Unnamed user

»Lunch Break« | »Lunch Break« | »Red Day Registration & Reception Begins« | »Food and Chill« | »Beach Bonfire Luau & Fireside Closing Remarks« | »Party @ The Hard Rock« | »Registration« | »Registration« | »Opening Remarks« | »Opening Remarks«

Karl Koscher

»TLSMy.net: Enabling HTTPS for home network devices« | »Micro Brewery Boat«

Samy Kamkar

»NAT Pinning 2.0: bypassing routers & firewalls via web+NAT abuse« | »Escape Rooms«

Ulrich Lang, PhD

»AI HACKER! Automatic vulnerability assessment & pen-testing of embedded & other systems«

Morgan Roman

»Don’t run with scissors: how to standardize the way your developers use dangerous aspects of your framework«

Jesse (@bashexplode)

»Purple Haze: The SpearPhishing Experience« | »Skydiving«

Soldier of FORTRAN

»Cutting Edge Techniques to Pwn the Gibson«

Michael Leibowitz, Principal Troublemaker and Topher Timzen, Principal Vulnerability Enthusiast

»EDR Is Coming; Hide Yo Sh!t« | »Sail Boat Racing«

Marcus Richerson

»Kiosk Red Pills«

Aravind Sreenivasa

»Static code analysis should work for developers, not for you« | »Scavenger Hunt«

Caleb McGary

»Using drivers for kernel operations during a Red Team operation« | »San Diego Zoo«

Volodymyr Pikhur

»Writing PoCs for processor software side-channels« | »Skydiving«

David Bryan - Aka VideoMan

»Card cloning doesn't have to be hard.« | »Bike Ride«

Shea Polansky

»Mocking HTTP Services with Burp«

Bryce Kunz (@TweekFawkes)

»May the Cloud be with You: Red Teaming GCP (Google Cloud Platform)«

Antonio Piazza

»Gone Calishing: A Red Team Approach to Weaponizing Google Calendar and How to Stop It.« | »Scavenger Hunt«


»Challenges of X.509 certs«

Bruce Potter

»Pen testing by asking questions: the Art of Elicitation« | »Bike Ride«

Kos (Kyle Osborn)

»From private to public, working in local government.« | »Escape Rooms«

Daniel Moghimi

»ZombieLoad: Leaking Data on Intel CPUs« | »Jet Skiing«

Jatin Kataria

»100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans« | »Hot Tub Island«

Ang Cui

»100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans« | »Hot Tub Island«

Rick Housley

»PERCH: Adding a peripheral layer to Ghidra« | »Hot Tub Island«

Mike Arnoult

»You're probably a young professional and you should probably be investing. Here's how.«

Tony Lauro

»API's are not just the 21st century developers mullet, they're also how you are getting PWND«

Thomas Roth and Josh Datko

»chip.fail« | »Sail Boat Racing«

Alex Ivkin

»Down the sinkhole with Kubernetes« | »Jet Skiing«

Adrian Bednarek

»Ethercombing - Blockchain brute force cryptanalysis«

Beau Woods

»Blue Team Set Us Up The SBOM«

Kate Temkin & Mikaela Szekely

»Hacking Even More USB with USB-Tools«

John (@0xpookie)

»Real Life Devsecops« | »Exploratory Penetration«

Kirsten Sireci Renner

»Navigating the Infosec Job Search« | »Mock Interview Resume Review Workshop«

Margaret Fero

»Mosaic Theory of Information Security«

Kashish Mittal

»Sea World«

Megan DeBlois

»Blue Teaming for Human Rights« | »San Diego Zoo«

Geo... Mark? Hardly!!

»HACKER JEOPARDY: The Road to Vegas, Baby!«

Erin Browning

»Token Up: Keeping Hands out of the Cookie Jar«