{"id":41,"date":"2010-07-23T16:22:18","date_gmt":"2010-07-23T16:22:18","guid":{"rendered":"http:\/\/www.secbarbie.com\/?p=41"},"modified":"2014-07-24T16:22:35","modified_gmt":"2014-07-24T16:22:35","slug":"security-summer-camp-part-1-the-talks","status":"publish","type":"post","link":"http:\/\/www.secbarbie.com\/?p=41","title":{"rendered":"Security Summer-Camp \u2013 Part 1: The Talks"},"content":{"rendered":"<h3 style=\"font-weight: normal;\"><\/h3>\n<h3 style=\"font-weight: normal;\"><\/h3>\n<h3 style=\"font-weight: normal;\"><\/h3>\n<h3 style=\"font-weight: normal;\"><\/h3>\n<h3 style=\"font-weight: normal;\"><\/h3>\n<h3 style=\"font-weight: normal;\"><\/h3>\n<h3 style=\"font-weight: normal;\"><\/h3>\n<h3 style=\"font-weight: normal;\"><span style=\"color: #ff0000;\"><a style=\"color: #a11893;\" href=\"https:\/\/web.archive.org\/web\/20110831210533\/http:\/\/www.blackhat.com\/html\/bh-us-10\"><img loading=\"lazy\" class=\"aligncenter\" title=\"Black Hat 2010\" src=\"https:\/\/web.archive.org\/web\/20110831210533im_\/http:\/\/www.securityuniversity.net\/Assets\/Images\/Current_Images\/events-blackhat-usa-2010.jpg\" alt=\"\" width=\"200\" height=\"150\" \/><\/a><\/span><\/h3>\n<h2 style=\"color: #111111;\">SecBarbie\u2019s talk picks of the week:<\/h2>\n<h3 style=\"color: #111111;\"><span style=\"color: #ff0000;\">Black Hat<\/span><\/h3>\n<p><b>Wednesday 1:45pm \u2013 3pm<\/b><\/p>\n<p><b><i>Augustus 1 &amp; 2<\/i><\/b><\/p>\n<p>Barnaby Jack \u2013 Jackpotting Automated Teller Machines Redux!<\/p>\n<p><b>Wednesday 3:15pm \u2013 4:30pm<\/b><\/p>\n<p><b><i>Roman<\/i><\/b><\/p>\n<p>Dan Kaminsky \u2013 Black Ops Of Fundamental Defense: Web Edition<\/p>\n<p><b>Wednesday 4:45pm \u2013 6pm<\/b><\/p>\n<p><b><i>Augustus 5 &amp; 6<\/i><\/b><\/p>\n<p>Fyodor \u2013 Mastering the Nmap Scripting Engine<\/p>\n<p><b><i>Milano 5 \u2013 8<\/i><\/b><\/p>\n<p>Alex Hutton \/ Allison Miller \u2013 Ushering in the Post-GRC World: Applied Threat Modeling<\/p>\n<p><b>Thursday 10am \u2013 11am<\/b><\/p>\n<p><b><i>Augustus 3 &amp; 4<\/i><\/b><\/p>\n<p>Chris Hoff \u2013 Cloudinomicon: Idepotent Infrastructure, Survivable Systems &amp; Bringing \u00a0 Sexy Back to Information Centricity<\/p>\n<p><b>Thursday 11:15am \u2013 12:30pm<\/b><\/p>\n<p><b><i>Roman<\/i><\/b><\/p>\n<p>Cesar Cerrudo \u2013 Token Kidnapping\u2019s Revenge<\/p>\n<p><b><i>Forum 25<\/i><\/b><\/p>\n<p>Lee Kushner, Mike Murray \u00a0 &#8211;\u00a0 Your Career = Your Business<\/p>\n<p><b><i>Milano 5 \u2013 8<\/i><\/b><\/p>\n<p>Tiffany Rad &#8211; The DMCA &amp; ACTA vs. Academic &amp; Professional Research: How Misuse \u00a0 of this Intellectual Property Legislation Chills Research, Disclosure and \u00a0 Innovation<\/p>\n<p><b>Thursday 3:15pm \u2013 4:30pm<\/b><\/p>\n<p><b><i>Milano 1 \u2013 4<\/i><\/b><\/p>\n<p>Samy Kamkar &#8211; How I met your girlfriend<\/p>\n<p>Wednesday also has the <b><i>Cloud Security Alliance Summit <\/i><\/b>with some pretty amazing, insightful, and wicked cool folks such as:<\/p>\n<p>Chris Hoff \u00a0 \u2013 \u00a0 Cloudersize Keynote<\/p>\n<p>Josh Pennell \u00a0 \u2013 \u00a0 Hacking the Hypervisor 2010<\/p>\n<p>Steve Riley \u00a0 \u2013 \u00a0 Security and compliance in the