• If you are citizen of an European Union member nation, you may not use this service unless you are at least 16 years old.

  • You already know Dokkio is an AI-powered assistant to organize & manage your digital files & messages. Very soon, Dokkio will support Outlook as well as One Drive. Check it out today!



Event details


The Kansas city bsides event will be held in concert with Kansas City's first managed cyber warfare exercise called Cyber-Raid


When: Friday, September 17th, 2010 10:00 AM to 5:30 PM

Where: Downtown Marriot Kansas City, MO. Discounted room rates http://cyber-raid.com/cyberraid/

Cost: Free!


Slides from the con

Evil Wifi

IDS Apocalypse

Inside Metasploit

Time Stamps in digital forensics



RSVP: If you would like to attend please email your name to bsideskc@gmail.com or edit the wiki below.


Invite your friends by posting this on Twitter: "#BSidesKC September 17th 2010: BBQ, beer and security fun! http://bit.ly/BSidesKC"


Call For Papers (CFP) is closed. 




Please email bsideskc@gmail.com for information.


Huge thanks to our sponsors!!!!!










Friday September 17


Track 1
9:000 AM - 10:00 AM
Brief remarks, thanks sponsors etc.
10:00 AM - 11:00 AM

The FBI's response to a computer intrusion.

This presentation will cover the FBI's response to a computer intrusion incident and what to expect.  A part of the presentation will cover intrusions as they relates to the financial industry.  The presentation will also cover the latest cyber trends and techniques used in cyber crimes.  Agents will include examples of local cyber investigations and their outcomes.


11:000 AM - Noon


William Metcalf

 I Survived IDS Apocolypse '10 and All I Got Was This Stupid T-Shirt.

Noon - 1:00 PM

Dave Hull  

 I see what you did there

 Digital forensic practitioners have long included file system time stamps in their analysis. Now Kristinn Gudjonsson's log2timeline has expanded this technique, giving us new evidence to analyze, even when perps are savvy enough to stomp the file system's time stamps.

1:00 PM - 1:30 PM
    Break for lunch
1:30 PM - 2:30 PM

 Daniel J Molina @DJMolina  

Seven Ways IT is enabling Cybercrime

2:30 PM - 3:30 PM


Evil WiFi: Subversive Wireless & Self Defense

3:30 PM - 4:30 PM

 Bill Swearingen  

 Automating Metasploit: Pwning hosts while you sleep

4:30 PM - 5:30 P


 Things that go bump in the Evite 

 A Hijacked Evite can not only ruin your party but it can p@wn your friends.  Clickjacking, Unfriending, and Exploiting! Oh, my! You're not in Kansas Anymore

5:30 PM - Whenever     Drinks/Closing remarks






  • John Winger bsideskc at gmail dot com
  • James Costello james at genesyswave dot com 




  • John Winger
  • James Costello 
  • jur1st 
  • Dave Hull
  • Cory Kennedy


Participants (aka Campers)


John Winger
@bsideskc / bsideskc at gmail.com
James Costello  @n0b0d4 / james at genesyswave dot com   


@jur1st / jur1st at cowtowncomputercongress dot org   
Jerry Wilstrand    
Marc Westbrock
Ryan Simpson    
hevnsnt  hevnsnt@cowtowncomputercongress.org   
Dave Hull
@davehull / dpsides at trustedsignal dot com


Kevin Riggins @kriggins / kriggins at infosecramblings dot com  
Noah Dunker @ax0n / ax0n (at) h-i-r.net


Jerry Gamblin @jgambln


Weston George @westongeorge  
Brian Sak @briansak  
Mark Butler @mbinc / mbutler at ioactive dot com


















Task List

(please -cross out- when it's done)




Wifi Provided by CIsco

Projector, White Boards




Streaming or Stickam or Skype







Tables and chairs



Tags for flickr, delicious, ma.gnolia, technorati etc.

Please use the tag #BSidesKC for content related to this event


Who's blogging?


Comments (0)

You don't have permission to comment on this page.