Nytro Posted March 17, 2013 Report Posted March 17, 2013 (edited) ShmooCon 2013[TABLE=width: 80%, align: center][TR][TH=colspan: 2]Friday, February 15, 2013[/TH] [/TR] [TR] [TH=width: 10%] Time [/TH] [TH=width: 60%] [/TH] [/TR] [TR] [TD=align: center] 1200 [/TD] [TD=colspan: 1, align: center]Registration Opens[/TD] [/TR] [TR] [TD=align: center] 1430 [/TD] [TD=colspan: 1, align: center]Opening Remarks and Rants Bruce Potter Video[/TD] [/TR] [TR] [TD=align: center] 1530 [/TD] [TD=colspan: 1, align: center]How to Own a Building: Exploiting the Physical World with BacNET and the BacNET Attack FrameworkBrad Bowers Video[/TD] [/TR] [TR] [TD=align: center] 1600 [/TD] [TD=colspan: 1, align: center]Mainframed: The Secrets Inside that Black BoxPhil Young Video[/TD] [/TR] [TR] [TD=align: center] 1630 [/TD] [TD=colspan: 1, align: center]WIPE THE DRIVE!!! - Techniques for Malware PersistenceMark Baggett and Jake Williams Video Slides[/TD] [/TR] [TR] [TD=align: center] 1700 [/TD] [TD=colspan: 1, align: center]Apple iOS Certificate TomfooleryTim MedinVideo[/TD] [/TR] [TR] [TD=align: center] 1730 [/TD] [TD=colspan: 1, align: center]Hide and Seek, Post-Exploitation StyleTJ O'Connor and Tim TomesVideo[/TD] [/TR] [TR] [TD=align: center] 1800 [/TD] [TD=colspan: 1, align: center]Bringing The Sexy Back To...Defense In DepthMartin Fisher[/TD] [/TR] [TR] [TD=align: center] 1830 [/TD] [TD=colspan: 1, align: center]Hackers get Schooled: Learning Lessons from AcademiaBruce Potter (moderator), Matt Blaze, Chris Eagle, Invisigoth, Dave Marcus and Michael SchearerVideo[/TD] [/TR] [TR] [TD=align: center] 2000 [/TD] [TD=colspan: 1, align: center]Video[/TD] [/TR] [/TABLE][TABLE=width: 80%, align: center] [TR][TH=colspan: 4] Saturday, February 16, 2013 [/TH][/TR] [TR] [TH=width: 5%] Time [/TH] [TH=width: 20%] Build It! [/TH] [TH=width: 20%] Belay It! [/TH] [TH=width: 20%] Bring it On! [/TH] [/TR] [TR] [TD=align: center] 0930 [/TD] [TD=colspan: 3, align: center]Registration Opens[/TD] [/TR] [TR] [TD=align: center] 1000 [/TD] [TD=align: center]Running a CTF .. Panel and DIscussion on the Art of Hacker GamingBranson Matheson, Brett Thorson, Liam Randall, Jordan Wiens, Tyler NighswanderVideo[/TD] [TD=align: center]C10M: Defending the Internet at ScaleRobert GrahamVideo[/TD] [TD=align: center]Paparazzi over IPDaniel Mende and Pascal TurbingVideo[/TD] [/TR] [TR] [TD=align: center] 1100 [/TD] [TD=align: center]DIY: Using Trust to Secure Embedded ProjectsTeddy Reed and David AnthonyVideo[/TD] [TD=align: center]Moloch: A New and Free Way To Index Your Packet Capture RepositoryAndy Wick and Eoin MillerVideo[/TD] [TD=align: center]OpenStack Security BriefMatthew JoyceVideo[/TD] [/TR] [TR] [TD=align: center] 1200 [/TD] [TD=align: center]Generalized Single Packet Authorization for Cloud Computing EnvironmentsMichael RashVideo[/TD] [TD=align: center]From "Shotgun Parsers" to Better Software StacksMeredith Patterson, Sergey Bratus and Dan TQ HirshVideo[/TD] [TD=align: center]The Computer Fraud and Abuse Act: Swartz, Auernheimer, and BeyondOrin Kerr and Marcia HoffmanVideo[/TD] [/TR] [TR] [TD=align: center] 1300 [/TD] [TD=colspan: 3, align: