hacklu 2016 Oct. 18, 2016 to Oct. 20, 2016, parchotel,luxembourg

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Stressed out? Denial of service attacks from the providers’ perspective Alice Hutchings The most frequent users of ‘booter’ or ‘stresser’ services are online gamers. These services are ...
Enhancing infrastructure cybersecurity in Europe Rossella Mattioli ENISA, the European Union Agency for Network & Information Security, is working together with European ...
Exploiting and attacking seismological networks… remotely Bertin Bervis Bonilla , James Jara In this presentation we are going to explain and demonstrate step by step in a ...
Where should I host my malware? Attila Marosi The growth of IoT devices continues to raise questions about their role and impact in ...
Interesting Malware - No, I’m not kidding… Marion Marschalek There is malware, and then, there is m.a.l.w.a.r.e. Last year we got our fingers on ...
House intercoms attacks: when frontdoors become backdoors Sebastien Dudek To break into a building, several methods have already been discussed, such as trying to ...
KillTheHashes 30 million Malware DNA profiling exercise Luciano Martins , Rodrigo Cetera , Javier Bassi Similar to human fingerprints, every malware has its own unique digital fingerprint that differentiates it ...
Unveiling the attack chain of Russian-speaking cybercriminals Wayne Huang , Sun Huang Existing research on the Asprox actor has focused primarily on the malware they spread, but ...
Cyber Grand Shellphish: Shellphish and the DARPA Cyber Grand Challenge Kevin Borgolte Autonomous hacking is becoming a reality. Over the last years, DARPA organized the Cyber Grand ...
Spy Hard with a Vengeance: How one city stood up to the Department of Homeland Security Aestetix , Brian Hofer This talk will cover the reign of surveillance that has secretly taken over the United ...
The Metabrik Platform: Rapid Development of Reusable Security Tools Patrice Auffret During the course of a penetration test, a malware analysis, a forensic analysis or a ...
Bridging political gaps with code Okhin One of the main mission of La Qaudrature du Net, as a NGO fighting for ...
WiFi Exploitation: How passive interception leads to active exploitation Solomon Sonya When was the last time you thought to yourself, hmm, I wonder if an attacker ...
2016: The Infosec Crossroads Saumil Udayan Shah “Today’s attacks succeed because the defense is reactive”. I have been researching attacks and offensive ...
Exploit generation and JavaScript analysis automation with WinDBG Fitzl Csaba , Miklos Desbordes-korcsev Our presentation will cover two different topics, which will show how easy and powerful is ...
Bootstrapping an Architectural Research Platform Jacob I. Torrey This talk aims to provide the fundamental architectural knowledge and resources for a security research ...
Exploiting new default accounts in SAP systems Joris Vis TODO
badGPO - Using GPOs for Persistence and Lateral Movement Yves Kraft , Immanuel Willi Group Policy is a feature which provides centralized management and configuration functions for the Microsoft ...
Machine Duping: Pwning Deep Learning Systems Clarence Chio Deep learning and neural networks have gained incredible popularity in recent years, but most deep ...
Credential Assessment: Mapping Privilege Escalation at Scale Matt “scriptjunkie” Weeks In countless intrusions from large retail giants to oil companies, attackers have progressed from initial ...
BtleJuice: the Bluetooth Smart Man In The Middle Framework Damien Cauquil A lot of Bluetooth Low Energy capable devices are spread since the last few years, ...
When Crypto Fails Yaniv Balmas , Ben Herzog “There is a theory which states that if ever anyone discovers exactly how to properly ...
When Practice Informs Technology Mahsa Alimardani Digital rights activists and social change actors often operate in singular movements that seldom overlap, ...
Windows systems & code signing protection Paul Rascagneres This presentation explains the code signing mechanism (authenticode) developed by Microsoft on Windows systems. The ...
Fraud detection and forensics on telco networks Vladimir borisovich Kropotov , Dmitry Kurbatov Telecom networks have always been targets for those looking to obtain services for free or ...
The Legend of Windows: A Link to the Hash M4xk , Sıx During one of our IT security investigation we have observed an undocumented Windows feature which ...
Of Mice and Keyboards: On the Security of Modern Wireless Desktop Sets Matthias Deeg Wireless desktop sets consisting of a wireless mouse, a wireless keyboard, and a USB dongle ...
Hadoop safari : Hunting for vulnerabilities Mahdi Braik , Thomas Debize With the growth of data traffic and data volumetric analysis needs, “Big Data” has become ...
Android malware reverse engineering Axelle Apvrille This workshop explains how to reverse engineer Android malware. After some brief explanation, attendees will ...
Malware Triage IOCs - Using Open Data to Help Develop Robust Indicators Sergei Frankoff , Sean Wilson Whether you are in the enterprise using malware triage as a gate to your incident ...
Introduction to Security Onion David Szili Security Onion is a Linux distribution based on Ubuntu, designed for security analysts. It contains ...
ARM Shellcode Basics Saumil Udayan Shah A 2 hour workshop on writing ARM Shellcode from scratch. I will cover some simple ...
FastIR Collector Sébastien Larinier The goal of the wokshop is to present and use the open source live forensic ...
Advanced Exploitation: ROP and protections bypass under Linux Julien Bachmann This workshop’s goal is to give trainees an understanding of the exploitation technique known as ...
Secrets in Soft Token: A security study of HID Global Soft Token Mouad Abouhali Nowadays, many companies tend to deploy two factors authentication means to remotely access their infrastructure. ...
The Fantastic 4 … forensic domains: net, disk, mem, mal David Durvaux , Christophe Vandeplas Forensic analysis (network, disk, memory, malware) is one of the core tasks of the incident ...
Malware analysis made easy with Volatility plugins Thomas Chopitea Volatility is a very well known, used, and loved memory forensics framework in the DFIR ...
Nothing is beyond our pots - An Introductory Worskhop about Honeypots Guillaume Arcas This introductory non-technical 4-hours workshop will present the basics of Honeypot and their history, the ...
A Hands On Introduction To Software Defined Radio FULL Didier Stevens Software Defined Radio is a fascinating playfield for hackers. But the learning curve is steep, ...