Ringzer0 BOOTSTRAP25 Austin

To see our schedule with full functionality, like timezone conversion and personal scheduling, please enable JavaScript and go here.
No sessions on Tuesday, March 18, 2025.
No sessions on Wednesday, March 19, 2025.
No sessions on Thursday, March 20, 2025.
09:00
09:00
480min
FREE Blackhoodie 1 Day Training: Compiler Internals for Security Engineers
Marion Marschalek

Blackhoodie is a free, women only reverse engineering workshop and community. This FREE 1 day class introduces students to security relevant aspects of compiler internals, and with guided examples enables students to perform their own code modifications through a compiler.

TCC📍Room 1.124
17:00
17:00
60min
Make your way to the San Jac Saloon for the BOOTLOADER Mixer Evening
TCC📍Room 1.124
18:30
18:30
10min
BOOTLOADER Mixer Evening @ San Jac Saloon, Doors Open
San Jac Saloon
19:00
19:00
45min
From 0 to Millions: Protecting Against AitM Phishing at Scale
Jacob Torrey

Phishing has evolved to bypass MFA using reverse proxies, while traditional defenses like blocklists are aging and evaded. This talk introduces Cloned Site Canarytoken, which alerts you to phishing attempts before credentials are entered, with real-world attack insights and response strategies.

San Jac Saloon
19:45
19:45
10min
A few words from Saumil Shah, Ringzer0
San Jac Saloon
20:00
20:00
45min
Design To Exploit: A Dive Into EV Charger Security
Jonathan Andersson, Connor Ford

This talk examines EVSE security through an analysis of 8 EV chargers and findings from Pwn2Own Automotive 2024 and 2025. It covers typical charger design, common attack surfaces, and the process of researching an EV charger from scratch, including a successfully exploited vulnerability.

San Jac Saloon
20:45
20:45
0min
BOOTLOADER Mixer Evening Continues
San Jac Saloon
09:00
09:00
10min
Welcome to BOOTSTRAP25, by Saumil Shah, Ringzer0
TCC📍Auditorium 1.110
09:15
09:15
45min
KEYNOTE: Security Products Don't Have To Suck
Haroon Meer

It has been a decade and a half since FX famously quipped that by quality level, "we’d be better off defending our networks with Microsoft Word than a Checkpoint firewall."

Security products are still pretty terrible - but why? From usability to vulnerability counts - we still fare pretty poorly. This keynote examines why this keeps happening and plots a path to a different world.

TCC📍Auditorium 1.110
10:00
10:00
45min
Musings from Decades of Linux Kernel Security Research
Joshua J. Drake

The Linux Kernel underpins billions of modern computers and devices ranging across almost every industry. Arguably, its ubiquity places it firmly into the category of critical infrastructure. But, is it secure? In this presentation, Josh will explore this question in detail. He compares and contrasts the security investments being made within the Linux Kernel developer ecosystem with a typical software development life cycle used in a professional development organization. Additionally, he will share a case study of a public and widely exposed security issue that remains unfixed. Finally, he will make recommendations that can reduce the risk posed by running the Linux Kernel.

TCC📍Auditorium 1.110
10:45
10:45
15min
15min Coffee Break
TCC📍Auditorium 1.110
11:00
11:00
90min
WORKSHOP: Blue2thprinting: identifying the form and function of the Bluetooth devices
Xeno Kovah

At this very moment you are enveloped in the warm glowing warming glow of dozens to hundreds of Bluetooth devices. Aren’t you curious what all those little critters are?! In this workshop we’ll use the Blue2thprinting tools to poke at these apparitions and get a sense of what they are and what they want from us!

Note: this workshop will require you to run a prepared Linux VMware VM, and plug in USB Bluetooth dongles for sending and receiving packets. Come with VMware installed, and a machine you're willing to plug USB devices into.

TCC📍Room 1.126
11:00
90min
WORKSHOP: Hands-on binary (de)obfuscation
Arnau Gàmez i Montolio

In this workshop, we will provide an introduction to state-of-the-art approaches for modern binary (de)obfuscation. After a brief lecture on the fundamental ideas, we will walk through practical examples. We will use symbolic execution to retrieve the obfuscated expression from the compiled binary and attempt to simplify it, and finally, we will leverage program synthesis to reason about and successfully recover the semantics of the obfuscated code.

TCC📍Room 1.124
12:30
12:30
45min
Lunch (12:30-13:15)
TCC📍Room 1.124
12:30
45min
Lunch (12:30-13:15)
TCC📍Room 1.126
13:15
13:15
90min
WORKSHOP: Compiler Internals for Security Engineers
Marion Marschalek

This workshop introduces students to security relevant aspects of compiler internals, and with guided examples enables students to perform their own code modifications through a compiler. We will use a pre-setup environment with which we can analyze source code through different compilation stages and by the end of the workshop students will be able to inject code at an early compiler stage. Students will gain understanding of the security relevancy of a build chain.

TCC📍Room 1.126
13:15
90min
WORKSHOP: Introduction to Automotive firmware reverse engineering
Willem Melching

In this workshop we will cover the basics of reverse engineering automotive firmware. An ECU firmware can consist of millions of lines of code which would take a long time to fully reverse engineer. Tips and tricks will be taught to quickly identify parts of the firmware that are of interest.

TCC📍Room 1.124
14:45
14:45
30min
30min Coffee Break
TCC📍Room 1.124
14:45
30min
30min Coffee Break
TCC📍Room 1.126
15:15
15:15
90min
WORKSHOP: Fuzz Testing Bare Metal and RTOS Firmware
Tobias Scharnowski, Marius Muench

Fuzz testing is a powerful technique for uncovering vulnerabilities, but applying it to deeply embedded, bare-metal, or real-time operating system (RTOS) firmware presents unique challenges compared to traditional Linux-based systems. This hands-on, 90-minute workshop will guide participants through the process of analyzing and fuzz testing deeply embedded firmware using a modern technique called firmware rehosting.

TCC📍Room 1.126
15:15
90min
WORKSHOP: Offensive Security Tool Development with Ghidra
John McIntosh

Unlock the power of automated reverse engineering with Ghidra’s command line tools in this hands-on workshop. Designed for developers and security analysts, this session will guide you through the process of setting up a productive development environment using the Ghidra Python VSCode Devcontainer Skeleton. You’ll learn how to automate tasks, script analyses, and integrate Ghidra’s powerful decompilation and disassembly features into your workflow, all from the command line.

TCC📍Room 1.124
16:45
16:45
5min
BOOTSTRAP25 Close
TCC📍Room 1.124
16:45
5min
BOOTSTRAP25 Close
TCC📍Room 1.126