• 09:00
  • Building an Empire with (Iron)Python

    Jim Shaver
    Sat, 09:00 - 09:50
    Marriott I & II - Track 1
  • Hardware Slashing, Smashing, and Reconstructing for Root access

    Deral Heiland
    Sat, 09:00 - 09:50
    Marriott VII, VIII, IX, X - Track 2
  • VBA Stomping - Advanced Malware Techniques

    Harold Ogden, Carrie Roberts, Kirk Sayre
    Sat, 09:00 - 09:50
    Kentucky E - Track 3
  • Disaster Strikes: A Hacker's Cook book

    Carlos Perez, Jose Quinones
    Sat, 09:00 - 09:50
    Kentucky F & G - Track 4
  • Tales From the Bug Mine - Highlights from the Android VRP

    Brian Claire Young
    Sat, 09:00 - 09:25
    Kentucky C & D - Stable
  • 09:30
  • Decision Analysis Applications in Threat Analysis Frameworks

    Emily Shawgo
    Sat, 09:30 - 09:55
    Kentucky C & D - Stable
  • 10:00
  • SAEDY: Subversion and Espionage Directed Against You

    Judy Towers
    Sat, 10:00 - 10:50
    Marriott I & II - Track 1
  • App-o-Lockalypse now!

    Oddvar Moe
    Sat, 10:00 - 10:50
    Marriott VII, VIII, IX, X - Track 2
  • Media hacks: an Infosec guide to dealing with journalists

    Sean Gallagher, Steve Ragan, Paul Wagenseil
    Sat, 10:00 - 10:50
    Kentucky E - Track 3
  • Ninja Looting Like a Pirate

    infojanitor
    Sat, 10:00 - 10:50
    Kentucky F & G - Track 4
  • How Russian Cyber Propaganda Really Works

    Jonathan Nichols
    Sat, 10:00 - 10:25
    Kentucky C & D - Stable
  • 10:30
  • Make Me Your Dark Web Personal Shopper!

    Emma Zaballos
    Sat, 10:30 - 10:55
    Kentucky C & D - Stable
  • 12:00
  • OSX/Pirrit - Reverse engineering mac OSX malware and the legal department of the company who makes it

    Yuval Chuddy, Amit Serper, Niv Yona
    Sat, 12:00 - 12:50
    Marriott I & II - Track 1
  • Web App 101: Getting the lay of the land

    Mike Saunders
    Sat, 12:00 - 12:50
    Marriott VII, VIII, IX, X - Track 2
  • Deploying Deceptive Systems: Luring Attackers from the Shadows

    Kevin Gennuso
    Sat, 12:00 - 12:50
    Kentucky E - Track 3
  • Hacking Mobile Applications with Frida

    David Coursey
    Sat, 12:00 - 12:50
    Kentucky F & G - Track 4
  • Driving Away Social Anxiety

    Joey Maresca
    Sat, 12:00 - 12:25
    Kentucky C & D - Stable
  • 12:30
  • Off-grid coms and power

    Justin Herman
    Sat, 12:30 - 12:55
    Kentucky C & D - Stable
  • 13:00
  • How to test Network Investigative Techniques(NITs) used by the FBI

    Dr. Matthew Miller
    Sat, 13:00 - 13:50
    Marriott I & II - Track 1
  • Invoke-DOSfuscation: Techniques FOR %F IN (-style) DO (S-level CMD Obfuscation)

    Daniel Bohannon
    Sat, 13:00 - 13:50
    Marriott VII, VIII, IX, X - Track 2
  • The Money-Laundering Cannon: Real cash; Real Criminals; and Real Layoffs

    Arian Evans
    Sat, 13:00 - 13:50
    Kentucky E - Track 3
  • Victor or Victim? Strategies for Avoiding an InfoSec Cold War

    Jason Lang, Stuart McIntosh
    Sat, 13:00 - 13:50
    Kentucky F & G - Track 4
  • CTFs: Leveling Up Through Competition

    Alex Flores
    Sat, 13:00 - 13:25
    Kentucky C & D - Stable
  • 13:30
  • Mapping wifi networks and triggering on interesting traffic patterns

    Caleb Madrigal
    Sat, 13:30 - 13:55
    Kentucky C & D - Stable
  • 14:00
  • Cloud Computing Therapy Session

    Andy Cooper, Cara Marie
    Sat, 14:00 - 14:50
    Marriott I & II - Track 1
  • WE ARE THE ARTILLERY: Using Google Fu To Take Down The Grids

