bsidesperth 2017 Dec. 2, 2017 to Dec. 3, 2017, perth,austrailia

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
A historical analysis of the security maturity of OpenSSH Matt Jones In this presentation, Matt will look at the security history of OpenSSH - software that ...
433Mhz And the World An Introduction to Jamming Mitch Kelly Evilmonkey is going to give a In depth talk on Radio Frequency, Modulation Techniques using ...
Synergising The Internet of Everything And Fog Computing To Actualise The Cyber Perl Harbor: A Cross-silo Byod Approach to Dynamically Mitigating Next-Generation Watering Holes Fergal Conner , Gordon Erasmos The synergistically entanglement of cloud, the internet of everything and big data (CIOEBD) has proven ...
Bypass Techniques, because I am lazy Adam Jon Foster About 2 years ago, Adam made the discovery of lockpicking, about 2 days after that ...
The snake that took down a child exploitation ring Peter Yorke In 2014, Police were alerted to an Undernet IRC channel sharing large amounts of child ...
Full Mission Profiles – Intelligence-lead, scenario bound penetration testing Alex Heidenreich By looking at the cyber problem through the analogue of a modern insurgency, including the ...
Becoming Securicon Valley: A Proposal for a State-wide Development Framework Duncan Blandford The news is full of stories of the burgeoning skills shortage in cyber security, but ...
The cyber security “skills shortage” and what does it mean for you Ricki Burke There are lots of headlines about a cyber security skills shortage. Initially, that sounds great ...
Deep Dive on the Dark Web Chester Wisniewski Many organizations underestimate the risk of cyberattack thinking they aren’t a big enough target for ...
117 projects later… Aaron We picked apart the 117 technical assurance projects (code reviews, VAs, pen tests, config reviews ...
In search of remote root Osprey A remote root in the context of Android is an exploit or exploit chain which ...
Beauty and the Beast: Burp and its Extender Sajeeb Lohani This talk is about Burp and its extender, including flaws & advantages of the extender, ...
Do you even Cyber bro? Tales of InfoSec, Devops, and sobering lessons from cognitive science Gareth Willis It’s 2017 and there still exists misunderstanding and even wilful antagonism between the InfoSec crowd ...
Think like a Khan, build like a Qin Josh How do we response to our ever changing and evolving threat environment, and the need ...
Protecting your at-rest data from a surprisingly motivated adversary, or, why you’re not paranoid enough about your disk encryption Kai Frost Kai examines the current issues with at-rest data encryption; in particular how it relates to ...
Google Chrome - Your newest best friend in the field Sam The control that extensions have over your browser and OS is downright ludicrous. After reporting ...
2FAssassin: Bypass 2FA, Stealing Private Keys, Abusing Client Certificates, Make Illegal Profits, Have Fun, and Much More Maxwell Koh The “knowledge factor” (using passwords for authentication) will never be enough for security. We need ...