Troopers 2015 March 18, 2015 to March 19, 2015, Heidelberg,Germany

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote: Information Security – The hard thing about the hard thing Haroon Meer N/A IncludeThinkstScapes
Pneumonia, Shardan, Antibiotics and Nasty MOV: a Dead Hand's Tale Arrigo Triulzi Starting in the 80’s we will discuss the influence of nuclear weapons on the design ...
Automating Network Security Ivan Pepelnjak Networking and security vendors love to talk about their software-defined solutions and automation… but can ...
HoneySAP: Who really wants your money Martin Gallo Targeted attacks against ERP systems and enterprise software are not something new, however they only ...
General Pr0ken File System - Hacking IBM's GPFS Florian Grunow , Felix Wilhelm The IBM General Parallel File System (IBM GPFS) is a high performance cluster file system ...
Game Over, Does the CISO get an Extra Life? Richard Rushing Each new year, brings new challenges, new attacks, new defections, new groups attacking, new requirements ...
I know what You Coded last Summer Andreas Wiegenstein , Xu Jia Are you aware that each of your SAP production systems statistically contains 9 security vulnerabilities ...
Hardware YOU can (Audit and then) Trust Benedikt Stockebrand While it is long known to the security community that attacks against hardware are among ...
The foundation is rotting and the basement is flooding: A deeper look at the implicit trust relationships in your organization Jacob Torrey In this session, a new hardware-level attack on PCIe is presented as an example for ...
JURASSIC SAP Juan Perez-etchegoyen , Sergio Abraham What you learned in school is that dinosaurs have been extinct for the last 65 ...
Modern Platform-Supported Rootkits Rodrigo Rubira Branco , Gabriel negreira Barbosa Talks on modern rootkit techniques are often presented in conferences around the world, but most ...
Hacking Fortune 2000th CEO’s mobile: Security of SAP Mobile Infrastructure Alexander mikhailovich Polyakov , Dimitry chastuhin Have you ever thought how to get access to most influential data stored on a ...
iOS Hacking – Advanced Pentest & Forensic Techniques Omer Coskun , Mark De Groot While there has certainly been valuable interesting research of blackbox security assessments techniques presented on ...
Defender Economics Andreas Lindh There are a lot of preconceptions about defense, the most prevalent one probably the “defenders ...
SAP, Credit Cards and the Bird that Talks Too Much Ertunga Arsal SAP applications build the business backbone of the largest organizations in the world. In this ...
Multipath TCP - Breaking Today's Networks with Tomorrow's Protocols Patrick Thomas , Catherine Pearce MultiPath TCP (MPTCP) is an extension to TCP that enables sessions to use multiple network ...
A Backdoor in Wonderland Frederik Weidemann , Hans-christian Esperer Many companies spend millions for locking down their SAP landscape. But even the highest invest ...
Incident Response and SAP Systems Juan Perez-etchegoyen , Sergio Abraham While cyber attacks are increasing every year, SAP systems are still not immune to being ...
Keynote Sergey Bratus N/A
Hacking FinSpy - a Case Study about how to Analyse and Defeat an Android Law-enforcement Spying App Attila Marosi Most possibly there is no need to make a long introduction when speaking about the ...
How to Efficiently Protect Active Directory from Credential Theft & Large Scale Compromise – An Approach Based on Real-World Expertise Friedwart Kuhn Credential theft and Pass-the-Hash (PtH) attacks are nowadays current threats to Active Directory environments. This ...
Introduction to Hacking In Car Systems Craig Smith We're going to cover the intros to CAN bus hacking with interactive demos for hacking ...
The old is new, again. CVE20112461 is back! Luca Carettoni , Mauro Gentile As a part of an ongoing investigation on Adobe Flash SOP bypass techniques, we identified ...
Let's Clear up the Debris - What the Snowden Leaks Mean for Your IT Security Strategies Sylvia Johnigk , Kai Nothdurft The Snowden Leaks triggered a worldwide scandal. The public interest and discussions focus on the ...
RF Retroreflectors, Emission Security and SDR Michael Ossmann The leaked pages from the NSA ANT catalog provided a glimpse into the modern world ...
The State of Email in 2015 Martijn Grooten Back in the early 1980s, when email was invented, the Internet population was many orders ...
Advanced PDF Tricks (A.P.T) - a Workshop-style Presentation to Understand the PDF File Format Ange ( ange4771 ) Albertini , Kurt Pfeifle This session is NOT about analyzing exploits but about learning to manipulate PDF contents. Among ...
Weapons of Mass Distraction – Sock Puppetry for Fun & Profit Marco Slaviero , Azhar Desai There have been many discussions online about governments making use of sock puppets on social ... IncludeThinkstScapes
Defending the Enterprise Against Network Infrastructure Threats Paul Coggin Learn about network attack vectors that an adversary can use to control, and influence network ...
The Wallstreet of Windows Binaries Marion Marschalek , Joseph Moti Nowadays common ways to find exploitable vulnerabilities include but are not limited to fuzzing, static ...
Crypto in the Cloud Frederik Armknecht Although cloud services become more and more popular, security concerns of the customers prevent a ...