Training
- 09:00-12:30:Karl Barrett - REV.ENG.E
- 09:00-17:00:Lukasz Gogolkiewicz - Practical Guide to Escalating Privileges in Windows
Wednesday
Talks
- 09:00-09:15:Intro
- 09:15-09:45:"Alex" - Stealing Chrome cookies without a password
- 09:45-10:15:Michelle Burke - For good or evil: why do you need my data?
- 10:15-10:45:Break
- 10:45-11:30:Matthew Ruffell - The story of the "Uncrackable" Lockbox, and Why Hackers Need to Work Alongside Developers
- 11:30-12:00:Pete Nicholls - Becoming a Security-Conscious Software Company
- 12:00-12:30:Edward Robinson - Disassembling Diablo
- 12:30-13:45:Lunch
- 13:45-14:15:Ben Knight - Classic Playstation Hacking
- 14:15-15:00:AaylaSecura1138 - What gives $7k and 3 CVEs? A web browser, confused about its cross-origin policy
- 15:00-15:45:Louis Nyffenegger - Entrepreneurship for hackers
- 15:45-16:15:Break
- 16:15-16:45:Pete Gent - An A-Z of Spectrum
- 16:45-17:15:Izzi Lithgow - Caught between the devil and the deep blue sea: Navigating security communications
- 17:15-17:45:Jeremy Stott - The Access Keys to Moria
- 17:45-17:50:Outro
Thursday
- 09:00-09:15:Intro
- 09:15-09:45:Sam Shute - Putting a backdoor in your front door.
- 09:45-10:00:Peter Jakowetz - Deleted Memories
- 10:00-10:30:Jed Laundry - Putting the ARR back into RBAC
- 10:15-10:45:Break
- 11:00-11:45:Adel Karimi - Seeing The Invisible: Finding Fingerprints on Encrypted Traffic
- 11:45-12:30:Josh Brodie - Security/Engineering: An Introduction to Industrial Control Systems
- 12:30-14:00:Lunch
- 14:00-14:45:antic0de & lokifer - Teaching An Old Dog New Tricks
- 14:45-15:15:Tom Isaacson - What's new in Wifi
- 15:15-15:30:Sarah Walker - IAM confused: a deep dive into permissions
- 15:30-16:00:Break
- 16:00-16:30:Karl Barrett - Industrial Sensorship
- 16:30-17:00:Kade - Panopticon Project, tracking state sponsored actors and why that's important
- 17:00-17:15:Shaquin & Ben - Super self-service: hacking kiosks using barcodes
- 17:15-17:45:Closing and Prizegiving