• 0
  • 0wn the Con

    The Shmoo Group
    Sat, 17:00 - 17:50
    Build It!
  • 5
  • 5G Protocol Vulnerabilities and Exploits

    Roger Piqueras Jover
    Sat, 10:00 - 10:50
    Bring it On!
  • A
  • Adventures in Hardware Hacking or Building Expensive Tools on a Budget

    Zac Franken
    Sat, 11:00 - 11:50
    Build It!
  • Adversary Detection Pipelines: Finally Making Your Threat Intel Useful

    Xena Olsen
    Sun, 10:00 - 10:50
    Belay It!
  • Airplane Mode: Cybersecurity @ 30,000+ Feet

    Olivia Stella
    Sat, 12:00 - 12:50
    Belay It!
  • Amateur Radio Exams

     
    Sat, 13:00 - 15:00
    BoF It!
  • Anti-Forensics for Fun and Privacy

    Alissa Gilbert
    Sat, 17:00 - 17:50
    Belay It!
  • A Wireless Journeyman’s Experience in Practical SIGINT

    Russell Handorf
    Sun, 10:00 - 10:50
    Build It!
  • B
  • Banjo: An Android Disassembler for Binary Ninja

    Austin Ralls
    Sat, 15:30 - 15:50
    Build It!
  • Battling Supermutants in the Phishing Wasteland

    Zack Allen, Ashlee Benge
    Sat, 10:00 - 10:50
    Belay It!
  • Between Two Moose

    Beetle, Matt Blaze, Bruce Potter, Kiersten Todt
    Sun, 13:00 - 13:50
    One Track Mind
  • C
  • Chip Decapping on a Budget

    Zach Pahle
    Sat, 15:00 - 15:20
    Build It!
  • Choose Your Own Adventure: Ransomware Response!

    Heather Smith
    Sat, 14:00 - 14:50
    Bring it On!
  • Cisco SMB Products — Critical Vulnerablities / 0-day Release

    Ken Pyle
    Sat, 15:00 - 15:20
    Bring it On!
  • Closing Remarks

     
    Sun, 14:00 - 14:50
    One Track Mind
  • Command and KubeCTL: Real-World Kubernetes Security for Pentesters

    Mark Manning
    Sat, 11:00 - 11:50
    Belay It!
  • Crossing the Border With Your Electronic Devices

    William Budington, Kurt Opsahl
    Sun, 10:00 - 10:50
    Bring it On!
  • Cybersecurity Clubs and You

    Shannon McHale
    Fri, 19:10 - 19:25
    Firetalks
  • D
  • DNS New World Order: QuadX! DoH! DoT! Da Fuq?

    James Troutman
    Fri, 20:50 - 21:05
    Firetalks
  • Do Unto Others: A Red Team Ethical Framework for Offensive Rules Of Engagement

    Roy Iversen, Tarah Wheeler
    Fri, 20:30 - 20:45
    Firetalks
  • E
  • Extracting an ELF From an ESP32

    Chris Lyne, Nick Miles
    Sat, 10:00 - 10:50
    Build It!
  • F
  • Face/Off: Action Plan for Perils & Privileges of Facial Recognition

    Suchi Pahi, Elizabeth Wharton
    Sat, 16:00 - 16:20
    Bring it On!
  • Firetalks Opening

     
    Fri, 19:00 - 19:10
    Firetalks
  • Flipping Bits on NSRL

    Billy Trobbiani
    Fri, 19:30 - 19:45
    Firetalks
  • H
  • Hacking Democracy: On Securing an Election

    Tod Beardsley, Jack Cable, Kimber Dowsett, Casey Ellis, Amélie E. Koran
    Sat, 17:00 - 17:50
    Bring it On!
  • Hack the Stars

    Yacko, Wacko, and Dot
    Sun, 12:00 - 12:50
    Bring it On!
  • K
  • Knowing the UnFuzzed and Finding Bugs with Coverage Analysis

    Mark Griffin
    Sun, 11:00 - 11:50
    Build It!
  • L
  • LABS: Infrastructure / Visualization

