This information is from a previous year. Please visit shellcon.io for up to date information.

Keynote - DIY Blue Teaming

"White hat", "black hat", "corporate", "criminal", no matter the context, "red" or offensive security practitioners tend to build their own tools in order to be successful. Weather it's to avoid paying high costs for "enterprise" level solutions, prototype new concepts, or simply "glue" solutions together that are otherwise not designed to play well with others, the accomplished attacker is also a tool smith. "What about the blue team!?" This talk aims to address just that by providing practical solutions to defender tasks that include but are not limited to: IPS/IDS, malware detection and defense, forensics, system hardening, and practical and expedient reverse engineering techniques.

Vyrus may or may not have begun his offensive security training in early childhood through a series of allegedly criminal acts for a hacker collective still active on the internet...

Back to talks..