Jump to content
Nytro

ShmooCon 2013 videos

Recommended Posts

Posted (edited)

ShmooCon 2013

[TABLE=width: 80%, align: center]

[TR]

[TH=colspan: 2]Friday, February 15, 2013[/TH]

[/TR]

[TR]

[TH=width: 10%] Time [/TH]

[TH=width: 60%]

[/TH]

[/TR]

[TR]

[TD=align: center] 1200 [/TD]

[TD=colspan: 1, align: center]Registration Opens[/TD]

[/TR]

[TR]

[TD=align: center] 1430 [/TD]

[TD=colspan: 1, align: center]Opening Remarks and Rants Bruce Potter

Video

[/TD]

[/TR]

[TR]

[TD=align: center] 1530 [/TD]

[TD=colspan: 1, align: center]

How to Own a Building: Exploiting the Physical World with BacNET and the BacNET Attack FrameworkBrad Bowers

Video

[/TD]

[/TR]

[TR]

[TD=align: center] 1600 [/TD]

[TD=colspan: 1, align: center]

Mainframed: The Secrets Inside that Black BoxPhil Young

Video

[/TD]

[/TR]

[TR]

[TD=align: center] 1630 [/TD]

[TD=colspan: 1, align: center]

WIPE THE DRIVE!!! - Techniques for Malware PersistenceMark Baggett and Jake Williams

Video Slides

[/TD]

[/TR]

[TR]

[TD=align: center] 1700 [/TD]

[TD=colspan: 1, align: center]

Apple iOS Certificate TomfooleryTim Medin

Video

[/TD]

[/TR]

[TR]

[TD=align: center] 1730 [/TD]

[TD=colspan: 1, align: center]

Hide and Seek, Post-Exploitation StyleTJ O'Connor and Tim Tomes

Video

[/TD]

[/TR]

[TR]

[TD=align: center] 1800 [/TD]

[TD=colspan: 1, align: center]

Bringing The Sexy Back To...Defense In DepthMartin Fisher

[/TD]

[/TR]

[TR]

[TD=align: center] 1830 [/TD]

[TD=colspan: 1, align: center]

Hackers get Schooled: Learning Lessons from AcademiaBruce Potter (moderator), Matt Blaze, Chris Eagle, Invisigoth, Dave Marcus and Michael Schearer

Video

[/TD]

[/TR]

[TR]

[TD=align: center] 2000 [/TD]

[TD=colspan: 1, align: center]Video

[/TD]

[/TR]

[/TABLE]

[TABLE=width: 80%, align: center]

[TR]

[TH=colspan: 4] Saturday, February 16, 2013 [/TH]

[/TR]

[TR]

[TH=width: 5%] Time [/TH]

[TH=width: 20%] Build It! [/TH]

[TH=width: 20%] Belay It! [/TH]

[TH=width: 20%] Bring it On! [/TH]

[/TR]

[TR]

[TD=align: center] 0930 [/TD]

[TD=colspan: 3, align: center]Registration Opens[/TD]

[/TR]

[TR]

[TD=align: center] 1000 [/TD]

[TD=align: center]

Running a CTF .. Panel and DIscussion on the Art of Hacker GamingBranson Matheson, Brett Thorson, Liam Randall, Jordan Wiens, Tyler Nighswander

Video

[/TD]

[TD=align: center]

C10M: Defending the Internet at ScaleRobert Graham

Video

[/TD]

[TD=align: center]

Paparazzi over IPDaniel Mende and Pascal Turbing

Video

[/TD]

[/TR]

[TR]

[TD=align: center] 1100 [/TD]

[TD=align: center]

DIY: Using Trust to Secure Embedded ProjectsTeddy Reed and David Anthony

Video

[/TD]

[TD=align: center]

Moloch: A New and Free Way To Index Your Packet Capture RepositoryAndy Wick and Eoin Miller

Video

[/TD]

[TD=align: center]

OpenStack Security BriefMatthew Joyce

Video

[/TD]

[/TR]

[TR]

[TD=align: center] 1200 [/TD]

[TD=align: center]

Generalized Single Packet Authorization for Cloud Computing EnvironmentsMichael Rash

Video

[/TD]

[TD=align: center]

From "Shotgun Parsers" to Better Software StacksMeredith Patterson, Sergey Bratus and Dan TQ Hirsh

Video

[/TD]

[TD=align: center]

The Computer Fraud and Abuse Act: Swartz, Auernheimer, and BeyondOrin Kerr and Marcia Hoffman

Video

[/TD]

[/TR]

[TR]

[TD=align: center] 1300 [/TD]

