• 09:00
  • Pwning People Personally

    Josh Schwartz
    Sat, 09:00 - 09:50
    Track 1 - Break Me
  • OSINT for AppSec: Recon-ng and Beyond

    Tim Tomes
    Sat, 09:00 - 09:50
    Track 2 - Fix Me
  • Mobile Application Reverse Engineering: Under the Hood

    Drew Branch, Billy McLaughlin
    Sat, 09:00 - 09:50
    Track 3 - Teach Me
  • Hacking for Homeschoolers

    Branden Miller
    Sat, 09:00 - 09:50
    Track 4 - The 3-Way
  • Stacking the Virtual Deck: Attacks by Predicting RNGs

    Adam Schwalm
    Sat, 09:00 - 09:25
    Track 5 - Stable Talks
  • 09:30
  • Homebrewing for Hackers

    Amber Aldrich, Benjamin Holland
    Sat, 09:30 - 09:55
    Track 5 - Stable Talks
  • 10:00
  • Stagefright: Scary Code in the Heart of Android

    Joshua Drake
    Sat, 10:00 - 10:50
    Track 1 - Break Me
  • Hacking Virtual Appliances

    Jeremy Brown
    Sat, 10:00 - 10:50
    Track 2 - Fix Me
  • Introducing the RITA VM: Hunting for Bad Guys on Your Network For Free with Math.

    Derek Banks, Brian Furham, John Strand, Joff Thyer
    Sat, 10:00 - 10:50
    Track 3 - Teach Me
  • Going AUTH the Rails on a Crazy Train

    Jeff Karmic, Tomek Rabczak
    Sat, 10:00 - 10:50
    Track 4 - The 3-Way
  • Stealthy and Persistent Back Door for Z- Wave Gateways

    Jonathan Fuller, Ben Ramsey
    Sat, 10:00 - 10:25
    Track 5 - Stable Talks
  • 10:30
  • Building a Better Honeypot Network

    Josh Pyorre
    Sat, 10:30 - 10:55
    Track 5 - Stable Talks
  • 12:00
  • Dec0ding Humans Live

    Chris Hadnagy
    Sat, 12:00 - 12:50
    Track 1 - Break Me
  • ISLET: An Attempt to Improve Linux-based Software Training

    Jon Schipp
    Sat, 12:00 - 12:50
    Track 2 - Fix Me
  • Breaking in Bad (I’m The One Who Doesn’t Knock)

    Jayson E. Street
    Sat, 12:00 - 12:50
    Track 3 - Teach Me
  • Bugspray - The 802.15.4 Attack Surface

    Bryan Halfpap
    Sat, 12:00 - 12:50
    Track 4 - The 3-Way
  • Surveillance Using Spare Stuff

    Matt Scheurer
    Sat, 12:00 - 12:25
    Track 5 - Stable Talks
  • 12:30
  • Crypto 101: An Intro to Real-World Crypto

    Adam Caudill
    Sat, 12:30 - 12:55
    Track 5 - Stable Talks
  • 13:00
  • Gray Hat PowerShell

    Ben Ten
    Sat, 13:00 - 13:50
    Track 1 - Break Me
  • CyberSecurity Alphabets - Hacker Edition

    Reuben A. Paul
    Sat, 13:00 - 13:50
    Track 2 - Fix Me
  • Developers: Care and Feeding

    Bill Sempf
    Sat, 13:00 - 13:50
    Track 3 - Teach Me
  • Unbillable: Exploiting Android in App Purchases

    Alfredo Ramirez
    Sat, 13:00 - 13:50
    Track 4 - The 3-Way
  • Practical Attacks Against Multifactor

    Josh Stone
    Sat, 13:00 - 13:25
    Track 5 - Stable Talks
  • 13:30
  • Hacking the Next Generation

    David Schwartzberg
    Sat, 13:30 - 13:55
    Track 5 - Stable Talks
  • 14:00
  • WhyMI so Sexy? WMI Attacks - Real-Time Defense - and Advanced Forensic Analysis

    William Ballenthin, Matthew Graeber, Claudiu Teodorescu
    Sat, 14:00 - 14:50
    Track 1 - Break Me
  • Losing Battles - Winning Wars - Active Defense Rebooted

    Rafal Los
    Sat, 14:00 - 14:50
    Track 2 - Fix Me
  • Fingerprinting the Modern Digital Footprint

    Arian Evans
    Sat, 14:00 - 14:50
    Track 3 - Teach Me
  • Bypass Surgery: Abusing Content Delivery Networks With Server-Side-Request Forgery (SSRF), Flash, and DNS

    Michael Brooks, Matthew Bryant
    Sat, 14:00 - 14:50
    Track 4 - The 3-Way
  • The Human Interface Device Attack Vector: Research and Development

    Alexander Livingston Segal
    Sat, 14:00 - 14:25
    Track 5 - Stable Talks
  • 14:30
  • A Survey of Powershell Enabled Malware

    Tyler Halfpop
    Sat, 14:30 - 14:55
    Track 5 - Stable Talks
  • 15:00
  • Hackers vs. Defenders: Can the Defender Ever Stop Playing Catch Up and Win?

