HackLu 2008 Oct. 22, 2008 to Oct. 24, 2008, Luxembourg,Luxembourg

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Opening Speech: Malware of the future - When mathematics work for the dark side. Eric Filiol Computer security deals with the essential problem of the sword against shield issue. Attackers aim ...
Browser Exploits - A new model for Browser Security Saumil Udayan Shah Browser exploits have taken centre stage as the next wave of practical exploitation of systems. ...
Investigating individuals and groups using open source intelligence Roelof ( RT ) Temmingh In this presentation we will show how the abundance of information on the Internet (using ...
Hacking Internet Kiosks Paul Craig Internet Kiosk's have become common place in today's internet centric society. Public internet Kiosk's can ...
User Authentication at the Firewall level Eric Leblond , Vincent Deffontaines , Sbastien Tricaud This talk focuses on how firewalls can work at the TCP/IP network layer and handle ...
Cracking into embedded devices and beyond! Adrian ‘pagvac’ Pastor The presentation covers cracking into embedded devices by exploiting vulnerabilities present on default software running ...
The end of the internet" aka "Self replicating malware on home routers Naxxatoe This talk is about devices that close to everybody has in their homes and offices. ...
Immersed network discovery and attacks, specifics of telecom Core Network (CN SS7/SIGTRAN) insider attacks Philippe Langlois The number of security perimeters is increasing for every companies thanks to new vectors such ...
Going outside Citrix context Joffrey Czarny Citrix is a Remote Desktop application that is very popular and is often used between ...
How to make smartcards resistant to hackers' lightsabers? Philippe Teuwen Cracking smartcards has always been a prized hobby, for the academic glory , for fun ...
A little journey inside Windows memory Damien Aumatre In 2005 and 2006, two security researchers, Maximilian Dornseif and Adam Boileau, showed an offensive ...
Browser Rootkits Julien Lenoir , Christophe Devaux For a few years now, people have learnt to configure firewalls. Very few ports are ...
Rustock.C - When a myth comes true Frank Boldewin Todays top notch spambots have one in common - next to the ability to send ...
Anti-virus 2.0 - "Compilers in disguise" Mihai Chiriac Early viruses were easily detected using simple pattern matching algorithms, but quickly evolved. Techniques such ...
Bridging the Gap between the Enterprise and You - or - Who's the JBoss now? Patrick Hof , Jens Liebchen The JBoss Application Server (JBoss AS) is a widely used open source Java application server. ...
Server-side Virus scanning Dumitru Codreanu Long are the days when antiviruses featured as little as few hundreds of virus signatures ...
Analysis of an undocumented network protocol Jean-baptiste Bdrune This presentation deals with a methodology used during the analysis of an undocumented and encrypted ...
Egregious use of TOR servers F.w.j Geelkerken From the early nineties of last century onward the importance of information and communication technology ...
gFuzz: An Instrumented Web Application Fuzzing Environment Ezequiel David Gutesman Web application fuzzers have traditionally been used by security experts as a first step in ...
RFIDIOts!!! Practical RFID hacking (without soldering irons). Adam ( Major Malfunction ) Laurie RFID is being embedded in everything... From Passports to Pants. Door Keys to Credit Cards. ...
How the Leopard Hides his Spots: OS X Anti-Forensic Techniques The Grugq Anti-Forensics is the new buzzword within forensic circles. Despite significant interest, no significant new information ...