Engineering Like In The Movies (Dale Pearson)'''
 
 
 
The reality of awareness and manipulation
 
 
 
'''Smart Phones – The Weak Link in the Security Chain (Nick Walker - tel0seh)'''
 
 
 
Hacking a network through an Android device
 
 
 
'''Enterprise Wi-Fi Worms, Backdoors and Botnets for Fun and Profit (Vivek Ramachandran)'''
 

Latest revision as of 07:38, 3 October 2015

The completed schedule is available on http://sched.brucon.org/grid-full

General Information

  • Registrations start at 8h30!
  • Typically workshops run for 2 consecutive speaking slots (ca. 2 hours), but some of them are even longer
  • Workshop rooms in the location Novotel Ghent (Orval, Chimay, La Trappe) are 5 minutes walking from the main venue
  • Workshop seats are limited. Reserved seats get in until 5 min before the workshop. After that it is first come, first in.
  • Read our important instructions on how to use SCHED.org!
  • This schedule is subject to change, check back regularly.

BruCON 0x07 Line-Up

Keynotes

  • Dave Kennedy, Co-founder of TrustedSec and Binary Defense Systems. Co-author of the book "Metasploit: The Penetration Testers Guide," the creator of the Social-Engineer Toolkit (SET), and Artillery
  • Shyama Rose is an accomplished Information Security visionary strategist with a 15-year track record for assessing risks and building ground-up security initiatives for Fortune 100 companies.


Talks

  • Willi Ballenthin and Jon Tomczak - Shims For The Win: Case study and investigative techniques for hijacked Application Compatibility Infrastructure
  • Alexandre Dulaunoy and Pieter-Jan Moreels - cve-search - A free software to collect, search and analyse common vulnerabilities and exposures in software
  • L. Grecs - Creating REAL Threat Intelligence ... with Evernote
  • Alejandro Hernandez - Brain Waves Surfing - (In)Security in EEG (Electroencephalography) Technologies
  • Mark Hillick - Levelling Up Security @ Riot Games
  • Ryan Kazanciyan and Matt Hastings - Desired state: compromise
  • Dhia Mahjoub and Thomas Mathew - Unified DNS View to Track Threats
  • David Mortman - SSO: It's the SAML SAML Situation (With Apologies to Mötley Crüe)
  • Rushikesh Nandedkar and Amrita Iyer - The .11 Veil, Camouflage & Covert!!! /*Invisible Wifi, Revealed */
  • Chris Nickerson - Nightmares of a Pentester
  • Kuba Sendor - OSXCollector: Automated forensic evidence collection & analysis for OS X
  • Richard Thieme - Hacking as Practice for Transplanetary Life in the 21st Century: How Hackers Frame the Pictures in Which Others Live
  • Mathy Vanhoef - Advanced WiFi Attacks using Commodity Hardware


5by5

This edition, there will not be a 5by5, but we will revive the project next edition


Workshops

  • Pieter Danhieux and Erik Van Buggenhout - Hands-on Incident Response Workshop
  • Sergei Frankoff and Sean Wilson - Crowdsourced Malware Triage Workshop - Making Sense of Malware with a Browser and a Notepad
  • Prateek Gianchandani - iOS application pentesting
  • Chris Lytle - Hands-On Old School Cryptography
  • Chris Lytle and Matt Jakubowski - BrewCon
  • Nathan Magniez - Wireless Assessment Bootcamp 101
  • Vito Rallo - Kernel Tales: Security Testing of aarch64 Android Kernels
  • Arnaud Soullie - Pentesting ICS 101 (@ICS Village)
  • Didier Stevens - A Hands On Introduction To Software Defined Radio
  • Javier Marcos and Ted Reed - Intrusion detection on Linux and OS X with osquery (https://osquery.io)
  • Ocean Lam, Count Ninjula and Keith Myers - DJ workshop


Villages

  • ICS Village
  • Hak4kidz - Hacking conference for children (Sunday 4-Oct)


Sounds

  • Ocean Lam (Hong Kong)
  • Count Ninjula (Los Angeles)
  • Keith Myers (Los Angeles)
  • keroSerene (Serene Han, pianist)