Sched.com Conference Mobile Apps
BSidesLV 2015
has ended
Create Your Own Event
BSidesLV 2015
Schedule
Simple
Expanded
Grid
By Tracks
Speakers
Artists
Sponsors
Exhibitors
Volunteers
Participants
Additional Information
Search
or browse by date + venue
Above The Ground Plane
Breaking Ground
Career Track
Chill-Out Room
Common Ground
General
Ground Truth
I Am The Cavalry
Parties/Mixers/After-Hours Events
Passwords
Proving Ground
Training Ground I
Training Ground II
Underground
Popular
Sign up
or
log in
to bookmark your favorites and sync them to your phone or calendar.
menu
Menu
Schedule
Speakers
Artists
Sponsors
Exhibitors
Volunteers
Participants
Additional Information
Search
tune
Filter sessions
Simple
Expanded
Grid
By Tracks
Tuesday
, August 4
Above The Ground Plane
11:00 •
Underground Wi-Fi Hacking for Web Pentesters
14:00 •
#radBIOS: Wireless networking with audio
15:00 •
I Amateur Radio (And So Can You!)
16:00 •
How to WCTF
Breaking Ground
11:00 •
Injection on Steroids: Code-less Code Injections and 0-Day Techniques
12:00 •
Getting the data out using social media
14:00 •
An introduction of the Kobra, a client for the Badger version 2.0, providing tactical situational awareness, physical tampering protection, and automatic process mitigation
15:00 •
NSA Playset: Bridging the Airgap without Radios
18:00 •
Your Electronic Device, Please: Understanding the Border Search Exception & Electronic Devices
Chill-Out Room
07:30 •
Breakfast
08:30 •
Coffee
09:45 •
Opening Remarks
10:00 •
Pros vs. Joes CTF and SECTF
10:00 •
(Un)Keynote: INCITE CLUB: WendyLady vs. ErrataRob or, “Fly THIS Sideways!”
12:30 •
Lunch
16:00 •
Happy Hour
21:30 •
Hacker Pyramid
Common Ground
11:00 •
Barely Legal: the Hacker’s Guide to Cybersecurity Legislation
14:00 •
Pentesting with Docker
15:00 •
Don’t hate the Disclosure, Hate the Vulnerability: How the government is bringing researchers and vendors together to talk vulnerability disclosure.
17:00 •
How Portal Can Change Your Security Forever
18:00 •
Angler Lurking in the Domain Shadows
Conference Center Foyer
08:30 •
Registration Open
Ground Truth
11:00 •
Verum - How Skynet Started as a Context Graph
12:00 •
When steganography stops being cool
14:00 •
Analogue Network Security
17:00 •
Crema: A LangSec-inspired Language
18:00 •
Making & Breaking Machine Learning Anomaly Detectors in Real Life
I Am The Cavalry
11:00 •
I Am The Cavalry Track Introduction and Overview
11:30 •
Hack the Future
12:00 •
Leading in a "Do"-ocracy
14:00 •
State of Medical Device Cyber Safety
14:30 •
How can we ensure safer Medical Devices?
17:00 •
State of Automotive Cyber Safety
17:30 •
How can we ensure safer Automobiles?
Passwords
11:00 •
A Security/Usability Review of Wordpress 2FA Plugins
11:30 •
Unspeakable Passwords: Pronounceable or Diceware
14:00 •
Pushing on String: Adventures in the 'Don't Care' Regions of Password Strength
15:00 •
What would fix passwords? Some weekly password audits. Pretty graphs to prove it! (A Haiku)
15:30 •
Breachego
17:00 •
Tell Me Who You Are, and I Will Tell You Your Lock Pattern
17:30 •
Scrutinizing WPA2 Password Generating Algorithms in Wireless Routers
18:00 •
Poppin' (Digital) Locks
18:30 •
Privileges in the Real World: Securing Password Management
Piazza Lounge Patio
20:00 •
QueerCon Mixer
Proving Ground
11:00 •
Speaking Metrics to Executives
11:30 •
Dropping hell0days: Business Interaction for Security Professionals - Or Anyone Else
12:00 •
Practice Safe Cyber: The Miseducation of American Students on Internet Safety
14:00 •
Check That Certificate
14:30 •
The Journey To ICS
15:00 •
Catching Linux Post-Exploitation with Auditd
15:30 •
Adding +10 Security to Your Scrum Agile Environment
17:00 •
Fight back – raising awareness @infosec
17:30 •
What the heck is this radio stuff, anyway?