Amazon cloud<\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20110831210533\/http:\/\/www.securitybsides.com\/BSidesLasVegas\"><img src=\"webkit-fake-url:\/\/AF309CF7-B67B-429C-A791-0D9C63896F63\/securitybsides_logo-300x300.jpg\" alt=\"securitybsides_logo-300x300.jpg\" \/><\/a><\/p>\n<p><strong style=\"color: #111111;\"><span style=\"color: #00ff00;\">Security BSides \u2013 Las Vegas 2010<\/span><\/strong><\/p>\n<p>I can\u2019t even begin to pick the Security BSides talks (special mention to the InfoSec Mentor Panel that I\u2019ll be on Wednesday at 6pm) as I would whole-heartedly endorse all of them. Bravo to the talk selection guys! So, here is the BSides Schedule:<\/p>\n<table cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td valign=\"top\"><\/td>\n<td valign=\"top\"><b>TRACK 1<\/b>&nbsp;<\/p>\n<p><b>On The Keys<\/b><\/td>\n<td valign=\"top\"><\/td>\n<td valign=\"top\"><\/td>\n<td valign=\"top\"><b>TRACK 2<\/b>&nbsp;<\/p>\n<p><b>AFK<\/b><\/td>\n<td valign=\"top\"><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><b>7\/28\/2010<\/b><\/td>\n<td valign=\"top\"><\/td>\n<td valign=\"top\"><\/td>\n<td valign=\"top\"><\/td>\n<td valign=\"top\"><\/td>\n<td valign=\"top\"><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">10:00 AM<\/td>\n<td valign=\"top\"><b>David Rook<\/b><\/td>\n<td valign=\"top\"><a href=\"https:\/\/web.archive.org\/web\/20110831210533\/http:\/\/www.securityninja.co.uk\/more-information-about-my-securitybsides-presentation\">Injecting Simplicity not SQL<\/a><\/td>\n<td valign=\"top\"><\/td>\n<td valign=\"top\"><b>Daniel Molina<\/b><\/td>\n<td valign=\"top\">Top 10 Things IT is Doing to Enable CyberCrime<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">11:00 AM<\/td>\n<td valign=\"top\"><b>Ryan Linn<\/b><\/td>\n<td valign=\"top\">Multi-Player MetaSploit<\/td>\n<td valign=\"top\"><\/td>\n<td valign=\"top\"><b>Will Gragido<\/b><\/td>\n<td valign=\"top\">Through the rabbit hole: An Expose of Darknets and the Onion Routed Underground<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">12:00 PM<\/td>\n<td valign=\"top\"><b>Christopher E. Pogue<\/b><\/td>\n<td valign=\"top\">Sniper Forensics<\/td>\n<td valign=\"top\"><\/td>\n<td valign=\"top\"><b>Gene Kim<\/b><\/td>\n<td valign=\"top\">Mobilizing the PCI Resistance: Lessons Learned From Fighting Prior Wars (SOX-404)<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">01:00 PM<\/td>\n<td valign=\"top\"><b>Chris Lytle,<\/b>&nbsp;<\/p>\n<p><b>Leigh Hollowell<\/b><\/td>\n<td valign=\"top\">CCDC<\/td>\n<td valign=\"top\"><\/td>\n<td valign=\"top\"><b>Andrew Hay,<\/b>&nbsp;<\/p>\n<p><b>Chris Nickerson<\/b><\/td>\n<td valign=\"top\">Building Bridges &#8211;\u00a0 Forcing Hackers and Business to Hug it Out<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">02:00 PM<\/td>\n<td valign=\"top\"><b>Sean-Paul Correll,<\/b>&nbsp;<\/p>\n<p><b>Luis Corrons<\/b><\/td>\n<td valign=\"top\">Catch That Butterfly: Stopping Mariposa in its Tracks and Revealing a Growing Underground Network of Amateur Hackers<\/td>\n<td valign=\"top\"><\/td>\n<td valign=\"top\"><b>Vik Phatak<\/b><\/td>\n<td valign=\"top\">ExploitHub: Arming the Pen Testers to Plug the