     
    Sat, 11:45 - 12:00
    BoF It!
  • LABS: Log Collection / Aggregation

     
    Sat, 15:30 - 15:45
    BoF It!
  • LABS: Networking / Core Services

     
    Sat, 10:30 - 10:45
    BoF It!
  • LABS: Network Security

     
    Sat, 11:30 - 11:45
    BoF It!
  • LABS: Security Operations Center

     
    Sat, 15:45 - 16:00
    BoF It!
  • LABS: Threat Hunting / Log Correlation

     
    Sat, 16:30 - 16:45
    BoF It!
  • LABS: Vulnerability Management

     
    Sat, 10:45 - 11:00
    BoF It!
  • LABS: Wireless Network

     
    Sat, 16:45 - 17:00
    BoF It!
  • M
  • Moose v. Woodchuck

    Samantha Livingston
    Fri, 15:30 - 15:50
    One Track Mind
  • O
  • Opening Remarks, Rumblings, Ruminations, and Rants

     
    Fri, 14:00 - 15:25
    One Track Mind
  • P
  • Playing the Short Game: The Effects of Data Breaches on Share Prices

    Chaim Sanders
    Sun, 11:00 - 11:50
    Bring it On!
  • Privacy Scores for iOS Apps

    Noelle Garrett
    Sat, 14:00 - 14:50
    Build It!
  • Project Everest: Fast, Correct, and Secure Software for Deployment Now!

    Jonathan Protzenko, Nikhil Swamy
    Sun, 12:00 - 12:50
    Belay It!
  • R
  • Real World Zero Trust Implementation

    Mark Loveless
    Sun, 11:00 - 11:50
    Belay It!
  • Resistance Isn’t Futile: A Practical Approach to Prioritizing Defenses with Threat Modeling

    Katie Nickels
    Sat, 15:30 - 15:50
    Bring it On!
  • Reverse Engineering Apple’s BLE Continuity Protocol for Tracking, OS Fingerprinting, and Behavioral Profiling

    Sam Teplov
    Fri, 16:00 - 16:20
    One Track Mind
  • Robots and Privacy

    Brittany Postnikoff
    Fri, 18:00 - 18:50
    One Track Mind
  • S
  • SBOM: Screw it, We’ll Do it Live!

    Audie, Joshua Corman
    Sat, 16:00 - 16:20
    Belay It!
  • Security Researcher OPSEC

    Krassimir Tzvetanov
    Sat, 16:30 - 16:50
    Belay It!
  • Software Mitigations for Hardware Vulnerabilities

    Antonio Gomez
    Sat, 15:30 - 15:50
    Belay It!
  • T
  • Teen Hacks for Obfuscating Identity on Social Media

    Samantha Mosely, Russell Mosley
    Sat, 15:00 - 15:20
    Belay It!
  • The Cyberlous Mrs. Maisel: A Comedic (and slightly terrifying) Introduction to Information Warfare

    J. Zhanna Malekos Smith, J.D.
    Sat, 12:00 - 12:50
    Bring it On!
  • The Hacker’s Guide to Cybersecurity Policy in 2020

    Leonard Bailey, Jen Ellis, Nick Leiserson, Kurt Opsahl
    Sat, 11:00 - 11:50
    Bring it On!
  • The Verilog to Verilog Decompiler

    Katie Liszewski
    Sun, 12:00 - 12:50
    Build It!
  • Think of the Kitten: The Truth About Section 230, the Law All the Cute Online Cat Pictures (And a Lot of Other Good Stuff) Depends On

    Cathy Gellis
    Fri, 16:30 - 16:50
    One Track Mind
  • U
  • Using Abusing the Freedom of Information Act

    Christine Giglio
    Fri, 19:50 - 20:05
    Firetalks
  • Using Android WebViews to Steal All the Files

    Jesson Soto Ventura
    Fri, 20:10 - 20:25
    Firetalks
  • Using OSINT for Human Rights and Victim Support

    Rae Baker
    Sat, 16:30 - 16:50
    Bring it On!
  • V
  • Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Review Process From the Ground Up

    Wendy Knox Everette
    Sat, 14:00 - 14:50
    Belay It!
  • Voight-Kampff for Email Addresses: Quantifying Email Address Reputation to Identify Spear-Phishing and Fraud

    Josh Kamdjou
    Sat, 16:00 - 16:50
    Build It!
  • W
  • What if We Had TLS for Phone Numbers? An Introduction to SHAKEN/STIR

    Kelley Robinson
    Fri, 17:30 - 17:50
    One Track Mind
  • Whitelisting LD_PRELOAD for Fun and No Profit

    Tony Lambert
    Sat, 12:00 - 12:50
    Build It!
  • Z
  • Zoom 0-Day: How Not to Handle a Vulnerability Report

    Jonathan Leitschuh
    Fri, 17:00 - 17:20
    One Track Mind