08:30 | Opening Ceremony |
|
09:00 |
Skoudis
|
Opening Keynote - Presented by Ed Skoudis |
10:00 |
others
|
DerbyCon Story Time Panel |
12:00 |
Hadnagy
|
Dynamic Risk Taking and Social Engineering |
Barry,
Cook,
Kienow,
Martin
|
Metasploit Town Hall Finale |
|
Strand
|
Well, what have we here? A year of cyber deception, attribution and making attackers rethink their life choices. |
|
Owens
|
Bypassing MacOS Detections With Swift |
|
12:30 |
Lewis
|
IPv6 Security Considerations - For When "Just Turn It Off" Isn't Good Enough |
13:00 |
DeMott,
Stigerwalt
|
Using Next Generation Fuzzing Tools: Fixing Bugs and Writing Memory Corruption Exploits |
Street
|
I PWN thee, I PWN thee not! |
|
Saulnier
|
BloodHound From Red to Blue |
|
Basu
|
Offensive Machine Learning for Pentesters and Red Teams |
|
13:30 |
Bingham
|
SCADA: What the next Stuxnet will look like and how to prevent it |
14:00 |
Graeber
|
“How do I detect technique X in Windows?” Applied Methodology to Definitively Answer this Question |
Elkins
|
Scientific computing for information security – forging the missing link |
|
Hertz
|
Azure Sentinel - A first look at Microsoft's SIEM Solution |
|
Kramer
|
Designing & building a stealth C2 LDAP channel |
|
14:30 |
Jr
|
There's No Place like (DUAL)Homed. |
15:00 |
Cody,
Tomes
|
To CORS! The cause of, and solution to, your SPA problems! |
Eisen,
Lehman
|
Defeating Next-Gen AV and EDR: Using Old (And New) Tricks on New Dogs |
|
Davison,
Schwartz
|
Behavioral Security and Offensive Psychology at Scale |
|
Peterman
|
Modlishka - Is a Mantis Eating 2FA's Lunch? |
|
15:30 |
Hempel
|
Hacking Humans: Addressing Vulnerabilities in the Advancing Medical Device Landscape |
16:00 |
Christensen,
Schroeder
|
Not A Security Boundary: Breaking Forest Trusts |
Baggett
|
The Hackers Apprentice |
|
Holmes
|
PowerShell Security: Looking Back from the Inside |
|
Olsen
|
It Must Be Fancy Bear! |
|
16:30 |
Roberts,
White
|
Getting the most out of your covert physical security assessment - A Client’s Guide |
17:00 |
Angelo,
Baker,
Kennedy,
Walpole
|
Enabling The Future (Panel) |
Smith
|
How to Tell the C-Level Their Baby is Ugly |
|
Williams
|
Cyber false flags and adversarial counterintelligence, oh my… |
|
Herman
|
Getting dirty on the CANBUS |
|
17:30 |
Sebree
|
Automated Dylib Hijacking |
18:00 |
Lakhan,
Moe
|
Phishing past Mail Protection Controls using Azure Information Protection (AIP) |
09:00 |
Landers,
Pearce
|
42: The answer to life, the universe, and everything offensive security |
Rosenmund
|
Collect All the Data - Protect All the Things |
|
Troia
|
Catching Cyber Criminals – Investigative techniques to identify modern threat actors and the clues they leave behind during data breaches |
|
Matthews
|
The $19.95 anonymous cyber profile |
|
09:30 |
Condon
|
Prepare to Be Boarded! A Tale of Kubernetes, Plunder, and Cryptobooty |
10:00 |
Holden,
Suto
|
kubered - Recipes for C2 Operations on Kubernetes |
Griffith,
Wright
|
Lying in Wait: Discovering and Exploiting Weaknesses in Automated Discovery Actions |
|
Tulis
|
COM Hijacking Techniques |
|
Bong,
Vieau
|
Build your own multi-user password manager using open source software |
|
10:30 |
Ruff
|
No class, Low Tech, High damage |
12:00 |
Gennuso
|
Testing Endpoint Protection: How Anyone Can Bypass Next Gen AV |
Heiland
|
Inter-chip communication - Testing end-to-end security on IoT |
|
Saunders
|
Assumed Breach: A Better Model for Penetration Testing |
|
Nester
|
Early Detection Through Deception |
|
12:30 |
Tabellion
|
The quest for 10g IDS |
13:00 |
Fosaaen
|
Adventures in Azure Privilege Escalation |
Szymanski
|
REST in Peace: Abusing GraphQL to Attack Underlying Infrastructure |
|
Gibble,
Haigh,
Sikorski,
Tully
|
StringSifter: Learning to Rank Strings Output for Speedier Malware Analysis |
|
Douglas,
Petersen
|
Swagger Defense |
|
13:30 |
Schroeder
|
