Welcome to the Family - Intro
People Buy You
Keynote Panel - Information Security Today and in the Future
The M/o/Vfuscator - Turning ‘Mov’ into a Soul-crushing RE Nightmare
And You Shall Know Me By My Trail of Documentation
Gadgets Zoo: Bypassing Control Flow Guard in Windows 10
Red vs. Blue: Modern Active Directory Attacks & Defense
Metasploit Town Hall
Red Teaming Enemy of the State
$helling Out (Getting Root) on a ‘Smart Drone’
Phishing: Going from Recon to Creds
Pwning People Personally
Stagefright: Scary Code in the Heart of Android
Dec0ding Humans Live
Gray Hat PowerShell
WhyMI so Sexy? WMI Attacks - Real-Time Defense - and Advanced Forensic Analysis
Hackers vs. Defenders: Can the Defender Ever Stop Playing Catch Up and Win?
Medical Devices: Pwnage and Honeypots
State of the Metasploit Framework
Credential Assessment: Mapping Privilege Escalation at Scale
Is That a Router in Your Pocket or Are You Trying to P0wn Me?
The Little-Known Horrors of Web Application Session Management
Practical Hardware Attacks Against Soho Routers & the Internet of Things
Stretching the Sandbox with Malware Feature Vectors
Gnuradio Demystifying RF Black Magic
Closing Ceremonies