Grehack 2020 Nov. 20, 2020 to Nov. 20, 2020, Virtual, Virtual

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Reverse Engineering archeology: Reverse engineering multiple devices with multiple versions, to put together a complex puzzle Shlomi Oberman , Moshe Schön Ripple20 is a series of zero-day vulnerabilities discovered in a widely used low-level TCP/IP software ...
The Great Hotel Hack: Adventures in attacking hospitality industry Etizaz Mohsin Ever wondered your presence exposed to an unknown entity even when you are promised for ...
Discontinued Privacy: Personal Data Leaks in Apple Bluetooth-Low-Energy Continuity Protocols Guillaume Cunche Apple Continuity protocols are the underlying network component of Apple Continuity services which allow seamless ...
No lightsaber is needed to break the Wookey David Berard Wookey is a secure USB mass storage project, developed by ANSSI. Every two years a ...
Vulnerability Research: A full chained exploit from IT network to PLC’s unconstrained code execution Nicolas Dola Nowadays, much of industrial companies own an Industrial Control System (ICS) environment regardless of their ...
Sneak into buildings with KNXnet/IP Claire Vacherot Building Management Systems (BMS) centralize and automate essential assets in a building. They are often ...
RF Shadow games Sebastien Dudek N/A
Anti-debugging tricks for Cortex-M chips Nicolas Oberli ARM Cortex-M chips are very common in embedded devices nowadays. Accessing their debug interface allows ...