Holes<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">03:00 PM<\/td>\n<td valign=\"top\"><b>Dave Kennedy (Rel1K)<\/b><\/td>\n<td valign=\"top\">SET 0.6 release with special PHUKD Key<\/td>\n<td valign=\"top\"><\/td>\n<td valign=\"top\"><b>Paul Judge, David Maynor<\/b><\/td>\n<td valign=\"top\">The Dark side of Twitter, Measuring and Analyzing Malicious Activity on Twitter<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">04:00 PM<\/td>\n<td valign=\"top\"><b>frank^2<\/b><\/td>\n<td valign=\"top\">Fuck Tools, Do It yourself Jerk<\/td>\n<td valign=\"top\"><\/td>\n<td valign=\"top\"><b>Grecs<\/b><\/td>\n<td valign=\"top\">Infosec Communities for Career Success: Understanding, Participating, and Cooking One Up<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">05:00 PM<\/td>\n<td valign=\"top\"><b>Jabra<\/b><\/td>\n<td valign=\"top\"><\/td>\n<td valign=\"top\"><\/td>\n<td valign=\"top\"><b>Joseph Sokoly<\/b><\/td>\n<td valign=\"top\">Infosec Young and Restless<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">06:00 PM<\/td>\n<td valign=\"top\"><b>Jim MacLeod<\/b><\/td>\n<td valign=\"top\">Stupid IP Tables Tricks<\/td>\n<td valign=\"top\"><\/td>\n<td valign=\"top\"><b>INFOSEC Mentoring, Mentee-ing Panel<\/b><\/td>\n<td valign=\"top\"><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">7\/29\/2010<\/td>\n<td valign=\"top\"><\/td>\n<td valign=\"top\"><\/td>\n<td valign=\"top\"><\/td>\n<td valign=\"top\"><\/td>\n<td valign=\"top\"><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">10:00 AM<\/td>\n<td valign=\"top\"><b>Jimmy Shah<\/b><\/td>\n<td valign=\"top\">Mobile Hackery<\/td>\n<td valign=\"top\"><\/td>\n<td valign=\"top\"><b>Josh Corman, Dennis Fisher, HD Moore, Jack Daniel<\/b><\/td>\n<td valign=\"top\">InfoSec Speed Debates<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">11:00 AM<\/td>\n<td valign=\"top\"><b>Egyp7<\/b><\/td>\n<td valign=\"top\">Beyond r57<\/td>\n<td valign=\"top\"><\/td>\n<td valign=\"top\"><b>Chris Sumner<\/b><\/td>\n<td valign=\"top\">Social Network Special Ops<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">12:00 PM<\/td>\n<td valign=\"top\"><b>HDM<\/b><\/td>\n<td valign=\"top\">Fun with VxWorks<\/td>\n<td valign=\"top\"><\/td>\n<td valign=\"top\"><b>Frank Breedijk, Ian Southam<\/b><\/td>\n<td valign=\"top\">The road to hell is paved with best practices<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">01:00 PM<\/td>\n<td valign=\"top\"><b>Davi Ottenheimer<\/b><\/td>\n<td valign=\"top\">Keypad Bypass Hacks<\/td>\n<td valign=\"top\"><\/td>\n<td valign=\"top\"><b>Bruce Potter<\/b><\/td>\n<td valign=\"top\">How to Make Network Diagrams that Don\u2019t Suck<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">02:00 PM<\/td>\n<td valign=\"top\"><b>Zach Lanier<\/b><\/td>\n<td valign=\"top\">It Melts In Your Hand: An Overview of Security (Failures) In Mobile Applications<\/td>\n<td valign=\"top\"><\/td>\n<td valign=\"top\"><b>Eric Smith<\/b><\/td>\n<td valign=\"top\">Roman Profiles : The 6 Mistakes of<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">03:00 PM<\/td>\n<td valign=\"top\"><b>Ray Kelly<\/b><\/td>\n<td valign=\"top\">A mechanics view of SQL injection<\/td>\n<td valign=\"top\"><\/td>\n<td