Devin Duffy-Halseth: I really love hearing about various malware combat vectors and APT marketing
Dan M. Dan is actually a broad-spectrum technology pro with 18 years of feel, 13 in direct show of Digital Forensics and event Response (DFIR). Dan has supported as a contributor, Specialized Lead, and Practice Lead for a lot of money 10 Incident Response provider. In this role, Dan supplied supervision on objectives and distribution with the service plus a functioning as a senior event handler and critical event lead. Dan’s research knowledge includes support for basic forensic review right up through answers to perform business breach situations. With this services Dan led towards the patent continuing growth of enterprise possibility intelligence revealing technologies. Dan is a presenter at occasions including VERY FIRST, Evanta, HTCIA, APWG, IEEE and lots of customer engagements. ‘” 3_Saturday,,,Workshops,”Octavius 7″,”‘Practical Spyware Testing: Hands-On'”,”‘Sam Bowne, Devin Duffy-Halseth, Dylan James Smith'”,”‘
Dylan James Smith
Discover ways to review house windows malware trials, with a hands-on number of works in a fun, CTF-style conditions. You will find four levels of investigations challenges.
1. Simple static investigations with document, strings, PEiD, PEview, addiction Walker, and VirusTotal 2. Basic dynamic evaluation with procedure Monitor, techniques Explorer, RegShot, and Wireshark 3. state-of-the-art fixed assessment with IDA Pro 100 % free and Hopper 4. complex dynamic analysis with Ollydbg and Windbg
The initial challenges were smooth adequate for newbies, additionally the future types become tough adequate to attention advanced protection specialists. We will exhibit the difficulties, discuss the engineering and methods, and help participants complete them as required.
All resources and difficulties are free at , such as slide porches reveal tanışma sitesi, videos lectures, and hands-on project training. They’ll stay readily available following the workshop ends up.
Requirements: Participant should really be knowledgeable about standard C development. Knowledge about creating windowpanes applications, construction words, and debuggers is effective although not required.
Supplies: Participants must bring a laptop (any OS) with VMware or VirtualBox attached to it. Each participant will be needing a 32-bit Microsoft windows digital device to operate malware examples. USB sticks with a Windows host 2008 VM will likely be available for people to copy. Some jobs additionally use a Kali Linux VM to replicate the Internet, but that is not necessary.
Sam Bowne Sam Bowne has become training computers networking and security classes at town school San Francisco since 2000. He has got provided speaks and hands-on courses at DEFCON, DESIRE, RSA, B-Sides SF, B-Sides LV, and several some other drawbacks. He has got a PhD and a CISSP and many tees.
Dylan James Smith Dylan James Smith enjoys assisted Sam Bowne with practical classes at DEF CON, RSA, B-Sides LV along with other conferences. He has got worked close by the computer help markets since adolescence. Today heA?AˆA™s old(er.) Presently focused on understanding and coaching “”the cybers.”” ‘” 3_Saturday,,,BHV,”Pisa Room”,”‘Biohackers Die'”,”‘Jeffrey Tibbetts'”,”‘Title: Biohackers Die
Speaker: Jeffrey Tibbetts About Jeffrey: Jeffrey Tibbetts was a Biohacker, blogger, muscles mod artist and nurse regarding Southern California. HeA?AˆA™s been a collaborator on work starting from insufflatable peptides that increase REM rest to non-Newtonian armor implants. The guy placed 3rd when you look at the Biohack community Oxytocin Poker competition and performed an implant on transhumanist presidential choice Zoltan Istvan. Jeff has the yearly show, A?AˆA?GrindfestA?AˆA? in Tehachapi Ca which ny days shows is actually for A?AˆA?the actual transhumanists.A?AˆA? He shares their laboratory space with two fantastic pets, Chango and Grumpus, in addition to two just appropriate kittens, Binky and Mildew.
Sam Bowne
Abstract: during the last decade, the ways we pursue human improvement became more and more unpleasant. WeA?AˆA™ve up to now started lucky, neverthelessA?AˆA™s probably if you don’t unavoidable that a death arise because biohacking. This speech discusses the numerous safety measures becoming taken by biohackers in order to make all of our methods and projects as safe as you possibly can.