{"id":1436,"date":"2018-06-15T12:58:08","date_gmt":"2018-06-15T10:58:08","guid":{"rendered":"https:\/\/archive.brucon.org\/2018\/?p=1436"},"modified":"2018-06-20T00:31:58","modified_gmt":"2018-06-19T22:31:58","slug":"brucon-0x0a-talks-workshops-announcement","status":"publish","type":"post","link":"https:\/\/archive.brucon.org\/2018\/2018\/06\/15\/brucon-0x0a-talks-workshops-announcement\/","title":{"rendered":"BruCON 0x0A talks and workshops announcement"},"content":{"rendered":"<p>We are pleased to announce the speaker and workshop line-up for the special 10th edition!<br \/>\nBruCON 0x0A will be held from October 3-5 and will bring together more than 600 community members of which 55 specialists will be presenting 2 keynotes, 12 talks, 11 workshops and 10 trainings.<br \/>\nThis year\u2019s special is our retro day, where we look back on our past! You have chosen the 8th most popular talks over the past BruCON editions and this selection will be published 20\/06!<\/p>\n<p><strong>Keynotes<\/strong><\/p>\n<p>Our first keynotes will be presented by Haroon Meer.<br \/>\nThe second one will be announced soon.<\/p>\n<p><strong>Talks<\/strong><\/p>\n<p>$SignaturesAreDead = &#8220;Long Live RESILIENT Signatures&#8221; wide ascii nocase &#8211; Daniel Bohannon &amp; Matthew Dunwoody<br \/>\nAll Your Cloud Are Belong To Us &#8211; Hunting Compromise in Azure &#8211; Nate Warfield<br \/>\nDisrupting the Kill Chain &#8211; Vineet Bhatia<br \/>\nDissecting Of Non-Malicious Artifacts: One IP At A Time &#8211; Dani Goland &amp; Ido Naor<br \/>\nExploits in Wetware &#8211; Robert Sell<br \/>\nFinding 0days in embedded systems with code coverage guided fuzzing &#8211; Lau Kai Jern &amp; Quynh Nguyen Anh<br \/>\nForging Trusts for Deception in Active Directory &#8211; Nikhil Mittal<br \/>\nHunting Android Malware: A novel runtime technique for identifying malicious applications &#8211; Christopher Le Roy<br \/>\nIoT RCE, a Study With Disney &#8211; Lilith Wyatt<br \/>\nMirror on the wall: using blue team techniques in red team ops &#8211; Marc Smeets &amp; Mark Bergman<br \/>\nOutside the Box: Breakouts and Privilege Escalation in Container Environments &#8211; Craig Ingram &amp; Etienne Stalmans<br \/>\nProcess Control through Counterfeit Comms: using and abusing built-in functionality to own a PLC &#8211; Jared Rittle<\/p>\n<p><strong>Workshops<\/strong><\/p>\n<p>Developing Resilient Detections (with Obfuscation &amp; Evasion in Mind) &#8211; Daniel Bohannon<br \/>\nFinding security vulnerabilities with modern fuzzing techniques &#8211; Rene Freingruber<br \/>\nIntroduction to Bro Network Security Monitor &#8211; David Szili &amp; Eva Szilagyi<br \/>\nJedi tricks to convince your boss (Episode 2): Weapons training &#8211; Emmanuel Nicaise<br \/>\nMalware Triage: Analyzing Malscripts &#8211; Return of The Exploits! &#8211; Sean Wilson &amp; Sergei Frankoff<br \/>\nMimikatz workshop &#8211; Benjamin Delpi<br \/>\nPython Toolsmithing 101 &#8211; Didier Stevens<br \/>\nSimplifying the art of instrumentation &#8211; Krishnakant B. Patil &amp; Rushikesh D. Nandedkar<br \/>\nThe hunt is on: Engineering the NextGen Cyber Threat Detection System. Attackers, it\u2019s not so easy to hide anymore! &#8211; Solomon Sonya<br \/>\nThe story of greendale &#8211; Thomas Chopitea<br \/>\nA goldmine within an ocean of data &#8211; basics of network forensics &#8211; Andy Deweirt<\/p>\n<p>Like these talks? Don&#8217;t forget to buy your tickets on <a href=\"https:\/\/archive.brucon.org\/2018\/tickets\/\">our ticketpage!<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We are pleased to announce the speaker and workshop line-up for the special 10th edition! BruCON 0x0A will be held from October 3-5 and will bring together more than 600 community members of which 55 specialists will be presenting 2 keynotes, 12 talks, 11 workshops and 10 trainings. This year\u2019s special is our retro day, where we look back on our past! You have chosen the 8th most popular talks over the past BruCON editions&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":{"0":"post-1436","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-uncategorized"},"menu_order":0,"_links":{"self":[{"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/posts\/1436","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/comments?post=1436"}],"version-history":[{"count":7,"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/posts\/1436\/revisions"}],"predecessor-version":[{"id":1450,"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/posts\/1436\/revisions\/1450"}],"wp:attachment":[{"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/media?parent=1436"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/categories?post=1436"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/tags?post=1436"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}