ShellCon.io 2020 Oct. 9, 2020 to Oct. 10, 2020, Virtual, Virtual

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
What's left behind? Memory traces you may not know you leave... Tarah Melton Thinking about what traces are left when activities occur on a Windows system? Think past ...
Bypassing the HR Firewall Jason Romero Infosec is an exciting field and statistics are constantly showing a high demand for individuals ...
houdinID: Lock ID and Security Ranking for Lockpickers Tiffany Cheezem houdinID is a mobile application for physical pentesters to help them identify and strategize attacks ...
Hiring Great Engineers who Love Security Brian Rutkin Hiring is hard. Hiring in tech is often harder because we tend to focus on ...
Bikini Bottom Cyber Range: How to Set Up Dynamic Red vs. Blue Training Environments Silas Shen , Jimmy Li , Louie Hernandez This is going to be a talk that dives into our experiences with running a ...
Game Theory: Help People Make Up Their Minds, For Your Benefit! Juneau Game theory is the study of choices and strategies made by rational actors in competitive ...
Up The Hill: Leadership, Volunteering and Burnout Sciaticnerd Leaders are shaped and challenged constantly. Patience and perseverance are what make them considered great. ...
Attacking and Defending Kubernetes: Inception-Style Jay Beale This demo-heavy talk with teach you how to attack a Kubernetes cluster, with a new ...
COVdID not bridge the skills gap! Kris Rides Whether your current staff members are handing in their notice, or that candidate you’re excited ...
... and now we can SPL "(?<foo>s[hi]{2}t)" Mary Cordova So you’ve put a giant pile of data into Splunk… how do you get started ...
Harnessing the Power of Apprenticeship Dr. Geanie Umberger Cybersecurity leaders are beginning to recognize they need a new way to cultivate expert talent. ...
The Wisdom of Clouds: A crowdsourced guide to cloud data security Daniel Tobin Are you overwhelmed by the amount of awesome tools that have been released in the ...
Friday's Salute!: Just Wear Pants Chris Elliot Transitioning from the Military isn’t simple, but we make it more complicated when we think ...
Intro to Cloud Security: Where to Start Patching Your Leaky Clouds Henry Canivel The adoption of cloud services in today’s tech climate is overwhelmingly pervasive, not only with ...
Hacking AWS - TTPs for the Cloud Nick Frichette Amazon Web Services (AWS) is one of the most popular ways for companies large and ...
How I Created My Clone Using AI - Next-Gen Social Engineering Tamaghna Basu This talk is inspired by an episode of Black Mirror. I will be demonstrating a ...
Keynote - Adversary Simulators High-Fidelity Intelligence and Reporting Toolkit Joe Rozner Documenting and reporting is a key part of red teaming and generally the part we ...
Finessing firmware security testing Aaron Guzman Whether network connected or standalone, firmware is the center of controlling any embedded device. As ...
PWN4Life - How Hackers Can Be The Heroes of Healthcare Christian Tully Stuck in a bit of a career rut? Perhaps it’s time for you to explore ...
Is Your TV Watching You? Yes...Yes It Is. Dant35an0nym0u5 Ever wonder if your TV is watching you watch it? In this talk, we will ...
Allyship in a Socially Distant World Alkalinered Supporting under-represented minorities in infosec, including BIPOC (Black, Indigenous, and People of Color), members of ...
Intro to ZigBee Exploitation Maxine Filcher While the Bluetooth family of protocols continues to claim the spotlight of low energy RF ...
Breaking Out Of Your Shell Jennifer Schwartz , Somar Dakak , Angela Lee Are you breaking out into the tech field and don’t know where to start? Discuss ...
Handling Adversarial Working Relationships as a Security Professional Daniel Crowley When you work in information security, not everyone is thankful for the job that you ...
DevOps to Blue Team: Exploit Your Tools Experience to Move Over Rtzq0 In many technical communities (security included) there exist both proprietary and community software solutions to ...
Keep Your Home Office and Your Job Hunt Secure Damon "ch3f" Small Many of us are working from home these days. It is possible that we will ...
Voice Based Software Exploitation Kim Nguyen The use of voice recognition is becoming prominent and is on the rise in many ...
Screwed on the Dotted Line: How to Avoid bullsh*t Contracts that Hurt Howard Craic'd Non-Disclosure, IP Rights Assignment, and Non-Compete agreements are staples of the technology world. But do ...
Triaging Suspicious Artifacts Ttheveii0x Eichinger SOC analysts need to be able to triage suspicious artifacts identified by alerts or while ...
Fooling Nmap and Metasploit: Cyber Deception on Production Systems Henry Reed Given enough time and resources, advanced adversaries will bypass modern intrusion detection solutions. SIEMs are ...
Saturday's Salute!: Purple Heart to Purple Teamer Paul Navarro The military has something called the “Rank Structure” and as a service member gets promoted ...
Rock the Cash Box (Practical ATM Protocol Hacking) Wasabi Fuqua They say life imitates art, and like the classic hacking films of the 1990’s this ...