18:00 •
SIEMple technology
18:30 •
How I learnt hacking in highschool
TBA
19:45 •
SSH (Super Soaked Hackers) Water Balloon Fight
Training Ground I
08:30 •
Deploying, Managing, and Leveraging Honeypots in the Enterprise using Open Source Tools
14:00 •
Exploit Kit Shenanigans: They’re Cheeky!
19:00 •
Ham Radio Exams
Training Ground II
08:30 •
Pentesting PLCs 101
14:00 •
Violent Python
Underground
11:00 •
Practical Application Whitelisting Evasion
14:00 •
The Internet of ... Mainframes?! WTF?
15:00 •
What's New Pussycat: Recent Improvements to Powercat
17:00 •
Hacking Our Way Into Hacking
18:00 •
Stress, Burnout, Rinse, Repeat
Wednesday
, August 5
Above The Ground Plane
10:30 •
WiFi Pineapple: Winning the WiFi Battlefield
11:30 •
Better Spectrum Monitoring with Software Defined Radio
14:00 •
Wi-Door - Bind/Rev Shells for your Wi-Fi
15:00 •
Software-Defined Radio Signal Processing with a $5 Microcontroller.
16:00 •
All Your RFz Are Belong to Me – Software Defined Radio Exploits
Breaking Ground
10:00 •
WhyMI so Sexy? WMI Attacks, Real-Time Defense, and Advanced Forensic Analysis
11:00 •
TAPIOCA (TAPIOCA Automated Processing for IOC Analysis)
14:00 •
Building an Empire with PowerShell
17:00 •
Remote Access, the APT
18:00 •
Crash The IoT Train Yourself: Intentionally Vulnerable WRT (IV-WRT)
Career Track
10:00 •
Introduction to the Career Track
10:10 •
Being the Paid Expert in the Room: Consulting for a Company or On Your Own
10:30 •
It’s All Geek to Me
11:10 •
Did you make a difference today?
11:30 •
Company Elevator Pitches
14:00 •
Welcome back, Emcee sets tone for the afternoon
14:15 •
Interview Role Play
15:35 •
Company Elevator Pitches
16:20 •
Life at a Startup, Tales From the Trenches: The Good, the Bad and the Ugly
16:40 •
It’s Not Just Your Answer: Hacking Tech Interviews
17:00 •
Infosec careers, myth vs. reality
17:20 •
Some things you just can’t find on Google.
17:40 •
Longevity in InfoSec – Turning Passion into Expertise & Respect
18:00 •
Common Mistakes that Engineers make while Interviewing in a “Hot” market
18:45 •
Closing remarks and thanks from our Emcee
Chill-Out Room
07:30 •
Breakfast
08:30 •
Coffee
09:45 •
Opening Remarks
10:00 •
Pros vs. Joes CTF and SECTF
12:30 •
Lunch
16:00 •
Happy Hour
16:15 •
Sue the Fed, Hack your FBI File
19:00 •
Auction, Raffle, Closing Remarks
Common Ground
10:00 •
A hackers guide to using the YubiKey - how to add inexpensive 2-factor authentication to your next project.
11:00 •
Haking the Next Generation
12:00 •
Backdooring MS Office documents with secret master keys
14:00 •
Yes, you too can perform daring acts of Live Acquisition.
15:00 •
For love of country: 15 years of Security Clearance Decisions
17:00 •
Rethink, Repurpose, Reuse... Rain Hell
18:00 •
Why does InfoSec play bass? And other observations about hacker culture.
Conference Center Foyer
08:30 •
Registration Open
Ground Truth
10:00 •
Have I seen you before?
