Dan M. Dan is a broad-spectrum tech professional with 18 years of experiences, 13 in direct results of online Forensics and Incident reaction (DFIR). Dan has actually offered as a contributor, Technical contribute, and exercise contribute for a Fortune 10 Incident impulse services. Contained in this part, Dan supplied supervision toward aim and delivery from the solution also a functioning as a senior incident handler and crucial event lead. Dan’s examination feel consists of service for standard forensic assessment right up through reactions to perform enterprise violation circumstances. In this work Dan led towards the patent advancement of business possibility intelligence sharing technology. Dan has also been a presenter at activities for example VERY FIRST, Evanta, HTCIA, APWG, IEEE and many visitors involvements. ‘” 3_Saturday,,,Workshops,”Octavius 7″,”‘Practical Malware Research: Hands-On'”,”‘Sam Bowne, Devin Duffy-Halseth, Dylan James Smith'”,”‘
Dylan James Smith
Learn how to determine Windows malware products, with a practical number of jobs in a fun, CTF-style surroundings. You can find four quantities of analysis challenges.
1. practical static analysis with file, strings, PEiD, PEview, Dependency Walker, and VirusTotal 2. Simple dynamic research with Process track, Process Explorer, RegShot, and Wireshark 3. state-of-the-art fixed review with IDA Pro Free and Hopper 4. cutting-edge powerful review with Ollydbg and Windbg
One challenges were smooth sufficient for newbies, and later types see challenging sufficient to interest intermediate safety pros. We’ll illustrate the difficulties, talk about the systems and methods, which help participants complete them as required.
All components and difficulties include freely available at , like slide decks, video clip lectures, and practical job instructions. They are going to remain readily available after the workshop closes.
Requirements: person should be acquainted basic C programs. Knowledge about building house windows software, assembly code, and debuggers is useful although not necessary.
Ingredients: players must push a computer (any OS) with VMware or VirtualBox mounted on they. Each person need a 32-bit windowpanes digital maker to operate malware samples. USB sticks with a Windows host 2008 VM will be designed for children to replicate. Some work additionally use a Kali Linux VM to imitate the web, but that’s not required.
Sam Bowne Sam Bowne has been training computer system marketing and security sessions at town school san francisco bay area since 2000. He has got offered talks and hands-on classes at DEFCON, DESIRE, RSA, B-Sides SF, B-Sides LV, and lots of different cons. He’s got a PhD and a CISSP and lots of tees.
Dylan James Smith Dylan James Smith possess aided Sam Bowne with practical courses at DEF CON, RSA, B-Sides LV and various other seminars. He has got worked close to the computer service business since puberty. Today heA?AˆA™s old(er quiver indir.) At this time focused on understanding and coaching “”the cybers.”” ‘” 3_Saturday,,,BHV,”Pisa Room”,”‘Biohackers Die'”,”‘Jeffrey Tibbetts'”,”‘Title: Biohackers Die
Audio speaker: Jeffrey Tibbetts About Jeffrey: Jeffrey Tibbetts is a Biohacker, blogger, human anatomy mod artist and nurse out-of Southern California. HeA?AˆA™s been a collaborator on work which range from insufflatable peptides that continue REM rest to non-Newtonian armor implants. He positioned third inside the Biohack Village Oxytocin Poker event and sang an implant on transhumanist presidential choice Zoltan Istvan. Jeff has the yearly event, A?AˆA?GrindfestA?AˆA? in Tehachapi Ca which New York instances says is for A?AˆA?the actual transhumanists.A?AˆA? He shares their laboratory area with two great pets, Chango and Grumpus, in addition to two simply appropriate kittens, Binky and Mildew.
Sam Bowne
Abstract: within the last ten years, the ways we go after person enhancement are becoming increasingly unpleasant. WeA?AˆA™ve to date come blessed, itA?AˆA™s most likely or even unavoidable that a death arise as a result of biohacking. This presentation talks about the numerous precautions are taken by biohackers to help make our processes and projects as safer as is possible.