44con 2015 Sept. 9, 2015 to Sept. 11, 2015, London,UK

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
How to drive a malware analyst crazy Michael Boman This talk will discuss the different methods malware authors use to complicate the malware forensics ... IncludeThinkstScapes Defence
Playing with Fire: Attacking the FireEye MPS Felix Wilhelm This talk will give an overview of a number of vulnerabilities in FireEye’s Malware Protection ... IncludeThinkstScapes
Is there an EFI monster inside your apple? Pedro Vilaça I publicly disclosed an Apple EFI firmware zero day. It was a very powerful bug ...
Barbarians At The Gate(way): An Examination Of The Attacker's Tool Box Dave Lewis This talk will examine the tools, methods and data behind the DDoS attacks that are ...
Smart Muttering; a story and toolset for smart meter platform Ian De Villiers The use of smart meters and their associated technologies is becoming more widespread as utility ...
Exploiting 64-bit IE on Windows 8.1 - The Pwn2Own Case Study Yuki Chen Instead of 32-bit IE, this year's Pwn2Own competition selected 64-bit Internet Explorer as the target ...
Windows 10: 2 Steps Forward, 1 Step Back James Forshaw Windows 10 is shaping up to be one of the most secure consumer operating systems ...
Meterpreter: Understanding the New Shiny Oj Reeves The last couple of years have seen Meterpreter move forward leaps and bounds when it ...
Inside Terracotta VPN Kent Backman Virtual Private Networks (VPN) are very popular. They are part and parcel for almost every ...
Jtagsploitation: 5 wires, 5 ways to root Joe Fitzpatrick , Matt King JTAG comes up in nearly every hardware-related hack. In order to do anything via JTAG, ...
DDoS mitigation EPIC FAIL collection Moshe Zioni I have been researching DDoS attacks and mitigation techniques for the past three years and ...
Hunting Asynchronous Vulnerabilities James Kettle In blackbox tests vulnerabilities can lurk out of sight in backend functions and background threads. ... Attack IncludeThinkstScapes
Old Dog, New Tricks: Forensics With PowerShell Jared Atkinson Recent intrusion into the networks of organizations like Office of Personnel Management, Sony, JPMorgan Chase, ...
Hackers in the Wire and Drones Oh My! Philip Polstra At the second 44CON Phil debuted The Deck, a penetration testing Linux distro for the ...
Attacking VxWorks: from Stone Age to Interstellar Yannick Formaggio VxWorks is the world’s most widely-used real-time operating system deployed in embedded systems. Its market ...
reverse reverse engineering Richo Healey Richo will walk attendees through the basic architecture of a traditional AOT compiler and runtime ... IncludeThinkstScapes
MITMf: Bringing Man-In-The-Middle attacks to the 21'st century Marcello Salvati Tired of managing countless scripts for automating your Man-In-The-Middle attacks? Have a cool idea for ...
Dark Fairytales from a Phisherman (Vol.II) Michele Orru Phishing attacks are a prevalent threat against large or small organisations. As professionals in the ...
Reverse engineering and exploiting font rasterizers: the OpenType saga Mateusz “j00ru” Jurczyk Font rasterization software is clearly among the most desirable attack vectors of all time, due ...
15-Minute Linux Incident Response Live Analysis Philip Polstra This presentation will show attendees how to perform an initial live analysis of a Linux ...
A Trek to the Emerald City: Ring -1 Based AV Shift To compete in the endless race against rootkits, antivirus software vendors are slowly starting to ...
Get in the Ring0 - Understanding Windows drivers Graham Sutherland (for "Learn Something" track) Separate your IRPs from your IRQLs, people, it's time to learn ...
Going AUTH the Rails on a Crazy Train Jeff Jarmoc , Tomek Rabczak Rails has a strong foundation in convention over configuration. In this regard, Rails handles a ...
Responsible disclosure: who cares? Dan Tentler , Oj Reeves Both Oj and Dan have been conducting security assessments for years. Occasionally a discovery is ...
Software Defined Networking (SDN) Security David Jorm SDN is rapidly moving from R&D to production deployment, with some frightening security implications. This ...
Forging the USB armory Andrea Barisani The availability of modern System on a Chip (SoC) parts, having low power consumption and ...