Kerberoasting Revisited |
14:00 |
Shelton
|
Breaking & Entering via SDR, or How I defeated Wiegend over UHF/VHF, or your apartment isn't safe... |
Tokazowski
|
The “Art” of The BEC - What Three Years of Fighting Has Taught Us |
|
Villanueva
|
Practical Heuristic Exploitation |
|
B
|
Hacking While Blind. |
|
14:30 |
Budacki
|
Choose Your Own TTX: Redefining the Incident Response Table Top Exercise |
15:00 |
Sebree
|
Assessing IoT Surveillance - Arlo |
Robbins,
Vazarkar
|
BloodHound: Head to Tail |
|
Melamed
|
Full Steam Ahead: Serverless Hacking 101 |
|
Rickard
|
Hunting Phish Kits |
|
15:30 |
Mullin
|
One woman's journey to CISO leveraging Social Engineering |
16:00 |
Balan
|
Next-gen IoT botnets - leveraging cloud implementations for shells on 500k IoTs |
Lang
|
Red Team Methodology: A Naked Look |
|
Berlin,
Carhart,
Clements,
Neely,
Wright
|
Five Mistakes We Wish Users Would Stop Making |
|
Hawkins
|
SharPersist: Windows Persistence Toolkit in C# |
|
16:30 |
Schwartz
|
Are you ready to leverage DevSecOps? Get ready and use it for good. |
17:00 |
Lo
|
Attacking with Automation: How Office 365 automation provides another new risk to the cloud |
Shaver
|
API Keys, Now What?Taking the Pen Test Into the Amazon Cloud |
|
Dyer,
Hazelrigg
|
Shadow IT in the Cloud |
|
17:30 |
Smith
|
.NET Manifesto - Win Friends and Influence the Loader |
18:00 |
Carhart
|
Confessions of an IT / OT Marriage Counselor |
09:00 | Quiet Time |
|
Leapline,
Yocum
|
Rise of the Machines // using machine learning with GRC |
|
Boyd,
Compton
|
Unix: the Other White Meat |
|
Cooper
|
Python Two birds with one stone |
|
09:30 |
Legowski
|
Invoke-GreatBirdOfCommonKnowledge - Gathering what is scattered with ATT&CK, an Atomic Bird, and a bit of homegrown PowerShell... |
10:00 |
Salvati
|
Red Team Level over 9000! Fusing the powah of .NET with a scripting language of your choosing: introducing BYOI (Bring Your own Interpreter) payloads. |
Blanchard
|
How to Give the Gift That Keeps on Giving - Your Knowledge |
|
Rumble
|
RFID sniffing, under your nose and in your face! |
|
McMurray
|
Adventures in systemd injection |
|
10:30 |
Escobar
|
Frag, You're It - Hacking Laser Tag |
11:00 |
Metcalf
|
Active Directory Security: Beyond the Easy Button |
Mayer
|
The Backup Operators Guide to the Galaxy |
|
Remes
|
Product Security Shouldn't be Painful |
|
Atkinson
|
Waking up the data engineer in you! |
|
11:30 |
Defoe,
Fowl
|
Old Tools, New Tricks: Hacking WebSockets |
12:00 |
Reed
|
Incident response on macOS |
Coggin
|
SS7 for INFOSEC |
|
Bryant,
Falcone
|
Hunting Webshells: Tracking TwoFace |
|
Hartong
|
Endpoint Detection Super Powers on the cheap, with Sysmon |
|
12:30 | Still More Quiet Time |
|
13:00 |
Velazco
|
I sim(ulate), therefore i catch: enhancing detection engineering with adversary simulation |
Maleeff
|
Empathy as a Service to Create a Culture of Security |
|
Linn
|
Improving CACTUSTORCH payloads |
|
EvilMog
|
Automating Hashtopolis |
|
13:30 |
Gardner
|
Social Engineering in Non-Linear Warfare |
14:00 |
Bort
|
Adversarial Emulation |
Gonzalez,
Labelle
|
Welcome to the Jumble: Improving RDP Tooling for Malware Analysis and Pentesting |
|
More Quiet Time |
||
Brown
|
How to cook a five star meal from the convenience of your hotel room |
|
14:30 |
David
|
Virtual Smart Cards for Lab Environments |
15:30 | Closing Ceremony |
This "Old School" schedule is an automatically-generated evolution of a manually-generated hack Darth Null has been using at ShmooCon since 2007. It won't work too well for a large conference, like DEFCON, but for smaller events like ShmooCon or BlackHat DC, it might be useful.
Simply print this out at whatever scale is most helpful to you. For example, for ShmooCon: print at 65%, fold Friday and Sunday back behind Saturday, and laminate, for a two-sided 3" x 4" card that you can keep in your shirt pocket.