• 08:30
  • Welcome to the Family

     
    Fri, 08:30 - 09:00
    Track 1
  • 09:00
  • Saving the world from the zombie apocalypse

     
    Fri, 09:00 - 09:40
    Track 1
  • 09:45
  • How to Give the Best Pen Test of Your Life

    Ed Skoudis
    Fri, 09:45 - 10:25
    Track 1
  • 10:30
  • Back by popular demand -- Adaptive Penetration Testing Part Two

    David Kennedy, Kevin Mitnick
    Fri, 10:30 - 11:10
    Track 1
  • 12:00
  • If it fits- it sniffs: Adventures in WarShipping

    Larry Pesce
    Fri, 12:00 - 12:50
    Track 1
  • Threat Modeling for Realz

    Bruce Potter
    Fri, 12:00 - 12:50
    Track 2
  • So You Want To Murder a Software Patent

    Jason Scott
    Fri, 12:00 - 12:50
    Track 3
  • Subverting ML Detections for Fun and Profit

    Siva Kumar, Ram Shankar, John Walton
    Fri, 12:00 - 12:50
    Track 4
  • NeXpose For Automated Compromise Detection

    Luis Santana
    Fri, 12:00 - 12:25
    Stable Talks
  • 12:30
  • A girl, some passion, and some tech stuff

    Sam Kinch, Johnny Long, Branden Miller, Emily Miller
    Fri, 12:30 - 12:55
    Stable Talks
  • 13:00
  • Abusing Active Directory in Post-Exploitation

    Carlos Perez
    Fri, 13:00 - 13:50
    Track 1
  • A Guided Tour of the Internet Ghetto :: Introduction to Tor Hidden Services

    Brent Huston
    Fri, 13:00 - 13:50
    Track 2
  • Patching the Human Vulns

    Leonard Isham, Moey
    Fri, 13:00 - 13:50
    Track 3
  • Secrets of DNS

    Ron Bowes
    Fri, 13:00 - 13:50
    Track 4
  • InfoSec -- from the mouth of babes (or an 8 year old)

    Reuben A. Paul
    Fri, 13:00 - 13:25
    Stable Talks
  • 13:30
  • Why Aim for the Ground?

    Phillip Fitzpatrick
    Fri, 13:30 - 13:55
    Stable Talks
  • 14:00
  • Quantifying The Adversary: Introducing GuerillaSearch and GuerillaPivot

    Dave Marcus
    Fri, 14:00 - 14:50
    Track 1
  • Red Teaming: Back and Forth, 5ever

    Josh Schwartz
    Fri, 14:00 - 14:50
    Track 2
  • Burp For All Languages

    Tom Steele
    Fri, 14:00 - 14:50
    Track 3
  • Snort & OpenAppID: How to Build an Open Source Next Generation Firewall

    Adam Hogan
    Fri, 14:00 - 14:50
    Track 4
  • NoSQL Injections: Moving Beyond ‘or ‘1’=’1′

    Matt Bromiley
    Fri, 14:00 - 14:25
    Stable Talks
  • 14:30
  • SWF Seeking Lazy Admin for Cross Domain Action

    Seth Art
    Fri, 14:30 - 14:55
    Stable Talks
  • 15:00
  • A Year in the (Backdoor) Factory

    Joshua Pitts
    Fri, 15:00 - 15:50
    Track 1
  • How not to suck at pen testing

    John Strand
    Fri, 15:00 - 15:50
    Track 2
  • Passing the Torch: Old School Red Teaming- New School Tactics

    David McGuire, Will Schroeder
    Fri, 15:00 - 15:50
    Track 3
  • GET A Grip on Your Hustle: Glassdoor Exfil Toolkit

    Chris Hodges, Parker Schmitt, Kyle Stone
    Fri, 15:00 - 15:50
    Track 4
  • Planning for Failure

