Kernelcon 2022 April 1, 2022 to April 2, 2022, Omaha, NE

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote: Never Mind the Bollocks, Here's Joe Grand Joe ( Kingpin ) Grand For many of us, hacking stemmed from a desire to have skills and access that ...
Breaking into Cloud Wallets: Findings from 3 years spent Hacking Crypto Web Apps Sam Curry In 2018, after being invited to an HackerOne program, a friend and I realized that ...
Learning to Speak ACARS Using ELK: Using SDR and ELK to Capture and Understand Aviation Data Links Carl Young This presentation demonstrates the use of the open-source Elasticsearch-Logstash-Kibana (ELK) technology stack as a data ...
Finding the Source: A tale of recreating fpipe and hiring overseas Mike Kunz The tool fpipe was simple 10kB windows console application written by Robin Keir that could ...
Hey! Your database got pwned Islam Heralla A data breach is an organization's worst nightmare. Your databases can be used as a ...
Old Attacks Are New Again: NFTs, Rugpulls, and Cryptophishing Heather Lawrence Old attacks are new again! Surely you have heard by now that non-fungible tokens (NFTs) ...
Secure OT Incorporation: Bringing the OT and IT Environments Together Harrison Koll Operational Technology (OT) networks and their systems are challenging to implement into corporate networks because ...
The root password was klondike Anthony Kava What was the hacking scene like for eLiTe (script) kids in Omaha in the era ...
Knock knock. Identifying Assets in the Cloud Ben Sadeghipour Identifying and enumerating assets has become incredibly easy thanks to all the tools that have ...
Hacking Kubernetes: Live Demo Marathon Andrew Martin In a live evocation of the recent O'Reilly title Hacking Kubernetes (Martin, Hausenblas, 2021), this ...
Threats lurking beneath the subsurface: Understanding and abusing Windows Subsystem for Linux (WSL) Daniel Adamitis In April 2016, Microsoft shocked the PC world when it announced the Windows Subsystem for ...
Credential Stuffing and Account Generators: Cracked Accounts for the Masses Jake Foiles Credential stuffing tools allow cyber criminals to quickly and easily crack large numbers of online ...
Project N.I.N.J.A.T.U.R.T.L.E.S. Benjamin Mcdaniel Let's stop some ransomware attacks! In this presentation, you'll hear our process from start to ...
Nightime APT: How I Was Nearly Folded In Half Matt Virus A random wlan SSID appears with great signal strength and strange characteristics. It takes years ...
Keeping a cool head in the eye of the storm, my experience with Incident Response leadership Benjamin Spencer This presentation is intended to go through my past experience with leading incident response teams ...
Warbiking Omaha Gus Gorman Analysis of wifi security in Omaha. On a quest for the low hanging wireless fruits ...
Research the Advanced Bot Landscape Yohann Sillam Bad bots traffic represents around a quarter of Internet traffic today and is predicted to ...
Detecting Brand Impersonation with Computer Vision and DNSRazzle Skip Cruse Brand impersonation and BEC are complicated problems with no easy solution. There are numerous companies ...
DMARC - Don't Let the Phishers Punk Your Email Domain Matthew K. Miller DMARC can be difficult to set up, with its exacting syntax added on to the ...
Cryptor: A New Toolset for Writing Windows Based Self-Encrypting Malware Jacob Mohrbutter Over the last year and a half, Jacob Mohrbutter has put much time into developing ...
CISO Panel Rob Lamagna-reiter , Jeff Weeks , Reet Lindner. Please join us as we welcome CISOs from leading companies in the Technology, SaaS, and ...
Keynote: Jen Easterly (Fireside Chat + Q&A) Jen Easterly n/a
The Hand That Feeds: How to Misuse Kubernetes Lewis Denham-parry We usually trust the hand that feeds, but what happens when we can't? How do ...
NetflOSINT: Taking an often-overlooked data source and operationalizing it Joe Gray When we think Network Forensics, we often immediately gravitate toward packet captures (PCAPs) and logs ...
Let's Rethink Enumeration Dan Tentler When you think "enumeration", you probably think "nmap, dns brute force, maybe shodan", right? What ...
Art of Mastering the successful Mergers and Acquisitions through Cybersecurity due-diligence Reet Kaur Mergers, buy-outs, divestitures: These are just a few of the ways in which companies can ...
Protecting Your Cloud Environment from the Netrunners Ryan Hollis Have you ever found yourself questioning, "what is my attack surface in the cloud?" What ...
All Juiced Up Nate Wood Ever wanted to make your own replacement battery or repair power tools? How about a ...
You're Just Not My Type(state): Turning Vulnerabilities into Compilation Errors with Rust Nathanial Lattimer It would be easier to build secure software if you couldn't write the vulnerabilities in ...
Securing Cloud-Native Workloads, an Introduction Gabe Schuyler So, you've finished your (rushed by lockdown) lift-and-shift to the cloud, and now your developers ...
Pain in the Appx Nick Mott Windows application package files (.APPX) are the installation system used to install Universal Windows Platform ...
Improving Cloud Incident Response without Throwing Shade James Dietle When it comes to incident response, your infrastructure may be in the cloud, but your ...
The Tale of Sh*tty NAC Megan Benoit How do you hack a NAC without giving your networking team a heart attack? We're ...
It's a Hard SOC Life: Lessons from Building Security Programs from Scratch John Dimartino From the smallest company to the largest enterprise, security programs are growing in size and ...
Knowing What Risks Matter -- And Don't -- In Your Open Source David Lindner As digital transformation accelerates, software developers face increasing pressure to speed up their work, and ...
How to Get Invited to the Party: DevOps + Security, Putting the Fun in Fundamental Joseph N. Wilson One of the main challenges in Cyber Security is that attackers always have more money, ...