Feb 4, 2017

Location

Dynetics, Inc (Solutions Complex building)
1004 Explorer Blvd, Huntsville, AL 35805

Sponsors


Keynote Speaker

Dave Chronister     


See you in 2018!

Schedule

Track 1Track 2
7:30 am Volunteers Arrive!

8:00 am Check-in & coffee!

8:30 am Opening Keynote

Dave Chronister —

9:15 am Break!

9:30 am Ain't Nobody Got Time For That! AKA Dynamic Malware Analysis for the Overworked Analyst

Edmund Brumaghin —

How to fix stupid - Methodologies to effectively stop users from clicking!

Joshua Crumbaugh —

10:15 am Something Died Inside Your Git Repo: Recognizing the Smell of Insecure Code

Cliff Smith —

Zigbee - Control Your World Technology and Wireless Remote Sensing Technology

Dr. Charline F. Nixon and Bill Brown, Rocket Scientist —

11:00 am How to Build Products Using Open Platform Firmware

Brian Richardson —

11:45 am Lunch (Free Pizza)!

12:30 pm All Your Door Belong To Me - Attacking Physical Access Systems

Valerie Thomas —

FTFY: The Addictive Game of Mending Malware Misbehavior with flare-qdb and Vivisect

Michael Bailey —

1:15 pm Break!

1:30 pm Kick starting an application security program with limited experience.

Timothy De Block —

Machine Augmented Analysis

Anthony Aragues —

2:15 pm A worm in the Apple - Examining OSX malware

Wes Widner —

Vulnerability hunting in Access Controls

Bobby Kuzma —

3:00 pm Break!

3:15 pm Put up a CryptoWall and Locky the key

Erich Kron —

OSINT

Joe Gray —

4:00 pm Physical Exploitation and Red Teaming

Brad Horton & Jeff Testman, US Army

4:45 pm BSides Closeout

Paul Coggin —

 

About


BSides Huntsville is an annual security conference located in The Rocket City. 2017 will be its 4th consecutive year! Previous years were well received and videos are available from IronGeek. All BSides teams are volunteers working hard to put together a productive and enjoyable conference.

Please make time to visit the sponsors between talks.

 High Res Logo

The Huntsville metro area has the highest per capita concentration of engineers in the country. We consistently rank near the top for annual lists of best cities. It was rockets from Huntsville that first put man on the moon. For 2015 we were #1 Best City for Engineers. For 2016, we were ranked #1 Best Affordable Places to Live.

If your business is tech, Huntsville is a great place to be. If you are not sure where to start, we have non-profits eager to help.

If this is your first time visiting Huntsville, we encourage you to tour the city and one of Alabama's top destinations: The U.S. Space & Rocket Center. It is about 5 miles away from the conference at Dynetics (Solutions Complex building). Shopping and restaurants are 4 miles away at Bridge Street Town Centre.

Contact



Archives


2014»

View at IronGeek


Sponsors

Calhoun Community College
University of Alabama in Huntsville
North Alabama ISSA
Parameter Security
IronGeek

Feb 8, 2014

Intro

Dr. Rayford Vaughn

Building The Future of P-12 Cyber Education

Dr. Casey Wardynski

Cyber Security Program At UAH

Russ Ward

1337 in the Library: Obtaining your information security education on the cheap

Adrian Crenshaw

Zero to Hero: Breaking into the security Field

Jeremy Conway

Certifications in Cybersecurity

Adam Wade Lewis

Trojans – The Forgotten Enemy

Dave Chronister

The Amazing Cybermen

Ben McGee

Why you are pwn’d and don’t know it!

Ben Miller

Cyber Security, What's The Fuss?

Deborah William

HTTPS: Now You See Me

Tim Mullican

Introduction to hacking with PowerShell

Scott Busby

All You Base Still Belong To Us: Physical Penetration Testing Tales From The Trenches

Valerie Thomas

Digital Energy BPT

Paul Coggin

2015»

View at IronGeek


Sponsors

Dynetics
Dragos Security
CYBATI
SudoSecure
IronGeek
TrustedSec
Binary Defense Systems
mountainsec
Parameter Security
Hacker University
Core Security
North Alabama ISSA
CyberProtex
H2L Solutions
Cyber Symbiotics

Classes: Feb 6th 2015

CybatiWorks "Mission: Control Systems"

Matt Luallen

Intro to Threat Intelligence

Robert M. Lee


Track 1: Feb 7th 2015

Keynote

Robert M. Lee

Hijacking Label Switched Networks in the Cloud

Paul Coggin

Real World Threats

Russ Ward

Lock picking, but bypass is easier

Adrian Crenshaw

The Dark Side Of PowerShell

Joshua Smith

Give me your data!

