April 13, 2019
Sean WorthingtonHacking Monetary Systems
Monetary systems are information systems. The most important component is the human brain and money is data - it must have physical and logical integrity. Join the inventor of the RAIDA ( Redundant Array of Independent Detection Agents ) - a replacement to the Blockchain - who will discuss the rise and fall of currencies including the destruction of the cryptocurrencies and the digital currencies that will replace them.
Jose BarrientosSDR Experimenting With Breaking Into Cars
Software Defined Radios are becoming increasingly more available and simpler to program, however much research into this field is lacking. Therefore a lot of our RF security protocols are wildly outdated. One example is that of our current Key Fob security system we have for most vehicles. I explored most of the security steps that were implemented in the last two decades, and creative ways to get around them.
Jason UgieDesigning for the Human Experience
The most compelling products solve problems and add value. The truth is products resonate with users not by the design but in the mind. The importance of design thinking is how user research informs development and design teams to become the voice of the user and create meaningful user experiences.
Trevor HartmanRaspberry Pi - The Cheap Tool That Rules Them All
A variety of techniques to use the RaspberryPi line of devices to attack the physical security of a business. The RaspberryPi is so cheap and versatile, it is the cheapest way to build a robust physical hacking arsenal.
MachinistWorking for Skynet: The Next 25 Years of Technological Change
Reviewing the technological change of the past two generations of humans, it becomes clear that there's no sign of slowing down any time in the near future. Our eyes should be kept open to increasing automation (and decreasing employment), Moore's Law, Artificial Intelligence, and Singularity, as these topics have drastic human implications.
Thad BognerOT, The Real OG: Operational Technology Demystified
IoT is all the rage nowadays, but the original IoT was Industrial Control Systems, or more generally know as Operational Technology. This talk will go over its history, how it works, how it can fail, and how you can help secure it.
Nicolas McBrideThe Internet Battlefield: A Look at the Front Lines
What a network security analyst is, tools used, attacks in the wild, and stories from the front lines of the internet battlefield.
Jeff HoldenRed Team Tools of the Trade
Explore different tools that maybe employed during a Red Team engagement. These tools will include the WiFi Pinapple, Ducky, Lan Turtle, Bash Bunny,Tastic RFID Thief,an RFID writer, and Raspberry PI.
Scotty FranzyshenWiFi Hacking with the ESP8266
How a $3 WiFi microcontroller with extremely low power draw can be useful to the security community. Covering hardware and programming for multiple applications in denial of service, penetration, and reconnaissance.
Collin DeverTake Control of Your IOT Data with MQTT
MQTT is a light-weight messaging protocol which works over TCP/IP. It can be used to set up a spoke and wheel style architecture perfect for today many modern IOT device. Because of it’s ease of use anyone can set up a server to protect their data and because of its small footprint it is perfect for use in you IOT creations with arduino or raspberry pi.
Brian Moran & Roberta PayneDigital Forensics & Incident Response Workshop
Interested in the field of digital forensics? Learn how to analyze physical media, network captures, and memory dumps using open-source tools. Examine various forensics artifacts on different operating systems. See how incident response and malware analysis augment this field. Explore careers in the industry.
Will Caput & Jeff WoodsPhishing 101
Walk through how phishing works, and how it applied to the last election. Preventative measures you can take to not be vulnerable. Live demonstration of phishing in action.
Edward MiroVehicle based surveillance technology 101
Vehicle based surveillance is utilized in many cities throughout the world. Very little is known by the general public about how to identify when vehicle based surveillance is being used and their methods. This information needs to be accessible and understandable by the technical and non-technical alike. As the general public becomes more savvy of information security, surveillance strategies will increasingly transition back to analog methods.
Eric MichaudMapping the Invisible - A Journey Into Discovering Tor Hidden Services
Scanning Tor darknets, speeding up tunnel generation and massively parallel port scanning.