Troopers 2015 March 18, 2015 to March 19, 2015, Heidelberg,Germany
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Keynote: Information Security – The hard thing about the hard thing | Haroon Meer | N/A | IncludeThinkstScapes |
Pneumonia, Shardan, Antibiotics and Nasty MOV: a Dead Hand's Tale | Arrigo Triulzi | Starting in the 80’s we will discuss the influence of nuclear weapons on the design ... | |
Automating Network Security | Ivan Pepelnjak | Networking and security vendors love to talk about their software-defined solutions and automation… but can ... | |
HoneySAP: Who really wants your money | Martin Gallo | Targeted attacks against ERP systems and enterprise software are not something new, however they only ... | |
General Pr0ken File System - Hacking IBM's GPFS | Florian Grunow , Felix Wilhelm | The IBM General Parallel File System (IBM GPFS) is a high performance cluster file system ... | |
Game Over, Does the CISO get an Extra Life? | Richard Rushing | Each new year, brings new challenges, new attacks, new defections, new groups attacking, new requirements ... | |
I know what You Coded last Summer | Andreas Wiegenstein , Xu Jia | Are you aware that each of your SAP production systems statistically contains 9 security vulnerabilities ... | |
Hardware YOU can (Audit and then) Trust | Benedikt Stockebrand | While it is long known to the security community that attacks against hardware are among ... | |
The foundation is rotting and the basement is flooding: A deeper look at the implicit trust relationships in your organization | Jacob Torrey | In this session, a new hardware-level attack on PCIe is presented as an example for ... | |
JURASSIC SAP | Sergio Abraham , Juan Perez-etchegoyen | What you learned in school is that dinosaurs have been extinct for the last 65 ... | |
Modern Platform-Supported Rootkits | Rodrigo Rubira Branco , Gabriel negreira Barbosa | Talks on modern rootkit techniques are often presented in conferences around the world, but most ... | |
Hacking Fortune 2000th CEO’s mobile: Security of SAP Mobile Infrastructure | Alexander mikhailovich Polyakov , Dimitry chastuhin | Have you ever thought how to get access to most influential data stored on a ... | |
iOS Hacking – Advanced Pentest & Forensic Techniques | Omer Coskun , Mark De Groot | While there has certainly been valuable interesting research of blackbox security assessments techniques presented on ... | |
Defender Economics | Andreas Lindh | There are a lot of preconceptions about defense, the most prevalent one probably the “defenders ... | |
SAP, Credit Cards and the Bird that Talks Too Much | Ertunga Arsal | SAP applications build the business backbone of the largest organizations in the world. In this ... | |
Multipath TCP - Breaking Today's Networks with Tomorrow's Protocols | Patrick Thomas , Catherine Pearce | MultiPath TCP (MPTCP) is an extension to TCP that enables sessions to use multiple network ... | |
A Backdoor in Wonderland | Hans-christian Esperer , Frederik Weidemann | Many companies spend millions for locking down their SAP landscape. But even the highest invest ... | |
Incident Response and SAP Systems | Juan Perez-etchegoyen , Sergio Abraham | While cyber attacks are increasing every year, SAP systems are still not immune to being ... | |
Keynote | Sergey Bratus | N/A | |
Hacking FinSpy - a Case Study about how to Analyse and Defeat an Android Law-enforcement Spying App | Attila Marosi | Most possibly there is no need to make a long introduction when speaking about the ... | |
How to Efficiently Protect Active Directory from Credential Theft & Large Scale Compromise – An Approach Based on Real-World Expertise | Friedwart Kuhn | Credential theft and Pass-the-Hash (PtH) attacks are nowadays current threats to Active Directory environments. This ... | |
Introduction to Hacking In Car Systems | Craig Smith | We're going to cover the intros to CAN bus hacking with interactive demos for hacking ... | |
The old is new, again. CVE20112461 is back! | Luca Carettoni , Mauro Gentile | As a part of an ongoing investigation on Adobe Flash SOP bypass techniques, we identified ... | |
Let's Clear up the Debris - What the Snowden Leaks Mean for Your IT Security Strategies | Sylvia Johnigk , Kai Nothdurft | The Snowden Leaks triggered a worldwide scandal. The public interest and discussions focus on the ... | |
RF Retroreflectors, Emission Security and SDR | Michael Ossmann | The leaked pages from the NSA ANT catalog provided a glimpse into the modern world ... | |
The State of Email in 2015 | Martijn Grooten | Back in the early 1980s, when email was invented, the Internet population was many orders ... | |
Advanced PDF Tricks (A.P.T) - a Workshop-style Presentation to Understand the PDF File Format | Ange ( ange4771 ) Albertini , Kurt Pfeifle | This session is NOT about analyzing exploits but about learning to manipulate PDF contents. Among ... | |
Weapons of Mass Distraction – Sock Puppetry for Fun & Profit | Marco Slaviero , Azhar Desai | There have been many discussions online about governments making use of sock puppets on social ... | IncludeThinkstScapes |
Defending the Enterprise Against Network Infrastructure Threats | Paul Coggin | Learn about network attack vectors that an adversary can use to control, and influence network ... | |
The Wallstreet of Windows Binaries | Marion Marschalek , Joseph Moti | Nowadays common ways to find exploitable vulnerabilities include but are not limited to fuzzing, static ... | |
Crypto in the Cloud | Frederik Armknecht | Although cloud services become more and more popular, security concerns of the customers prevent a ... |