valign=\"top\"><b>ValSmith<\/b><\/td>\n<td valign=\"top\">Social Engineering the CFP Process<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">04:00 PM<\/td>\n<td valign=\"top\"><b>Moxie Marlinspike<\/b><\/td>\n<td valign=\"top\">How technology killed my heroes, and why they will never be born again<\/td>\n<td valign=\"top\"><\/td>\n<td valign=\"top\"><b>Chris Roberts<\/b><\/td>\n<td valign=\"top\">Planes, Trains and Automobiles: (OK, Cars and Buses)<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">05:00 PM<\/td>\n<td valign=\"top\"><b>Jason Ross<\/b><\/td>\n<td valign=\"top\">Who Owns the Internet? AKA: Where did all that cyberspace go?<\/td>\n<td valign=\"top\"><\/td>\n<td valign=\"top\"><b>Andre Gironda<\/b><\/td>\n<td valign=\"top\">App Assessments Reloaded<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><a href=\"https:\/\/web.archive.org\/web\/20110831210533\/http:\/\/www.defcon.org\/html\/defcon-18\/dc-18-schedule.html\"><img src=\"webkit-fake-url:\/\/AF309CF7-B67B-429C-A791-0D9C63896F63\/dc-18-logo-wide-300x110.png\" alt=\"dc-18-logo-wide-300x110.png\" \/><\/a><\/p>\n<p><b>DefCon 18<\/b><\/p>\n<p><b>Friday 1pm \u2013 2pm<\/b><\/p>\n<p><b>Track 4<\/b><\/p>\n<p>Dennis Brown &#8211; How Hackers Won the Zombie Apocalypse<\/p>\n<p><b>Friday 2pm \u2013 3pm<\/b><\/p>\n<p><b>Track 3<\/b><\/p>\n<p>Jim Rennie, Eric Rachner &#8211; Search &amp; Seizure &amp; Golfballs<\/p>\n<p><b>Friday 3pm \u2013 3:30pm<\/b><\/p>\n<p><b>Track 5<\/b><\/p>\n<p>Righter Kunkel &#8211; Air Traffic Control Insecurity 2.0<\/p>\n<p>&nbsp;<\/p>\n<p><b>Friday 4pm \u2013 5pm<\/b><\/p>\n<p><b>Track 4<\/b><\/p>\n<p>Tottenkoph &#8211; An Introduction to Virtual Graffiti<\/p>\n<p><b>Friday 5pm \u2013 6pm<\/b><\/p>\n<p><b>Track 2<\/b><\/p>\n<p>Sumit Siddharth &#8211; Hacking Oracle from Web Apps<\/p>\n<p><b>Friday 6pm \u2013 6:20pm<\/b><\/p>\n<p><b>Track 5<\/b><\/p>\n<p>Marisa Fagan &#8211; Be A MENTOR!<\/p>\n<p><b>Friday 9pm \u2013 ???pm<\/b><\/p>\n<p><b>Track 1<\/b><\/p>\n<p>Hacker Jeopardy!!!!!!!\u00a0 \u00a0 \u00a0 \u2013 Bring Booze!<\/p>\n<p><b>Saturday 10am \u2013 11am<\/b><\/p>\n<p><b>Track 2<\/b><\/p>\n<p>Jeremy Brown &#8211; Exploiting SCADA Systems<\/p>\n<p><b>Saturday 10am \u2013 11am<\/b><\/p>\n<p><b>Track 4<\/b><\/p>\n<p>Chris Paget &#8211; Extreme-range RFID Tracking<\/p>\n<p><b>Saturday 11am \u2013 12pm<\/b><\/p>\n<p><b>Track 4<\/b><\/p>\n<p>Barnaby Jack \u2013 Jackpotting Automated Teller Machines Redux!<\/p>\n<p><b>Saturday 12pm \u2013 1pm<\/b><\/p>\n<p><b>Track 1<\/b><\/p>\n<p>Nicholas Percoco, Christian Papathanasiou \u2013 \u201cThis is not the Droid you\u2019re looking for..\u201d<\/p>\n<p><b>Saturday 1pm \u2013 2pm<\/b><\/p>\n<p><b>Track 1<\/b><\/p>\n<p>frank^2 &#8211; Trolling Reverse-Engineers with Math: Ness\u2026. It Hurts\u2026<\/p>\n<p><b>Saturday 3pm \u2013 4pm<\/b><\/p>\n<p><b>Track 2<\/b><\/p>\n<p>James Arlen &#8211; SCADA and ICS for Security Experts: How to avoid Cyberduchery<\/p>\n<p><b>Saturday 3pm \u2013 4pm<\/b><\/p>\n<p><b>Track 5<\/b><\/p>\n<p>Garry Pejski &#8211; My Life as a Spyware Developer<\/p>\n<p>&nbsp;<\/p>\n<p><b>Saturday 4pm \u2013 5pm<\/b><\/p>\n<p><b>Track 4<\/b><\/p>\n<p>Jayson Street &#8211; Deceiving the Heavens to Cross the Sea: Using the 26 stratagems for Social Engineering<\/p>\n<p>&nbsp;<\/p>\n<p><b>Saturday 5pm \u2013 6pm<\/b><\/p>\n<p><b>Track 4<\/b><\/p>\n<p>Leigh Honeywell, follower &#8211; Physical Computing, Virtual Security: Adding the Arduino Microcontroller Development Environment to your security toolbox<\/p>\n<p><b>Saturday 7pm \u2013 9pm<\/b><\/p>\n<p><b>Track 5<\/b><\/p>\n<p>DefCon Security Jam III: Now in 3D?