BSidesManchester 2019 Aug. 29, 2019 to Aug. 29, 2019, Manchester, UK

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
From builder to breaker Gavin Johnson-lynn A journey from Software Developer to Red Teamer. In under two years I went from ...
HTTP Desync Attacks: Smashing into the Cell Next Door James Kettle N/A
Fe-fi-fo-FIM, I smell the monitoring of an elastic stack! Brett Calderbank FIM is simple right? Everyone knows how to do FIM right? I'm gonna have to ...
Increasing Security: New Recruits Rachael Stos-gale If you want to get your first job in cyber security, or you want to ...
Introduction to OWASP Juice shop Tim Corless-carter OWASP Juice Shop is an intentionally vulnerable Web app that can be used for general ...
Quantum Computers and Cryptography Imran Shaheem Quantum Cryptography has come along a great deal since scientific and mathematical interest in the ...
Navigating the Red Forest Derek Price Successful cyber attacks often involve gaining administrative access to a domain within a short amount ...
Hacking RF: Breaking what We Can’t See Grant Colgan An often overlooked aspect of security is what happens when information is moving magically from ...
Phishing Overboard Elise Manna Novacoast This talk will cover advanced techniques in phishing attacks and all the weird things miscreants ...
Metadata piggybacking: A look into Open Graph Abuse Charlie Hosier The Open Graph protocol was initially released in April 2010. It is a protocol that ...
Getting Splunky with Lateral Movement - Attack, Detect and Evade Ross Macdonald Following on from our talk at SteelCon 2019 (Getting Splunky with Kerberos) we’ve decided to ...
a8n-retrospective/introspective : a minor exercise in ego... Steve “autom8on” Wilson I started my path into security back in 1993 with a job as a physical ...
osint + python: extracting information from tor network and darkweb Jose Candel The talk will start explaining how Tor project can help us to the research and ...
Malicious Behavior Detection using WMI Ben Lister How do we know when trusted applications that are integral to the operating system are ...
1 year on, It's not all about GDPR. An introduction to the NIS Directive; The Silent one... Romeo Embolo This talk will provide a brief introduction to the NIS Directive, its scope and why ...
Exposing AWS with flAWS Mike Lehan As more web applications move to cloud hosting, the security landscape is changing. Whilst network ...
Threat Modelling and Black Swans - Predicting the unpredictable by thinking like an attacker Nick Dunn Threat modelling is a useful tool for improving the security of a system at design ...
The perfect place for a backdoor (VM Hub 3.0) Balazs Bucsay Testing embedded devices are mostly fun, in some cases it is like being in the ...
Coding Burp Extensions Paul Johnston The Burp extender API lets you enhance the functionality of Burp to support new technologies, ...
Nice vulnerability, I don't care James Carter As Security professionals we are bombarded with data about what we do, from threat feeds ...
Offensive Development: How to DevOps Your Red Team Dominic Chell During this talk we will explore how DevOps principles can be applied to red teaming, ...
Making a Subset difference: The Crypto in AACS Rael Sasiak-rushby When I wanted to understand how AACS works I found very little information/explanation. The Subset-Difference ...
Protecting Kids Online: Are We Doing Enough Katie Colgan In recent years with the rise of smart devices, kids almost have an expectation of ...
What colour is your hat? Megan Robertson Ethical hacking, ethical living - how to devise your own moral code and live by ...
S-a-a-a-S – Security as an actual service Samantha Humphries Security teams are regularly branded with the unfortunate moniker of ‘the department of no’; seen ...
Do I need to change the OSS in my product? Making informed decisions. Alex Burrage Open Source software runs the world - some estimates say upwards of 90% of lines ...
Crash, Burn, Report Scott Helme With the launch of the Reporting API any browser that visits your site can automatically ...
I like big bots James Maude The internet isn't fair, bots and automated threats make up the majority of web traffic ...
Rage Against The FUD The Beer Farmers Rage Against The FUDFUD you, I won’t do what you tell me.In this talk, we ...
BadUSB Tia C In the past couple of years, USB devices have become more and more common, USB ...
Fun with Frida! James Williams Frida is widely used for mobile assessments, but hardly anyone seems to use it with ...
Losing Battles but Winning Wars Phil Lynch The talk is based around the collective negative experiences of Nettitude's Red Team and how ...