    Krypt3ia, Chris Sistrunk, SynAckPwn
    Sat, 14:00 - 14:50
    Marriott VII, VIII, IX, X - Track 2
  • Perfect Storm: Taking the Helm of Kubernetes

    Ian Coldwater
    Sat, 14:00 - 14:50
    Kentucky E - Track 3
  • Ubiquitous Shells

    Jon Gorenflo
    Sat, 14:00 - 14:50
    Kentucky F & G - Track 4
  • Extending Burp to Find Struts and XXE Vulnerabilities

    Chris Elgee
    Sat, 14:00 - 14:25
    Kentucky C & D - Stable
  • 14:30
  • Introduction to x86 Assembly

    DazzleCatDuo
    Sat, 14:30 - 14:55
    Kentucky C & D - Stable
  • 15:00
  • Silent Compromise: Social Engineering Fortune 500 Businesses

    Joe Gray
    Sat, 15:00 - 15:50
    Marriott I & II - Track 1
  • Just Let Yourself In

    David Boyd
    Sat, 15:00 - 15:50
    Marriott VII, VIII, IX, X - Track 2
  • How to put on a Con for Fun and (Non) Profit

    Mike Fry, Bill Gardner, Rick Hayes, Benny Karnes, John Moore, Matt Perry, Justin Rogosky, Steve Truax
    Sat, 15:00 - 15:50
    Kentucky E - Track 3
  • 99 Reasons Your Perimeter Is Leaking - Evolution of C&C

    John Askew
    Sat, 15:00 - 15:50
    Kentucky F & G - Track 4
  • Pacu: Attack and Post-Exploitation in AWS

    Spencer Gietzen
    Sat, 15:00 - 15:25
    Kentucky C & D - Stable
  • 15:30
  • An Inconvenient Truth: Evading the Ransomware Protection in Windows 10

    Soya Aoyama
    Sat, 15:30 - 15:55
    Kentucky C & D - Stable
  • 16:00
  • Dexter: the friendly forensics expert on the Coinbase security team

    Hayden Parker
    Sat, 16:00 - 16:50
    Marriott I & II - Track 1
  • A “Crash” Course in Exploiting Buffer Overflows (Live Demos!)

    Parker Garrison
    Sat, 16:00 - 16:50
    Marriott VII, VIII, IX, X - Track 2
  • Web app testing classroom in a box - the good, the bad and the ugly

    Chelle Clements, Jim McMurry, Lee Neely
    Sat, 16:00 - 16:50
    Kentucky E - Track 3
  • Ship Hacking: a Primer for Today’s Pirate

    Brian Olson, Brian Satira
    Sat, 16:00 - 16:50
    Kentucky F & G - Track 4
  • Brutal Blogging - Go for the Jugular

    Kate Brew
    Sat, 16:00 - 16:25
    Kentucky C & D - Stable
  • 16:30
  • RID Hijacking: Maintaining Access on Windows Machines

    Sebastián Castro
    Sat, 16:30 - 16:55
    Kentucky C & D - Stable
  • 17:00
  • Going on a Printer Safari – Hunting Zebra Printers

    James Edge
    Sat, 17:00 - 17:50
    Marriott I & II - Track 1
  • Living in a Secure Container, Down by the River

    Jack Mannino
    Sat, 17:00 - 17:50
    Marriott VII, VIII, IX, X - Track 2
  • Metasploit Town Hall 0x4

    Adam Cammack, Brent Cook, Cody Pierce, Aaron Soto
    Sat, 17:00 - 17:50
    Kentucky E - Track 3
  • Code Execution with JDK Scripting Tools & Nashorn Javascript Engine

    Brett Hawkins
    Sat, 17:00 - 17:50
    Kentucky F & G - Track 4
  • Your Training Data is Bad and You Should Feel Bad

    Ryan J. O'Grady
    Sat, 17:00 - 17:25
    Kentucky C & D - Stable
  • 17:30
  • So many pentesting tools from a $4 Arduino

    Kevin Bong, Michael Vieau
    Sat, 17:30 - 17:55
    Kentucky C & D - Stable
  • 18:00
  • Community Based Career Development or How to Get More than a T-Shirt When Participating as part of the Community

    Cindy Jones, Kristen Renner, Kathryn Seymour, Kathleen Smith, Magen Wu
    Sat, 18:00 - 18:50
    Kentucky E - Track 3
  • PHONOPTICON - leveraging low-rent mobile ad services to achieve state-actor level mass surveillance on a shoestring budget

    Mark Milhouse
    Sat, 18:00 - 18:50
    Kentucky F & G - Track 4