BSidesLondon 2019 June 4, 2019 to June 5, 2019, London, UK

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Using Network Miner to Reconstruct Network Traffic Matthew Short Knowing how to extract resources from a packet capture can be an invaluable foundation for ...
Bots: can they really be managed? Diana Alvarado There a hundreds of types of bots that generate traffic for any given site, so ...
SOC it up! - Common Frustrations and Solutions in SOC teams today. Jymit Khondhu Common frustrations seen in SOC teams nowadays, how are these currently being solved, with a ...
Exploring Emotet, an Elaborate Everyday Enigma Luca Nagy The Emotet Trojan is the most widespread malware family in the wild. It has been, ...
Turning Your Weapons Against You. Andrew Blane My talk is about using security tools setup by an organisation against itself. Specifically vulnerability ...
Usernames, the missing piece - The OSINT Jigsaw Puzzle Simon Hall There are often debates around usernames and how they should be assumed public knowledge, leading ...
Watching The Watchers, the Stalkerware Surveillance Ecosystem Cian Heasley While we focus on nation states' and corporation's role in steadily eroding our privacy and ...
Stalkerware in mobile devices Jessica Amery An overview of mobile stalkerware, specifically on the Android platform. I will discuss the marketing ...
My first program: a pentesting tool Nina Fasel In my talk I would like to introduce my first self-coded security tool. It’s a ...
Working Title: Bug Bounties: More than Meets the Eye Jamie O'hare Bug Bounties have this WD40 aura that they are **the** solution to an organisation's external ...
Mission assurance in closed, proprietary Systems Josh De Boer Bespoke networks and bespoke systems, especially air-gaped systems, aren't subject to the same threat vectors ...
Aletheia: GPU accelerated file carving Corey Forbes This talk will be a brief summary of my Dissertation regarding the use of General ...
The Keymaker Maksims Luferovs The Keymaker - a tool for creating access tokens for Service Providers using stolen ADFS ...
Forensicating Windows Artifacts: Investigation w/out Event Logs! Renzon Cruz When dealing with security incidents, hackers tend to wipe their digital footprints to avoid being ...
The Definition of Madness Ian Davies We keep seeing the same old mistakes and the same old issues. Isn't the definition ...
Frida the "Hooker" Barnabás Sztán-kovács FRIDA is a bad girl who can do nasty things - not only she is ...
Vendor data science buzzwords hacked Thordis Thorsteins In this talk I will go through buzzwords commonly used by security vendors, explain what ...
A Newbie's talk on Mobile Dangers through the Looking Glass Sarah Kingham A talk on the vulnerabilities and attacks that can be carried out using other devices ...
Automation in application security Javier Dominguez Most of security efforts are based on mitigation, detection and forensics, but little is done ...
Cyber systems of the powergrid. How does power get to your tea kettle from the power plant. Bigezy This talk will show the digital and analog systems of the power grid and follow ...
A safer way to pay - Comparing the security and integrity of 21st century payment systems Chester Wisniewski This talk will look at how to determine what security and privacy risks are worth ...
Fixing the Internet's Auto-Immune Problem: Bilateral Safe Harbor for Good-Faith Hackers Chloé Messdaghi Thousands of organizations have already adopted the idea of inviting good-faith hacking to hack into ...
Understanding Stress, Anxiety and Depression and How to Cope Olga Zilberberg Understanding the symptoms of stress, anxiety and depression and knowing the mechanics of our mind ...
AWS vs Azure Security Paul Schwarzenberger All too often, an organisation’s choice of cloud provider is made at a senior management ...
They are the Champions: how to build and maintain an effective cybersecurity champion programme within your organisation Kevin Barker In this presentation, we will look at how to maximise your security awareness programme and ...
Closed for Business: Taking Down Darknet Markets John Shier Darknet markets come and go for various reasons. Over the last several years we've seen ...
Inside Magecart - their web skimming tactics revealed Terry Bishop Magecart is an umbrella term given to at least a dozen cybercriminal groups that are ...
CyberRange: an open-source offensive security lab in AWS Thomas Cappetta The SecDevOps-Cuse/CyberRange aims to be an open-source offensive/defensive security project providing aspiring & experienced cyber ...
You won't even know it's recording you! Elaheh Samani At a time when user experience can make or break a business, app developers are ...
State sponsored stalking ?! Paul Rascagneres With the advent of social networks followed by Secure Instant Messaging (S’IM), privacy became more ...
Password Cracking; the First 500 Million Jamie Riden We present a new tool, hashcrack, to preprocess hash files and drive hashcat with sensible ...
When the Magic Wears Off: Flaws in ML for Security Evaluations (and What to Do about It) Lorenza Cavallaro Academic research on machine learning-based malware classification appears to leave very little room for improvement, ...
Build to hack, hack to build. Chris Le Roy Containers,Cloud,DevOps and SDLC are all terms that are increasing in terms of usage in the ...
We take your security seriously. Or do we? The Beer Farmers In this talk, we discuss the lengths some organisations go to, in order to protect ...
Hacking RF: Breaking what we can't see Grant Colgan An often over looked aspect of security is what happens when information is moving magicly ...
Offensive pcap Stuart Mcmurray When writing malware, oftentimes we need a bit more flexibility (i.e. sneakiness) than the victim's ...
Spear Phishing: From Linkedin to Loggedin Alex Archondakis Spear phishing is on the rise, and the more our lives are displayed online, the ...
The Imitation Game: emulating attackers Wietze Beukema How do you realistically emulate attacker behaviour? Whether you are testing your own defences, want ...
The little phone that could ch-ch-chroot. Mathew Whitter-jones Security testing or penetration testing has been a career path that many are beginning to ...
Digital Intelligence Investigations James Cyber investigations are hard, and tying an online identity to someone in real life is ...
Powershell is DEAD – Epic Learnings! Ben Turner Powershell is Dead……mibs! It probably is if you want to limit your attack tooling, but ...
ISIS Online: Junaid Hussain Michael Jack This talk examines the online tactics of Junaid Hussain (Aka TriCk) as a hacktavist and ...