Bsidescanberra 2017 March 17, 2017 to March 18, 2017, canberra,australia

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
From 2600 to 1600 Pennsylvania Ave: Reflections on 15 years of infosec reporting Pat Gray After 15 years reporting on information security, Risky Business podcast host Patrick Gray reflects on ...
The Insecurity of Industrial Things Stephen A. Ridley , Margaret Carlton This talk summarizes the state of IoT security, specifically as it relates to Industrial Control ...
Human vs Machine: A source code review challenge Kate Mcinnes Take one human, a couple of commercial code analysers, a few open source code analysers, ...
Behind the Scenes Building DARPA's Cyber Grand Challenge Chris Eagle DARPA hosted the Cyber Grand Challenge Final Event—the world’s first all-machine cyber hacking tournament—on August ...
Efficient Fuzzing? Sure we can do that... Shane Magrath Fuzzing is a simple technique for finding software defects that are security interesting. Industrial fuzzing ...
The evolution of flight data recovery at the ATSB - from foil to flash Aaron Holman Australia was the first country to legislate the requirement for flight recorders to be carried ...
Departed Communications: Learn the ways to smash them Fatih Ozavci Unified Communications (UC) is widely used by larger organisations for video conferences, office collaboration, cloud ...
Walk through of the 2016 CERT Australia BSides Canberra Incident Response Challenge Andrew Clark , Simeon Simes CERT Australia has been using technical challenges to test applicants for technical roles in its ...
Shiny Toys' vs Tools – Getting better value out of your detection tool suite Petrina Olds In this talk I will discuss how to get better value out of your security ...
Exploit to Exfil - Emerging techniques for persistence, lateral movement Ben Wilson During numerous investigations and incidents we've seen that attackers can be a creative and crafty ...
Life After Yara Arun Lakhotia , Paul Black Yara rules are widely used to quickly search for malware samples and memory dumps. Though ...
Middle-out Network Analysis: Finding Evil with a Low Signal-to-Noise Ratio Steve Miller , Geoff Carstairs Attackers are using increasingly clever techniques to evade detection in network traffic. The development of ...
Mitigating control-flow hijack with dereferenced function pointers Gideon Greech Exploits seek to gain control of the execution path of a program and direct it ...
Back to the Futu^H^H^H^H …… ah screw it, it’s all broken - Practical GPS Spoofing David Robinson GPS is central to a lot of aspects of the systems we deal with on ...
SatNav Forensics - I Know Where the Bodies are Buried Peter Hannay The research being presented has contributed to over a 250 years of combined jail time. ...
USB Based Overvoltage Devices or Another reason not to trust USBs Adam Jon Foster The Killer USB, Building a Killer USB, A guy thinking he knows what hes doing ...
Homebrew homebrew Liam0 You can get it hacking You can get it cracking You can get it any ...
What the Heck is a Ham Radio? Max Amateur radio is quite a broad hobby, and you may already be interested in part ...
We have no idea how to hack a Furby Connect L0ss , Swarley On the morning of New Year’s Day 1965, children’s TV presenter Soupy Sales encouraged his ...
One keyring to rule them all Scott Herdman In a time where companies are investing in endless “CYBER” protective devices and services to ...
Breaching physical security, and generally causing mayhem, with wireless signals T.j. Acton In today’s technologically advanced world, insecure wireless protocols remain at large. With the emergence of ...
/redacted/ Tim Noise Tim promises to drop /redacted/
Using radio to transmit text and exfil data - 1hr Pamela O'shea This hands-on workshop will walk participants through a series of steps to transmit and receive ...
Antenna building & testing workshop Paul Harvey Do you have a HackRF or RTL-SDR that's deaf? You can't fix everything in software ...
The Root of all EAPoL Neal Wise EAP - Extensible Authentication Protocol - is used in network authentication strategies such as IEEE-802.1x ...
Pentesting voice biometrics Jakub Kaluzny The era of scratch cards, RSA tokens, SMS codes and different variations of second factor ...
Busted: Putting common Elevator myths to the test Wizzy In this presentation I will attempt to bust some common elevator myths. These myths may ...
Privacy Workshops Gabor , Attacus , Robin Set up your own end-to-end encrypted group chat - 1hr Are you a pentester or ...
Honeypotting - A journey into deception based security - 2hrs Adel Karimi , Elliott Brink This workshop introduces you to honeypot technology and the ways you can leverage deception in ...