    Noah Beddome
    Fri, 15:00 - 15:25
    Stable Talks
  • 15:30
  • The Social Engineering Savants -- The Psychopathic Profile

    Kevin Miller
    Fri, 15:30 - 15:55
    Stable Talks
  • 16:00
  • Ball and Chain (A New Paradigm in Stored Password Security)

    Benjamin Donnelly, Tim Tomes
    Fri, 16:00 - 16:50
    Track 1
  • Mainframes, Mopeds and Mischief: A PenTester's Year in Review

    Tyler Wrightson
    Fri, 16:00 - 16:50
    Track 2
  • I Am The Cavalry: Year [0]

    Space Rogue, Beau Woods
    Fri, 16:00 - 16:50
    Track 3
  • DNS-Based Authentication of Named Entities (DANE): Can we fix our broken CA model?

    Tony Cargile
    Fri, 16:00 - 16:50
    Track 4
  • Hiding the breadcrumbs: Forensics and anti-forensics on SAP systems

    Juan Perez-Etchegoyen
    Fri, 16:00 - 16:25
    Stable Talks
  • 16:30
  • You’re in the butter zone now- baby.

    Chris Scott
    Fri, 16:30 - 16:55
    Stable Talks
  • 17:00
  • Et tu- Kerberos?

    Christopher Campbell
    Fri, 17:00 - 17:50
    Track 1
  • The Multibillion Dollar Industry That’s Ignored

    Jason Montgomery, Ryan Sevey
    Fri, 17:00 - 17:50
    Track 2
  • University Education In Security Panel

    Sam Bowne, Adrian Crenshaw, G. W. Ray Davidson III, PhD, Bill Gardner, Sam Liles
    Fri, 17:00 - 17:50
    Track 3
  • Exploiting Browsers Like A Boss w/ WhiteLightning!

    Bryce Kunz
    Fri, 17:00 - 17:50
    Track 4
  • Making BadUSB Work For You

    Adam Caudill, Brandon Wilson
    Fri, 17:00 - 17:25
    Stable Talks
  • 17:30
  • PassCrackNet: When everything else fails- just crack hashes.

    Adam Ringwood
    Fri, 17:30 - 17:55
    Stable Talks
  • 18:00
  • Advanced Red Teaming: All your Badge Are Belong To Us

    Eric Smith
    Fri, 18:00 - 18:50
    Track 1
  • Code Insecurity or Code in Security

    Mano Paul
    Fri, 18:00 - 18:50
    Track 2
  • What happened to the ‘A’? How to leverage BCP/DR for your Info Sec Program

    Moey
    Fri, 18:00 - 18:50
    Track 3
  • Real World Intrusion Response

    David Sharpe, Katherine Trame
    Fri, 18:00 - 18:50
    Track 4
  • Vulnerability Assessment 2.0

    John Askew
    Fri, 18:00 - 18:25
    Stable Talks
  • 18:30
  • Social Engineering your progeny to be hackers

    Simon Liles, Stuart Liles, Sydney Liles
    Fri, 18:30 - 18:55
    Stable Talks
  • 19:00
  • Bypassing Internet Explorer’s XSS Filter

    Carlos Munoz
    Fri, 19:00 - 19:50
    Track 1
  • C3CM: Defeating the Command- Control- and Communications of Digital Assailants

    Russ McRee
    Fri, 19:00 - 19:50
    Track 2
  • Securing Your A$$ets from Espionage

    Stacey Banks
    Fri, 19:00 - 19:50
    Track 3
  • Application Whitelisting: Be Careful Where The Silver Bullet Is Aimed

    David McCartney
    Fri, 19:00 - 19:50
    Track 4
  • A Brief History of Exploitation

    Devin Cook
    Fri, 19:00 - 19:25
    Stable Talks
  • 19:30
  • Hunting Malware on Linux Production Servers: The Windigo Backstory

    Oliver Bilodeau
    Fri, 19:30 - 19:55
    Stable Talks