„“Tick, Tick, Tick. Boom! You Are Dead.““ A?AˆA” Technical & the FTC


""Tick, Tick, Tick. Boom! You Are Dead."" A?AˆA” Technical & the FTC

Whitney Merrill Confidentiality, eCommerce & Customers Defense Advice, Electronic Arts

This chat covers dynamic index DACLs in depth, the ""misconfiguration taxonomy"", and enumeration/analysis with BloodHound's newly circulated element set. We will manage the abuse of offer DACL misconfigurations for the purpose of site legal rights level, including common misconfigurations encountered in the open. We shall after that manage ways to building AD DACL backdoors, including ways to avert existing detections, and can consider with protective mitigation/detection approaches for every thing explained.

Andy Robbins As a Red personnel lead, Andy Robbins possess done entrance examinations and red-colored staff tests for several lot of money 100 commercial consumers, also federal and state organizations. Andy introduced his study on a vital drawback from inside the ACH installment handling regular in 2014 at DerbyCon while the ISC2 industry Congress, and also spoken at additional conferences such as DEF CON , BSidesLV, ekoparty, ISSA Foreign, and Paranoia Conf in Oslo. He has got a passion for offensive development and yellow professionals tradecraft, and helps to develop and train the ""Adaptive yellow staff strategies"" training course at BlackHat American.

Will Schroeder Will Schroeder are an offensive professional and purple teamer. He or she is a co-founder of Empire/Empyre, BloodHound, and also the Veil-Framework, developed PowerView and PowerUp, was a dynamic designer throughout the PowerSploit venture, and is also a Microsoft PowerShell MVP. He has displayed at some conferences, such as DEF CON , DerbyCon, Troopers, BlueHat Israel, and differing safety BSides.

Terrell McSweeny Administrator, Government Trade Commission

The Federal Trade fee is actually a law enforcement company tasked with protecting consumers from unfair and deceitful practices. Protecting people on the web and from worst technical is nothing newer when it comes down to FTC. We're going to take a peek right back at what the FTC is doing when DEF CON very first started in 1993, and what we should've started carrying out since. We're going to discuss enforcement behavior regarding modem hijacking, FUD advertising, identity theft & fraud, plus familiarizes you with Dewie the e-Turtle. Excited, we are going to speak about the FTC's potential future shielding consumers' privacy and data safety and what you can do to simply help.

Whitney Merrill Whitney Merrill are a hacker, ex-fed, and attorney. She actually is presently a privacy attorney at Electronic Arts (EA), as well as in the lady time, she operates the Crypto & Privacy town (arrive state heya!). Not too long ago, she supported the girl country as a lawyer at the Federal Trade Commission in which she worked on many consumer cover matters including facts protection, privacy, and deceitful advertising. Whitney gotten the woman J.D. and master's degree in desktop research from University of Illinois at Urbana-Champaign.

Terrell McSweeny Terrell McSweeny serves as a Commissioner for the Federal Trade fee. This year signifies the woman 4th time at DEF CON . Regarding tech dilemmas, administrator McSweeny possess concentrated on the useful part scientists and hackers can enjoy shielding consumer information safety and privacy. She opposes terrible coverage and legislative proposals like required backdoors in addition to criminalization of hacking and thinks that enforcers just like the FTC should make use of the specialist community to protect buyers. She desires enterprises to make usage of protection by-design, privacy by-design and facts ethics build - but understands that, when you look at the absence of legislation, administration and data are the just way of holding enterprises in charge of your choices they generate for the ways in which they keep and make use of consumer facts.

Visited the HHV and learn the abilities needed for desoldering and reclaiming PCB equipment. If you're already knowledgeable about this technique, after that take a moment to brush through to your talent. Each session was about one hour long and can cover: introduction, protection, standard vs. RoHS practices, then hands on ingredient data recovery. These meeting tend to be first arrive initial supported in the course of beginning, therefore appear very early to get your own discover in! No knowledge or waplog nedir devices expected!'" 2_monday,,,IOT,"important competition Area","'IoT - the surprise that helps to keep in offering'","'Alex ""Jay"" Balan '","'