Kiwicon20138AD 2018 Nov. 16, 2018 to Nov. 16, 2018, Wellington, New Zealand
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Regrets | Jessie Frazelle | This talk will be on the regrets from building Docker. Recently I have been working ... | |
Apathy and Arsenic: a Victorian Era lesson on fighting the surveillance state | Attacus | What does expensive Victorian era wallpaper have in common with a Cambridge Analytica Facebook quiz? ... | |
Introducing "moriarty", a tool for automated smart contract symbolic execution vulnerability discovery and exploit synthesis | Caleb "alhazred" Anderson | "In the grim future of 2018, there is only war... and the cypherpunks won. if ... | |
Feeding the Beast: Network Insurgency | Syngularity0 | There's a metric bucketload of cool technology and awesome tools out there to support red ... | |
Lessons from game consoles and the coming security apocalypse | Boyd Multerer | There are few computing devices that are more attacked on an ongoing basis than game ... | |
Living w/o the Land - Active Directory attacks from Linux | Mubix | Powershell and C# has been the new hotness for 5-6 years now, but with all ... | |
Ghosts in the Browser: Backdooring with service workers | Claudio Law | Service workers are all the rage for progressive web apps nowadays. This talk will take ... | |
Mayday, Mayday, Mayday - Safe Harbor, no more | Eliza Sorensen | CONTENT WARNING: THIS TALK TOUCHES ON SOME VERY SENSITIVE ISSUES, AN INTRO TO THE TALK ... | |
DHCP is hard | Felix Wilhelm | DHCP is a 25 years old network protocol supported by almost every network capable device ... | |
Getting Buzzed on Buzzwords: Using Cloud & Big Data to Pentest at Scale | Moloch & Mandatory | You’ve heard about cloud, big data, server-less infrastructure, web scale, and other buzzwords that cause ... | |
Securing a World of Physically Capable Computers | Bruce Schneier | Computer security is no longer about data; it’s about life and property. This change makes ... | |
Moving Fast and Securing Things | Kelly Ann | In a world where autonomy flourishes, a perpetual stream of new ideas gets executed. As ... | |
Cyber defence exercises - how to make it cool? | Raimo Peterson | Technical cyber defence exercises are typically conducted in a Cyber Range, hosting hundreds of servers, ... | |
Getting Shells from JavaScript: offensive JavaScript techniques for red teamers | Dylan Frichot | AppSec is often very heavily focused on pre-exploitation. Frameworks like BeEF break this norm a ... | |
Overwatch Cyber-Espionage Tool | Wayne | In the last few years we have seen a number of classified documents leaked from ... | |
Tracing the Watchers: practical tooling | Paul Mcmillan | Everyone knows that listening to the police scanner is legal.* Less well known: every time ... | |
Arbitrary code execution, I choose you! | Sarah Young | Did you hear about the arbitrary code execution hardware vulnerability in the Nintendo Switch discovered ... | |
Red Cell - Mimicking Threat Actors for Realistic Responses | Brendan Jamieson | Many organisations make use of offensive security exercises to test their security posture - including ... | |
Set Theory for Hackers | Pruby | Why is your anti-phishing training largely pointless, but some parts of it essential? Why is ... | |
Hacking and the law: The year is actually still 1998 | Felix Geiringer | A short précis on the interaction between NZ law and hacking. The theme of the ... | |
Digital identity: decentralised and self-sovereign | Martin Krafft | It's 2038, and technology has become ubiquitous, and seamlessly interwoven with human existence. Authentication is ... | |
The day the carnival came to town | David Hood | The mid-2018 attempted speaking visit by members the Canadian alt-right caused Twitter discussions among tens ... | |
ScRooters - disrupting the electric scooter market | Matthew Garrett | Electric scooter companies have started cropping up all over the US. Competing largely on brand ... | |
Testastretta Operetta | Doi | "Computers are responsible for everything. EVERYTHING. Power plants? Computers. Makin' juice? Also computers. That deep ... | |
Server Room Selfies: When physical security goes wrong | Logan Woods | What if someone could just walk in off the street and physically help themselves to ... |