{"id":826,"date":"2015-05-15T23:00:00","date_gmt":"2015-05-15T23:00:00","guid":{"rendered":"https:\/\/www-new.brucon.org\/2018\/2015\/05\/15\/brucon-0x07-line-up-and-early-bird-registrations\/"},"modified":"2015-05-15T23:00:00","modified_gmt":"2015-05-15T23:00:00","slug":"brucon-0x07-line-up-and-early-bird-registrations","status":"publish","type":"post","link":"https:\/\/archive.brucon.org\/2018\/2015\/05\/15\/brucon-0x07-line-up-and-early-bird-registrations\/","title":{"rendered":"BruCON 0x07 Line-up and Early Bird Registrations"},"content":{"rendered":"<div style=\"background-color: white;color: #333333;font-family: Georgia, serif;font-size: 13px;line-height: 20.8000011444092px\">Hello there BruCONneers!<\/div>\n<div style=\"background-color: white;color: #333333;font-family: Georgia, serif;font-size: 13px;line-height: 20.8000011444092px\"><\/div>\n<div style=\"background-color: white;color: #333333;font-family: Georgia, serif;font-size: 13px;line-height: 20.8000011444092px\">Over the past month we have been chewing over the CFP submissions. We received really great proposals and had to make some tough choices. And finally, white smoke!<\/div>\n<div style=\"background-color: white;color: #333333;font-family: Georgia, serif;font-size: 13px;line-height: 20.8000011444092px\"><\/div>\n<div style=\"background-color: white;color: #333333;font-family: Georgia, serif;font-size: 13px;line-height: 20.8000011444092px\">We are thrilled to propose you the&nbsp;<b><u>Line-Up for BruCON 0x07<\/u><\/b>:<\/div>\n<div style=\"background-color: white;color: #333333;font-family: Georgia, serif;font-size: 13px;line-height: 20.8000011444092px\"><\/div>\n<div style=\"background-color: white;color: #333333;font-family: Georgia, serif;font-size: 13px;line-height: 20.8000011444092px\"><b>Keynotes<\/b><\/div>\n<div style=\"background-color: white;color: #333333;font-family: Georgia, serif;font-size: 13px;line-height: 20.8000011444092px\"><\/div>\n<ul style=\"background-color: white;color: #222222;font-family: arial, sans-serif;font-size: 12.8000001907349px\">\n<li style=\"color: #333333;font-family: Georgia, serif;line-height: 20.8000011444092px;margin-left: 15px\">Dave Kennedy, Co-founder of TrustedSec and Binary Defense Systems. C<span style=\"line-height: 20.8000011444092px\">o-author of the book &#8220;Metasploit: The Penetration Testers Guide,&#8221; the creator of the Social-Engineer Toolkit (SET), and Artillery<\/span><\/li>\n<li style=\"margin-left: 15px\"><span style=\"color: #333333;font-family: Georgia, serif;line-height: 20.8000011444092px\">Shyama Rose,&nbsp;<\/span><span style=\"color: #333333;font-family: Georgia, serif\"><span style=\"line-height: 20.8000011444092px\">Vice President of Information Security for Live Nation Entertainment<\/span><\/span><\/li>\n<\/ul>\n<div style=\"background-color: white;color: #333333;font-family: Georgia, serif;font-size: 13px;line-height: 20.8000011444092px\"><\/div>\n<div style=\"background-color: white;color: #333333;font-family: Georgia, serif;font-size: 13px;line-height: 20.8000011444092px\"><b>Talks<\/b><\/div>\n<div style=\"background-color: white;color: #333333;font-family: Georgia, serif;font-size: 13px;line-height: 20.8000011444092px\"><\/div>\n<ul style=\"background-color: white;color: #333333;font-family: Georgia, serif;font-size: 13px;line-height: 20.8000011444092px\">\n<li style=\"margin-left: 15px\">Willi Ballenthin and Jon Tomczak &#8211; Shims For The Win: Case study and investigative techniques for hijacked Application Compatibility Infrastructure<\/li>\n<li style=\"margin-left: 15px\">Alexandre Dulaunoy and Pieter-Jan Moreels &#8211; cve-search &#8211; A free software to collect, search and analyse common vulnerabilities and exposures in software<\/li>\n<li style=\"margin-left: 15px\">L. Grecs &#8211; Creating REAL Threat Intelligence &#8230; with Evernote<\/li>\n<li style=\"margin-left: 15px\">Mark Hillick &#8211; Levelling Up Security @ Riot Games<\/li>\n<li style=\"margin-left: 15px\">Samuel Hunter and Adam Schoeman &#8211; Explosive Honey: Improving intelligence collected by Honeypots<\/li>\n<li style=\"margin-left: 15px\">Ryan Kazanciyan and Matt Hastings &#8211; Desired state: compromise<\/li>\n<li style=\"margin-left: 15px\">Dhia Mahjoub and Thomas Mathew &#8211; Unified DNS View to Track Threats<\/li>\n<li style=\"margin-left: 15px\">David Mortman &#8211; SSO: It&#8217;s the SAML SAML Situation (With Apologies to M\u00f6tley