Sched.com Conference Mobile Apps
BruCON 0x0A
has ended
Create Your Own Event
BruCON 0x0A
-
Saved To
My Schedule
Schedule
Simple
Expanded
Grid
By Venue
Speakers
Attendees
Search
or browse by date + venue
Lounge
Social Event
Talk
Village
Workshop
Popular
menu
Menu
Log in
Sign up
Schedule
Speakers
Attendees
Search
Popular Events
#1
Social engineering for penetration testers
#2
Advanced WiFi Attacks using Commodity Hardware
#3
Levelling Up Security @ Riot Games
#4
(Re)Investigating Powershell attacks
#5
Hacking driverless vehicles
#6
The 99c heart surgeon dilemma
#7
Lunch
#8
BruCON Retro Opening
#9
Coffee Break
#10
Registration & Breakfast
#11
Mentor/Mentee
#12
BruCON Party
#13
Hunting Android Malware: A novel runtime technique for identifying malicious applications
#14
All Your Cloud Are Belong To Us – Hunting Compromise in Azure
#15
Disrupting the Kill Chain
#16
Forging Trusts for Deception in Active Directory
#17
Keynote - When Lemon Markets, Imposter Syndrome & Dunning–Kruger collide
#18
BruCON Opening
#19
$SignaturesAreDead = “Long Live RESILIENT Signatures” wide ascii nocase
#20
Lunch
#21
Coffee Break
#22
Registration & Breakfast
#23
Finding 0days in embedded systems with code coverage guided fuzzing
#24
Reversing Industrial Protocols – Real World Use Cases (From zero to control in 10 minutes)
#25
Python Toolsmithing 101
#26
Simplifying the art of instrumentation
#27
Developing Resilient Detections (with Obfuscation & Evasion in Mind)
#28
Finding security vulnerabilities with modern fuzzing techniques
#29
Malware Triage: Analyzing Malscripts – Return of The Exploits!
#30
A goldmine within an ocean of data – basics of network forensics
#31
Introduction to Bro Network Security Monitor
#32
Python Toolsmithing 101
#33
The hunt is on: Engineering the NextGen Cyber Threat Detection System. Attackers, it’s not so easy to hide anymore! (Short Version)
#34
Mirror on the wall: using blue team techniques in red team ops
#35
Outside the Box: Breakouts and Privilege Escalation in Container Environments
#36
Process Control through Counterfeit Comms: using and abusing built-in functionality to own a PLC
#37
Dissecting Of Non-Malicious Artifacts: One IP At A Time
#38
IoT RCE, a Study With Disney
#39
BruCON Closing
#40
Lunch
#41
Keynote - 5.256e+6 minutes in a decade
#42
Registration & Breakfast
#43
Coffee Break
#44
Exploits in Wetware
#45
Finding security vulnerabilities with modern fuzzing techniques (Short Version)
#46
Active Directory Redteaming : Attacking the backbone of Enterprise environments
#47
A goldmine within an ocean of data – basics of network forensics
#48
The hunt is on: Engineering the NextGen Cyber Threat Detection System. Attackers, it’s not so easy to hide anymore!
#49
The story of greendale
#50
ICS Forensic Workshop
Popular by Type
All Types
Lounge
Social Event
Talk
Village
Workshop
Popular by Day
All days
Wednesday, Oct 3
Thursday, Oct 4
Friday, Oct 5
Recently Active Attendees
SS
Stephan Siebeck
N
Nathanael
Steffen
Stijn
Tijl
B
Bertrand
WouterK
Sciuro
More →