ROOTCON12 2018 Sept. 27, 2018 to Sept. 28, 2018, Tagaytay, Philippines

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Apple Health Vladimir Katalov Your heartrate and sleeping habits. Cardio and workouts. Steps and walking routines, and even your ...
Bug Bounty Hunting on Steroids Anshuman Bhartiya Bug bounty programs are a hot topic these days. More and more companies are realizing ...
Cyber Security Threats to Telecom Networks Rosalia D’alessandro , Hardik Mehta , Loay Abdelrazek The presentation will include the following: Quick introduction of 3G/4G telecom networksDiscuss various ways to ...
Defending cloud Infrastructures with Cloud Security Suite Shivankar Madaan Nowadays, cloud infrastructure is pretty much the de-facto service used by large/small companies. Most of ...
Exploiting ActionScript3 Interpreter Boris Ivanov At the end of 2017 we discovered an Adobe Flash Player zero day vulnerability (CVE-2017-11292) ...
Expl-iot: Hacking IoT like a boss Aseem "@" Jakhar IoT is getting a lot of attention these days. Lot of startups are coming up ...
Fire & Ice: Making and Breaking macOS firewalls Patrick Wardle In the ever raging battle between malicious code and anti-malware tools, firewalls play an essential ...
How (not) to fail at hardware Craig Smith A lot of security is being moved into hardware. This doesn't fix security, it just ...
IoT and JTAG Primer Michel Chamberland IoT use is growing rapidly through a research study sponsored by Trustwave, it was revealed ...
Not So Crab Mentality: A True RasS Story Christopher Elisan Ransomware-as-a-Service (RaaS) is a booming business for cybercriminals. It gives novice and not-so-skilled cybercriminals the ...
pi$$ing off an APT Ed Williams Red teaming is everywhere and everybody is doing it. Most organisations are not mature enough ...
SAP Incident Response, how to attack and defend! Jordan Santarsieri SAP is a core part of the business-critical infrastructure of 95% of the biggest companies ...