BsidesKnoxville 2016 May 20, 2016 to May 20, 2016, knowville,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Pentester Agility (What I look for in potential team members) Slade Griffin A lot of people seem to be interested in "getting into cyber security" or becoming ...
Peeking under the hood with Frida S Rubenstein Ever wanted to peek beneath the hood of an application running on your desktop or ...
Intro to automotive security Oded Ashkenazi Automotive security has received a major buzz recently, mainly due to researchers like Charlie Miller ...
Scripting Myself Out of a Job - Automating the Penetration Test with APT2 Adam Len Compton The review board likes submissions that include references to prior works and research you used ...
Learning to Hack RFID for Under $500 Jerry Gamblin On a recent trip to Vegas I noticed that all the hotel locks had switched ...
Tags attack, IoT, physical hacking, wireless hacking Christopher Craig In 2015, Wired reporter Andy Greenberg asked Charlie Miller and Chris Valasek to show him ...
Hack Yourself: Building A Test Lab David Boyd We all want to improve our skill sets, right? Reading is great, but there is ...
Hello Kitty Binyamin Sharet Kitty is a new open source fuzzing framework. It's modular, extensible and flexible. Kitty allows ...
How we pwned Riscure's Rhme+ challenge in two days Itay Rotem Earlier this year, Riscure issued a challenge where they provided an Arduino Nano with special ...
Keynote (Title TBA) Sergey Bratus Sergey Bratus is a Research Assistant Professor of Computer Science at Dartmouth College. He sees ...
Forensics Impossible: Self-Destructing Thumb Drives Brandon Wilson Many people do not understand that a USB thumb drive is a mini computer, capable ...
The Natural Laws and Consequences of Cyber Insecurity Matt Smith This talk will cover the common, underlying vulnerability issues and solutions found after performing numerous ...
Level Up! - Practical Windows Privilege Escalation Andrew Smith For attackers, obtaining access to a Windows workstation with limited privileges can really put a ...
Powershell for CyberWarriors Russel Van Tuyl Powershell, the new hotness, is an interactive object-oriented command environment that has revolutionized the ability ...
The Joy of Sandbox Mitigations James Forshaw When researchers think of Microsoft Windows process mitigations they’re likely to come up with DEP ...
Stack Smashing Protection Bypass via Pthreads - A case of MiniUPNP Buffer overflow Aleksandar Nikolic In 2015 Talos identified and reported a buffer overflow vulnerability in client side code of ...
The Best Campfire Tales that Reverse Engineers Tell Travis Goodspeed At a conference, I don't much give a damn what the target was or how ...