Category Archives: Uncategorized

Preliminary Lineup Released!

We’re proud to announce our preliminary lineup for ToorCon San Diego 16. We’ll be posting additional talks and more details over the next week as we finish up the Call for Papers. Also, our Workshops are selling fast so don’t wait too long to register!

Advanced ANDROID & iOS Exploitation Workshop
Instructor: Aditya Gupta, Attify Security

Software Defined Radio Workshop
Instructor: Michael Ossmann, Great Scott Gadgets

MS-SQL Post-exploitation In-depth Workshop
Instructors: Rob Beck & Noelle Murata, Neohapsis

ToorCon 15 Reception

Our reception tonight is at the pool deck on the 3rd Floor. Follow the signs for the Ivory Room. Saturday and Sunday’s events will be on the Second Floor. You’ll need to use the elevators to get up. We’ll see you all soon!

Preliminary Lineup Announced!

We just announced our preliminary lineup of talks for ToorCon 15, go check it out!


Peach Fuzzer: Effective Fuzzing – New!
Michael Eddington

Advanced Mobile Hacking Workshop
Aditya Gupta & Subho Halder

3D Printing Workshop

Software Defined Radio Workshop – Sold Out!
Michael Ossmann

Deep Knowledge Seminars

Defeating Spread Spectrum Communication with Software Defined Radio
Michael Ossmann

Firmware attacks, Copernicus, and You
Xeno Kovah


BREACHing SSL, one byte at a time
@PradoAngelo & @GluckYoel

Multiplexed Wired Attack Surfaces
Michael Ossmann & Kos

x86 Rewriting: Beating Binaries into Submission

Traffic Interception and Remote Mobile Phone Cloning with a Compromised CDMA Femtocell
Doug DePerry & Andrew Rahimi

The Outer Limits: Hacking a Smart TV
Aaron Grattafiori

So you ZMAP’d the internet. Now what?
Paul McMillan

Data Leaking in Next Generation Cars
Christie Dudley / Valkyrie

Clowntown express, interesting bugs and running a bug bounty program
Collin Greene

Are you a Janitor or a Cleaner?
John “geekspeed” Stauffacher / Matthew “mattrix” Hoy

I Can Haz DarkNet & MeshNet Best Practices? : Helping making better decentralized networks, one beer at a time.
Drew Redshift Porter

Applications of Artificial Intelligence in Ad-Hoc Static Code Analysis

Let the Hackers Learn
John Irwin

TPMS Report
Jared Boone

Death by Numbers: Scalable Mobile Malware Heuristics
David Shaw

Managing your pentest data with Kvasir

Rickrolling your neighbors with Google Chromecast
Dan “AltF4” Petro

Making Attacks Go Backwards

Hacking and Reverse Engineering Industrial Control Systems with DOSBox

Bypassing FireEye
AverageJoe / Joe Giron

PeachFuzz Workshop Announced!

Fuzzing is the technique of finding flaws and vulnerabilities in solutions through the mutation of data. This technique is a preferred way of both defenders and attackers to discover vulnerabilities in a system. The Peach Fuzzing Framework is the most widely used fuzzing system. Researchers, corporations, and governments use Peach to find vulnerabilities in systems. Peach was designed to fuzz any type of data consumer from servers to embedded systems. Peach is a cross platform system running on Windows, Linux, and OS X.

This class will focus on the latest release of Peach 3 and is taught by Michael Eddington the creator of Peach.

You will learn to create both dumb and smart fuzzers and apply these concepts and tools to their unique environment. The course is designed to be student-centric, hands-on, and lab intensive. On day one the Peach Fuzzing Framework is introduced from a practitioner’s perspective. You will learn how to use Peach to fuzz a variety of targets including network clients & servers, file consumers, and API interfaces such as COM. On the second day you will develop and run fuzzers against different targets mutating data and collecting crashes.

TC:SD Peach Fuzzing + Seminar

Call For Papers Announced!

It’s that time of year again! ToorCon 15 is coming so get your code finished and submit a talk this time around. We’re letting you decide if you want to be a part of our 50-minute talks on Saturday, 20-minute talks on Sunday, and 75-minute talks for our Deep Knowledge Seminars on Friday depending on how much time you need to present your new ideas and techniques. We evaluate our submissions in the order that they’re received so submit your talk before time runs out!


Please no vendor pitches or talks on old subjects. We try to keep ToorCon highly technical so please only submit talks on original research that isn’t more than 12 months old. Talks that are submitted for a 50-minute or 75-minute slot may be asked to be reduced to 20-minutes if space on the lineup is limited. You must notify ToorCon if you are in any way unable to make it to your talk after being accepted.

Reasons to Submit

– The honor and prestige of knowing you’ve made your contribution to hacker society
– A free ticket for yourself and a friend
– Invitations to all of the parties and special events
– Free admission to the Friday seminars (as space is available)
– Compensation is provided to 2-day workshop trainers, please email for details

ToorCon San Diego 15 Call For Papers!

Seminar and Workshop Reg

Hey gang, we are pushing Seminar and Workshop Reg to Aug 11th since we still need to firm up our program. We will make an announcement once we have it up. Thanks for patients!

-the ToorCon Cr3w