BruCon 2014 Sept. 22, 2014 to Sept. 24, 2014, brussels,belgium

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote Adam Shostack , Jennifer Minella N/A
Let's help law enforcement more to drag malware actors into the law Hendrik Adrian To overcome the above facts. In this presentation we stress the importance to stop every ...
Using Superpowers for Hardware Reverse Engineering Joe ( Kingpin ) Grand Superpowers, normally used by superheroes in the battle of good versus evil, are also accessible ...
A distributed approach to mobile malware scanning Daan Raman In this presentation, we will discuss the advantages of a distributed online mobile malware scanning ...
Hacking Driverless Vehicles Zoz Are driverless vehicles ripe for the hacking? Autonomous and unmanned systems are already patrolling our ...
Thunderbolts and Lightning / Very, Very Frightening Snare , Rzn People keep talking about Thunderbolt DMA attacks as though they're a foregone conclusion. Prior to ...
Biting into the forbidden fruit. Lessons from trusting JavaScript crypto Krzysztof Kotowicz We all know JS crypto is flawed, right? Over the years, security community has pointed ...
Investigating PowerShell Attacks Ryan Kazanciyan , Matt Hastings Over the past two years, we've seen targeted attackers increasingly make use of PowerShell to ...
Cyber Necromancy: Resurrecting the Dead (Game Servers) Joseph Tartaro , Matthew Halchyshak Reverse engineering is not all binaries and byte-code. The black art also extends to networks ...
Windows Crash Dump Exploration Aaron Lemasters The Microsoft Windows crash dump mechanism is perhaps one of the most crucial undocumented components ...
One packer to rule them all: Empirical identification, comparison and circumvention of current Antivirus detection techniques Alaeddine Mesbahi , Arne Swinnen Lately, many popular Antivirus solutions claim to be the most effective against unknown and obfuscated ...
The Projects Of Prototype This Joe ( Kingpin ) Grand , Zoz Designing and building projects is hard. Designing and building projects of things that have never ...
Data transforming your sewage into signatures - lessons learnt from building a hybrid honeypot named Amber Adam Schoeman What happens when you collect a bunch of good data, under good pretences only to ...
Stealing a Mobile Identity Using Wormholes Markus Vervier Authentication in mobile networks is usually done using a secure element which is commonly a ...
Security Makes Strange Bedfellows: Using Legal and Procurement To Secure Software Noel Dunne , Paco Hope The penetration test finds a bug in the code that was coded four months ago ...
Chiron - An All-In-One Penetration-Testing Framework for IPv6 Antonios Atlasis In this talk, an open-source security assessment and penetration testing framework specifically designed for IPv6 ...
WPScan Vulnerability Database Ryan Dewhurst Ryan will be talking about his experience completing his BruCON 5by5 project in which he ...
OWTF re-architecture Alessandro Fanio González Why are good practices in software development relevant to security? Have you ever tried to ...
Conpot Daniel Haslinger , Lukas Rist , Johnny Vestergaard Conpot is a low interaction server side Industrial Control Systems honeypot designed to be easy ...
OWTF Botnet mode Marios Kourtesis OWASP OWTF is the Offensive (Web) Testing Framework, a project designed to facilitate penetration testing, ...
OWASP: OWTF Bharadwaj Machiraju The purpose of OWTF is to automate the manual, uncreative part of pentesting, so that ...
Network device forensics Didier Stevens , Xavier Mertens Memory forensics is the next step the forensic community has taken. In this workshop, you ...
Autonomous Remote Hacking Drones (requirements) Philip Polstra This workshop will walk attendees through the process of creating their own remote hacking drones. ...
Counterfeiting the Pipes with FakeNet 2.0 Michael Sikorski Successful dynamic analysis of malware is dependent on your ability to “Fake the Network”. Tricking ...
Linux Forensics Workshop Hal Pomeranz This hands-on workshop is a rapid introduction to key artefacts and techniques for investigating compromised ...
Splinter the RAT Attack: Create Your Own Botnet to Exploit the Network Solomon Sonya Amassing a large multi-node botnet is no trivial task, but is possible if you know ...
Old School Crypto Chris Lytle , Leigh Lytle Cryptography is awesome, but modern cryptography has a seriously high barrier to entry that prevents ...
"The audit log was cleared" won’t stop me: Advanced Windows Event Log Forensics Willi Ballenthin Obviously, event logs contain key forensic artefacts. But what can you do when they’ve been ...
The dirty secrets of client-side exploitation and protection Wim Remes , Daniela Zapata It’s no secret that client-side attacks are what gets attackers a foothold on the network, ...
Exploiting the Bells and Whistles: Uncovering OEM Vulnerabilities in Android Jake Valletta In today’s day and age, there are literally hundreds of presentations, blogs, and trainings on ...