11:00 •
Who Watches the Watchers? Metrics for Security Strategy
12:00 •
Advancing Internet Security Research with Big Data and Graph Databases
14:00 •
Intro to Data Science for Security
17:00 •
No More Fudge Factors and Made-up Shit: Performance Numbers That Mean Something
18:00 •
AI and CND - implications for security in the era of Artificial Intelligence
Passwords
10:00 •
Security Questions Considered Harmful
10:30 •
I Forgot My Password
11:00 •
Harvesting Passwords from Source Code, Scripts, and Code Repositories
12:00 •
Towards Standardizing Comparisons of Password Guessability
14:00 •
Stronger Password-Based Encryption Using I/O Hardness
14:30 •
Auth for Encrypted Services with Server Side APT
15:00 •
Blind Hashing
15:30 •
PBKDF2: Performance Matters
17:00 •
Password Alert by Google
17:30 •
No More Graphical Passwords
18:00 •
How Secure Are Multi-Word Random Passphrases?
18:30 •
Are You Sure That You Still Need Passwords?
Proving Ground
10:00 •
ZOMG It's OSINT Heaven!
10:30 •
Classic Misdirection: Social Engineering to Counter Surveillance
11:00 •
Phishing: Going from Recon to Credentials
11:30 •
Social Media in Incident Response Program
12:00 •
Cats and Mice - Ever evolving attackers and other game changers
14:00 •
FAA, FTC, FCC - FU: How Three F'ing Agencies are Shaping Info Sec
14:30 •
+10 Knowledge: Sharing What You Learn For the Benefit of the Everyman.
15:00 •
Maximizing Bro Detection
15:30 •
Embedding Web Apps in MITMProxy Scripts
17:00 •
What Lurks in the Shadow
17:30 •
Out of Denial: A 12-Step Program for Recovering Admins
18:00 •
Why We Can't Have Nice Things: Original Research on Conflict Resolution Styles in Information Security & Risk Management
18:30 •
Serial Box - Primer for dealing with Serial and JTAG for basic hardware hacking
The Pool
22:00 •
Pool Party Sponsored by Ionic Security
Training Ground I
08:30 •
Radare2 an open source reverse engineering framework
14:00 •
Android App Security Auditing
Training Ground II
08:30 •
You Hack, We Capture: Attack Analysis with Honeypots
14:00 •
Open Up A Can of OSINT On 'Em
Underground
10:00 •
All You Need Is One: A ClickOnce Love Story
11:00 •
Bio-Hacking: Implantable chip attack vector
14:00 •
Fishing To Phishing - It’s all about slimy creatures.
15:00 •
Insider Tricks for Bug Bounty Success
17:00 •
Actionable Threat Intelligence: ISIS, SuperBall, SuperFish, and your less magical 8-ball
18:00 •
Ask the EFF
Timezone
BSidesLV 2015
America/Los Angeles
Filter By Date
BSidesLV 2015
Aug 4
-
5, 2015
Tuesday
, August 4
Wednesday
, August 5
Filter By Tracks
Tuscany Suites, 255 E. Flamingo Rd. Las Vegas, NV
Sort schedule by Tracks
Above The Ground Plane
Breaking Ground
Career Track
Chill-Out Room
Common Ground
Conference Center Foyer
Ground Truth
I Am The Cavalry
Passwords
Piazza Lounge Patio
Proving Ground
TBA
The Pool
Training Ground I
Training Ground II
Underground
Filter By Type
Above The Ground Plane
Breaking Ground
Career Track
Chill-Out Room
Common Ground
General
Ground Truth
I Am The Cavalry
Parties/Mixers/After-Hours Events
Passwords
Proving Ground
Training Ground I
Training Ground II
Underground
Popular
Recently Active Participants
Adrian Sanabria
Reed Loden
Jon Zeolla
MF
Martin Forssén
MM
Mark Manning
Håkon Fostervold Høydal
Eriks
mauvehed/nate
More →
Filter sessions
Apply filters to sessions.
close
Dates
Tuesday
, August 4
Wednesday
, August 5
Venue
Above The Ground Plane
Breaking Ground
Career Track
Chill-Out Room
Common Ground
Conference Center Foyer
Ground Truth
I Am The Cavalry
Passwords
Piazza Lounge Patio
Proving Ground
TBA
The Pool
Training Ground I
Training Ground II
Underground
Session Type
Above The Ground Plane
Breaking Ground
Career Track
Chill-Out Room
Common Ground
General
Ground Truth
I Am The Cavalry
Parties/Mixers/After-Hours Events
Passwords
Proving Ground
Training Ground I
Training Ground II
Underground
Other Filters
Popular