HackinParis2018 2018 June 25, 2018 to June 29, 2018, Paris, France

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Drones the new weapon of choice - also for hackers Dominique C. Brack My talk will be about drone threats in general and how you can assess drone ...
Building Systems On Shaky Grounds 10 Tactics To Manage The Modern Supply Chain Robert Wood Software engineering today has rightfully embraced the open source and cloud ecosystem to move faster ...
Silent wire hacking Erwan Tanniou Many networks can be reached from the outside as RJ45 cables are visible near various ...
Auditd for the Masses Philipp Krenn The Linux Audit daemon is responsible for writing audit records to the disk, which you ...
From printed circuit boards to exploits: pwning IoT devices like a boss Damien "virtualabs" Cauquil Hardware hacking hit the news quite often in 2017, and a lot of pentesters tried ...
Mobile operators vs. Hackers new security measures for new bypassing techniques Sergey Puzankov After all the loud news around the insecurity of the mobile networks and some harsh ...
Invoke-DOSfuscation: Techniques FOR %F IN (-style) DO (S-level CMD Obfuscation) Daniel Bohannon Skilled attackers continually seek out new attack vectors and effective ways of obfuscating old techniques ...
DEBATE - To Serve Man AI, Machine Learning & Deep Learning in Security Winn Schwartau , Michael Carpenter Do you believe in vendor claims that AI, or some equivalent, offers superior security? Is ...
The Insecure Software Development Lifecycle How to find, fix, and manage deficiencies within an existing methodology April C. Wright As security practitioners, we know what "secure software" is, but we do not always know ...
Knockin' on IPv6's doors Fernando Gont As a result of the exhaustion of the IPv4 free address space, more and more ...
The Bicho An Advanced Car Backdoor Maker Sheila Caracciolo Attacks targeting connected cars have already been presented in several conferences, as well as different ...
The Past, Present & Future of Enterprise Security the 'Golden Age' of Attack Automation Marcello Salvati The past 4-5 years have completely changed the way pentesters & attackers think about Active ...
Hunting PBX for Vulnerabilities Sachin Mehta Our main motto of this session is to walk through the multiple vulnerabilities present in ...
No Win32_Process Needed Expanding the WMI Lateral Movement Arsenal Philip Tsukerman For quite some time now, WMI has resided in the main roster of techniques used ...
How To Bring HID Attacks To The Next Level Luca Bongiorni In the last few years, digital payment methods have had an incredible adoption rate in ...