Track 1
Opening Remarks
9:00 - 9:30
Pathways Into Darkness: Hunting for Adversary Behaviors Atop the Pyramid Of Pain
10:00 - 10:50
Detecting WMI Exploitation
11:00 - 11:50
Lunch Break
12:00 - 13:00
DarkMention: Next-Generation Attack Prediction
13:00 - 13:50
Working with WeirdAAL (AWS Attack Library)
14:00 - 14:50
On the Nose: Bypassing Huawei's Fingerprint Authentication by Exploiting the TrustZone
15:00 - 15:50
Detecting Dedicated Infrastructure
16:00 - 16:50
Track 2
So You Want To Be a Mentor: Taking Someone from Noob to Knowledgeable
9:30 - 10:00
Stealing Cycles, Mining Coin: An Introduction to Malicious Cryptomining
10:00 - 10:50
How Can I Find Thee? Let Me Count the Ways - Automated Bug Finding in Practice
11:00 - 11:50
Lunch Break
12:00 - 13:00
Workshop: Augmenting Penetration Testing with Lightweight Static Analysis
13:00 - 16:50
Snowtalks
OpSec Workshop
10:00
Return of Return of the Dork
13:00
Blue Team Password Cracking
14:00
Failures of Mobile Blacklists
15:00
Real Talk on Comms
16:00