BSidesBudapest 2019 March 28, 2019 to March 28, 2019, Budapest, Hungary

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
How Will Cryptography Survive the Rise of Quantum Computing? Rakhim Davletkaliyev The most widely used cryptography today is based upon a handful of ideas from number ...
FRIDA, the "Hooker" Barnabás Sztán-kovács FRIDA is a bad girl who can do nasty things - not only she is ...
Social Networks are Social Weapons Tobias Schrödel Tobias will talk about Social Networks with two aspects: a) how do they know so ...
Scale Your Auditing Events Philipp Krenn The Linux Audit daemon is responsible for writing audit records to the disk, which you ...
How to be a Pentester? Zsombor Kovács The word Hacker is one of the most widely misunderstood and misused one within the ...
Abusing Google Play Billing for Fun and Unlimited Credits Guillaume Lopes In 2017, the estimated global in-app purchase revenue was projected to exceed $37 billion. Just ...
Sustainability of the x86 Insecurity Model Dávid Török In today's ever evolving cybersecurity landscape, some organizations are starting to get the grasp of ...
The Katz out of The Bag Sandor Feher Mimikatz is a hacking tool that showed up in almost all significant IT incidents of ...
To Write or not Write, that is the Question - Abusing of Leaked Data and Vulnerable User Assets on Android Julien Thomas Thought data leakage through Android shared folders is not a new topic, it generally focused ...
OWASP Top 10 Like I’m Five - From a Bug Bounty Hunter's Perspective Dávid Schütz OWASP Top 10 is a list of the 10 most common types of web vulnerabilities ...
Precaution - Your Source… for Vulnerabilities Martin Vrachev Precaution is an open source GitHub app designed to increase the security of open source ...
Return-Oriented-Exploitation on ARM Tamás Tokics The focus of my talk is to introduce Return-Oriented-Programming (ROP) exploit techniques. The talk will ...
Measuring the Unmeasurable - How to Estimate the Vulnerability of the Users? Dr. Ferenc Leitold User behaviors danger the operation of an organization much more than any technical vulnerability does. ...