- ATGP00 Underground Wi Fi Hacking for Web Pentesters Greg Foss
- ATGP01 radBIOS Wireless networking with audio Richo Healey
- ATGP02 I Amateur Radio And So Can You Kat Sweet
- ATGP03 Intro for New WCTFers Russell Handorf Rick Farina
- ATGP05 Better Spectrum Monitoring with Software Defined Radio Michael Ossmann
- ATGP06 Wi Door BindRev Shells for your Wi Fi Vivek Ramachandran
- ATGP07 Software Defined Radio Signal Processing with a 5 Microcontroller Jared Boone
- ATGP08 All Your RFz Are Belong to Me Software Defined Radio Exploits Balint Seeber
- BG00 Injection on Steroids Code less Code Injections and 0 Day Techniques Paul Schofield Udi Yavo
- BG01 Getting the data out using social media Dakota Nelson Gabriel Butterick Byron Wasti
- BG02 An introduction of the Kobra a client for the Badger version 20 providing tactical situational
- BG03 NSA Playset Bridging the Airgap without Radios Michael Leibowitz
- BG05 Your Electronic Device Please Understanding the Border Search Exception Electronic Devices Whit
- BG06 WhyMI so Sexy WMI Attacks Real Time Defense and Advanced Forensic Analysis William Ballenthin C
- BG07 TAPIOCA TAPIOCA Automated Processing for IOC Analysis Ryan J Chapman Moses Schwartz
- BG08 Building an Empire with PowerShell Will Schroeder Justin Warner
- BG09 Remote Access the APT Ian Latter
- BG10 Crash The IoT Train Yourself Intentionally Vulnerable WRT IV WRT Paul Asadoorian Nick Curran
- CG00 Barely Legal the Hackeras Guide to Cybersecurity Legislation Jen Ellis
- CG01 Pentesting with Docker Tom Steele
- CG02 Don't hate the Disclosure Hate the Vulnerability How the government is bringing researchers and
- CG03 How Portal Can Change Your Security Forever Katrina Rodzon
- CG04 Angler Lurking in the Domain Shadows Nick Biasini
- CG05 A hackers guide to using the YubiKey how to add inexpensive 2 factor authentication to your nex
- CG06 Haking the Next Generation David Schwartzberg
- CG07 Backdooring MS Office documents with secret master keys Yoshinori Takesako Shigeo Mitsunari
- CG08 Yes you too can perform daring acts of Live Acquisition D0n Quix0te
- CG10 Rethink Repurpose Reuse Rain Hell Michael Zupo
- CG11 Why does InfoSec play bass And other observations about hacker culture Adrian Sanabria
- GT00 Verum How Skynet Started as a Context Graph Gabriel Bassett
- GT01 Adversary Intelligence from Conflict to Consensus Alex Valdevia Rich Barger
- GT01 When steganography stops being cool David Sancho
- GT02 Analogue Network Security Winn Schwartau
- GT03 Crema A LangSec inspired Language Sergey Bratus Jacob Torrey
- GT04 Making Breaking Machine Learning Anomaly Detectors in Real Life Clarence Chio
- GT05 Have I seen you before Daniel Reich Maxim Pevzner
- GT06 Who Watches the Watchers Metrics for Security Strategy Michael Roytman
- GT07 Advancing Internet Security Research with Big Data and Graph Databases Andrew Hess
- GT09 No More Fudge Factors and Made up Shit Performance Numbers That Mean Something Russell Thomas
- IATC00 IATC Track Introduction and Overview Josh Corman joshcorman Nicholas J Percoco
- IATC00 Intro and Hack the Future Keren Elazari1
- IATC01 Hack the Future Keren Elazari
- IATC03 State of Medical Device Cyber Safety Beau Woods Scott Erven
- IATC04 Leading in a Do ocracy Chris Nickerson Beau Woods Tod Beardsley Tim Remes
- IATC05 State of Automotive Cyber Safety Josh Corman joshcorman Craig Smith
- PG00 Speaking Metrics to Executives Michael St Vincent
- PG01 Dropping hell0days Business Interaction for Security Professionals Or Anyone Else Elliot Johnso
- PG02 Practice Safe Cyber The Miseducation of American Students on Internet Safety Vivienne Pustell
- PG03 Check That Certificate Jacob Jernigan Andrew Sorensen
- PG04 The Journey To ICS Larry Vandenaweele
- PG05 Catching Linux Post Exploitation with Auditd Eric Gershman
- PG06 Adding +10 Security to Your Scrum Agile Environment Josh Louden
- PG07 Fight back raising awareness @infosec Petri Koivisto
- PG08 What the heck is this radio stuff anyway Nick Kartsioukas
- PG09 SIEMple technology Bill Davison
- PG10 How I learnt hacking in highschool Lokesh Pidawekar
- PG11 ZOMG Its OSINT Heaven Tazz Tazz
- PG12 Classic Misdirection Social Engineering to Counter Surveillance Peter Clemenko III
- PG13 Phishing Going from Recon to Credentials Adam Compton Eric Gershman
- PG14 Social Media in Incident Response Program JoEtta LeSueur
- PG15 Cats and Mice Ever evolving attackers and other game changerse Eric Kmetz
- PG16 FAA FTC FCC FU How Three F ing Agencies are Shaping Info Sec Elizabeth Wharton
- PG17 +10 Knowledge Sharing What You Learn For the Benefit of the Everyman Ashley Miller
- PG18 Maximizing Bro Detection John B Althouse
- PG19 Embedding Web Apps in MITMProxy Scripts Chris Czub
- PG20 What Lurks in the Shadow Cheryl Biswas
- PG21 Out of Denial A 12 Step Program for Recovering Admins Paul Lee
- PG22 Why We Cant Have Nice Things Original Research on Conflict Resolution Styles in Information Sec
- PG23 Serial Box Primer for dealing with Serial and JTAG for basic hardware hacking Matthew Jakubowsk
- [Private Video]
- PW00 passwords privacy keystroke dynamics Per Thorsheim
- PW01 Unspeakable passwords pronounceable or Diceware Jeffery Goldberg
- PW02 Pushing on String Adventures in the Dont Care Regions of Password Strength Cormac Herley
- PW03 What would fix passwords Some weekly password audits Pretty graphs to prove it A Haiku Rick Red
- PW04 Breachego Christian Heinrich
- PW05 Tell Me Who You Are and I Will Tell You Your Lock Pattern Marte LAge
- PW06 Scrutinizing WPA2 Password Generating Algorithms in Wireless Routers Eduardo Novella
- PW07 Poppin Digital Locks Devin Egan
- PW08 Privileges in the Real World Securing Password Management Andrey Dulkin
- PW09 Security Questions Considered Harmful Jim Fenton
- PW10 I Forgot My Password Michal A paAek
- PW11 Harvesting Passwords from Source Code Scripts and Code Repositories Philippe Paquet
- PW12 Towards Standardizing Comparisons of Password Guessability Sean Segreti Blase Ur
- PW20 Password Based Encryption Using IO Hardness Greg Zaverucha
- PW21 Auth for Encrypted Services with Server Side APT
- PW22 Blind Hashing
- PW23 PBKDF2 Performance Matters
- PW24 Password Alert by Google
- PW25 No More Graphical Passwords Mark Brunett
- PW26 How Secure Are Multi Word Random Passphrases