    Mano Paul
    Sat, 15:00 - 15:50
    Track 1 - Break Me
  • Social Media Risk Metrics. When OMGWTFBBQ Meets Risk Algorithms.

    Iftach Ian Amit, Alex Hutton
    Sat, 15:00 - 15:50
    Track 2 - Fix Me
  • Surviving Your Startup

    Bruce Potter
    Sat, 15:00 - 15:50
    Track 3 - Teach Me
  • Dynamic Analysis of Flash Files

    Jacob Thompson
    Sat, 15:00 - 15:50
    Track 4 - The 3-Way
  • Tool Drop: Free as in Beer

    Scot Berner, Jason Lang
    Sat, 15:00 - 15:25
    Track 5 - Stable Talks
  • 15:30
  • Tactical Diversion-Driven Defense

    Greg Foss, Tom Hegal
    Sat, 15:30 - 15:55
    Track 5 - Stable Talks
  • 16:00
  • Medical Devices: Pwnage and Honeypots

    Mark Collao, Scott Erven
    Sat, 16:00 - 16:50
    Track 1 - Break Me
  • Building a Brain for Infosec

    Jason Montgomery, Ryan Sevey
    Sat, 16:00 - 16:50
    Track 2 - Fix Me
  • Started from the bottom, now I’m here?: How to ruin your life by getting everything you ever wanted

    Chris Nickerson
    Sat, 16:00 - 16:50
    Track 3 - Teach Me
  • Attacking Packing: Captain Hook Beats Down on Peter Packer

    Nick Cano, Vadim Kotov
    Sat, 16:00 - 16:50
    Track 4 - The 3-Way
  • Windows 10 Defense in Depth

    Eddie David
    Sat, 16:00 - 16:25
    Track 5 - Stable Talks
  • 16:30
  • Latest Tools in Automotive Hacking

    Craig Smith
    Sat, 16:30 - 16:55
    Track 5 - Stable Talks
  • 17:00
  • State of the Metasploit Framework

    James Lee
    Sat, 17:00 - 17:50
    Track 1 - Break Me
  • How to Build Your Own Covert SIGINT Vehicle

    Drew Porter
    Sat, 17:00 - 17:50
    Track 2 - Fix Me
  • Using Windows diagnostics for system compromise

    Nicholas Berthaume
    Sat, 17:00 - 17:50
    Track 3 - Teach Me
  • HFC Update

    Johnny Long, Henry Wanjala
    Sat, 17:00 - 17:50
    Track 4 - The 3-Way
  • Ansible. And Why it Works for Me.

    Charles Yost
    Sat, 17:00 - 17:25
    Track 5 - Stable Talks
  • 17:30
  • Learning Mainframe Hacking: Where the Hell Did All My Free Time Go?

    Chad Rikansrud
    Sat, 17:30 - 17:55
    Track 5 - Stable Talks
  • 18:00
  • Credential Assessment: Mapping Privilege Escalation at Scale

    Matt Weeks
    Sat, 18:00 - 18:50
    Track 1 - Break Me
  • InfoSec Big Picture and Some Quick Wins

    Schuyler Dorsey
    Sat, 18:00 - 18:50
    Track 3 - Teach Me
  • HARdy HAR HAR HAR: HAR File Collection and Analysis for Malware

    Robert Simmons
    Sat, 18:00 - 18:50
    Track 4 - The 3-Way
  • Intercepting USB Traffic for Attack and Defense

    Brandon Wilson
    Sat, 18:00 - 18:25
    Track 5 - Stable Talks
  • 18:30
  • Geeks Need Basements!

    Kathleen Veach
    Sat, 18:30 - 18:55
    Track 5 - Stable Talks
  • 19:00
  • Intro to x86

    Stephanie Preston
    Sat, 19:00 - 19:25
    Track 5 - Stable Talks
  • 19:30
  • Spy Vs. Spy: How to Use Breakable Dependencies to Your Advantage

    Stacey Banks, Anne Henmi
    Sat, 19:30 - 19:55
    Track 5 - Stable Talks