Bsidesljubljana 2017 March 17, 2017 to March 17, 2017, ljubljana,slovenia

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Overview and Usage of Binary Analysis Frameworks Florian Magin This talk is intended for people that are interested in automatic binary analysis and want ...
Teaching toasters to kill: hacking the Internet of Things Vlatko Kosturjak , Tonimir Kišasondi IoT and embedded systems are gaining more and more traction in the real world. Low ...
Peculiar SSH – May we interest you in this particular feature? Leyrer , Maclemon We all use SSH on a more or less daily basis. More advanced users even ...
You Can’t Escape the Web: When Web Exploits Migrate to the Operating System Adam Rapley Web technologies are moving to the desktop in a concerted effort to produce easily accessible ...
What we learnt from running our Security Operations Center Robert Kiss , Gyorgy Demarcsek We would like to present how we built our Security Operations Center in Python on ...
WARNING – Do Not Feed the Bears Mirosalv Stampar As a member of .HR GovCERT, we are involved into all major government related incidents, ...
yescrypt: large-scale password hashing Alexander Peslyak Like it or not, password authentication remains relevant (including as one of several authentication factors), ...
Responsible Disclosure and Ethical Hacking Gorazd Bozic On one hand we have a very strict view bound by the formal legal constraints. ...
RSA USA 2017 Replay: Fixing the Fixing Mitja Kolsek , Stanka Salamun Today’s security updates are too big, too risky and too late. It is common for ...
CookieMonstruo: Hijacking the Social Login Martin Von Knobloch “With this talk, we want to revive the interest in the largely ignored method of ...
Deception Defence 101 + A tool-less approach to setup a Deceptive Defence environment Pedram Hayati The concept of deception security has been around since early 1990. However, its rate of ...
ROP CFI RAP XNR CPI WTF? – Navigating the Exploit Mitigation Djungle Michael Rodler Techniques to bypass ASLR and NX are already widely known. The first thing the modern ...