Loading…
BSidesSLC has ended

Sign up or log in to bookmark your favorites and sync them to your phone or calendar.

Training [clear filter]
Thursday, February 21
 

10:00am PST

Ham Radio Technician Study Session
Come study and have your questions answered as you prepare to take the FCC amateur radio Technician exam.  Open session with instructors to help you prepare for the exam.

Speakers

Thursday February 21, 2019 10:00am - 2:00pm PST
Lone Peak

10:00am PST

Basic Memory Corruption: Introduction to Stack-based Exploitation
This is a course on basic stack-based exploitation. We’ll begin with a review of how memory management works within an IA32 architecture, before diving headfirst into classic attacks such as buffer overflows, format string exploits, and DTOR/GOT overwrites. We’ll also learn how to write shellcode and bypass non-executable stacks using return-to-libc attacks. Finally, we’ll go over some basic mitigations to the techniques we’ve learned. This is meant to be a foundational course that can serve as jumping off point for students wishing to learn more advanced topics such as ROP chains, heap sprays, use after free, and defeating ASLR. Students should each bring a laptop equipped with VMWare or VirtualBox and provisioned with at least 25GB of disk space and 8GB of memory. Prior exposure to C programming, assembly, and basic memory management concepts are highly recommended in order to benefit from this course.

Speakers
avatar for Gabriel Ryan

Gabriel Ryan

Gabriel Ryan is a researcher and security consultant with a passion for wireless and infrastructure testing. He currently serves as a Principal Consultant for Mandiant, a FireEye company, supporting their Red Team practice in Denver.Some of Gabriel’s most recent work includes the... Read More →


Thursday February 21, 2019 10:00am - 6:00pm PST
Sego Lilly D

10:00am PST

BSidesSLC Crypto Puzzler
Come join us and play the BSides 2019 Crypto Puzzler, a quest-driven web-based game that both trains you for and challenges you with cryptography puzzles. Select from multiple character classes, earn gold to buy health and mana potions, and participate in a series of quests as you level up your code breaking skills. There are optional training quests that teach you the cryptographic concepts you'll need, and you can even use mana to get hints along the way.

Speakers
avatar for Jeremy Pruitt

Jeremy Pruitt

Jeremy has been passionate about infosec since long before he attended his first security conference at Defcon 8. He spent the past 10+ years leading teams focused on emerging technologies and infrastructure automation and currently leads the team at Tesla responsible for container... Read More →


Thursday February 21, 2019 10:00am - 6:00pm PST
Sego Lily B

10:00am PST

HackQuest: CTF Crash Course
Quickly becoming an industry staple, CTF events can now be found at any major event and reward those with a multi-faceted skill set. Their popularity is no accident: the same skills and approaches to problem-solving that predict a participant's success, are often critical for a successful career in information security. In this course attendees will: (1) Audit Source Code, Binaries, & Web Applications for Vulnerabilities, (2) Dive into the building blocks for developing working exploits for these vulnerabilities (3) Understand how to quickly triage files for forensics artifacts & break weak crypto, and (4) Test your skills under pressure, competing against other students in live challenges! Take your fundamentals from zero-to-hero in this hands-on bootcamp, and prepare yourself to dominate the BSides CTF!

Speakers
avatar for Kevin Lustic

Kevin Lustic

Kevin is an Information Security researcher in Utah, leading the Adobe Red Team in performing offensive security testing against Adobe's Digital Experience SaaS offerings. Prior to joining Adobe, Kevin spent five years in the Intelligence Community as a global network vulnerability... Read More →


Thursday February 21, 2019 10:00am - 6:00pm PST
Sego Lily C

10:00am PST

Malware Traffic Analysis
This workshop provides a foundation for investigating packet captures (pcaps) of malicious network traffic. The workshop begins with basic investigation concepts, setting up Wireshark, and identifying hosts and users in network traffic. Participants then learn characteristics of malware infections and other suspicious network traffic. The workshop covers techniques to assess the root cause of an infection and determine false positive alerts. This training concludes with an evaluation designed to give participants experience in writing an incident report.

Speakers
avatar for Brad Duncan

Brad Duncan

Based in Texas, Brad Duncan specializes in traffic analysis of malware and suspicious network activity. After more than 21 years of classified intelligence work for the US Air Force, Brad transitioned to cyber security in 2010. He is currently a Threat Intelligence Analyst for Palo... Read More →


Thursday February 21, 2019 10:00am - 6:00pm PST
Sego Lilly E

3:00pm PST

Ham Radio Licensing Exam Session
Interested in experimenting with wifi and other wireless protocols?  Using the airwaves to communicate locally and internationally without cellphones or the internet? Come get licensed as an Technician class amateur radio operator or upgrade your existing license. Exam fee is $15, bring your photo id. Study at https://hamstudy.org/ See what to bring here: http://www.arrl.org/what-to-bring-to-an-exam-session

Speakers

Thursday February 21, 2019 3:00pm - 6:00pm PST
Lone Peak