Skip to main content.
The Shmoo Group

Navigation: About | Location | Schedule | Speakers | Contests and Events | Hacker Arcade | Labs | Sponsors | Past Events


Thanks to our sponsors!
Thanks to our sponsors!

Friday - February 15th

Time One Track Mind
Registration Opens
1500Opening Remarks
1600Intercepting Mobile Phone/GSM Traffic
1630Forensic Image Analysis to Recover Passwords
David Smith
1700Baked not Fried: Performing an Unauthorized Phishing Awareness Exercise
Syn Phishus
1730Web Portals: Gateway to Information or a Hole in our Perimeter Defenses?
Deral Heiland
1800Hacking the Samurai Spirit
Isaac Mathis
1830New Countermeasures to the Bump Key Attack
Deviant Ollam
Keynote Address: Ed Felten
Hack or Halo Practice

Saturday - Februry 16th

Time Build it! Break it! Bring it on!
930Registration Opens
1000Active 802.11 Fingerprinting: Gibberish and "Secret Handshakes" to Know Your AP
Sergey Bratus, Cory Cornelius and Daniel Peebles
Virtual Worlds - Real Exploits
Charlie Miller and Dino Dai Zovi
Climbing EVEREST - An Inside Look at Voting Systems Used in the US
Sandy Clark, Eric Cronin, Gaurav Shah and Matt Blaze
1100SIPing Your Network
Radu State, Humberto Abdelnur, and Olivier Festor
Smarter Password Cracking
Matt Weir
Forced Internet Condom
Aaron Higbee and Jaime Fuentes
1200They're Hacking Our Clients! Why are We Focusing Only on the Servers
Jay Beale
21st Century Shellcode for Solaris
Tim Vidas
A Hacker Looks Past 50
G. Mark Hardy
1400Passive Host Characterization
Matthew Wollenweber
Why are Databases so Hard to Secure
Sheeri Cabral
TL1 Device Security
Rachel Bicknell
1500Practical Hacker Crypto
Simple Nomad
VoIP Penetration Testing: Lessons Learned
John Kindervag and Jason Ostrom
I Will Be Your Eyes and Hands: Colossal Cave, Adventure and Reality
Jason Scott
1600Using Aspect Oriented Programming to Prevent Application Attacks
Rohit Sethi and Nish Bhalla
Got Citrix? Hack It!
Shanit Gupta
You Must Be This Tall to Ride the Security Ride
Joel Wilbanks and Pete Caro
1700Flash Drives & Solid State Drives Data Recovery Comparison to Hard Drives: Animated
Scott Moulton
Advanced Protocol Fuzzing - What We Learned when Bringing Layer2 Logic to "SPIKE Land"
Enno Rey and Daniel Mende
Legal Issues for Bot-net Researchers and Mitigators
Alexander Muentz
1830Hack or Halo
2100Saturday Night Party @ TBD

Sunday - Februry 17th

Time Build it! Break it! Bring it on!
0930Registration Opens
1000Hacking Windows Vista Security
Dan Griffin
Malware Software Armoring Circumvention
Danny Quist
When Lawyers Attack! Dealing with the New Rules of Electronic Discovery
John Benson, Esq.
1100Vulncatcher: Fun with Vtrace and Programmatic Debugging
0wn the Con
The Shmoo Group
The Geek and the Gumshoe or Can Mathematics and Computers Really Solve Crimes?
Michael Schearer and Frank Thornton
1200Path X: Explosive Security Testing Tools using XPath
Andre Gironda, Marcin Wielgoszewski and Tom Stracener
PEAP: Pwned Extensible Authentication Protocol
Josh Wright and Brad Antoniewicz
How do I Pwn Thee? Let Me Count the Ways
1300Room Split
1330On the Social Responsibility of Hackers
Panel: Bruce Potter (moderator), Simple Nomad, Johnny Long, Rick Dakan, TBD
1430Closing Remarks