hackfest 2017 Nov. 4, 2017 to Nov. 5, 2017, quebec,canada

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
BITSInject - control your BITS, get SYSTEM Dor Azouri Windows’ BITS service is a middleman for your download jobs. You start a BITS job, ...
Les véhicules autonomes, leur télémétrie et l’impact sur la sécurité Marc-andre Belanger Présentement, une intéressante transformation est en cours du côté de l’assurance automobile avec l’arrivé des ...
Introducing CSE’s open source AssemblyLine: High-volume malware triaging and analysis Steve Garon , John O’brien The Communications Security Establishment (CSE), Canada’s national cryptologic agency and a leading expert in cyber ...
NOAH: Uncover the Evil Within! Respond Immediately by Collecting All the Artifacts Agentlessly Pierre-alexandre Braeken Imagine the moment you realize that a malicious threat actor has compromised your network and ...
Propriétés des preuves numériques et considérations relatives à leur cueillette Sylvain Desharnais , Nadia Vigneault Lorsqu’une infraction ou un crime numérique est commis, les preuves de cet acte doivent être ...
Make a Thing – Creating a Professional-Quality Embedded Device on a Budget Michael Vieau , Kevin Bong It used to be that only professional engineering shops had the knowledge and resources to ...
Attack Driven Development: Getting Started in Application Security Keith Hoodlet Software Security professionals often express the concern that we do not teach Computer Science students ...
Practical Analysis of Awareness @4n6kendra Many organizations today participate in some form of Security Awareness training. Whether it be something ...
Superhéros Tous! Comment l’empathie peut aider l’inclusion des personnel avec ASD/ADHD Michelle Infosec est un milieu attirant pour les personnes avec ASD où ADHD mais on a ...
How To Pwn an Enterprise in 2017 (or 2016, or 2015…) Johnny Xmas Johnny Xmas is here to “reveal the magicians’ secrets on all of the “low-hanging fruit” ...
Quebec Fail Panel (French) Hackfest Nous sommes heureux de vous présenter les Fails de l’année 2016-2017 du Québec et Canada. ...
Between You and Me and the Network Security Boundary Patrick Fussel Many organizations have IT environments with zones of varying security requirements. These zones are usually ...
Static-Analysis Tools: Now you’re Playing with Power! Philippe Arteau You are performing penetration testing on Web applications. Do you systematically perform code reviews when ...
Beating the Disinformation Drift: Facts about the AlphaBay Market Masarah Paquet-clouston In July 2017, the AlphaBay market was taken down by law enforcement and the alleged ...
The Bottom of the Barrel: Scraping Pastebin for Obfuscated Malware Patrick Colford Started in 2002, pastebin.com has become the largest service of its kind in the world, ...
Selenium: dark side of the moon Adam Reiser Script the deep web! Selenium is a set of technologies for browser automation with powerful ...
Banking on Insecurity: Why Attackers Can Take the Money and Run Cheryl Biswas This is the ongoing fairytale of securing financial institutions. So many banks in so little ...
Hacking Smart Contracts Konstantinos Karagiannis It can be argued that the DAO hack of June 2016 was the moment smart ...
Lessons Learned Hunting IoT Malware Olivier Bilodeau Permeating the entire spectrum of computing devices, malware can be found anywhere code is executed. ...
Stantinko : Un botnet aux multiples facettes opérant depuis plus de 5 ans Matthieu Faou , Frédéric Vachon Stantinko est un botnet découvert en 2017 par des chercheurs d’ESET et dont la taille ...
Hadoop safari : Hunting for vulnerabilities Mahdi Braik , Thomas Debize With the growth of data traffic and data volumetric analysis needs, “Big Data” has become ...
Genetic Algorithms for Brute Forcing Christopher Ellis Machine Learning algorithms have many applications in Cyber Security; while, most of these applications are ...
The Black Art of Wireless Post-Exploitation Gabriel Ryan Wireless is an inherently insecure protocol. Most companies recognize this, and focus their resources on ...
(Workshop) Advanced Wireless Attacks Against Enterprise Networks Gabriel Ryan This workshop will instruct attendees on how to carry out sophisticated wireless attacks against corporate ...
Vaccination - An Anti-Honeypot Approach Gal Bitensky Malware often searches for specific artifacts as part of its “anti-­VManalysissandboxdebugging” evasion mechanisms, we will ...
How to obtain 100 Facebooks accounts per day through internet searches Yael Basurto , Guillermo Buendia Back in 2016, it was very new the way how the Facebook mobile application implements ...
SniffAir – An Open-Source Framework for Wireless Security Assessments Matthew Eidelberg , Steven Daracott SniffAir is an open-source wireless security framework. Its primary purpose is to provide penetration testers, ...
Fingerprinting Android malware packaging process through static analysis to identify their creator François Gagnon In this talk, we will look at some elements of Android malware static analysis: what ...
Élection présidentielle Française 2.0 Damien Bancal Comment Internet a failli transformer une élection démocratique en une immense anarchie numériques entre fuite ...
Dissecting a Metamorphic File-Infecting Ransomware Raul Alvarez Virlock is a polymorphic file-infecting ransomware. It is capable of infecting executable files and at ...