• 08:30
  • Opening Ceremonies

     
    Fri, 08:30 - 09:00
    Track 2
  • 09:00
  • Scanning Darkly

    HD Moore
    Fri, 09:00 - 09:50
    Track 1 - Break Me
  • 10:00
  • Kinetic Pwnage: Obliterating the Line Between Computers and the Physical World

    Ed Skoudis
    Fri, 10:00 - 10:50
    Track 1 - Break Me
  • 12:00
  • Look Ma, No Exploits! – The Recon-ng Framework

    Tim Tomes
    Fri, 12:00 - 12:50
    Track 1 - Break Me
  • Cognitive Injection: Reprogramming the Situation-Oriented Human OS

    Andy Ellis
    Fri, 12:00 - 12:50
    Track 2 - Fix Me
  • It’s Only a Game: Learning Security through Gaming

    Bruce Potter
    Fri, 12:00 - 12:50
    Track 3 - Teach Me
  • Pigs Don’t Fly – Why owning a typical network is so easy, and how to build a secure one.

    Matt Weeks
    Fri, 12:00 - 12:50
    Track 4 - The 3-Way
  • Building An Information Security Awareness Program from Scratch

    Bill Gardner, Valerie Thomas
    Fri, 12:00 - 12:50
    Track 5 - Hybrid Room
  • Gen Y—Getting Them to Talk Rather than Text at Work

    Nancy Kovanic
    Fri, 12:00 - 12:25
    Stable - Stable Talks
  • 12:30
  • Battle Scars And Friendly Fire: Threat Research Team War Stories

    Seth Geftic, Will Gragido
    Fri, 12:30 - 12:55
    Stable - Stable Talks
  • 13:00
  • Practical Exploitation Using A Malicious Service Set Identifier (SSID)

    Deral Heiland
    Fri, 13:00 - 13:50
    Track 1 - Break Me
  • IOCAware – Actively Collect Compromise Indicators and Test Your Entire Enterprise

    Matt Jezorek, Dennis Kuntz
    Fri, 13:00 - 13:50
    Track 2 - Fix Me
  • Ooops, Now What? :: The Stolen Data Impact Model (SDIM)

    Brent Huston
    Fri, 13:00 - 13:50
    Track 3 - Teach Me
  • Finding The Signal in the Noise: Quantifying Advanced Malware

    Dave Marcus
    Fri, 13:00 - 13:50
    Track 4 - The 3-Way
  • Malware : testing malware scenarios on your network

    Juan Cortes, Tony Huffman
    Fri, 13:00 - 13:50
    Track 5 - Hybrid Room
  • Unmasking Miscreants

    Brandon Levene, Allison Nixon
    Fri, 13:00 - 13:25
    Stable - Stable Talks
  • 13:30
  • gitDigger: Creating useful wordlists from public GitHub repositories

    Jaime Filson "WiK"
    Fri, 13:30 - 13:55
    Stable - Stable Talks
  • 14:00
  • JTAGulator: Assisted discovery of on-chip debug interfaces

    Joe Grand
    Fri, 14:00 - 14:50
    Track 1 - Break Me
  • Cash is King: Who’s Wearing Your Crown?

    Tom Eston, Spencer McIntyre
    Fri, 14:00 - 14:50
    Track 2 - Fix Me
  • Anti-Forensics: Memory or something, I forget.

    Int0x80
    Fri, 14:00 - 14:50
    Track 3 - Teach Me
  • Applying the 32 Zombieland Rules to IT Security

    Larry Pesce
    Fri, 14:00 - 14:50
    Track 4 - The 3-Way
  • Password Intelligence Project – Advanced Password Recovery and Modern Mitigation Strategies

    John Moore
    Fri, 14:00 - 14:50
    Track 5 - Hybrid Room
  • PowerShell and Windows Throw the Best Shell Parties

    Piotr Marszalik
    Fri, 14:00 - 14:25
    Stable - Stable Talks
  • 14:30
  • Owning Computers Without Shell Access

    Royce Davis
    Fri, 14:30 - 14:55
    Stable - Stable Talks
  • 15:00
  • Seeing red in your future?

    Iftach Ian Amit
    Fri, 15:00 - 15:50
    Track 1 - Break Me
  • Security Sucks, and You’re Wearing A Nursing Bra

    Paul Asadoorian
    Fri, 15:00 - 15:50
    Track 2 - Fix Me
  • The Mysterious Mister Hokum

    Jason Scott
    Fri, 15:00 - 15:50
    Track 3 - Teach Me
  • Windows 0wn3d By Default

    Mark Baggett
    Fri, 15:00 - 15:50
    Track 4 - The 3-Way
  • Tizen Security: Hacking the new mobile OS

    Mark Manning
    Fri, 15:00 - 15:50
    Track 5 - Hybrid Room
  • Sixnet Tools: for poking at Sixnet Things

    Mehdi Sabraoui
    Fri, 15:00 - 15:25
    Stable - Stable Talks
  • 15:30
  • Promoting Your Security Program Like A Lobbyist.