Dave Chronister

Gods and Monsters: A tale of the dark side of the web

Aamir Lakhani

Sensory Perception: A DIY approach to building a sensor network

Tim Fowler

Reverse Engineering Network Device APIs

Dan Nagle

Track 2: Feb 7th 2015

So Easy A High-Schooler Could Do It: Static malware analysis using function-level signatures

James Brahm, Matthew Rogers, and Morgan Wagner

Pragmatic Cloud Security: What InfoSec Practitioners Have Been Waiting For

Josh Danielson and Arthur Andrieu

Developing and Open Source Threat Intelligence Program

Edward McCabe

Applying User-Centered Design Techniques for Augmenting Human Perception in Cyber Warfare

Frank Cohee

The Great Trojan Demo

Ben Miller

A Virtual SCADA Laboratory for Cybersecurity Pedagogy and Research

Zach Thornton

PlagueScanner: An Open Source Multiple AV Scanner Framework

Utkonos

2016»

View at IronGeek


Sponsors


Dynetics
TrustedSec
Binary Defense Systems
Adrian Crenshaw
Tactical Edge
Pluralsight
Evident
National Cyber Summit

Track 1: 9:00 am

Opening Keynote

Jack Daniel

Track 1: 10:00 am

Slaying Rogue Access Points with Python and Cheap Hardware

Gabriel Ryan

Track 1: 11:00 am

Web shells as a covert channel

Joe Vest

Track 1: 1:00 pm

Afternoon Keynote: TSA Luggage Locks: Details, Flaws & Making The Best Of A Bad Lock

Adrian Crenshaw

Track 1: 2:00 pm

At the mountains of malware: Lessons learned from analyzing terabytes of malware

Wes Widner

Track 1: 3:00 pm

Exploiting first hop protocols to own the network.

Paul Coggin

Track 1: 4:00 pm

History of WRT and Wireless Mesh protocols.

Alex Kot

Track 1: 5:00 pm

BSides Closeout

Paul Coggin

Track 2: 10:00 am

Hacking Peoples' Lives with Google Sync

Shawn Edwards, Sean Hopkins

Track 2: 11:00 am

A practical approach to deploying Data Loss Prevention

Jon Damratoski

Track 2: 2:00 pm

Threat Modeling the Minecraft Way

Jarred White

Track 2: 3:00 pm

Privacy 101: An introduction with Tradecraft Light

Leonard Isham

2017»


Sponsors


Dynetics
Adrian Crenshaw
TrustedSec
Parameter Security
Securicon

Track 1: 8:30 am

Opening Keynote

Dave Chronister

Track 1: 9:30 am

Ain't Nobody Got Time For That! AKA Dynamic Malware Analysis for the Overworked Analyst

Edmund Brumaghin

Track 1: 10:15 am

Something Died Inside Your Git Repo: Recognizing the Smell of Insecure Code

Cliff Smith

Track 1: 11:00 am

How to Build Products Using Open Platform Firmware

Slidedeck

Brian Richardson

Track 1: 12:30 pm

All Your Door Belong To Me - Attacking Physical Access Systems

Valerie Thomas

Track 1: 1:30 pm

Kick starting an application security program with limited experience.

Slidedeck

Timothy De Block

Track 1: 2:15 pm

A worm in the Apple - Examining OSX malware

Slidedeck

Wes Widner

Track 1: 3:15 pm

Put up a CryptoWall and Locky the key

Erich Kron

Track 1: 4:00 pm

Physical Exploitation and Red Teaming

Brad Horton & Jeff Testman, US Army

Track 1: 4:45 pm

BSides Closeout

Paul Coggin

Track 2: 9:30 am

How to fix stupid - Methodologies to effectively stop users from clicking!

Slidedeck

Joshua Crumbaugh

Track 2: 10:15 am

Zigbee - Control Your World Technology and Wireless Remote Sensing Technology

Dr. Charline F. Nixon and Bill Brown, Rocket Scientist

Track 2: 12:30 pm

FTFY: The Addictive Game of Mending Malware Misbehavior with flare-qdb and Vivisect

Slidedeck

Michael Bailey

Track 2: 1:30 pm

Machine Augmented Analysis

Anthony Aragues

Track 2: 2:15 pm

Vulnerability hunting in Access Controls

Bobby Kuzma

Track 2: 3:15 pm

OSINT

Joe Gray