Grehack 2020 Nov. 20, 2020 to Nov. 20, 2020, Virtual, Virtual
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Reverse Engineering archeology: Reverse engineering multiple devices with multiple versions, to put together a complex puzzle | Shlomi Oberman , Moshe Schön | Ripple20 is a series of zero-day vulnerabilities discovered in a widely used low-level TCP/IP software ... | |
The Great Hotel Hack: Adventures in attacking hospitality industry | Etizaz Mohsin | Ever wondered your presence exposed to an unknown entity even when you are promised for ... | |
Discontinued Privacy: Personal Data Leaks in Apple Bluetooth-Low-Energy Continuity Protocols | Guillaume Cunche | Apple Continuity protocols are the underlying network component of Apple Continuity services which allow seamless ... | |
No lightsaber is needed to break the Wookey | David Berard | Wookey is a secure USB mass storage project, developed by ANSSI. Every two years a ... | |
Vulnerability Research: A full chained exploit from IT network to PLC’s unconstrained code execution | Nicolas Dola | Nowadays, much of industrial companies own an Industrial Control System (ICS) environment regardless of their ... | |
Sneak into buildings with KNXnet/IP | Claire Vacherot | Building Management Systems (BMS) centralize and automate essential assets in a building. They are often ... | |
RF Shadow games | Sebastien Dudek | N/A | |
Anti-debugging tricks for Cortex-M chips | Nicolas Oberli | ARM Cortex-M chips are very common in embedded devices nowadays. Accessing their debug interface allows ... |