hacktivity2018 2018 Oct. 12, 2018 to Oct. 13, 2018, Budapest, Hungary

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote Brian Gorenc , Mike Ossmann N/A
Finding Game Secrets... AT SCALE! Bernardo Maia Rodrigues Some video game secrets and cheats took years/decades to be discovered. From debug menus, to ...
How to Get into the Darknet & PIN Breaking of Smartphones Tobias Schrödel This presentation is divided into two completely different parts.Part 1: Ever wondered how to get ...
Smart Car Forensics and Vehicle Weaponization Gabriel Tanase As “smart” is becoming the new standard for everything, malicious threat actors are quick to ...
A Drone Tale: All Your Drones Belong To Us Paolo Stagno In 2013, DJI Drones quickly gained the reputation as the most stable platform for use ...
~Securing~ Attacking Kubernetes Vincent Ruijter This talks' focus lays on a popular containerization tool called Kubernetes. Common implementations of Kubernetes ...
XFLTReaT: Building a Tunnel Balazs Bucsay XFLTReaT is an open-source tunnelling framework that handles all the boring stuff and offers the ...
Diffing C Sources to Binaries Joxean Koret Often, when doing reverse engineering projects, one needs to import symbols from Open Source or ...
Becoming The Quiz Master: Thanks RE. Jack S linkcabin aims to discuss the journey of reverse engineering a pub quiz machine, to a ...
Hacking Yachts Remotely via Satcom or Router Stephan Gerling Modern vessels and yachts are equipped with a lot of specialized equipment communicating over internal ...
Hunting for bugs in Adobe Experience Manager webapps Mikhail Egorov Adobe Experience Manager (AEM) is an enterprise-grade CMS. It’s used by high-profile companies like Linkedin, ...
Keynote / On screen Rodrigo Rubira Branco N/A
The Nigerians are in the Spajz Gabor Szappanos Nigerian criminals have been heavily involved in email scams for decades and they are very ...
Interdependent Privacy & the Psychology of Likes Gergely Biczók The Facebook/Cambridge Analytica case headlined technical news the whole Spring of 2018. This case is ...
What's 4k in Real Money? Robert Neumann In the early years of computer science size did matter. The same rule applied to ...
Monitoring Information Leaking with Open SRC Tools (HUN) Tamás Kovács Az OSINT, azaz az Open Source Intelligence még mindig méltatlanul alábecsült területe az információbiztonságnak, és ...
Passwords & Authentication Based on Proper Crypto Stef Two new(ish) protocols and their implementations will be introduced. Both protocols are based on simple, ...
Ethereum Smart Contract Hacking Explained like I’m Five Zoltan Balazs Mining. Ethereum. Smart Contracts. Gas. Solidity. DAO. These words had no or a different meaning ...
Under the Hood – The Automotive Challenge Inbar Raz In an average 5-year old car, there are about 30 different computers on board. In ...
The (not so profitable) Path towards Automated Heap Exploitation Thais Moreira Hamasaki The modern world depends and rely on the security (and safety!) of software. To protect ...
The Mate Escape – Android Pwn2Owning Alex Loureiro As memory corruption is becoming harder and harder and more mitigations are being added for ...
Examp. of Locality Sensitive Hashing & their Usage for Malware Classification Csongor Tamás Several tools has been proposed for malware classification and similarity detection of binary malware samples, ...
Cheaters for Everything from Minesweeper to Mobile Banking Applications Zsombor Kovács In my opinion, cheating acceptable - it merely means expanding the frame of an application ...
Bypassing an Enterprise-Grade Biometric Face Authentication System Matthias Deeg Biometric authentication systems have long, checkered history in IT security and are regarded as a ...