<\/p>\n<p><b>Saturday 10pm \u2013 ??pm<\/b><\/p>\n<p><b>Track 4<\/b><\/p>\n<p>10,000 Cent Pyramid<\/p>\n<p><b>Sunday 10am \u2013 11am<\/b><\/p>\n<p><b>Track 4<\/b><\/p>\n<p>Mike Bailey &#8211; Web Services we just don\u2019t need<\/p>\n<p><b>Sunday 11am &#8211;\u00a0 12pm<\/b><\/p>\n<p><b>Track 2<\/b><\/p>\n<p>Valsmith, Colin Ames, Anthony Lai &#8211; Balancing the Pwn Trade Deficit<\/p>\n<p><b>Sunday 1pm &#8211;\u00a0 2pm<\/b><\/p>\n<p><b>Track 5<\/b><\/p>\n<p>mc.fly, rvd, vyrus, no maam &#8211; ChaosVPN for Playing CTFs<\/p>\n<p><b>Sunday 2pm &#8211;\u00a0 3pm<\/b><\/p>\n<p><b>Track 3<\/b><\/p>\n<p>David Smith, Samuel Petreski &#8211; A new approach to forensic methodology &#8211; !!BUSTED!! Case Studies<\/p>\n<p><b>Sunday 4pm &#8211;\u00a0 5pm<\/b><\/p>\n<p><b>Track 1<\/b><\/p>\n<p>The Suggmeister &#8211; Social Networking Special Ops: Extending Data Visualization Tools for Faster Pwnage<\/p>\n<p>&nbsp;<\/p>\n<p><b>Sunday 5pm &#8211;\u00a0 6pm<\/b><\/p>\n<p><b>Track 1<\/b><\/p>\n<p>Justin Morehouse, Tony Flick &#8211; Getting Social with the Smart Grid<\/p>\n<p><b>Sunday 6pm<\/b><\/p>\n<p><b>CLOSING CEREMONIES!!!!!<\/b><\/p>\n<p><b><i>Please reclaim all lost livers here!<\/i><\/b><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>If you are NOT going to be in the melt-your-face-off land of Las Vegas next week, you can follow all of the action and some of the parties via my live-conference feed on twitter.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>SecBarbie\u2019s talk picks of the week: Black Hat Wednesday 1:45pm \u2013 3pm Augustus 1 &amp; 2 Barnaby Jack \u2013&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false},"categories":[16],"tags":[2,17,3,11],"_links":{"self":[{"href":"http:\/\/www.secbarbie.com\/index.php?rest_route=\/wp\/v2\/posts\/41"}],"collection":[{"href":"http:\/\/www.secbarbie.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.secbarbie.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.secbarbie.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.secbarbie.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=41"}],"version-history":[{"count":2,"href":"http:\/\/www.secbarbie.com\/index.php?rest_route=\/wp\/v2\/posts\/41\/revisions"}],"predecessor-version":[{"id":43,"href":"http:\/\/www.secbarbie.com\/index.php?rest_route=\/wp\/v2\/posts\/41\/revisions\/43"}],"wp:attachment":[{"href":"http:\/\/www.secbarbie.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=41"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.secbarbie.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=41"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.secbarbie.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=41"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}