Opening Ceremonies
Subverting Trust in Windows - A Case Study of the "How" and "Why" of Engaging in Security Research
I had my mom break into a prison, then we had pie.
So you want to be a Social Engineer
Here Be Dragons: The Unexplored Land of Active Directory ACLs
TBD
Invoke-CradleCrafter: Moar PowerShell obFUsk8tion & Detection (@('Tech','niques') -Join'')
PSAmsi - An offensive PowerShell module for interacting with the Anti-Malware Scan Interface in Windows 10
An ACE in the Hole: Stealthy Host Persistence via Security Descriptors
War Stories on Embedded Security: Pentesting, IoT, Building Managers, and how to do Better
Return From The Underworld - The Future Of Red Team Kerberos
Memory-Based Library Loading: Someone Did That Already.
Building the DeathStar: getting Domain Admin with a push of a button (a.k.a. how I almost automated myself out of a job)
Modern Evasion Techniques
FM, and Bluetooth, and Wifi... Oh My!
Detect Me If You Can
Full-Contact Recon
Not a Security Boundary: Bypassing User Account Control
Victim Machine has joined #general: Using Third Party APIs as C&C Infrastructure.
Aiding Static Analysis: Discovering Vulnerabilities in Binary Targets through Knowledge Graph Inferences
Evading Autoruns
MitM Digital Subscriber Lines
Jumping the Fence: Comparison and Improvements for Existing Jump Oriented Programming Tools
Closing Ceremony