Kiwicon 2016 Nov. 17, 2016 to Nov. 18, 2016, wellington,new zealand

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Defending the Gibson in the Age of Enlightenment Darren Bilby The year is 2016, dumped mailboxes are key presidential debate topics, ransomware runs rampant in ...
The mjg59 Smile Time Variety Half Hour Matthew Garrett People want stunt hacks of dog feeders and space shuttles. People need meaningful improvements in ...
Hacking HID iClass William Turner A short recap of the security and insecurity of HID iClass RFID access cards. The ...
Finding and Exploiting Access Control Vulnerabilities in Graphical User Interfaces Collin Mulliner Graphical user interfaces (GUIs) contain a number of common visual elements or widgets such as ...
Radiation-induced cryptographic failures and how to defend against them Peter Gutmann It's been known for some years now that encryption can be highly susceptible to fault ...
Attacking OSX for fun and profit Dan Tentler For the purposes of a documentary. I got asked to hack a journalist. His request, ...
Compliance in the Cloud: It's what you make of it Geoff Hi, I'm Geoff and I've spent the last five years in the Amazon Cloud Mines ...
Active Incident Response: Kiwicon Edition Brian Candlish , Christian Teutenberg Security breaches are becoming a daily occurrence now. Wake up, check your twitter and see ...
Out of the Browser into the Fire: Exploiting Native Web-based Applications Shubs , Moloch The evolution of the web has blurred the line between traditional web applications and native ...
Practical Phishing Automation with PhishLulz Antisnatchor If you do Phishing attacks on a regular basis, you will end up using a ...
PHP Internals: Exploit Dev Edition Emmanuel Law This talk will give a tour about PHP Internals. It'll take the audience on a ...
Can applications contain themselves? Jess Frazelle Containers are all the rage right now, but at the heart of them is just ...
Not So Random - Exploiting Unsafe Random Number Generator Use Brendan Jamieson PRNG? CSPRNG? Do these acronyms mean anything to you? What's the difference? Why does it ...
A Monster of an Attribution Problem Failymonster What happens when a threat actor appears put of the blue? You have a monster ...
Hacking AWS end to end Daniel Grzelak All the things are and/or will be on AWS now but the public state of ...
Luring developers with candy and other evil tricks Eleanor Saitta Security teams have historically been the scary people in black with stompy boots off in ...
Prince of Persia Simon Conant Basically we poked a thing, turned out to be a decade (+) of Iranian espionage ...
SDIR: Software Defined InfraRed Dominic Spill There have never been more infrared signals, from the remote control toys and televisions that ...
Let’s do the Timewarp Again Karit GPS is used for life critical services like finding a date on Tinder, hailing an ...
Pwning ML for Fun and Profit Davi Ottenheimer Everyone is talking ML this and AI that as if they expect some kind of ...
NodeJS: Remote Code Execution as a Service Jeff It is a period of civil war. You, mighty MODERN JAVASCRIPT DEVELOPER (insane person) wield ...
New Zealand, we (nearly) have a National CERT. Declan Ingram In May of this year the government announced new investment to establish a National CERT. ...
Red Star OS will bring the imperialist aggressors and Park Geun-Hye clique to their knees Lord Tuskington In the 1990s, comrade Torvalds and the Respected Marshall Richard Stallman brought socialist innovations to ...
_blank slate Jenofdoom Unbeknownst to many web developers, a common "feature" of link elements in HTML can leave ...
Kicking Orion's Ass-sets Mubix SolarWinds has this tool called Orion. It does great things. It does horrible things. I ...
Condensed History of Lock Picking Grace Nolan In the 1800s Windows 0days were extremely rare, so hackers at the time had to ...