-
Opening Remarks
- BSides Manchester Crew
-
HTTP Desync Attacks:
Smashing Into The Cell Next Door
- James Kettle
-
Fe-fi-fo-FIM, I Smell The
Monitoring Of An Elastic Stack!
- Brett Calderbank
-
From Builder To Breaker
- Gavin Johnson-Lynn
-
Increasing Security: New Recruits
- Rachael Stos-Gale
-
Quantum Computers And Cryptography
- Imran Shaheem
-
Navigating The Red Forest
- Derek Price
-
Hacking RF: Breaking What We Can’t See
- Grant Colgan
-
Introduction To OWASP Juice Shop
- Tim Corless-Carter
-
Phishing Overboard
- Elise Manna
-
Getting Splunky With Lateral Movement
Attack, Detect And Evade
- Ross Bingham and Tom MacDonald
-
a8n-retrospective/introspective:
A Minor Exercise In Ego...
- Steve “autom8on” Wilson
-
Osint + Python: Extracting Information
From Tor Network And Darkweb
- Jose Manuel Ortega
-
Metadata Piggybacking:
A Look Into Open Graph Abuse
- Charlie Hosier
-
Malicious Behavior Detection Using WMI
- Ben Lister
-
The Perfect Place For A Backdoor (VM Hub 3.0)
- Balazs Bucsay
-
Exposing AWS With FlAWS
- Mike Lehan
-
Threat Modelling And Black Swans - Predicting
The Unpredictable By Thinking Like An Attacker
- Nick Dunn
-
1 Year On, It's Not All About GDPR. An Intro
To The NIS Directive; The Silent One...
- Romeo Embolo
-
Offensive Development:
How To DevOps Your Red Team
- Dominic Chell
-
Profiling The Attacker: Using
Natural Language Processing To Predict Crime
- James Stevenson
-
Nice Vulnerability, I Don't Care
- James Carter
-
Protecting Kids Online:
Are We Doing Enough
- Katie Colgan
-
What Colour Is Your Hat?
- Megan Robertson
-
S-a-a-a-S-Security As An Actual Service
- Samantha Humphries
-
Making A Subset Difference:
The Crypto In AACS
- Rael Sasiak-Rushby
-
Do I Need To Change The OSS In My Product?
Making Informed Decisions.
- Alex Burrage
-
Crash, Burn, Report
- Scott Helme
-
I Like Big Bots
- James Maude
-
Rage Against The FUD
- The Beer Farmers
-
Fun With Frida!
- James Williams
-
Losing Battles But Winning Wars
- Phil Lynch
-
Closing Remarks
- BSides Manchester Crew