BSidesLisbon 2018 Nov. 29, 2018 to Nov. 30, 2018, Lisbon, Portugal

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Protecting Crypto Exchanges from a new wave of Man-in-the-Browser attacks Pedro Fortuna In the last year or so, we have seen a massive increase in the value ...
VPNFilter - YetAnotherBotNet or maybe not.... Vitor Mercer VPNFilter - YetAnotherBotNet or is it more than that?! A different view into VPNFilter from ...
Cruising Ocean Threat with TheHive, Cortex & MISP without Sinking Saâd Kadhi TheHive, Cortex and MISP is a **highly integrated**, free, open source stack used by many ...
Reverse Engineering Microcontroller Firmware Steve Lord Sometimes you find a microcontroller, and you just need to know what it does. In ...
Keynote: The Infosec Survival Field Guide Stefan Friedli Information Security, what an exciting field to be working in. You get to be a ...
Securing Attacking Kubernetes Vincent Ruijter A purple team talk targeting Kubernetes deployments. Demonstrating several attack vectors and the corresponding mitigations.This ...
Binary protocol analysis with CANAPE Hans-martin Müller CANAPE is a Windows toolkit for analyzing binary protocols in a graphical environment, written by ...
Exfiltrate all the things! David Umbelino This talk is based on our research on airgap systems and covert channel exfiltration methods. ...
CookieMonstruo: Apple Flavour Martin Vk A look on web cookies security on macOS and how the idea that anti-malware solutions ...
Modern Binary Exploitation Techniques for Linux André Bento We are not in the 90’s anymore. Many memory corruption mitigations were introduced through all ...
Social Engineering, Applied Educational Theory, and the Gap Between Them Rose Regina Lawrence In this space, we glorify and revel in impressive and amusing social engineering hijinks. This ...
SecOps Automation and Orchestration Nicolas Mattiocco How SecOps Automation and Orchestration tackle today's cybersecurity challenges.A company, regardless of its size and ...
Open Source Intelligence based Intrusion Detection System Ivo Vacas The presentation shows the implementation of an Intrusion Detection System based on Open Source Intelligence ...
Hunting Android Malware: A novel runtime technique for identifying malicious applications Chris Le Roy In this research, we propose a novel technique to identify malicious Android applications through the ...
Active Directory security: 8 (very) low hanging fruits and how to smash those attack paths Remi Daubresse Pentester or attacker often exploit the same obvious vulnerabilities in Active directory. Come learn how ...
Project DiSIEM: Diversity Enhancements for Security Information and Event Management Ana Respicio , Fernando Alves , Alysson Ferreira This talk presents the DiSIEM EU H2020 Project (http://disiem-project.eu/) with a special focus on its ...