• 09:00
  • 42: The answer to life, the universe, and everything offensive security

    Nick Landers, Will Pearce
    Sat, 09:00 - 09:45
    Track 1
  • Collect All the Data - Protect All the Things

    Aaron Rosenmund
    Sat, 09:00 - 09:45
    Track 2
  • Catching Cyber Criminals – Investigative techniques to identify modern threat actors and the clues they leave behind during data breaches

    Vinny Troia
    Sat, 09:00 - 09:45
    Track 3
  • The $19.95 anonymous cyber profile

    Patrick Matthews
    Sat, 09:00 - 09:30
    Stable Talks
  • 09:30
  • Prepare to Be Boarded! A Tale of Kubernetes, Plunder, and Cryptobooty

    James Condon
    Sat, 09:30 - 10:00
    Stable Talks
  • 10:00
  • kubered - Recipes for C2 Operations on Kubernetes

    Jeff Holden, Larry Suto
    Sat, 10:00 - 10:45
    Track 1
  • Lying in Wait: Discovering and Exploiting Weaknesses in Automated Discovery Actions

    Jacob Griffith, Timothy Wright
    Sat, 10:00 - 10:45
    Track 2
  • COM Hijacking Techniques

    David Tulis
    Sat, 10:00 - 10:45
    Track 3
  • Build your own multi-user password manager using open source software

    Kevin Bong, Michael Vieau
    Sat, 10:00 - 10:30
    Stable Talks
  • 10:30
  • No class, Low Tech, High damage

    Tom Ruff
    Sat, 10:30 - 11:00
    Stable Talks
  • 12:00
  • Testing Endpoint Protection: How Anyone Can Bypass Next Gen AV

    Kevin Gennuso
    Sat, 12:00 - 12:45
    Track 1
  • Inter-chip communication - Testing end-to-end security on IoT

    Deral Heiland
    Sat, 12:00 - 12:45
    Track 2
  • Assumed Breach: A Better Model for Penetration Testing

    Mike Saunders
    Sat, 12:00 - 12:45
    Track 3
  • Early Detection Through Deception

    Jason Nester
    Sat, 12:00 - 12:30
    Stable Talks
  • 12:30
  • The quest for 10g IDS

    Harold Tabellion
    Sat, 12:30 - 13:00
    Stable Talks
  • 13:00
  • Adventures in Azure Privilege Escalation

    Karl Fosaaen
    Sat, 13:00 - 13:45
    Track 1
  • REST in Peace: Abusing GraphQL to Attack Underlying Infrastructure

    Matthew Szymanski
    Sat, 13:00 - 13:45
    Track 2
  • StringSifter: Learning to Rank Strings Output for Speedier Malware Analysis

    Jay Gibble, Matthew Haigh, Michael Sikorski, Philip Tully
    Sat, 13:00 - 13:45
    Track 3
  • Swagger Defense

    Mick Douglas, Pete Petersen
    Sat, 13:00 - 13:30
    Stable Talks
  • 13:30
  • Kerberoasting Revisited

    Will Schroeder
    Sat, 13:30 - 14:00
    Stable Talks
  • 14:00
  • Breaking & Entering via SDR, or How I defeated Wiegend over UHF/VHF, or your apartment isn't safe...

    Tim Shelton
    Sat, 14:00 - 14:45
    Track 1
  • The “Art” of The BEC - What Three Years of Fighting Has Taught Us

    Ronnie Tokazowski
    Sat, 14:00 - 14:45
    Track 2
  • Practical Heuristic Exploitation

    Kelly Villanueva
    Sat, 14:00 - 14:45
    Track 3
  • Hacking While Blind.

    Joe B
    Sat, 14:00 - 14:30
    Stable Talks
  • 14:30
  • Choose Your Own TTX: Redefining the Incident Response Table Top Exercise

    Jamison Budacki
    Sat, 14:30 - 15:00
    Stable Talks
  • 15:00
  • Assessing IoT Surveillance - Arlo

    Jimi Sebree
    Sat, 15:00 - 15:45
    Track 1
  • BloodHound: Head to Tail

    Andy Robbins, Rohan Vazarkar
    Sat, 15:00 - 15:45
    Track 2
  • Full Steam Ahead: Serverless Hacking 101

    Tal Melamed
    Sat, 15:00 - 15:45
    Track 3
  • Hunting Phish Kits

    Josh Rickard
    Sat, 15:00 - 15:30
    Stable Talks
  • 15:30
  • One woman's journey to CISO leveraging Social Engineering

    Kate Mullin
    Sat, 15:30 - 16:00
    Stable Talks
  • 16:00
  • Next-gen IoT botnets - leveraging cloud implementations for shells on 500k IoTs

    Alex Balan
    Sat, 16:00 - 16:45
    Track 1
  • Red Team Methodology: A Naked Look

    Jason Lang
    Sat, 16:00 - 16:45
    Track 2
  • Five Mistakes We Wish Users Would Stop Making

    Amanda Berlin, Lesley Carhart, Chelle Clements, Lee Neely, April C. Wright
    Sat, 16:00 - 16:45
    Track 3
  • SharPersist: Windows Persistence Toolkit in C#

    Brett Hawkins
    Sat, 16:00 - 16:30
    Stable Talks
  • 16:30
  • Are you ready to leverage DevSecOps? Get ready and use it for good.

    Nicole Schwartz
    Sat, 16:30 - 17:00
    Stable Talks
  • 17:00
  • Attacking with Automation: How Office 365 automation provides another new risk to the cloud

    Trent Lo
    Sat, 17:00 - 17:45
    Track 1
  • API Keys, Now What?Taking the Pen Test Into the Amazon Cloud

    Jim Shaver
    Sat, 17:00 - 17:45
    Track 2
  • Shadow IT in the Cloud

    Marisa Dyer, Jessica Hazelrigg
    Sat, 17:00 - 17:30
    Stable Talks
  • 17:30
  • .NET Manifesto - Win Friends and Influence the Loader

    Casey Smith
    Sat, 17:30 - 18:00
    Stable Talks
  • 18:00
  • Confessions of an IT / OT Marriage Counselor

    Lesley Carhart
    Sat, 18:00 - 18:30
    Stable Talks