BSidesLondon 2017 June 7, 2017 to June 7, 2017, london,uk

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Opening Remarks Thomas Fischer N/A
[Keynote] Freaky Leaks from a Chic Geek Chris Kubecka Subtitle: I should buy a boat Leakware, leaked data bases and leaky applications. Leaks are ...
Introduction and Kick Off Craig Jones N/A
Introducing Pi-Key: Hacking just like the Movies Jon Aubrey , Trevor Shingles Have you ever watched a film where the actor attaches a 'hacking device' to something, ...
Connecting the dots! Arron "finux" Finnon We've seen in 2016 the datapocalypse of 3rd party data breaches, with conservative estimates reaching ...
Session 1 Dynamic Stink Lie Berry's with John Carroll @n0x00 John Carroll Want to know how to identify DLL pre-loading attacks but feel like you aren't geeky ...
Session 1 Web Hacking 101 with Porthunter @porthunter Porthunter We will cover all the basics to give you a good head start into the ...
Session 1 Saving time and effort with security tools and solutions on the BSDs with Sevan Janiyan @sevanjaniyan Sevan Janiyan An quick introductory tour of some of the features in the BSD family of UNIX ...
Targeted CV writing when entering or changing fields David Chismon Getting the first Job in a new field can be hard, particularly if there is ...
How the f**k do I get in? One woman's struggle to break into cyber security! Colette Weston N/A
Profiling Malicious Actors (Working Title) James Stevenson N/A
Awareness about behavior online, how to build it Jelena Milosevic N/A
Working with a recruiter: Mythbuster. What a ‘good’ recruiter does Ryan King , James Spear How to engage and work with a recruiter. Why use a recruiter? CERIS. Trust goes ...
WiFi-based IMSI Catcher Piers O'hanlon We present a new WiFi-based IMSI catcher which operates by exploiting flaws in the way ...
[NOT FILMED] How storytelling made me a better infosec professional Javvad Malik Lights, camera, action… just three words can conjure up images, build anticipation, and set the ...
Session 2 Red Teaming with PoshC2 with Ben Turner & Phil Lynch ( @benpturner & @plynch98 ) Ben Turner This workshop is aimed to help people get setup and start attacking client devices (using ...
Think about the box Stefan Hager N/A
Security Monitoring: Avoiding 'Oh Sh*t' Moments Pete Bryan N/A
Needle in a haystack: Tips and tricks to get you noticed by us. Craig Jones , Randall Otto Ever wanted to work at a vendor? Seen that awesome security job? We’ll tell you ...
Secure Communications Zoë Rose When users and clients ask for 'secure communications' they often get excited about shinny new ...
Sharing is not caring: Proliferation of GitHub code in real attacks Christopher Doman What happens when attackers deploy open-source malware Looking at open command and control servers to ...
Droid Reversal for 'Civilians Giles Greenway N/A
Breakout - Ask the expert panel, open questions here David Chismon , Ryan King , James Spear , Randall Otto N/A
Session 2 Making Infosec YouTube Videos with Javvad Malik @J4vv4D and Leigh-Anne Galloway Javvad Malik , Leigh-anne Galloway If you've considered making YouTube videos to compliment your blogging, or just want to learn ...
Session 2 From zero to hero with Scott Helme @Scott_Helme Scott Helme In this workshop each delegate will be assigned their own virtual server with a website ...
IPv6 for Pentesters Owen Shearing N/A
Session 3 Malware Funalysis: Networking (mostly) with PATH Path Diving right into the traffic of some pretty hairy current malware, mostly focussing on recent ...
[NOT FILMED] Alexa's top 1M domains - the state of web insecurity 2017 Porthunter 1M top Alexa site, how secure are they? Join me as we explore my research ...
Holy smokes, how to vape yourself to root Ross ‘shodan’ Bevington We all know that smoking is bad for your health, but what about your network? ...
The state of crypto APIs Nick Smith N/A
Session 3 Leveraging Global Datasets to Improve Your Cyber Investigations with Jeff Lenton @RiskIQ Jeff Lenton Limited Capacity full Adding this to your schedule will put you on the waitlist. While ...
Session 4 Breaking Apps with Frida with Jahmel Harris @JayHarris_Sec Jahmel Harris Frida is a magical piece of software that can inject JavaScript into running applications. This ...
Session 3 Introduction to Logical Windows Privilege Escalation with James Foreshaw @tiraniddo James Foreshaw More and more code running on Windows is done inside sandboxes or as non-administrators. This ...
Brazilian Bandits: Cybercrime in Brazil Annabel Jamieson N/A
Enemies of the West Neil Lines On November 24, 2014, "Guardians of Peace" (GOP) released confidential data from the film studio ...
Hunt Or Be Hunted Alex davies Over the last few years threat hunting has risen from being a grassroots hands-on defensive ...
Malware Analysis 101 Andrew Costis N/A
Ignorance is bliss - does privacy matter? Andi Hudson N/A
Whodunnit: The art of attribution Abel Toro N/A
Panning for Coin: Small-time Currency Mining Botnets (Working Title) Luke Somerville N/A
A look at TR-06FAIL and other CPE Configuration Disasters Darren Martyn In late 2016 a TR-064 (LAN-side CPE management) misconfiguration in a wide range of CPE ...
Truly Anonymous Credentials Using Modern Cryptography Matthew Di Ferrante When using anonymous networks like Tor or I2P, one problem is always how to prevent ...
The use of SMT solvers in IT security Thaís N/A
Running Circles On Social Media - Intelligent OSINT Jack N/A