Hackmiami 2017 May 19, 2017 to May 21, 2017, miami,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Hunting CyberCriminals (or not) Claudio Caracciolo Millions of malicious applets (.jar files) and apps exist out there. You know that, but ...
Cryptocurrencies & Anonymity: The Good, The Bad & The Future Benjamin Brown Cryptocurrencies are seeing an enormous uptick in use. While much of that use shows through ...
Doomsday Preppers: Fortifying Your Red Team Infrastructure Steve Borosh , Jeff Dimmock The sky is falling! Nation state 0days are up for auction, blue teams are hacking ...
cookieMOnstruo: hijacking the social login Martin Von Knobloch With this talk, we want to revive the interest in the largely ignored method of ...
Don’t Get Caught Em-bed:Finding and Preventing Vulns at its Lowest Level Aaron Guzman It's no secret that embedded systems surround and control our daily lives. Embedded device and ...
Interactive Offense and Incident Response Jonathan Echavarria , Joe Partlow Join us as we walk through a real-world threat scenario as we play out both ...
Detection of webshells in compromised perimeter assets using ML algorithms Rod Soto , Joseph Zadeh This presentation will focus on the use of machine learning techniques and analytics to detect ...
Creating a security tool in 30 minutes .Come learn how to create and bootstrap your security tool idea with the creator of things Jason Bunch In this presentation Jason will start with a brief overview of proven problem solving techniques ...
The rise of security assistants over security audit services Yury Chemerkin Mobile applications have not only become daily things of our lives, but they have also ...
Hacks and Crafts: Improvised Physical Security Tools for Improvised Situations Jeff Toth Ever start unpacking your kit on a physical security assessment and then you realize you ...
The Mirai Botnet... a story from the trenches Chad Seaman Akamai was responsible for mitigating the worlds largest DDoS attack (at that time, 620/Gbps) against ...
The Ransomware and IoT Threat Christopher Elisan We have seen a rise in Ransomware attacks in the past year. While we are ...
Oauth Nightmares Abstract OAuth Nightmares Yashvier Kosaraju , Hariram Balasundaram OAuth is one of the most popular authorization frameworks in use today. All major platforms ...
Repurposing Adversarial Tradecraft Alexander Rymdemko-harvey Today’s threat surface is defined by the actors that develop and employ advanced adversarial techniques. ...
Abusing “Accepted Risk” With 3rd Party Command and Control Jon Perez , Justin Warner In mature networks, defenders stand guard utilizing strong boundary defenses to protect users, detect adversaries, ...
All Your Base Are Belong to Everyone: Managing Digital Trust in the Era of Megabreaches Alexander Heid The year 2016 & 2017 experienced unprecedented disclosures of compromised data sets that were made ...
Hacking the Federal Aviation Administration William M. Nett Radar or RAdio Direction And Ranging is an object-detection system that uses radio waves to ...
-ExecutionPolicy Bypass" Living off the land with Powershell and WMI Evan Wagner Multi staged exploitation techniques using Powershell. Presentation will go over capabilities to subvert execution restrictions, ...
Hackers Interrupted Alex Holden Going beyond a breach or initial damage, let’s examine the minds of the hackers. What ...
The Cloud is a Lie Eijah For years now, companies have been promoting Cloud-based storage as a solution to all of ...