ZeroNights 2015 Nov. 25, 2015 to Nov. 26, 2015, moscow,russia

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote: A praise for hackers Rodrigo Rubira Branco Hackers are creating knowledge and sharing information since the inception of technologies. They do have ...
Hacking virtual appliances Jeremy Brown Virtual Appliances have become very prevalent these days as virtualization is ubiquitous and hypervisors commonplace. ...
Extracting the painful (Blue)tooth Matteo Beccaro , Matteo Collura Do you know how many Bluetooth-enabled devices are currently present in the world? With the ...
Cisco IOS shellcode – all-in-one George Nosenko Cisco network equipment has always been an attractive attack target due to its prevalence and ...
Fix it yourself: resolving UEFI vulnerabilities single-handedly Nikolaj Schlej A vulnerability has been found in your firmware but the vendor isn’t in any hurry ...
Big problems with big data – Hadoop interfaces security Jakub Kaluzny Did "cloud computing" and "big data" buzzwords bring new challenges for security testers? Apart from ...
illusoryTLS: Nobody But Us Impersonate, Tamper, and Exploit Alfonso de Gregorio Learn how to embed an elliptic-curve asymmetric backdoor into a RSA modulus using Elligator. Find ...
Hack like a movie star: Step-by-step guide to crafting SCADA payloads for physical attacks with catastrophic consequences Marina Krotofil Nearly all talks on SCADA vulnerabilities are concluded with the sweeping scenarios of physical attacks ...
Modifying the firmwares of industrial switches Alexander Ermolov The data bus is the heart of any modern ICS infrastructure. It is typically based ...
Direct X – direct way to Microsoft Windows kernel Nikita Tarakanov Graphics technologies expose a large number of APIs in kernel mode drivers that need to ...
«Attacking hypervisors using firmware and hardware» Alexander Matrosov In this presentation, we explore the attack surface of modern hypervisors from the perspective of ...
«Introducing Choronzon: an approach to knowledge-based evolutionary fuzzing» Nikolaos Naziridis , Zisis Sialveras The framework that will be presented is a file format fuzzer that uses evolutionary algorithms ...
«Warranty void if label removed – attacking MPLS networks» Georgi Geshev Multiprotocol Label Switching (MPLS) is certainly the most prevalent service provider technology used by major ...
«Getting the most out of CSP: a deep dive» Sergey Shekyan Content Security Policy is used to declare web resource content restrictions. It prevents exploitation by ...
«Did you get your token?» Daniel (jin Long) , Azure (yang Jietao) Microsoft keeps evolving its security mechanisms while releasing new versions of Windows. These new introduced ...