    Jerry Gamblin
    Fri, 15:30 - 15:55
    Stable - Stable Talks
  • 16:00
  • TMI: How to attack SharePoint servers and tools to make it easier

    James Jardine, Kevin Johnson
    Fri, 16:00 - 16:50
    Track 1 - Break Me
  • Windows Attacks: AT is the new black

    Rob Fuller, Chris Gates
    Fri, 16:00 - 16:50
    Track 2 - Fix Me
  • Appsec Tl;dr

    Gillis Jones
    Fri, 16:00 - 16:50
    Track 3 - Teach Me
  • Android 4.0: Ice Cream “Sudo Make Me a” Sandwich

    Max Sobell
    Fri, 16:00 - 16:50
    Track 4 - The 3-Way
  • RAWR – Rapid Assessment of Web Resources

    Adam Byers, Tom Moore
    Fri, 16:00 - 16:50
    Track 5 - Hybrid Room
  • Abusing LFI-RFI for Fun,Profit and Shells

    Francis Alexander
    Fri, 16:00 - 16:25
    Stable - Stable Talks
  • 16:30
  • Hardening Windows 8 apps for the Windows Store

    Bill Sempf
    Fri, 16:30 - 16:55
    Stable - Stable Talks
  • 17:00
  • The High Risk of Low Risk Applications

    conrad reynolds
    Fri, 17:00 - 17:50
    Track 1 - Break Me
  • How Good is Your Phish

    Greg Simo, @Sonofshirt
    Fri, 17:00 - 17:50
    Track 2 - Fix Me
  • DIY Command & Control For Fun And *No* Profit

    David Schwartzberg
    Fri, 17:00 - 17:50
    Track 3 - Teach Me
  • Hiding @ Depth – Exploring & Subverting NAND Flash memory

    Josh Thomas
    Fri, 17:00 - 17:50
    Track 4 - The 3-Way
  • Decoding Bug Bounty Programs

    Jon Rose
    Fri, 17:00 - 17:50
    Track 5 - Hybrid Room
  • Intro to Dynamic Access Control in Windows Server 2012

    Evan Anderson
    Fri, 17:00 - 17:25
    Stable - Stable Talks
  • 17:30
  • Evolutionary Security – Embracing Failure to Attain “Good Enough”

    Josh More
    Fri, 17:30 - 17:55
    Stable - Stable Talks
  • 18:00
  • It’s Okay to Touch Yourself

    Ben Ten
    Fri, 18:00 - 18:50
    Track 1 - Break Me
  • Identifying Evil: An introduction to Reverse Engineering Malware and other software

    Bart Hopper
    Fri, 18:00 - 18:50
    Track 2 - Fix Me
  • IPv6 is here (kind of), what can I do with it?

    Dan Wilkins
    Fri, 18:00 - 18:50
    Track 3 - Teach Me
  • Attacking the Next Generation Air Traffic Control System; Hackers, liquor and commercial airliners.

    Renderman
    Fri, 18:00 - 18:50
    Track 4 - The 3-Way
  • Patching Windows Executables with the Backdoor Factory

    Joshua Pitts
    Fri, 18:00 - 18:50
    Track 5 - Hybrid Room
  • DIY Forensics: When Incident Response Morphs into Digital Forensics

    John Sammons
    Fri, 18:00 - 18:25
    Stable - Stable Talks
  • 18:30
  • ANOTHER Log to Analyze – Utilizing DNS to Discover Malware in Your Network

    Nathan Magniez
    Fri, 18:30 - 18:55
    Stable - Stable Talks
  • 19:00
  • Collaborative Penetration Testing With Lair

    Dan Kottmann, Tom Steele
    Fri, 19:00 - 19:50
    Track 1 - Break Me
  • How Im going to own your organization in just a few days.

    RazorEQX
    Fri, 19:00 - 19:50
    Track 2 - Fix Me
  • Dancing with Dalvik

    Thomas Richards
    Fri, 19:00 - 19:50
    Track 3 - Teach Me
  • Antivirus Evasion through Antigenic Variation (Why the Blacklisting Approach to AV is Broken)

    Trenton Ivey
    Fri, 19:00 - 19:50
    Track 4 - The 3-Way
  • DEF CON Documentary

    Jason Scott
    Fri, 19:00 - 20:50
    Track 5 - Hybrid Room