[TD=colspan: 3, align: center]Lunch[/TD]

[/TR]

[TR]

[TD=align: center] 1400 [/TD]

[TD=align: center]

Malware Analysis: Collaboration, Automation & TrainingRichard Harman

Video

[/TD]

[TD=align: center]

Bright Shiny Things: Why We Need Intelligent Data Access ControlsBob Bigman, Craig Rosen, David Ferraiolo, Mark McGovern

Video

[/TD]

[TD=align: center]

Ten Strategies of a World-Class Computer Security Incident Response TeamCarson Zimmerman

Video

[/TD]

[/TR]

[TR]

[TD=align: center] 1500 [/TD]

[TD=align: center]

Armor for your Android AppsRoman Faynberg

Video

[/TD]

[TD=align: center]

Protecting Sensitive Information on iOS DevicesDavid Schuetz

Video

[/TD]

[TD=align: center]

Beyond Nymwars: An Analysis of the Online Identity BattlegroundAestetix

Video

[/TD]

[/TR]

[TR]

[TD=align: center] 1600 [/TD]

[TD=align: center]

How Smart Is Bluetooth Smart?Mike Ryan

Video

[/TD]

[TD=align: center]

Chopshop: Busting the Gh0stWesley Shields and Murad Khan

Video

[/TD]

[TD=align: center]

The Cloud - Storms on the HorizonTyler Pitchford

Video

[/TD]

[/TR]

[TR]

[TD=align: center] 1700 [/TD]

[TD=align: center]

0wn the ConThe Shmoo Group

Video

[/TD]

[TD=align: center]

PunkSPIDER: An Open Source, Scalable Distributed Fuzzing Project Targeting the Entire InternetAlejandro Caceres

Video

[/TD]

[TD=align: center]

Crypto: You're doing it wrongRon Bowes

Video

[/TD]

[/TR]

[TR]

[TD=align: center] 1830 [/TD]

[TD=colspan: 3, align: center]Fire Talks[/TD]

[/TR]

[TR]

[TD=align: center] 2000 [/TD]

[TD=colspan: 3, align: center]Saturday Night Party @ TBD[/TD]

[/TR]

[/TABLE]

[TABLE=width: 80%, align: center]

[TR]

[TH=colspan: 4] Sunday, February 17, 2013 [/TH]

[/TR]

[TR]

[TH=width: 5%] Time [/TH]

[TH=width: 20%] Build It! [/TH]

[TH=width: 20%] Belay It! [/TH]

[TH=width: 20%] Bring it On! [/TH]

[/TR]

[TR]

[TD=align: center] 0930 [/TD]

[TD=colspan: 3, align: center]Registration Opens[/TD]

[/TR]

[TR]

[TD=align: center] 1000 [/TD]

[TD=align: center]

Identity-Based Internet Protocol NetworkDavid Pisano

Video

[/TD]

[TD=align: center]

NSM and more with Bro Network MonitorLiam Randall

Video

[/TD]

[TD=align: center]

These Go to Eleven: When the Law Goes Too FarMichael Schearer

Video

[/TD]

[/TR]

[TR]

[TD=align: center] 1100 [/TD]

[TD=align: center]

Forensics - ExFat Bastardized for CamerasScott Moulton

Video

[/TD]

[TD=align: center]

Page Fault Liberation Army or Better Security Through TrappingJulian Bangert and Sergey Bratus

Video

[/TD]

[TD=align: center]

Hacking as an Act of WarGmark Hardy

Video

[/TD]

[/TR]

[TR]

[TD=align: center] 1200 [/TD]

[TD=align: center]

MASTIFF: Automated Static Analysis FrameworkTyler Hudak

Video

[/TD]

[TD=align: center]

Attacking scada Wireless Systems for Fun and Profit - and FixingAtlas

Video

[/TD]

[TD=align: center]

Ka-ching! How to Make Real MoneyMargaret Russell

Video

[/TD]

[/TR]

[TR]

[TD=align: center] 1300 [/TD]

[TD=colspan: 3, align: center]Room Split Break[/TD]

[/TR]

[TR]

[TD=align: center] 1330 [/TD]

[TD=colspan: 3, align: center]

Is Practical Information Sharing Possible?Sean Barnum, Doug Wilson, Ben Miller

Video

[/TD]

[/TR]

[TR]

[TD=align: center] 1430 [/TD]

[TD=colspan: 3, align: center]Closing Remarks[/TD]

[/TR]

[/TABLE]

Copyright © 2012 ShmooCon

Sursa: ShmooCon 2013 - February 15-17 - ShmooCon 2013

Edited by Nytro

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...