BalCCon2018 2018 Sept. 14, 2018 to Sept. 16, 2018, Novi Sad, Serbia
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Blockchain: the top 10 security disasters | Jean-phillipe Aumasson | Many blockchain platforms support tokens, holding a total value of hundreds of millions, if not ... | |
Exploiting esoteric SQL injection vulnerabilities | Bojanz | Although SQL injection vulnerabilities are the most common web application vulnerabilities, many tools and penetration ... | |
Security Safari in b0rkenLand Watch out! There are dangerous Security Problems | Hetti | 2018 started really well for the internet regarding computer security. Let's take care of it ... | |
Backups (occasionally…) What could possibly go wrong | Maclemon | You do have backups, do you? Are you sure? I thought so as well… until… ... | |
Preventing CPU side-channel attacks with kernel tracking | Hackman | Marian will present a protection from Meltdown/Spectre types of attacks. He will also show, why ... | |
Emulating AVR from Scratch Featuring AVRS, an Emulator meant for Reverse Engineering | Cluosh | An overview of the AVR architecture and the challenges/opportunities for building an emulator from the ... | |
Masked reflected DDoS attacks, and how to protect against them | Johnathan Roy Azaria | Some attacks go unchanged for years, and a great example for this is reflected DDoS ... | |
Impact of domain name dropcatching on business security | Kirils Solovjovs | Domain names are the real estate of the internet. With every decade it becomes more ... | |
Comparing Malicious Files How many freaking names can we have for one malware family? | Robert Simmons | One critical step one must take during the malware analysis process is to attempt to ... | |
Phishing Phishers Turning the tables on phishers | Arnim Eijkhoudt | KPN is the largest telecom & internet services provider in the Netherlands. We have a ... | |
Free Your Android Liberate Your Device! | Albert | While Android is a mostly free operating system, many devices contain non-free drivers as well ... | |
How I survived ICO! | Milan Gabor | ICOs are a common way now to collect some funding and issuing tokens at the ... | |
Modern Commandline Tools V1.4 (English Edition) Effective, Better, Faster, Useful - Alternatives to grep, ls, find, ... | Leyrer | ls, grep, find, ifconfig. We all know these tools and use them on a daily ... | |
Towards the perfect cryptocurrency wallet | Nemanja | Last year we witnessed a huge leap in value for many cryptocurrencies, which attracted much ... | |
Public Code with Free Securing Our Digital Public Infrastructure | Max Mehl | The "Public Money? Public Code!" initiative has been created to make all code developed with ... | |
Tales from the hunt Some less hyped bugs in (web)apps | Tonimir Kišasondi | Everyone is talking about common classes of bugs, sql injection, XSS, CSRF, IDOR etc... But, ... | |
Amateur radio activity days Everything You Always Wanted to Know About Amateur radio * But Were Afraid to Ask | Abakalov | During Balccon2k18 we will be active making amateur radio QSOs (contacts) with stations worldwide using ... | |
Toll of personal privacy in 2018 | Kirils Solovjovs | In this 50 minute long talk the author will present their personal privacy choices that ... | |
Application Container Security Container crash course for hackers, defenders and pentesters | Kost | Application Containers like LXD, Docker and rkt are popular ways of containerization of each application. ... | |
Secrets and Time - how much torture can you endure until your key expires. Protecting journalists and researchers with distributed cryptography. | Smuggler | Journalists and researchers find themselves in an environment where their digital devices are subject to ... | |
Spectre & Co. For Mere Mortals How To Explain Risk To Muggles | Frank Rustemeyer | A new language is needed to explain tough bits of computer science and engineering like ... | |
How to achieve both economic and personal freedom using globality and flexibility. Crypto liberation story of one perpetual traveler | Wilder | Crypto liberation story of one perpetual traveler: How to achieve both economic and personal freedom ... | |
Hacking Driverless Vehicles | Zoz | Autonomous and unmanned systems are already patrolling our skies and oceans and being tested on ... | |
automated number plate readers why ANPR such and what that has to do with missing user input verification | Mc.fly | I played around with automated number plate recognition systems in the netherlands.They are broken.I will ... | |
Riding the wave | Vladan Nikolić | SDR - demystifying magic. What SDR is and how it can be used to compromise ... | |
Email, how does it even work? | Maclemon | Email is one of the oldest federated social networks in IT history. Its roots date ... | |
Sustainability challange and the role of hackers | Igo Nikolic | A lecture exploring the global sustainability transition from the technical, social, economic and environmental perspectives, ... | |
Dicussion on sustainability and hackers | Igor Nikolic | Follow up discussion, exploring the topics discussed in the lecture and any other related aspect ... | |
Dancing in the Dark Inertial Navigation MEMS sensors basics | Bogdan Doroslovac | MEMS technology is in almost every smart device around us, ranging from smart watches to ... | |
Hybrid Cloud Seeding Hacking Microsoft Hybrid Cloud Infrastructure | Tanoy "notty" Bose , Blueberry Vignesh4303 | During a red team exercise, one of the prime crown jewel that the attacker targets ... | |
A WinDbg full of tricks Malware analysis tricks using WinDbg | Vanja | WinDbg is a powerful debugging environment allowing an analyst to dig into the Windows internals ... |