From BruCON 2015
Jump to: navigation, search
m (Day 2 : Tuesday September 20th)
m (Day 2 : Tuesday September 20th)
Line 174: Line 174:
 
!|15:00
 
!|15:00
 
|
 
|
|[[Content#Myth-busting_Risk_.28Jack_Jones.29|Myth-busting Risk - Jack Jones]]
+
|[[Content#Myth-busting_Risk_.28Jack_Jones.29|Myth-busting Risk - Jack Jones]] ([http://2011.brucon.org/images/9/9f/Brucon2011-Mythbusting_Risk_v4.pdf pdf])
 
|
 
|
 
|- bgcolor="#CCCCCC"
 
|- bgcolor="#CCCCCC"

Revision as of 08:28, 3 October 2011

General Information

  • Please register for workshops here
  • Workshops run for 2 consecutive speaking slots (ca. 2 hours)
  • This schedule is subject to change, check back regularly.
  • LAST MINUTE Announcements <- check it regularly!

Day 1 : Monday September 19th

Registrations start at 9h00!

Time Lounge (Basement) Westvleteren (Aula A - main track) Westmalle (Aula B - workshops) Orval (Aula D - workshop) Outside
9:00 Breakfast
9:50 Welcome (Seba & Wim)
10:00 Keynote - Alex Hutton
11:00 IOS Data Protection Internals - Andrey Belenko (pdf) Collective Malicious PDF Analysis - Brandon Dixon & x0ner Lockpicking workshop - TOOOL NL
12:00 Botnet Identification and remediation - Barry Irwin (pdf)
13:00 Lunch
14:00 DJ Workshop (Joernchen and Mumpi of Phenoelit) Lightning talks Day 1 The web application hacking toolchain - Jason Haddix White hat shellcode: not for exploits - Didier Stevens Beer workshop - Machtelt Garrels (pdf)
15:00 Smart Phones, the weak link in the security chain - Nick Walker and Werner Nel
16:00 Coffee break
16:30 keynote Incident response : the good the bad and the ugly, or how to keep your face after a security breach.- Aluc Wifi malware for fun and profit - Vivek Ramachandran Hacking your conference badge - OpenAMD
17:30 keynote Black Ops of TCP/IP 2011 - Dan Kaminsky
18:30 Dinner
19:30 Pentesting high security environments - Joe McCray and Chris Gates Podcasters meetup Agnitio: the security code review Swiss knife - David Rook (Securityninja)
20:30 Abusing locality in shared web hosting - Nick Nikiforakis (pdf) PowerPoint Karaoke
21:30 Close
22:00 Doors closed

Day 2 : Tuesday September 20th

Time Lounge (Basement) Westvleteren (Aula A - main track) Westmalle (Aula B - workshops) Orval (Aula D - workshop) Outside
9:00 Breakfast
10:00 Pushing in, leaving a present and pulling out without anybody noticing - Ian Amit (pdf)
11:00 Certified programming with dependent types : Because the future of defense is liberal application of math - Andreas Bogk Hacking your conference badge - OpenAMD Scriptkiddie hacking techniques - Ellen Moar & Colin McLean
12:00 Botnets and Browsers, Brothers in a Ghost Shell - Aditya K Sood (pdf)
13:00 Lunch
14:00 Social Engineering like in the movies - Dale Pearson Cisco VoIP insecurity - Sandro Gauci and Joffrey Czarny The web application hacking toolchain - Jason Haddix
15:00 Myth-busting Risk - Jack Jones (pdf)
16:00 Coffee break
16:30 Attacking SAP's J2EE Engine - Alexander Polyakov and Dmitriy Chastuhin White hat shellcode: not for exploits - Didier Stevens Wifi malware for fun and profit - Vivek Ramachandran
17:30 Keynote : You and your research - Haroon Meer
18:30 Dinner
19:30 Lightning talks Day 2 Infosec Mentors Collective Malicious PDF Analysis - Brandon Dixon & x0ner
20:30 The 99c heart surgeon dilemma - Stefan Friedli
21:30 Close
22:00 Doors closed