bsideslisbon 2017 Nov. 9, 2017 to Nov. 10, 2017, lisbon,portugal

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
KEYNOTE: THE POST-QUANTUM PROJECT: WHY AND HOW? Jp Aumasson In a few weeks NIST will kick off the the "Post-Quantum Crypto Project", a contest ...
KEYNOTE: HOW STORYTELLING MADE ME A BETTER INFOSEC PROFESSIONAL Javvad Malik Lights, camera, action… just three words can conjure up images, build anticipation, and set the ...
KNOCK KNOCK! WHO'S THERE? NSA! Pedro Vilaça Thanks to the ShadowBrokers we can finally take a peek at some of NSA's tools ...
INTEL AMT: USING & ABUSING THE GHOST IN THE MACHINE Parth Shukla Come see how Intel AMT can be used to completely own a modern machine permanently ...
GTFO MR. USER David Sopas In this talk, the author will present real case scenarios (aka hacking to PoC) showing ...
CONTROLLING YOUR NEIGHBOUR’S LIGHTS – A VULNERABILITY ASSESSMENT STUDY OVER COMMON ENERGY COMMERCIAL SERVICES André Garrido ZigBee is a wireless protocol with an extremely low energy consumption rate and has been ...
WILD WILD WEB APP TO DOMAIN ADMIN: A CASE STUDY Nacho Sorribas This talk is about a real war story. The intention of the talk is to ...
CRAFTING THE NEXT-GENERATION MAN-IN-THE-BROWSER TROJAN Pedro Fortuna , Paulo Silva Current Man-in-the-Browser (MITB) trojans like Trickbot or Dridex are pretty much similar to first generation ...
ABUSING ANDROID IN-APP BILLING FEATURE THANKS TO A MISUNDERSTOOD INTEGRATION Jérémy Matos Android provides an In-app Billing API so that developers can sell extra features directly in ...
HARDWARE BASICS - WHY AND HOW TO BREAK HARDWARE. Kieran Roberts Hardware is everywhere and 'hardware hacking' has grown massively in popularity over the last few ...
V!4GR4 BOTNET: CYBER-CRIME, ENLARGED Ben herzberg Trafficking of counterfeit pharmaceuticals is a massive industry, and have been known for its persistent ...
BOTNET ACTIVITY MONITORING THROUGH PROCESS PUPPETEERING Tiago Pereira Monitoring botnet activity to produce threat intelligence often requires the development of specialized tools that ...
I BOOT WHEN U-BOOT Bernardo Maia Rodrigues , Vincent Ruijter Personal computer systems are now considerably more secure than embedded devices. Trusted Platform Module (TPM) ...
FANTASTIC SIGNALS AND WHERE TO FIND THEM Luís Grangeia , José Moreira This talk with be an introduction to software defined radio (SDR) for security professionals with ...
I THOUGHT I SAW A |-|4><0.- Thomas Fischer Threat Hunting refers to proactively and iteratively searching through networks or datasets to detect and ...
PRACTICAL OUT-OF-BAND DATA EXFILTRATION IN 802.11 Luís Mendes Gomes , João Pena Gil Out-of-Band exfiltration using 802.11 has been around for a while, but the code that is ...
HAVING FUN WHILE ANALYZING MOBILE APPLICATIONS Álvaro Felipe Melchor In this talk I will present how open source frameworks can be leveraged to carry ...
FILELESS MALWARE INFECTIONS - MALWARE TRICKS FOR PENTESTERS Ramón Pinuaga In the non-stop struggle between malware authors and anti-malware software, a new strategy is beginning ...
INTELMQ - THE FULL PROCESSMENT OF A THREAT André Garrido The excess or absence of information available today combined with the lack of automation makes ...
STATIC ANALYSIS OF A RAT CAMPAIGN Ricardo Dias This workshop is a deep-dive into a remote access tool (RAT) distribution campaign. We will ...