From BruCON 2015
Jump to: navigation, search
Line 31: Line 31:
 
| rowspan="2" | [[Presentations#Trusted_Cryptography | Trusted Cryptography]]
 
| rowspan="2" | [[Presentations#Trusted_Cryptography | Trusted Cryptography]]
 
| rowspan="4" | [[Workshops#Digital_ID | Digital ID #1]]
 
| rowspan="4" | [[Workshops#Digital_ID | Digital ID #1]]
| rowspan="4" | [[Workshops#Physical_locks_by_Toool | Physical Locks #1]]
+
| rowspan="4" | [[Workshops#Physical_locks_by_Toool | Lockpicking #1]]
 
| rowspan="2" | [[Presentations#Social_engineering_for_penetration_testers  | Social engineering for penetration testers]]
 
| rowspan="2" | [[Presentations#Social_engineering_for_penetration_testers  | Social engineering for penetration testers]]
 
| rowspan="4" | [[Workshops#Arduino:_how_we_made_the_beerduino | Arduino Workshop #2]]
 
| rowspan="4" | [[Workshops#Arduino:_how_we_made_the_beerduino | Arduino Workshop #2]]
Line 128: Line 128:
  
 
| rowspan="2" | [[Presentations#Transition_to_IPv6_on_the_Internet:_Threats_and_Mitigation_Techniques | Transition to IPv6 on the Internet: Threats and Mitigation Techniques]]
 
| rowspan="2" | [[Presentations#Transition_to_IPv6_on_the_Internet:_Threats_and_Mitigation_Techniques | Transition to IPv6 on the Internet: Threats and Mitigation Techniques]]
| rowspan="4" |  [[Workshops#Physical_locks_by_Toool | Physical Locks #2]]
+
| rowspan="4" |  [[Workshops#Physical_locks_by_Toool | Lockpicking #2]]
 
| rowspan="4" | Soldering workshop
 
| rowspan="4" | Soldering workshop
  

Revision as of 00:45, 13 July 2009

  • Wednesday 16/09 - Thursday 17/09: see Training
  • Friday 18/09 - Saturday 19/09: Workshops + Presentations + Lightning Talks

Conference doors and registration will be open at 8:00 on Friday

Click here to see the complete Alphabetical list of speakers
Click here to see the complete Alphabetical list of presentations

Schedule

Friday 18th Saturday 19th
Hour Speaker Track Workshop Track #1 Workshop Track #2 Speaker Track Workshop Track #1 Workshop Track #2
9:00 Trusted Cryptography Digital ID #1 Lockpicking #1 Social engineering for penetration testers Arduino Workshop #2 Wireless Security #2
9:30
10:00 SQL Injection - how far does the rabbit hole go? “I am walking through a city made of glass and I have a bag full of rocks” (Dispelling the myths and discussing the facts Global Cyber-Warfare)
10:30
11:00 Break Break Break Break Break Break
11:30 How to prepare, coordinate and conduct a cyber attack Arduino Workshop #1 JTAG Workshop #1 A new web attack vector: Script Fragmentation Digital ID #2 VOIP #2
12:00
12:30 Malicious Markup - I thought you were my friend - cycle 3 Botnets, Ransomware, Malware, and Stuff!
13:00
13:30 Lunch Lunch Lunch Lunch Lunch Lunch
14:00
14:30 Rage Against The Kiosk Soldering workshop Lightning Talks #1 Open Source Information Gathering JTAG Workshop #2 Lightning Talks #2


15:00
15:30 All Your Packets Are Belong to Us - Attacking Backbone Technologies Red and Tiger Team
16:00
16:30 Break Break Break Break Break Break
17:00 Knowing Me Knowing You (The dangers of social networks) Wireless Security #1 VOIP #1 Transition to IPv6 on the Internet: Threats and Mitigation Techniques Lockpicking #2 Soldering workshop
17:30
18:00 Building Hackerspaces Everywhere The Frogs Who Desired A King: A Virtualization and Cloud Computing Security Fable Set To Interpretive Dance
18:30
19:00 Dinner Break Dinner Break Dinner Break Dinner Break Dinner Break Dinner Break
19:30
20:00 Auction Auction Auction Brucon Afterparty Brucon Afterparty Brucon Afterparty
20:30
21:00      
21:30      
22:00      
22:30      
23:00      
23:30      
0:00