center]Lunch[/TD] [/TR] [TR] [TD=align: center] 1400 [/TD] [TD=align: center]Malware Analysis: Collaboration, Automation & TrainingRichard HarmanVideo[/TD] [TD=align: center]Bright Shiny Things: Why We Need Intelligent Data Access ControlsBob Bigman, Craig Rosen, David Ferraiolo, Mark McGovernVideo[/TD] [TD=align: center]Ten Strategies of a World-Class Computer Security Incident Response TeamCarson ZimmermanVideo[/TD] [/TR] [TR] [TD=align: center] 1500 [/TD] [TD=align: center]Armor for your Android AppsRoman FaynbergVideo[/TD] [TD=align: center]Protecting Sensitive Information on iOS DevicesDavid SchuetzVideo[/TD] [TD=align: center]Beyond Nymwars: An Analysis of the Online Identity BattlegroundAestetixVideo[/TD] [/TR] [TR] [TD=align: center] 1600 [/TD] [TD=align: center]How Smart Is Bluetooth Smart?Mike RyanVideo[/TD] [TD=align: center]Chopshop: Busting the Gh0stWesley Shields and Murad KhanVideo[/TD] [TD=align: center]The Cloud - Storms on the HorizonTyler PitchfordVideo[/TD] [/TR] [TR] [TD=align: center] 1700 [/TD] [TD=align: center]0wn the ConThe Shmoo GroupVideo[/TD] [TD=align: center]PunkSPIDER: An Open Source, Scalable Distributed Fuzzing Project Targeting the Entire InternetAlejandro CaceresVideo[/TD] [TD=align: center]Crypto: You're doing it wrongRon BowesVideo[/TD] [/TR] [TR] [TD=align: center] 1830 [/TD] [TD=colspan: 3, align: center]Fire Talks[/TD] [/TR] [TR] [TD=align: center] 2000 [/TD] [TD=colspan: 3, align: center]Saturday Night Party @ TBD[/TD] [/TR] [/TABLE] [TABLE=width: 80%, align: center][TR][TH=colspan: 4] Sunday, February 17, 2013 [/TH][/TR] [TR] [TH=width: 5%] Time [/TH] [TH=width: 20%] Build It! [/TH] [TH=width: 20%] Belay It! [/TH] [TH=width: 20%] Bring it On! [/TH] [/TR] [TR] [TD=align: center] 0930 [/TD] [TD=colspan: 3, align: center]Registration Opens[/TD] [/TR] [TR] [TD=align: center] 1000 [/TD] [TD=align: center]Identity-Based Internet Protocol NetworkDavid PisanoVideo[/TD] [TD=align: center]NSM and more with Bro Network MonitorLiam RandallVideo[/TD] [TD=align: center]These Go to Eleven: When the Law Goes Too FarMichael SchearerVideo[/TD] [/TR] [TR] [TD=align: center] 1100 [/TD] [TD=align: center]Forensics - ExFat Bastardized for CamerasScott MoultonVideo[/TD] [TD=align: center]Page Fault Liberation Army or Better Security Through TrappingJulian Bangert and Sergey BratusVideo[/TD] [TD=align: center]Hacking as an Act of WarGmark HardyVideo[/TD] [/TR] [TR] [TD=align: center] 1200 [/TD] [TD=align: center]MASTIFF: Automated Static Analysis FrameworkTyler HudakVideo[/TD] [TD=align: center]Attacking scada Wireless Systems for Fun and Profit - and FixingAtlasVideo[/TD] [TD=align: center]Ka-ching! How to Make Real MoneyMargaret RussellVideo[/TD] [/TR] [TR] [TD=align: center] 1300 [/TD] [TD=colspan: 3, align: center]Room Split Break[/TD] [/TR] [TR] [TD=align: center] 1330 [/TD] [TD=colspan: 3, align: center]Is Practical Information Sharing Possible?Sean Barnum, Doug Wilson, Ben MillerVideo[/TD] [/TR] [TR] [TD=align: center] 1430 [/TD] [TD=colspan: 3, align: center]Closing Remarks[/TD][/TR][/TABLE] Copyright © 2012 ShmooConSursa: ShmooCon 2013 - February 15-17 - ShmooCon 2013 Edited March 17, 2013 by Nytro Quote