ConfidenceKrakow 2018 June 4, 2018 to June 5, 2018, Krakow, Poland

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Present challenges in Cyber Security Daniel Leiendecker N/A
Intel ME: Security keys Genealogy, Obfuscation and other Magic Dmitry Goryachy The Intel Management Engine (ME) technology was introduced in 2005. Though more than 10 years ...
Practical intelligence-driven defense Igor Yugoslavskiy Defending from advanced cyberattacks requires defenders to have a modern approach to the threats and ...
XSS is dead. We just don't get it. Mario Heiderich XSS is about twenty years old by now and appears to be alive and kicking. ...
They didn't know what hit them. Network security monitoring on a massive scale. Michal Purzynski Have you ever thought - all those network security monitoring tools are exciting, but it ...
Who and why should fear hardware trojans? Adam Kostrzewa Can we trust our processors, routers and other electronic IP components? This important question is ...
Darknet traffic - what can we learn from nooks and crannies of the internet? Piotr Bazydło Darknet (network telescope) is an unused space of IP addresses, where normally weshould observe no ...
A 2018 practical guide to hacking RFID/NFC Sławomir Jasek Ever wanted to hack these proximity/contactless cards you use every day, but did not know ...
Disrupting the red team – a practical guide Ed Williams Red teaming is everywhere and everybody is doing it. Most organisations are not mature enough ...
Surfin on you CAN-bus Thomas Fischer The content of my presentation consists of three parts and for each part I also ...
Defending Microsoft Environments at Scale Vineet Bhatia Defending a Microsoft Environment at Scale looks at the innovations made in Windows 10 and ...
How quantum computing is changing cryptography Marcin Matusiewicz Quantum computers are machines that exploit quantum mechanical phenomena to solve mathematical problems that are ...
OSINT vs OPSEC w 30 min. Piotr Konieczny N/A
Pentesting Voice Biometrics Solutions Jakub Jakub Kałużny The era of using scratch cards, RSA tokens and SMS codes as a second factor ...
It's a trap! - Remote detection of low and medium interaction honeypots Julio Cesar Fort Honeypots are widely deployed and indispensable tool used by threat researchers to simulate a real ...
Invoke-DOSfuscation: Techniques FOR %F IN (-style) DO (S-level CMD Obfuscation) Daniel Bohannon Skilled attackers continually seek out new attack vectors and effective ways of obfuscating old techniques ...
Busting Advanced BotNet’s Senad Aruc [Busting Advanced botnets became our passion with the hope that we can provide a very ...
CREDS – the new distributed certificate management system for UBS Michael Jarmolkowicz At CREDS we issue and manage the keys to the bank. Future IT landscape is ...
Hunting for the secrets in a cloud forest Paweł Rzepa Have you ever wonder if the access to your cloud kingdom is secure? Have you ...
Linux Kernel Runtime Guard (LKRG) under the hood. Adam "pi3" Zabrocki Linux Kernel Runtime Guard (LKRG) is a loadable kernel module that performs runtime integrity checking ...
HI, I'M THE NEXT UPCOMING HACKMAGEDDON aka "Cyber Terrorism: wrong assumptions & true facts + what I hope will never happen!" Raoul "Nobody" Chiesa This presentation will begin with a tentative definition of the "Cyber Terrorism" terminology, then focusing ...
Warsztat audytora Bartłomiej Mizerski N/A
Hacking REST APIs - 20 cases Michał Sajdak During the presentation I'll show about 20 real life cases of vulnerabilities in different APIs.There ...