Opening Ceremonies
Subverting Trust in Windows - A Case Study of the "How" and "Why" of Engaging in Security Research
I had my mom break into a prison, then we had pie.
So you want to be a Social Engineer
Further Adventures in Smart Home Automation: Honey, Please Don’t Burn Down Your Office
When to Test, and How to Test It
How to Measure Your Security: Holding Security Vendors Accountable
Eye on the Prize
Building Better Backdoors with WMI
Here Be Dragons: The Unexplored Land of Active Directory ACLs
Securing Windows with Group Policy
A New Take at Payload Generation: Empty-Nest
How we accidentally created our own RAT/C2/Distributed Computing Network
Beyond xp_cmdshell
Bots, Trolls, and Warriors
TBD
Defending against PowerShell Attacks
VMware Escapology: How to Houdini The Hypervisor
Active Defense for web apps
Building Google for Criminal Enterprises
Invoke-CradleCrafter: Moar PowerShell obFUsk8tion & Detection (@('Tech','niques') -Join'')
CredDefense Toolkit
3rd Annual Metasploit Townhall
IoT Security – Executing an Effective Security Testing Process
V!4GR4: Cyber-Crime, Enlarged
PSAmsi - An offensive PowerShell module for interacting with the Anti-Malware Scan Interface in Windows 10
Steel Sharpens Steel: Using Red Teams to improve Blue Teams
Purpose Driven Hunt: What do I do with all this data?
Fileless Malware - The New “Cyber”
The skills gap: how can we fix it?
Extending Burp
An ACE in the Hole: Stealthy Host Persistence via Security Descriptors
Introducing DeepBlueCLI v2, now available in PowerShell and Python
DanderSpritz: How the Equation Group's 2013 tools pwn in 2017
Hunting Lateral Movement for Fun and Profit
Shellcode Via VBScript/JScript Implications
Retail Store/POS Penetration Testing
War Stories on Embedded Security: Pentesting, IoT, Building Managers, and how to do Better
Run your security program like a boss / practical governance advice
Defending the Cloud: Lessons from Intrusion Detection in SharePoint Online
(Mostly) Free Defenses Against the Phishing Kill Chain
Improv Comedy as a Social Engineering Tool
How to safely conduct shenanigans
Digital Vengeance: Exploiting the Most Notorious C&C Toolkits
The .NET Inter-Operability Operation
A presentation or presentations because...