Briefings Schedule
* All times are in UTC -5 (U.S. Central [CDT]). Convert to your timezone
HERE
Day 1 - Oct 29
Time |
Description |
Speaker |
1000-1015 |
Opening Remarks |
Omar Santos and Phillip Wylie |
1015-1115 |
External Threat Hunters are Red Teamers |
Jorge Orchilles and David Maynor |
1115-1130 |
Break |
|
1130-1230 |
Charge!: Why you shouldn't trust that power bank |
Mauro Eldritch & Luis Ramirez |
1230-1245 |
Break |
|
1245-1345 |
You Are The Weakest Link: Attacking Organizations Through the Human Element |
Savannah Lazzara |
1345-1400 |
Break |
|
1400-1500 |
Steganography on Red Team Operations: Beyond CTF |
Vinicius Vieira (v1n1v131r4) |
1500-1515 |
Break |
|
1515-1615 |
Ghosts In The Clouds: Bypassing AWS Policies |
Jonathan C Helmus |
1615-1630 |
Break |
|
1630-1730 |
Y'all Tryna Enumerate Azure AD and ARM or Nah? |
Leron Gray |
1730-1745 |
Break |
|
1745-1815 |
DockerENT: The only open source tool to scan running docker container and network |
Rohit Sehgal |
1815-1830 |
Break |
|
1830-2030 |
Hacking is Not a Crime Workshop |
Chloé Messdaghi |
2030-2045 |
Day 1 Wrap-up |
Savannah Lazzara and Omar Santos |
Day 2 - Oct 30
Time |
Description |
Speaker |
1000-1015 |
Opening Remarks |
Omar Santos and Phillip Wylie |
1015-1115 |
Unauthenticated Access to SAP SolMan? root them All! |
Pablo Artuso and Yvan Genuer |
1115-1130 |
Break |
|
1130-1230 |
Malicious Learning: Generating fake news and political propaganda with Machine Learning |
Mauro Eldritch & Santiago Perez |
1230-1245 |
Break |
|
1245-1345 |
Pivoting and Exploitation in Docker Environments |
Filipi Pires |
1345-1400 |
Break |
|
1400-1500 |
Red Techniques and Blue Considerations in Modern Tech Environments |
Cedric Owens |
1500-1515 |
Break |
|
1515-1615 |
Offensive Docker for CTF, Pentesting and Bug Bounty |
Arsenio Aguirre |
1615-1630 |
Break |
|
1630-1645 |
The Dark Side of Cloud Configuration - Vulnerability or Feature? |
Vladi Sandler |
1645-1745 |
Breaking Into Your Building – A Hacker’s Guide to Unauthorized Physical Access |
Brent White and Tim Roberts |
1745-1845 |
Quark Engine - An Obfuscation-Neglect Android Malware Scoring System |
JunWei Song and KunYu Chen |
1845-1900 |
Day 2 Wrap-up |
Savannah Lazzara and Omar Santos |
Day 3 - Oct 31
Time |
Description |
Speaker |
1000-1015 |
Opening Remarks |
Omar Santos and Phillip Wylie |
1015-1115 |
Your Alert is My Advantage |
Evan Anderson and Greg Foss |
1115-1130 |
Break |
|
1130-1230 |
Actions Speak Browser Than Words (Exploiting n-days for fun and profit) |
Max Van Amerongen (maxpl0it) |
1230-1245 |
Break |
|
1245-1345 |
Don't Ruck Us Again |
Gal Zror |
1345-1400 |
Break |
|
1400-1500 |
How to Rob a Bank |
Joshua Crumbaugh |
1500-1545 |
Dissecting and Comparing Different Binaries to Malware Analysis |
Filipi Pires |
1545-1645 |
Learning by Doing: Building and Breaking a Machine Learning System |
Johann Rehberger |
1700-1800 |
GrayHat 2020 Closing Ceremony |
Staff, Villages, Organizers |