BSidesUK 2015 June 3, 2015 to June 3, 2015, London,UK

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Introduction Paul Batson , Thomas Fischer , Lawrence Munro N/A
How Google turned me into my mother: the proxy paradox in security Wendy Nather Security has been trying to catch up with technology all this time, but the gap ...
DarkComet From Defense To Offense - Identify your Attacker Kevin Breen DarkComet is A Remote Access Trojan that has been around for a while. It has ...
How I Rob Banks Freaky Clown An updated version of the very popular talk that has never been recorded! Let me ...
T2W1-(Practical) Android Malware Analysis Paul Amar Limited Capacity full This hands-on workshop will give you the basics to reverse Android malwares ...
T3W1-Return-Oriented Programming Primer Bas Berg Limited Capacity filling up I've been involved in the VulnHub CTF team for quite a ...
T1W1-Breaking In to Pentesting: Student Edition Steve Lord Limited Capacity seats available Are you a student looking to take the leap to becoming ...
Blue Teamers: The Cinderella of Cyber? Andy Settle , James Burns N/A
Digital Forensics Investigations in the Cloud Environment Wendy Nather , Neha Thethi This presentation will give an overview of the digital forensic issues and challenges existing in ...
Monstrous Appetites: Where Our Security Eyes are Bigger than Our Stomachs Sarah Clarke , James Mckinlay Stress, comfort, misunderstanding, motivation, money - Reasons why you over consume and miss the target. ...
Why bother assessing popular software? David Middlehurst , James Loureiro Many popular software packages have gone through many iterations of white and black box testing ...
Virtual Terminals, POS Security and becoming a billionaire overnight! Grigorios Fragkos Very few people use cash nowadays, as most use a debit or a credit card ...
Reversing for Fun: How to Pick a Victim Rory Alsop , Feargus Pendlebury More and more devices once considered boring now bear marketing boasts that are music to ...
Emulating the Unknown Alan King , Peter Goode You have a binary dump from the ROM of a device you need to understand. ...
Proprietary network protocols - risky business on the wire. Jakub Kaluzny When speed and latency counts, there is no place for standard HTTP/SSL stack and a ...
OpSec vs Attribution - the Hollywood view Stephen Bonner Many of the nation state approaches to cyber security require accurate attribution, however this has ...
A Look at the Real Social Engineers Jessica Barker , Richard De Vere This short talk will look directly into real life social engineers, giving an insight into ...
Standardisation in Penetration Testing and Vulnerability Assessment: Market Analysis and Recommendations Thom Langford , William Knowles Lancaster University and the British Standards Institutions (BSI) have undertaken market research of the penetration ... IncludeThinkstScapes
T2W2-Diving into Nessus reports for business level information Gavin Millard Limited Capacity full Nessus is part of almost every penetration testers toolkit but how can ...
T3W2-Dradis Framework 3.0 - We are back! Daniel P. Martin Limited Capacity seats available After a three years of hiatus and six months in the ...
T1W2-Pen Tester Interview Simulation Ben Dewar-powell Limited Capacity filling up This is to give students (and anyone else that wants to ...
Powershell for Log Analysis and Data Crunching Lewis Ardern , Michelle D'israeli You're stuck on a basic Windows estate, you can't pull the data out, there's no ...
Elliptic Curve Cryptography for those who are afraid of maths Martijn Grooten Elliptic Curve Cryptography (ECC) is hot. Far better scalable than traditional encryption, more and more ...
My love-hate affair with Security Operations Javvad Malik I started my career in security operations. It was great - the world was at ...
T2W3-Maltego Magic - Creating transforms & other stuff Adam Maxwell Limited Capacity full In this workshop I will teach people how to write their own ...
Android App Inspection and Code Injection Fabio Cerullo , Cycubix Quick run through of extracting and decompiling an APK to inspect its working parts and ...
"Stay hungry, stay foolish" by Steve Jobs, CEO of Apple Computer and of Pixar Animation Studios Elliot Stirling N/A
Crash all the Flying Things! - exploiting and defending aircraft collision avoidance Joe Greenwood The engineering industry has been traditionally slow to adopt security, with the woeful state of ...
E-banking transaction authorization – possible vulnerabilities, security verification and best practices for implementation Wojciech Dworakowski During 10+ years of my professional experience as application security expert I had a chance ...
Hack the Hash Yiannis Chrysanthou , Nathaniel Mchugh Crypto hash functions look magical but are in fact built of the simplest operations. Their ...
Encouraging Ethical Disclosure & Reporting Dave Hartley , Aidan Mitchell Responsible, open and ethical disclosure leads to more secure services and applications for everyone. Failure ...
Introducing wifiphisher, a tool for automated WiFi phishing attacks George Chatzisofroniou WiFi networks are commonly plagued by two serious issues: i) management frames can be easily ...
Some hypotheses on well-being, burnout and stress related illnesses in the Cyber Security industry Jack Daniel , Chris Sumner This short talk will introduce the hypotheses behind a future study aiming to examine whether ...
ARMed ROPpery Sam Brown ARM CPUs are everywhere now but a lot of people's knowledge around asm and exploitation ...
T3W3-Windows Privilege Escalation Ruben Boonen , Francesco Mifsud Limited Capacity full The Windows Privilege Escalation workshop aims to provide attendees with a solid ...
T1W3-The Writey Writer's Guide to Writing Writerly Chris "paperghost" Boyd Limited Capacity seats available This workshop is based around 10 years of professional blogging / ...
DLL Hijacking: The Eighth Circle of DLL Hell Ollie Whitehouse , Keith Learmonth DLLs have been the spine of the Windows architecture since the early 90s, so it's ...
Power to the People: bringing infosec to the masses Jessica Barker To truly make a difference in infosec, our industry needs to better understand the people ...
Updating the Future David Rogers Software updates are a nightmare. For users, for manufacturers and also for the hacking community. ...
T2W4-Myths about the HTTPS Lock - Building & Breaking PKI masterclass Yousif Hussin We've been taught that if we see that secure-lock icon while web-browsing then our connection ...
Intelligence led Penetration Testing Cam Buchanan As cyber-attacks become have become sophisticated and prevalent, it is key that penetration testing evolves ...
Threat Intelligence a new approach for cyber security Alonso Silva An increasing number of organisations and individuals fall victim to cyber attacks, despite having set ...