Wahckcon 2015 May 2, 2015 to May 3, 2015, North Bridge,Austrailia

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
KEYNOTE: Cybersecurity - A Key Ingredient to Australia's Economic Growth Gary Hale With the Prime Minister's Cybersecurity Review well underway, what does this mean for Australia - ...
How to hack your way out of home detention William Turner Home detention systems are secure, they must be, they protect us from the bad guys, ...
So you think all those attacks are originated from China? Let's go through a journey of an in-depth investigation of attacks by using custom honeypots Pedram Hayati Looking at your server logs, you always see sheer loads of connections from China or ...
Probe-lematic PEDs Doles Almost everyone carries a smartphone, this talk demonstrates how passive collection of wireless data can ...
iOS Runtime Hacking Crash Course Michael Gianarakis This talk will provide a crash course in exploiting iOS applications through the manipulation of ...
Response kids are cool too! Scotty Brown A talk that's 'a day in the life' of a modern incident responder, showing that ...
BIOHACK YOUR WETWARE - BECOME A CYBORG Ss23 With fancy technology being so abundant these days, the options for becoming a cyborg on ...
Breaking the security of physical devices Silvio Cesare From owning, cloning, and honing in on Australia's public transport cards, home alarms from Bunnings, ...
Tainted BeEF or Treating Mad Cow Disease With Websocket (In)Security Maxim Chernyshev BeEF is a poulare client side security assessment and penetration testing toolkit. The author's research ...
Bypassing Android Binary Protections Julian Berton Android binary protections, what are they, how to bypass them, why we bother, and lots ...
A foray into hardware hackery: Maybe you can teach an old dog new tricks Dave Taylor With any luck, I'll be demonstrating a cheap and relatively straightforward way of manipulating the ...
Improving your haxor skills "legally", while doing the right thing Hugh Davenport This talk will give an overview of different methods of responsible/coordinated disclosure of varying levels ...
Cloutron - The Hipster way to monitor your cloud Christian "xntrik" Frichot We use a lot of AWS cloudy stuff, and sometimes you have to wait for ...
What happens to old Cloud accounts and data? Robin Lennox In 2015, more companies are using the cloud to provide services such as email, document ...
Chronicles of same origin policy bypass Emmanuel Law Same Origin Policy (SOP) is one of the fundamental protection when surfing the internet. It's ...
Find all the bugs: win all the bounties Shubham Shah "In the last two years alone, I have made approximately at least $30k from bug ...