SCHEDULE
-
Thursday Oct 29, 2020 10:00 AMRTV Opening Remarks
-
Thursday Oct 29, 2020 10:15 AMExternal Threat Hunters are Red Teamers – VB
-
Thursday Oct 29, 2020 11:30 AMCharge: Why you shouldn’t trust that power bank – VB
-
Thursday Oct 29, 2020 12:45 PMYou Are The Weakest Link: Attacking Organizations Through the Human Element – VB
-
Thursday Oct 29, 2020 02:00 PMSteganography on Red Team Operations: Beyond CTF – VB
-
Thursday Oct 29, 2020 03:15 PMGhosts In The Clouds: Bypassing AWS Policies- VB
-
Thursday Oct 29, 2020 04:30 PMEnumerate Azure AD and ARM – VB
-
Friday Oct 30, 2020 10:15 AMUnauthenticated Access to SAP SolMan? root them All! – VB
-
Friday Oct 30, 2020 11:30 AMMalicious Learning: Generating fake news and political propaganda with Machine Learning – VB
-
Friday Oct 30, 2020 12:45 PMPivoting and Exploitation in Docker Environment – VB
-
Friday Oct 30, 2020 02:00 PMRed Techniques and Blue Considerations in Modern Tech Orgs – VB
-
Friday Oct 30, 2020 03:15 PMOffensive Docker for CTF, Pentesting and Bug Bounty – VB
-
Friday Oct 30, 2020 04:30 PMThe Dark Side of Cloud Configuration – Vulnerability or Feature? – VB
-
Saturday Oct 31, 2020 03:15 PMHow to Rob a bank with a phone – VB
-
Saturday Oct 31, 2020 10:15 AMYour Alert is My Advantage – VB
-
Saturday Oct 31, 2020 05:30 PMLearning by Doing: Building and Breaking a Machine Learning System – VB
-
Saturday Oct 31, 2020 11:30 AMActions Speak Browser Than Words – VB
-
Saturday Oct 31, 2020 12:45 PMDon’t Ruck us too hard – VB
-
Saturday Oct 31, 2020 03:15 PMVB – Dissecting and Comparing Different Binaries to Malware Analysis