HackInParis 2014 June 23, 2014 to June 27, 2014, Paris,France

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
DEBATE FRIDAY 27 JUNE 2014 - GLOBAL SURVEILLANCE : SECURITY VS. PRIVACY? Debaters NEW at HACK IN PARIS THIS YEAR, a debate: Global Surveillance: Security vs. Privacy? (Friday ...
ARM AARCH64: WRITING EXPLOITS FOR THE NEW ARM ARCHITECTURE Thomas Roth Late 2013 the first devices with a processor capable of running 64-bit ARM code launched. ...
BITING INTO THE FORBIDDEN FRUIT. LESSONS FROM TRUSTING JAVASCRIPT CRYPTO. Krzysztof Kotowicz We all know JS crypto is flawed, right? Over the years, security community has pointed ... IncludeThinkstScapes
PENTESTING NOSQL DB'S WITH NOSQL EXPLOITATION FRAMEWORK Francis Alexander With the rise of NoSQL databases,more and more corporates as well as end users have ...
PLUNDER, PILLAGE AND PRINT: THE ART OF LEVERAGE MULTIFUNCTION PRINTERS DURING PENETRATION TESTING Deral Heiland , Pete Arzamendi In this presentation I will go beyond the common printer issues and focus around penetration ...
SETUP FOR FAILURE: DEFEATING UEFI/WIN8 SECUREBOOT Xeno Kovah , Corey Kallenberg , John Butterworth , Sam Cornwell Over the past year, a number of BIOS security issues have come to light. And ...
FUZZING, REVERSING AND MATHS Pedro Guillén Núñez , Josep Pi Rodriguez , Mario Lezcano Casado , Francisco Criado Gallart We want to present several 0days using fuzzing and reverse engineering and maths. 1 Critical ...
EXTREME FORENSICS RELOADED 2Q /2014 Alvaro Alexander Soto You will learn about the most advanced forensics and data recovery investigations, trends, methods, tools ...
KEY NOTE N°2: AROUND THE WORLD IN 80 CONS! Jayson E. Street This is a talk on perspectives. I step outside of mine to see hacking around ...
DIGITAL ENERGY – BPT Paul Coggin There are a great deal of conversations today regarding APT and critical infrastructure networks for ...
C++11 METAPROGRAMMING TECHNICS APPLIED TO SOFTWARE OBFUSCATION Sebastien Andrivet Obfuscation is the transformation of source or binary code into a form that is difficult ...
ENERGY FRAUD AND ORCHESTRATED BLACKOUTS: ISSUES WITH WIRELESS METERING PROTOCOLS (WM-BUS) Cyrill Brunschwiler Government requirements new business cases and consumer behavioural changes drive energy market players to improve ...
BREAKING THROUGH THE BOTTLENECK: MOBILE MALWARE IS OUTBREAK SPREADING LIKE WILDFIRE. Thomas Wang This presentation demonstrates various advanced evasion techniques used by mobile malware to break the bottleneck ... IncludeThinkstScapes
JSMVCOMFG: TO STERNLY LOOK AT JAVASCRIPT MVC AND TEMPLATING FRAMEWORKS Mario Heiderich There is a way to build common, classic web applications. You know, servers, databases, some ... IncludeThinkstScapes
SPLINTER THE RAT ATTACK: CREATE YOUR OWN BOTNET TO EXPLOIT THE NETWORK Solomon Sonya By now, most people understand the overall concept of botnets and Remote Administration Tools (RAT). ...