Cr\u00fce)<\/li>\n<li style=\"margin-left: 15px\">Rushikesh Nandedkar and Amrita Iyer &#8211; The .11 Veil, Camouflage &amp; Covert!!! \/*Invisible Wifi, Revealed *\/<\/li>\n<li style=\"margin-left: 15px\">Chris Nickerson &#8211; Nightmares of a Pentester<\/li>\n<li style=\"margin-left: 15px\">Kuba Sendor and Ivan Leichtling &#8211; OSXCollector: Automated forensic evidence collection &amp; analysis for OS X<\/li>\n<li style=\"margin-left: 15px\">Eric Smith &#8211; Advanced Red Teaming: All your badges are belong to us<\/li>\n<li style=\"margin-left: 15px\">Richard Thieme &#8211; Hacking as Practice for Transplanetary Life in the 21st Century: How Hackers Frame the Pictures in Which Others Live<\/li>\n<li style=\"margin-left: 15px\">Mathy Vanhoef &#8211; Advanced WiFi Attacks using Commodity Hardware<\/li>\n<\/ul>\n<p><br style=\"background-color: white;color: #333333;font-family: Georgia, serif;font-size: 13px;line-height: 20.8000011444092px\" \/><\/p>\n<div style=\"background-color: white;color: #333333;font-family: Georgia, serif;font-size: 13px;line-height: 20.8000011444092px\"><b>Workshops<\/b><\/div>\n<div style=\"background-color: white;color: #333333;font-family: Georgia, serif;font-size: 13px;line-height: 20.8000011444092px\"><\/div>\n<div style=\"background-color: white;color: #333333;font-family: Georgia, serif;font-size: 13px;line-height: 20.8000011444092px\"><\/div>\n<ul style=\"background-color: white;color: #333333;font-family: Georgia, serif;font-size: 13px;line-height: 20.8000011444092px\">\n<li style=\"margin-left: 15px\">Pieter Danhieux and Erik Van Buggenhout &#8211; Hands-on Incident Response Workshop<\/li>\n<li style=\"margin-left: 15px\">Sergei Frankoff and Sean Wilson &#8211; Crowdsourced Malware Triage Workshop &#8211; Making Sense of Malware with a Browser and a Notepad<\/li>\n<li style=\"margin-left: 15px\">Prateek Gianchandani &#8211; iOS application pentesting<\/li>\n<li style=\"margin-left: 15px\">Chris Lytle and Leigh Lytle &#8211; Hands-On Old School Cryptography<\/li>\n<li style=\"margin-left: 15px\">Chris Lytle and Matt Jakubowski &#8211; BrewCon<\/li>\n<li style=\"margin-left: 15px\">Vito Rallo &#8211; Kernel Tales<\/li>\n<li style=\"margin-left: 15px\">Vivek Ramachandran &#8211; Wi-Fi Network and Host based Intrusion Detection &amp; Forensics for Pentesters<\/li>\n<li style=\"margin-left: 15px\">Arnaud Soullie &#8211; Pentesting ICS 101<\/li>\n<li style=\"margin-left: 15px\">Didier Stevens &#8211; A Hands On Introduction To Software Defined Radio<\/li>\n<li style=\"margin-left: 15px\"><span style=\"line-height: 20.8000011444092px\">DJ Jackalope, Ocean Lam, Count Ninjula and Keith Myers &#8211; DJ workshop<\/span><\/li>\n<\/ul>\n<div style=\"background-color: white;color: #222222;font-family: arial, sans-serif;font-size: 12.8000001907349px\"><b style=\"color: #333333;font-family: Georgia, serif;line-height: 20.8000011444092px\"><br \/><\/b><\/div>\n<div style=\"background-color: white;color: #222222;font-family: arial, sans-serif;font-size: 12.8000001907349px\"><b style=\"color: #333333;font-family: Georgia, serif;line-height: 20.8000011444092px\">Villages<\/b><span style=\"color: #333333;font-family: Georgia, serif\"><span style=\"line-height: 20.8000011444092px\"><br \/><\/span><\/span><\/div>\n<div style=\"background-color: white;color: #222222;font-family: arial, sans-serif;font-size: 12.8000001907349px\">\n<ul style=\"color: #333333;font-family: Georgia, serif;line-height: 20.8000011444092px\">\n<li style=\"margin-left: 15px\">ICS Village<\/li>\n<li style=\"margin-left: 15px\">Hak4kidz &#8211; Hacking conference for children (Sunday 4-Oct)<\/li>\n<\/ul>\n<\/div>\n<p><br style=\"background-color: white;color: #333333;font-family: Georgia, serif;font-size: 13px;line-height: 20.8000011444092px\" \/><\/p>\n<div style=\"background-color: white;color: #333333;font-family: Georgia, serif;font-size: 13px;line-height: 20.8000011444092px\"><b>Sounds<\/b><\/div>\n<div style=\"background-color: white;color: #333333;font-family: Georgia, serif;font-size: 13px;line-height: 20.8000011444092px\"><\/div>\n<ul style=\"background-color: white;color: #333333;font-family: Georgia, serif;font-size: 13px;line-height: 20.8000011444092px\">\n<li style=\"margin-left: 15px\">Ocean Lam (Hong Kong)<\/li>\n<li style=\"margin-left: 15px\">DJ Jackalope (Las Vegas)<\/li>\n<li style=\"margin-left: 15px\">Count Ninjula (Los Angeles)<\/li>\n<li style=\"margin-left: 15px\">Keith Myers (Los Angeles)<\/li>\n<li style=\"margin-left: 15px\">keroSerene (Serene Han, pianist)<\/li>\n<\/ul>\n<div style=\"background-color: white;color: #333333;font-family: Georgia, serif;font-size: 13px;line-height: 20.8000011444092px\"><\/div>\n<div style=\"background-color: white;color: #333333;font-family: Georgia, serif;font-size: 13px;line-height: 20.8000011444092px\"><b>Training<\/b><\/div>\n<div style=\"background-color: white;color: #333333;font-family: Georgia, serif;font-size: 13px;line-height: 20.8000011444092px\">\n<ul style=\"line-height: 20.8000011444092px\">\n<li style=\"margin-left: 15px\">Andrew Honig &#8211; Practical Malware Analysis: Rapid Introduction (3 day training)<\/li>\n<li style=\"margin-left: 15px\">Russ Gideon &#8211; Tactical Exploitation and Response (3 day training)<\/li>\n<li style=\"margin-left: 15px\">Dawid Czagan &#8211; Hacking web applications &#8211; case studies of award-winning bugs in Google, Yahoo, Mozilla and more (2 day training)<\/li>\n<li style=\"margin-left: 15px\">Didier Stevens &#8211; Wireshark WiFi and Lua-Packet Class (2 day training)<\/li>\n<li style=\"margin-left: 15px\">Chris Nutt &#8211; Cyber Breach Management (3 day training)<\/li>\n<\/ul>\n<\/div>\n<div style=\"background-color: white;color: #333333;font-family: Georgia, serif;font-size: 13px;line-height: 20.8000011444092px\">Stay tuned for more training announcements!<\/div>\n<div style=\"background-color: white;color: #333333;font-family: Georgia, serif;font-size: 13px;line-height: 20.8000011444092px\"><\/div>\n<div style=\"background-color: white;color: #333333;font-family: Georgia, serif;font-size: 13px;line-height: 20.8000011444092px\">You might want to come earlier, as we have some extra activities on Wednesday 7-Oct in the pipeline \ud83d\ude42<\/div>\n<div style=\"background-color: white;color: #333333;font-family: Georgia, serif;font-size: 13px;line-height: 20.8000011444092px\"><\/div>\n<div style=\"background-color: white;color: #333333;font-family: Georgia, serif;font-size: 13px;line-height: 20.8000011444092px\">Early Bird registration is now open for the&nbsp;<a href=\"http:\/\/2015.brucon.org\/index.php\/Tickets\" style=\"color: #999999;text-decoration: none\" target=\"_blank\" class=\"broken_link\">conference<\/a>&nbsp;and the&nbsp;<a href=\"http:\/\/2015.brucon.org\/index.php\/Training\" style=\"color: #999999;text-decoration: none\" target=\"_blank\" class=\"broken_link\">trainings<\/a>!<\/div>\n<div style=\"background-color: white;color: #333333;font-family: Georgia, serif;font-size: 13px;line-height: 20.8000011444092px\"><\/div>\n<div style=\"background-color: white;color: #333333;font-family: Georgia, serif;font-size: 13px;line-height: 20.8000011444092px\">Cheers,<\/div>\n<div style=\"background-color: white;color: #333333;font-family: Georgia, serif;font-size: 13px;line-height: 20.8000011444092px\"><\/div>\n<p><br style=\"background-color: white;color: #333333;font-family: Georgia, serif;font-size: 13px;line-height: 20.8000011444092px\" \/><\/p>\n<div style=\"background-color: white;color: #333333;font-family: Georgia, serif;font-size: 13px;line-height: 20.8000011444092px\">the BruCON team<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Hello there BruCONneers! Over the past month we have been chewing over the CFP submissions. We received really great proposals and had to make some tough choices. And finally, white smoke! We are thrilled to propose you the&nbsp;Line-Up for BruCON 0x07: Keynotes Dave Kennedy, Co-founder of TrustedSec and Binary Defense Systems. Co-author of the book &#8220;Metasploit: The Penetration Testers Guide,&#8221; the creator of the Social-Engineer Toolkit (SET), and Artillery Shyama Rose,&nbsp;Vice President of Information Security&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":{"0":"post-826","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-uncategorized"},"menu_order":0,"_links":{"self":[{"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/posts\/826","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/comments?post=826"}],"version-history":[{"count":0,"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/posts\/826\/revisions"}],"wp:attachment":[{"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/media?parent=826"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/categories?post=826"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/tags?post=826"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}