Hacking Monetary SystemsMonetary systems are information systems. The most important component is the human brain and money is data - it must have physical and logical integrity. Join the inventor of the RAIDA ( Redundant Array of Independent Detection Agents ) - a replacement to the Blockchain - who will discuss the rise and fall of currencies including the destruction of the cryptocurrencies and the digital currencies that will replace them.
SDR Experimenting With Breaking Into CarsSoftware Defined Radios are becoming increasingly more available and simpler to program, however much research into this field is lacking. Therefore a lot of our RF security protocols are wildly outdated. One example is that of our current Key Fob security system we have for most vehicles. I explored most of the security steps that were implemented in the last two decades, and creative ways to get around them.
Designing for the Human ExperienceThe most compelling products solve problems and add value. The truth is products resonate with users not by the design but in the mind. The importance of design thinking is how user research informs development and design teams to become the voice of the user and create meaningful user experiences.
Raspberry Pi - The Cheap Tool That Rules Them AllA variety of techniques to use the RaspberryPi line of devices to attack the physical security of a business. The RaspberryPi is so cheap and versatile, it is the cheapest way to build a robust physical hacking arsenal.
Working for Skynet: The Next 25 Years of Technological ChangeReviewing the technological change of the past two generations of humans, it becomes clear that there's no sign of slowing down any time in the near future. Our eyes should be kept open to increasing automation (and decreasing employment), Moore's Law, Artificial Intelligence, and Singularity, as these topics have drastic human implications.
OT, The Real OG: Operational Technology DemystifiedIoT is all the rage nowadays, but the original IoT was Industrial Control Systems, or more generally know as Operational Technology. This talk will go over its history, how it works, how it can fail, and how you can help secure it.
The Internet Battlefield: A Look at the Front LinesWhat a network security analyst is, tools used, attacks in the wild, and stories from the front lines of the internet battlefield.
Red Team Tools of the TradeExplore different tools that maybe employed during a Red Team engagement. These tools will include the WiFi Pinapple, Ducky, Lan Turtle, Bash Bunny,Tastic RFID Thief,an RFID writer, and Raspberry PI.
WiFi Hacking with the ESP8266How a $3 WiFi microcontroller with extremely low power draw can be useful to the security community. Covering hardware and programming for multiple applications in denial of service, penetration, and reconnaissance.
Take Control of Your IOT Data with MQTTMQTT is a light-weight messaging protocol which works over TCP/IP. It can be used to set up a spoke and wheel style architecture perfect for today many modern IOT device. Because of it’s ease of use anyone can set up a server to protect their data and because of its small footprint it is perfect for use in you IOT creations with arduino or raspberry pi.
Brian Moran & Roberta Payne
Digital Forensics & Incident Response WorkshopInterested in the field of digital forensics? Learn how to analyze physical media, network captures, and memory dumps using open-source tools. Examine various forensics artifacts on different operating systems. See how incident response and malware analysis augment this field. Explore careers in the industry.
Will Caput & Jeff Woods
Phishing 101Walk through how phishing works, and how it applied to the last election. Preventative measures you can take to not be vulnerable. Live demonstration of phishing in action.
Vehicle based surveillance technology 101Vehicle based surveillance is utilized in many cities throughout the world. Very little is known by the general public about how to identify when vehicle based surveillance is being used and their methods. This information needs to be accessible and understandable by the technical and non-technical alike. As the general public becomes more savvy of information security, surveillance strategies will increasingly transition back to analog methods.
Mapping the Invisible - A Journey Into Discovering Tor Hidden ServicesScanning Tor darknets, speeding up tunnel generation and massively parallel port scanning.
0900 : Wifi Hacking with the ESP8266
1000 : Designing for the Human Esperience
1030 : SDR experimenting with Breaking into cars
1100 : Raspberry Pi - The Cheap Tool That Rules Them All
1200 : Digital Forensics & Incident Response Workshop
1330 : Working for Skynet: The Next 25 Years of Technological Change
1400 : Phishing: How it works and a live demo
1430 : Red Team Tools of the Trade
1530 : Vehicle Based Surveillance Technology
1600 : The Internet Battlefield: A look at the front lines
1700 : Take Control of Your Data with MQTT
1730 : OT, the real OG: Operational Technology demystified
1830 : Mapping the Invisible: A Journey Into Discovering Tor Hidden Services
1900 : Hacking Monetary Systems