Registration & Breakfast 08:30 - 10:00
Lunch 13:00 - 14:00
Coffee Break 16:00 - 16:30
Dinner 18:30 - 20:00
BruCON Opening
Keynote - The cyber short. A market solution for product safety... 10:00 - 11:00
Detecting malware even when it is encrypted - Machine Learning f... 11:00 - 12:00
Knock Knock... Who's there? admin admin and get in! An overview... 12:00 - 13:00
Evading Microsoft ATA for Active Directory Domination 14:00 - 15:00
Secure channels: Building real world crypto systems 15:00 - 16:00
From Weakest Link to Retaliation Weapon: Building Efficient Anti... 16:30 - 17:30
Open Source Security Orchestration 17:30 - 18:30
ICS and IoT Village 10:00 - 19:00
Hacking Bluetooth Smart locks 13:30 - 17:30
Practical iOS App Exploitation and Defense using iGoat 10:30 - 12:30
Windows malware development: A JMP in the dark 13:30 - 17:30
Programming Wireshark With Lua 10:30 - 12:30
Malware Triage: Malscripts Are The New Exploit Kit 13:30 - 17:30
Playing with RFID workshop 10:30 - 12:30
Practical Machine Learning in InfoSecurity 13:30 - 17:30
Getting the Most Out of Windows Event Logs 10:30 - 12:30
BruCON Party 21:30 - 23:59
Keynote - How hackers changed the security industry and how we n... 10:00 - 11:00
See no evil, hear no evil: Hacking invisibly and silently with l... 11:00 - 12:00
Browser Exploits? Grab them by the… collar! 12:00 - 13:00
XFLTReaT: a new dimension in tunnelling 14:00 - 15:00
DYODE 15:00 - 16:00
Weaponizing the BBC Micro:Bit 16:30 - 17:30
MEATPISTOL, A Modular Malware Implant Framework 17:30 - 18:30
BruCON Closing
ICS and IoT Village 10:00 - 18:00
ICS Pentest 101 13:30 - 17:30
May the data stay with you - Network Data Exfiltration Techniques. 10:30 - 12:30
Building a cheap, robust, scaling, penetration testing/bug bounty super computer 13:30 - 17:30
Defeating Proprietary Protocols the Smart Way 10:30 - 12:30
Jedi's trick to convince your boss and colleagues 13:30 - 17:30
Mimikatz 13:30 - 17:30
Hacker Run (10K) 07:30 - 08:30