Kiwicon20138AD 2018 Nov. 16, 2018 to Nov. 16, 2018, Wellington, New Zealand

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Regrets Jessie Frazelle This talk will be on the regrets from building Docker. Recently I have been working ...
Apathy and Arsenic: a Victorian Era lesson on fighting the surveillance state Attacus What does expensive Victorian era wallpaper have in common with a Cambridge Analytica Facebook quiz? ...
Introducing "moriarty", a tool for automated smart contract symbolic execution vulnerability discovery and exploit synthesis Caleb "alhazred" Anderson "In the grim future of 2018, there is only war... and the cypherpunks won. if ...
Feeding the Beast: Network Insurgency Syngularity0 There's a metric bucketload of cool technology and awesome tools out there to support red ...
Lessons from game consoles and the coming security apocalypse Boyd Multerer There are few computing devices that are more attacked on an ongoing basis than game ...
Living w/o the Land - Active Directory attacks from Linux Mubix Powershell and C# has been the new hotness for 5-6 years now, but with all ...
Ghosts in the Browser: Backdooring with service workers Claudio Law Service workers are all the rage for progressive web apps nowadays. This talk will take ...
Mayday, Mayday, Mayday - Safe Harbor, no more Eliza Sorensen CONTENT WARNING: THIS TALK TOUCHES ON SOME VERY SENSITIVE ISSUES, AN INTRO TO THE TALK ...
DHCP is hard Felix Wilhelm DHCP is a 25 years old network protocol supported by almost every network capable device ...
Getting Buzzed on Buzzwords: Using Cloud & Big Data to Pentest at Scale Moloch & Mandatory You’ve heard about cloud, big data, server-less infrastructure, web scale, and other buzzwords that cause ...
Securing a World of Physically Capable Computers Bruce Schneier Computer security is no longer about data; it’s about life and property. This change makes ...
Moving Fast and Securing Things Kelly Ann In a world where autonomy flourishes, a perpetual stream of new ideas gets executed. As ...
Cyber defence exercises - how to make it cool? Raimo Peterson Technical cyber defence exercises are typically conducted in a Cyber Range, hosting hundreds of servers, ...
Getting Shells from JavaScript: offensive JavaScript techniques for red teamers Dylan Frichot AppSec is often very heavily focused on pre-exploitation. Frameworks like BeEF break this norm a ...
Overwatch Cyber-Espionage Tool Wayne In the last few years we have seen a number of classified documents leaked from ...
Tracing the Watchers: practical tooling Paul Mcmillan Everyone knows that listening to the police scanner is legal.* Less well known: every time ...
Arbitrary code execution, I choose you! Sarah Young Did you hear about the arbitrary code execution hardware vulnerability in the Nintendo Switch discovered ...
Red Cell - Mimicking Threat Actors for Realistic Responses Brendan Jamieson Many organisations make use of offensive security exercises to test their security posture - including ...
Set Theory for Hackers Pruby Why is your anti-phishing training largely pointless, but some parts of it essential? Why is ...
Hacking and the law: The year is actually still 1998 Felix Geiringer A short précis on the interaction between NZ law and hacking. The theme of the ...
Digital identity: decentralised and self-sovereign Martin Krafft It's 2038, and technology has become ubiquitous, and seamlessly interwoven with human existence. Authentication is ...
The day the carnival came to town David Hood The mid-2018 attempted speaking visit by members the Canadian alt-right caused Twitter discussions among tens ...
ScRooters - disrupting the electric scooter market Matthew Garrett Electric scooter companies have started cropping up all over the US. Competing largely on brand ...
Testastretta Operetta Doi "Computers are responsible for everything. EVERYTHING. Power plants? Computers. Makin' juice? Also computers. That deep ...
Server Room Selfies: When physical security goes wrong Logan Woods What if someone could just walk in off the street and physically help themselves to ...