Sign up or log in to bookmark your favorites and sync them to your phone or calendar.
Registration opens 18:00 - 18:29
44CON LONDON 2015...
Stegosploit - Drive-by Browser Exploits using only Images 18:45 - 19:44
Get in the Ring0 - Understanding Windows drivers 19:45 - 20:44
Film: Hackers 22:00 - 23:59
How to drive a malware analyst crazy 19:45 - 20:44
Registration opens 08:30 - 09:14
Smart Muttering; a story and toolset for smart meter platform 09:30 - 10:29
Break 10:30 - 10:59
Is there an EFI monster inside your apple? 11:00 - 11:59
Lunch 12:00 - 13:29
DDoS mitigation EPIC FAIL collection 13:30 - 14:29
reverse reverse engineering 14:30 - 15:29
44CON LONDON 2015 afternoon tea
Inside Terracotta VPN 16:00 - 16:59
Barbarians At The Gate(way): An Examination Of The Attacker's... 17:00 - 17:59
44CON LONDON 2015 Gin O'Clock 18:00 - 18:59
44CON LONDON 2015 Evening Session 19:00 - 19:34
Exploiting 64-bit IE on Windows 8.1 - The Pwn2Own Case St... 19:35 - 20:29
Playing with Fire: Attacking the FireEye MPS 20:30 - 21:29
44CON LONDON 2015 Pub Quiz 21:30 - 22:29
Hunted 22:30 - 23:30
Attacking VxWorks: from Stone Age to Interstellar 09:30 - 10:29
Meterpreter: Understanding the New Shiny 11:00 - 11:59
Old Dog, New Tricks: Forensics With PowerShell 13:30 - 14:29
Dark Fairytales from a Phisherman (Vol.II) 14:30 - 15:29
A Trek to the Emerald City: Ring -1 Based AV 16:00 - 16:59
Reverse engineering and exploiting font rasterizers: the OpenT... 17:00 - 17:59
Jtagsploitation: 5 wires, 5 ways to root 19:35 - 20:29
Film: Sneakers 20:30 - 22:29
Film: Blade Runner - Director's Cut 10 22:30 - 11 00:59
Introduction to Reverse Engineering C++ 10:30 - 12:29
Lunch 12:30 - 13:29
Analyzing Malicious Office Documents 13:30 - 15:29
Indicators of Compromise: From malware analysis to eradication 16:00 - 17:59
The IOT Evening Workshop 19:35 - 22:59
Software Defined Networking (SDN) Security 09:30 - 10:29
Break 10:30 - 11:29
Going AUTH the Rails on a Crazy Train 11:30 - 12:29
Lunch 12:30 - 13:59
Windows 10: 2 Steps Forward, 1 Step Back 14:00 - 14:59
Responsible disclosure: who cares? 15:00 - 15:59
44CON LONDON 2015 Closing 16:00 - 16:30
Bar open until late 01:00 - 04:00
15-Minute Linux Incident Response Live Analysis 09:30 - 10:29
Forging the USB armory 11:30 - 12:29
MITMf: Bringing Man-In-The-Middle attacks to the 21'st century 14:00 - 14:59
Hunting Asynchronous Vulnerabilities 15:00 - 15:59
Hands-on JTAG for fun and root shells 11:30 - 13:29
Lunch 13:30 - 14:29
Old Dog, New Tricks: Forensics With PowerShell 14:30 - 15:59