CypherCon 2019 April 11, 2019 to April 12, 2019, Milwaukee, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
JOURNEY TO COMMAND INJECTION: HACKING THE LENOVO IX4-300D Rick Ramgattie Fully comprising an embedded device isn’t always as easy as sending a GET request with ...
BUILDING A COHESIVE UNDERGRADUATE SECURITY CLUB Ian Klatzco Building good teams (either in the “elite” sense or the “healthy culture” sense) is hard. ...
UNHINGING SECURITY ON THE BUFFALO TERASTATION NAS Ian Sindermann Often times it only takes a small oversight to cause a vulnerability, even when it ...
MICRO AND NANO-SEGMENTATION: LESSONS LEARNED FROM THE FIELD, THOUGHTS ON THE FUTURE Russ From This presentation introduces Micro-Segmentation and includes industry adoption statistics, strategies, and implementation examples. This presentation ...
REMOTE WIRELESS PENTESTING IN A NUTSHELL (OR AMMO CAN) Eric Orme Wireless pentesting typically requires physical proximity to a target which requires time, limited resources, and ...
KEYNOTE: NOW YOU SEE IT, NOW YOU DON’T: THE MAGIC OF FORENSIC ARTIFACTS HIDING IN PLAIN SIGHT Cindy Murphy In the field of digital forensics, we have our tried and true artifacts and methods ...
Anatomy of a Hotwallet – Bitcoin at Scale Matthew Werner Coinbase has become one of the leading cryptocurrency exchanges in the world. The systems we’ve ...
BEAT THE APTS: EXPLORE DIGITAL FORENSICS THROUGH GAMIFIED CYBER LEARNING Keenan Skelly Ever cyber professional wants to stop an APT from hurting their company. But when they ...
URBAN FORAGING: BACK TO OUR BEGINNINGS Nick Wersel Someone in the 1860s one day decided ‘Imma order this houseplant from Asia on Amazon ...
“BUG BOUNTY” LAW: NAVIGATING THE VULNERABILITY DISCLOSURE LEGAL LANDSCAPE Amit On Bug Bounties and Vulnerability Disclosure Program (VDP) are one of the fastest growing, most popular ...
WHAT THE WORLD NEEDS NOW, IS HAM SWEET HAM Jonathan Tomek Do you know why the hacker community is so interested in HAM radio? You probably ...
SPELUNKING THE BITCOIN BLOCKCHAIN Josh Bressers There are few topics that capture the imagination and headlines like Bitcoin. Many of us ...
CAPTURE THE FAIL: AVOIDING PITFALLS WHEN RUNNING YOUR CTF Kris Silvers Is it possible to contribute to the security community without dropping an 0 day or ...
THRIFT SHOPPIN’ WITH YOUR DATA Josh Frantz Do you ever wonder what happens with disk drives, flash drives, even floppy drives when ...
TRACKING THE ADVERSARY’S LEARNING CURVE Edd Black Attackers are commonly broken into two camps: low skilled opportunists (script kiddies) and the APT ...
WHAT ARE WE DOING HERE? RETHINKING SECURITY Jeff Man Have you ever noticed that much of the mission of cyber- and information security professionals ...
EVERYTHING OLD IS NEW AGAIN: A LOOK AT HISTORIC CONS AND THEIR TRANSITION TO A DIGITAL WORLD Stephanie "snow" Carruthers What does a pig in a poke, pigeon drops, and salting have in common? They ...
A KINESTHETIC APPROACH TO LEARNING ENCRYPTION Antoinette Stevens Kinesthetic (also sometimes referred to as tactile) learning style usually means that someone learns best ...
DON’T FORGET TO WIPE Michael Portera On June 29, 2018, Toys R Us shut its doors to the public after filing ...
PRIVILEGE ESCALATION IN MECHANICAL MASTER-KEY SYSTEMS Arden Meyer The mechanical pin and tumbler locks we use on our homes, schools, and businesses have ...
SECURITY LESSONS FROM THE WOOFMUTT Chris Roberts · Curiosity killed the cat, but in OUR world, that’s the job of an OSINT ...
MORE THAN TOR : SHINING A LIGHT ON DIFFERENT CORNERS OF THE DARK WEB Benjamin Brown When the terms darknet or dark web are invoked it is almost always in reference ...
SHIFTING SECURITY LEFT: SELF-SERVICE SECURITY FOR DEVELOPERS AND BEYOND Chris Merkel The shift to the cloud, Agile and DevOps is making it more difficult than ever ...
THE X-15 ROCKET PLANE, FLYING THE FIRST WINGS INTO SPACE Michelle Evans With the Soviet Union’s launch of the first Sputnik satellite in 1957, the Cold Warsoared ...
ENCRYPTION, SILVER BULLETS, AND HOLY WATER J wolfgang Goerlich Werewolves attack? We have silver bullets. Vampires attack? We have holy water. Criminal hackers attack? ...
PHREAKING FOR FUN AND PROFIT (HISTORICAL TALK) Brad Swanson This talk will be about phreaking back in the late 80’s, up until the mid ...
Keynote: I, For One, Welcome Our New AI Over Lords Ed Skoudis Amazing new AI-based services from Amazon, Google, and Microsoft let organizations rely on automated technology ...
SORRY ABOUT YOUR WAF: MODERN BYPASS TECHNIQUES FOR AUTONOMOUS ATTACKS Johnny Crowther Scripting and automation are absolutely critical to many aspects of an attacker’s effectiveness, penetration tester ...
ALWAYS LOOK A GIFT (TROJAN) HORSE IN THE MOUTH James Arndt It could be said that the city of Troy needed to update its antivirus or ...
DECRYPTING THE MESS THAT IS SSL /TLS NEGOTIATION – PREPARING FOR THE 2020 APOCALYPSE Jim Nitterauer Recently, all major browser vendors agreed in principle to end support for TLS (Transport Layer ...
BET YOU NEVER PLAYED AN NES GAME LIKE THIS: INNOVATING UNDER LIMITATIONS Vigrey We all know someone who has a Nintendo Entertainment System (NES) sitting around collecting dust. ...
AUTOMATING HASHTOPOLIS Dustin Mog) This talk will cover the basics of using the Hashtopolis user-api to automate functions in ...
WHAT HAPPENS WHEN A GENOME DATABASE IS BREACHED? Michelle Meas DNA sequencing has gotten exponentially cheaper since its invention, and is rapidly becoming a popular ...