44con 2017 Sept. 13, 2017 to Sept. 15, 2017, londun,uk

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
The Internet of Us Don a. Bailey The Internet of Things has devolved into a four letter word on the tongues of ...
Cracking HiTag2 Crypto – Weaponising Academic Attacks for Breaking and Entering Kevin Sheldrake HiTag2 is an RFID technology operating at 125KHz. It is distinguished from many others in ...
Chkrootkit: Eating APTs for breakfast since 1997 Nelson Murilo Chkrootkit will be 20 years old in 2017!The first chkrootkit release was 1997 and it ...
Biting the Apple that feeds you – macOS Kernel Fuzzing Alex Plaskett , James Loureiro This talk details the use of MWR’s platform agnostic kernel fuzzing techniques to automatically identify ...
Breaking Historical Ciphers with Modern Algorithms Klaus Schmeh Many old encryption methods are still hard to break today. For instance, cryptanalyzing a Turning ...
The Black Art of Wireless Post-Exploitation: Bypassing Port-Based Access Controls Using Indirect Wireless Pivots Gabriel Ryan Most forms of WPA2-EAP have been broken for nearly a decade. EAP-TTLS and EAP-PEAP have ...
Red Team Revenge : Attacking Microsoft ATA Nikhil Mittal Microsoft Advanced Threat Analytics (ATA) is a defence platform which reads information from multiple sources ...
BaRMIe – Poking Java’s Back Door Nicky Bloor Java’s Remote Method Invocation (RMI) enables developers to seamlessly interact with objects that reside within ...
Persisting with Microsoft Office: Abusing Extensibility Options William Knowles One software product that red teamers will almost certainly find on any compromised workstation is ...
See no evil, hear no evil: Hacking invisibly and silently with light and sound Matt Wixey Traditional techniques for C2 channels, exfiltration and exploitation are often frustrated by the growing sophistication ...
Secrets Of The Motherboard (Shit My Chipset Says) Graham Sutherland Modern motherboards are fairly daunting pieces of hardware. They’re full of closed-source firmware, undocumented and ...
Cisco ASA Episode 2: Striking back – Internals and Mitigations Cedric Halbronn In 2016, two critical vulnerabilities were published that targeted Cisco ASA (Adaptive Security Appliance) firewalls. ...
Inside Android’s SafetyNet Attestation: What it can and can’t do lessons learned from a large scale deployment Colin Mulliner There are many reasons for protecting your mobile applications against modification and tampering. Until recently ...
Subgraph OS: Hardening a Linux Desktop David mirza Ahmad Subgraph OS is an operating system designed to provide a hardened Linux desktop resistant to ...
Hypervisor-Assisted Ring0 Debugging with radare2 Lars Haukli Reverse engineering protected code operating in kernel mode can be challenging. More advanced protection mechanisms ...
Lessons Learned Hunting IoT Malware Olivier Bilodeau Permeating the entire spectrum of computing devices, malware can be found anywhere code is executed. ...
So You Want to Hack Radios Marc Newlin , Matt Knight The Age of the Radio is upon us: wireless protocols are a dime a dozen ...
Checking BIOS protections offline with just the firmware updates Yuriy Bulygin , Oleksandr Bazhaniuk Vulnerabilities in system firmware allow adversaries to bypass almost any protection used in the operating ...
Hide Yo Keys, Hide Yo Car: Remotely Exploiting Connected Vehicle APIs and Apps Aaron Guzman Today, most vehicle manufacturers in the US connect their vehicles to a type of network ...