BsidesKnoxville 2016 May 20, 2016 to May 20, 2016, knowville,usa
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Pentester Agility (What I look for in potential team members) | Slade Griffin | A lot of people seem to be interested in "getting into cyber security" or becoming ... | |
Peeking under the hood with Frida | S Rubenstein | Ever wanted to peek beneath the hood of an application running on your desktop or ... | |
Intro to automotive security | Oded Ashkenazi | Automotive security has received a major buzz recently, mainly due to researchers like Charlie Miller ... | |
Scripting Myself Out of a Job - Automating the Penetration Test with APT2 | Adam Len Compton | The review board likes submissions that include references to prior works and research you used ... | |
Learning to Hack RFID for Under $500 | Jerry Gamblin | On a recent trip to Vegas I noticed that all the hotel locks had switched ... | |
Tags attack, IoT, physical hacking, wireless hacking | Christopher Craig | In 2015, Wired reporter Andy Greenberg asked Charlie Miller and Chris Valasek to show him ... | |
Hack Yourself: Building A Test Lab | David Boyd | We all want to improve our skill sets, right? Reading is great, but there is ... | |
Hello Kitty | Binyamin Sharet | Kitty is a new open source fuzzing framework. It's modular, extensible and flexible. Kitty allows ... | |
How we pwned Riscure's Rhme+ challenge in two days | Itay Rotem | Earlier this year, Riscure issued a challenge where they provided an Arduino Nano with special ... | |
Keynote (Title TBA) | Sergey Bratus | Sergey Bratus is a Research Assistant Professor of Computer Science at Dartmouth College. He sees ... | |
Forensics Impossible: Self-Destructing Thumb Drives | Brandon Wilson | Many people do not understand that a USB thumb drive is a mini computer, capable ... | |
The Natural Laws and Consequences of Cyber Insecurity | Matt Smith | This talk will cover the common, underlying vulnerability issues and solutions found after performing numerous ... | |
Level Up! - Practical Windows Privilege Escalation | Andrew Smith | For attackers, obtaining access to a Windows workstation with limited privileges can really put a ... | |
Powershell for CyberWarriors | Russel Van Tuyl | Powershell, the new hotness, is an interactive object-oriented command environment that has revolutionized the ability ... | |
The Joy of Sandbox Mitigations | James Forshaw | When researchers think of Microsoft Windows process mitigations they’re likely to come up with DEP ... | |
Stack Smashing Protection Bypass via Pthreads - A case of MiniUPNP Buffer overflow | Aleksandar Nikolic | In 2015 Talos identified and reported a buffer overflow vulnerability in client side code of ... | |
The Best Campfire Tales that Reverse Engineers Tell | Travis Goodspeed | At a conference, I don't much give a damn what the target was or how ... |