BSidesUK 2015 June 3, 2015 to June 3, 2015, London,UK
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Introduction | Paul Batson , Thomas Fischer , Lawrence Munro | N/A | |
How Google turned me into my mother: the proxy paradox in security | Wendy Nather | Security has been trying to catch up with technology all this time, but the gap ... | |
DarkComet From Defense To Offense - Identify your Attacker | Kevin Breen | DarkComet is A Remote Access Trojan that has been around for a while. It has ... | |
How I Rob Banks | Freaky Clown | An updated version of the very popular talk that has never been recorded! Let me ... | |
T2W1-(Practical) Android Malware Analysis | Paul Amar | Limited Capacity full This hands-on workshop will give you the basics to reverse Android malwares ... | |
T3W1-Return-Oriented Programming Primer | Bas Berg | Limited Capacity filling up I've been involved in the VulnHub CTF team for quite a ... | |
T1W1-Breaking In to Pentesting: Student Edition | Steve Lord | Limited Capacity seats available Are you a student looking to take the leap to becoming ... | |
Blue Teamers: The Cinderella of Cyber? | Andy Settle , James Burns | N/A | |
Digital Forensics Investigations in the Cloud Environment | Wendy Nather , Neha Thethi | This presentation will give an overview of the digital forensic issues and challenges existing in ... | |
Monstrous Appetites: Where Our Security Eyes are Bigger than Our Stomachs | Sarah Clarke , James Mckinlay | Stress, comfort, misunderstanding, motivation, money - Reasons why you over consume and miss the target. ... | |
Why bother assessing popular software? | David Middlehurst , James Loureiro | Many popular software packages have gone through many iterations of white and black box testing ... | |
Virtual Terminals, POS Security and becoming a billionaire overnight! | Grigorios Fragkos | Very few people use cash nowadays, as most use a debit or a credit card ... | |
Reversing for Fun: How to Pick a Victim | Rory Alsop , Feargus Pendlebury | More and more devices once considered boring now bear marketing boasts that are music to ... | |
Emulating the Unknown | Alan King , Peter Goode | You have a binary dump from the ROM of a device you need to understand. ... | |
Proprietary network protocols - risky business on the wire. | Jakub Kaluzny | When speed and latency counts, there is no place for standard HTTP/SSL stack and a ... | |
OpSec vs Attribution - the Hollywood view | Stephen Bonner | Many of the nation state approaches to cyber security require accurate attribution, however this has ... | |
A Look at the Real Social Engineers | Jessica Barker , Richard De Vere | This short talk will look directly into real life social engineers, giving an insight into ... | |
Standardisation in Penetration Testing and Vulnerability Assessment: Market Analysis and Recommendations | Thom Langford , William Knowles | Lancaster University and the British Standards Institutions (BSI) have undertaken market research of the penetration ... | IncludeThinkstScapes |
T2W2-Diving into Nessus reports for business level information | Gavin Millard | Limited Capacity full Nessus is part of almost every penetration testers toolkit but how can ... | |
T3W2-Dradis Framework 3.0 - We are back! | Daniel P. Martin | Limited Capacity seats available After a three years of hiatus and six months in the ... | |
T1W2-Pen Tester Interview Simulation | Ben Dewar-powell | Limited Capacity filling up This is to give students (and anyone else that wants to ... | |
Powershell for Log Analysis and Data Crunching | Lewis Ardern , Michelle D'israeli | You're stuck on a basic Windows estate, you can't pull the data out, there's no ... | |
Elliptic Curve Cryptography for those who are afraid of maths | Martijn Grooten | Elliptic Curve Cryptography (ECC) is hot. Far better scalable than traditional encryption, more and more ... | |
My love-hate affair with Security Operations | Javvad Malik | I started my career in security operations. It was great - the world was at ... | |
T2W3-Maltego Magic - Creating transforms & other stuff | Adam Maxwell | Limited Capacity full In this workshop I will teach people how to write their own ... | |
Android App Inspection and Code Injection | Fabio Cerullo , Cycubix | Quick run through of extracting and decompiling an APK to inspect its working parts and ... | |
"Stay hungry, stay foolish" by Steve Jobs, CEO of Apple Computer and of Pixar Animation Studios | Elliot Stirling | N/A | |
Crash all the Flying Things! - exploiting and defending aircraft collision avoidance | Joe Greenwood | The engineering industry has been traditionally slow to adopt security, with the woeful state of ... | |
E-banking transaction authorization – possible vulnerabilities, security verification and best practices for implementation | Wojciech Dworakowski | During 10+ years of my professional experience as application security expert I had a chance ... | |
Hack the Hash | Yiannis Chrysanthou , Nathaniel Mchugh | Crypto hash functions look magical but are in fact built of the simplest operations. Their ... | |
Encouraging Ethical Disclosure & Reporting | Dave Hartley , Aidan Mitchell | Responsible, open and ethical disclosure leads to more secure services and applications for everyone. Failure ... | |
Introducing wifiphisher, a tool for automated WiFi phishing attacks | George Chatzisofroniou | WiFi networks are commonly plagued by two serious issues: i) management frames can be easily ... | |
Some hypotheses on well-being, burnout and stress related illnesses in the Cyber Security industry | Jack Daniel , Chris Sumner | This short talk will introduce the hypotheses behind a future study aiming to examine whether ... | |
ARMed ROPpery | Sam Brown | ARM CPUs are everywhere now but a lot of people's knowledge around asm and exploitation ... | |
T3W3-Windows Privilege Escalation | Ruben Boonen , Francesco Mifsud | Limited Capacity full The Windows Privilege Escalation workshop aims to provide attendees with a solid ... | |
T1W3-The Writey Writer's Guide to Writing Writerly | Chris "paperghost" Boyd | Limited Capacity seats available This workshop is based around 10 years of professional blogging / ... | |
DLL Hijacking: The Eighth Circle of DLL Hell | Ollie Whitehouse , Keith Learmonth | DLLs have been the spine of the Windows architecture since the early 90s, so it's ... | |
Power to the People: bringing infosec to the masses | Jessica Barker | To truly make a difference in infosec, our industry needs to better understand the people ... | |
Updating the Future | David Rogers | Software updates are a nightmare. For users, for manufacturers and also for the hacking community. ... | |
T2W4-Myths about the HTTPS Lock - Building & Breaking PKI masterclass | Yousif Hussin | We've been taught that if we see that secure-lock icon while web-browsing then our connection ... | |
Intelligence led Penetration Testing | Cam Buchanan | As cyber-attacks become have become sophisticated and prevalent, it is key that penetration testing evolves ... | |
Threat Intelligence a new approach for cyber security | Alonso Silva | An increasing number of organisations and individuals fall victim to cyber attacks, despite having set ... |