{"id":38,"date":"2018-06-02T12:35:31","date_gmt":"2018-06-02T12:35:31","guid":{"rendered":"https:\/\/www-new.brucon.org\/2018\/?page_id=38"},"modified":"2018-09-11T21:27:27","modified_gmt":"2018-09-11T19:27:27","slug":"schedule","status":"publish","type":"page","link":"https:\/\/archive.brucon.org\/2018\/schedule\/","title":{"rendered":"Schedule"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][vc_empty_space][vc_raw_html]JTNDYSUyMGlkJTNEJTIyc2NoZWQtZW1iZWQlMjIlMjBocmVmJTNEJTIyJTJGJTJGYnJ1Y29uMHgwYS5zY2hlZC5jb20lMkYlMjIlMjBkYXRhLXNjaGVkLXNpZGViYXIlM0QlMjJubyUyMiUzRVZpZXclMjB0aGUlMjBCcnVDT04lMjAweDBBJTIwc2NoZWR1bGUlMjAlMjZhbXAlM0IlMjBkaXJlY3RvcnkuJTNDJTJGYSUzRSUzQ3NjcmlwdCUyMHR5cGUlM0QlMjJ0ZXh0JTJGamF2YXNjcmlwdCUyMiUyMHNyYyUzRCUyMiUyRiUyRmJydWNvbjB4MGEuc2NoZWQuY29tJTJGanMlMkZlbWJlZC5qcyUyMiUzRSUzQyUyRnNjcmlwdCUzRQ==[\/vc_raw_html][\/vc_column][\/vc_row][vc_row disable_element=&#8221;yes&#8221;][vc_column][vc_column_text]<\/p>\n<div class=\"entry-content post-content\">\n<p>You can find all information including timing, bio, abstracts on\u00a0<a href=\"https:\/\/brucon0x0a.sched.com\/\" target=\"_blank\" rel=\"noopener\">https:\/\/brucon0x0a.sched.com\/<\/a><\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<div class=\"entry-content post-content\">\n<p><strong>Keynotes<\/strong><\/p>\n<p>Our first keynotes will be presented by Haroon Meer and our second by\u00a0Daniel Cuthbert<\/p>\n<p><strong>Talks<\/strong><\/p>\n<p>$SignaturesAreDead = \u201cLong Live RESILIENT Signatures\u201d wide ascii nocase \u2013 Daniel Bohannon &amp; Matthew Dunwoody<br \/>\nAll Your Cloud Are Belong To Us \u2013 Hunting Compromise in Azure \u2013 Nate Warfield<br \/>\nDisrupting the Kill Chain \u2013 Vineet Bhatia<br \/>\nDissecting Of Non-Malicious Artifacts: One IP At A Time \u2013 Dani Goland &amp; Ido Naor<br \/>\nExploits in Wetware \u2013 Robert Sell<br \/>\nFinding 0days in embedded systems with code coverage guided fuzzing \u2013 Lau Kai Jern &amp; Quynh Nguyen Anh<br \/>\nForging Trusts for Deception in Active Directory \u2013 Nikhil Mittal<br \/>\nHunting Android Malware: A novel runtime technique for identifying malicious applications \u2013 Christopher Le Roy<br \/>\nIoT RCE, a Study With Disney \u2013 Lilith Wyatt<br \/>\nMirror on the wall: using blue team techniques in red team ops \u2013 Marc Smeets &amp; Mark Bergman<br \/>\nOutside the Box: Breakouts and Privilege Escalation in Container Environments \u2013 Craig Ingram &amp; Etienne Stalmans<br \/>\nProcess Control through Counterfeit Comms: using and abusing built-in functionality to own a PLC \u2013 Jared Rittle<\/p>\n<p><strong>Workshops<\/strong><\/p>\n<p>Developing Resilient Detections (with Obfuscation &amp; Evasion in Mind) \u2013 Daniel Bohannon<br \/>\nFinding security vulnerabilities with modern fuzzing techniques \u2013 Rene Freingruber<br \/>\nIntroduction to Bro Network Security Monitor \u2013 David Szili &amp; Eva Szilagyi<br \/>\nJedi tricks to convince your boss (Episode 2): Weapons training \u2013 Emmanuel Nicaise<br \/>\nMalware Triage: Analyzing Malscripts \u2013 Return of The Exploits! \u2013 Sean Wilson &amp; Sergei Frankoff<br \/>\nMimikatz workshop \u2013 Benjamin Delpi<br \/>\nPython Toolsmithing 101 \u2013 Didier Stevens<br \/>\nSimplifying the art of instrumentation \u2013 Krishnakant B. Patil &amp; Rushikesh D. Nandedkar<br \/>\nThe hunt is on: Engineering the NextGen Cyber Threat Detection System. Attackers, it\u2019s not so easy to hide anymore! \u2013 Solomon Sonya<br \/>\nThe story of greendale \u2013 Thomas Chopitea<br \/>\nA goldmine within an ocean of data \u2013 basics of network forensics \u2013 Andy Deweirt<\/p>\n<p>Like these talks? Don\u2019t forget to buy your tickets on <a href=\"https:\/\/archive.brucon.org\/2018\/tickets\/\">our ticketpage!<\/a><\/p>\n<\/div>\n<p><!--[sched url=\"https:\/\/brucon0x092017.sched.com\/\"]-->[\/vc_column_text][vc_empty_space height=&#8221;500px&#8221;][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_empty_space][vc_raw_html]JTNDYSUyMGlkJTNEJTIyc2NoZWQtZW1iZWQlMjIlMjBocmVmJTNEJTIyJTJGJTJGYnJ1Y29uMHgwYS5zY2hlZC5jb20lMkYlMjIlMjBkYXRhLXNjaGVkLXNpZGViYXIlM0QlMjJubyUyMiUzRVZpZXclMjB0aGUlMjBCcnVDT04lMjAweDBBJTIwc2NoZWR1bGUlMjAlMjZhbXAlM0IlMjBkaXJlY3RvcnkuJTNDJTJGYSUzRSUzQ3NjcmlwdCUyMHR5cGUlM0QlMjJ0ZXh0JTJGamF2YXNjcmlwdCUyMiUyMHNyYyUzRCUyMiUyRiUyRmJydWNvbjB4MGEuc2NoZWQuY29tJTJGanMlMkZlbWJlZC5qcyUyMiUzRSUzQyUyRnNjcmlwdCUzRQ==[\/vc_raw_html][\/vc_column][\/vc_row][vc_row disable_element=&#8221;yes&#8221;][vc_column][vc_column_text] You can find all information including timing, bio, abstracts on\u00a0https:\/\/brucon0x0a.sched.com\/ &nbsp; Keynotes Our first keynotes will be presented by Haroon Meer and our second by\u00a0Daniel Cuthbert Talks $SignaturesAreDead = \u201cLong Live RESILIENT Signatures\u201d wide ascii nocase \u2013 Daniel Bohannon &amp; Matthew Dunwoody All Your Cloud Are Belong To Us \u2013 Hunting Compromise in Azure \u2013 Nate Warfield Disrupting the Kill Chain \u2013 Vineet Bhatia Dissecting Of Non-Malicious Artifacts: One IP At A Time&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-38","page","type-page","status-publish"],"_links":{"self":[{"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/pages\/38","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/comments?post=38"}],"version-history":[{"count":13,"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/pages\/38\/revisions"}],"predecessor-version":[{"id":514,"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/pages\/38\/revisions\/514"}],"wp:attachment":[{"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/media?parent=38"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}