hacktivity2018 2018 Oct. 12, 2018 to Oct. 13, 2018, Budapest, Hungary
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Keynote | Brian Gorenc , Mike Ossmann | N/A | |
Finding Game Secrets... AT SCALE! | Bernardo Maia Rodrigues | Some video game secrets and cheats took years/decades to be discovered. From debug menus, to ... | |
How to Get into the Darknet & PIN Breaking of Smartphones | Tobias Schrödel | This presentation is divided into two completely different parts.Part 1: Ever wondered how to get ... | |
Smart Car Forensics and Vehicle Weaponization | Gabriel Tanase | As “smart” is becoming the new standard for everything, malicious threat actors are quick to ... | |
A Drone Tale: All Your Drones Belong To Us | Paolo Stagno | In 2013, DJI Drones quickly gained the reputation as the most stable platform for use ... | |
~Securing~ Attacking Kubernetes | Vincent Ruijter | This talks' focus lays on a popular containerization tool called Kubernetes. Common implementations of Kubernetes ... | |
XFLTReaT: Building a Tunnel | Balazs Bucsay | XFLTReaT is an open-source tunnelling framework that handles all the boring stuff and offers the ... | |
Diffing C Sources to Binaries | Joxean Koret | Often, when doing reverse engineering projects, one needs to import symbols from Open Source or ... | |
Becoming The Quiz Master: Thanks RE. | Jack S | linkcabin aims to discuss the journey of reverse engineering a pub quiz machine, to a ... | |
Hacking Yachts Remotely via Satcom or Router | Stephan Gerling | Modern vessels and yachts are equipped with a lot of specialized equipment communicating over internal ... | |
Hunting for bugs in Adobe Experience Manager webapps | Mikhail Egorov | Adobe Experience Manager (AEM) is an enterprise-grade CMS. It’s used by high-profile companies like Linkedin, ... | |
Keynote / On screen | Rodrigo Rubira Branco | N/A | |
The Nigerians are in the Spajz | Gabor Szappanos | Nigerian criminals have been heavily involved in email scams for decades and they are very ... | |
Interdependent Privacy & the Psychology of Likes | Gergely Biczók | The Facebook/Cambridge Analytica case headlined technical news the whole Spring of 2018. This case is ... | |
What's 4k in Real Money? | Robert Neumann | In the early years of computer science size did matter. The same rule applied to ... | |
Monitoring Information Leaking with Open SRC Tools (HUN) | Tamás Kovács | Az OSINT, azaz az Open Source Intelligence még mindig méltatlanul alábecsült területe az információbiztonságnak, és ... | |
Passwords & Authentication Based on Proper Crypto | Stef | Two new(ish) protocols and their implementations will be introduced. Both protocols are based on simple, ... | |
Ethereum Smart Contract Hacking Explained like I’m Five | Zoltan Balazs | Mining. Ethereum. Smart Contracts. Gas. Solidity. DAO. These words had no or a different meaning ... | |
Under the Hood – The Automotive Challenge | Inbar Raz | In an average 5-year old car, there are about 30 different computers on board. In ... | |
The (not so profitable) Path towards Automated Heap Exploitation | Thais Moreira Hamasaki | The modern world depends and rely on the security (and safety!) of software. To protect ... | |
The Mate Escape – Android Pwn2Owning | Alex Loureiro | As memory corruption is becoming harder and harder and more mitigations are being added for ... | |
Examp. of Locality Sensitive Hashing & their Usage for Malware Classification | Csongor Tamás | Several tools has been proposed for malware classification and similarity detection of binary malware samples, ... | |
Cheaters for Everything from Minesweeper to Mobile Banking Applications | Zsombor Kovács | In my opinion, cheating acceptable - it merely means expanding the frame of an application ... | |
Bypassing an Enterprise-Grade Biometric Face Authentication System | Matthias Deeg | Biometric authentication systems have long, checkered history in IT security and are regarded as a ... |