Open Source Malware Lab

2100, Noether
Speaker(s): Robert Simmons
The landscape of open-source malware analysis tools improves every day. A malware analysis lab can be thought of as a set of entry points into a tool chain. The main entry points are a file, a URL, a network traffic capture, and a memory image. This talk is an examination of the major open-source tools that satisfy the analysis requirements for each of these entry points. Each tool's output can potentially feed into another tool for further analysis. The linking of one tool to the next in a tool chain allows one to build a comprehensive automated malware analysis lab using open-source software.


Social Engineering

2100, Lamarr, Friedman
Speaker(s): Emmanuel Goldstein and friends
Since 1994, we've had a lot of fun with this panel, where we not only share stories of some of our most memorable social engineering adventures of years past, but we try and create some new memories live on stage over a good old-fashioned telephone line. For those not familiar, social engineering is the art of getting information out of people, information that you usually have absolutely no business possessing. The ability to gain a stranger's trust, knowing what to ask for, and (perhaps most importantly) how to deal with failing miserably are all vital skills in the pursuit of unauthorized information. This panel is open to suggestion on targets to try, as well as open to new panelists who want to share their stories and skills. Leave your info at the information desk. (Be sure to include your Social Security number and mother's maiden name.)