Pass-the-SALT 2022 July 4, 2022 to July 6, 2022, Lille, France

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Mattermost End-to-End Encryption plugin Adrien Bossuat This talk will describe the internals of a Mattermost End-to-End Encryption plugin that has been ...
CryptPad : a zero knowledge collaboration platform Ludovic Dubost Presentation of the CryptPad.fr project, a 100% encrypted collaboration platform. Cloud services are increasingly used ...
Dataflow tabular charts -- a presentation tool for security architects Yves Rutschle Security architects commonly have to represent drawings of complex systems to highlight the principles of ...
Sandboxing your application with Landlock, illustration with the p7zip case Mickaël Salaün Landlock is the security sandboxing feature available since Linux 5.13. Its goal is to empower ...
Building operating systems optimized for containers, from IoT to desktops and servers Timothée Ravier Containers on Linux are a powerful abstraction that help isolate applications from one another. They ...
sslh -- an applicative-level protocol multiplexer Yves Rutschle Once upon a time, corporate firewalls started to block port 22. But we could still ...
Write faster Suricata signatures easier with Suricata Language Server Eric Leblond Writing signatures for Suricata and other intrusion detection systems (IDS) is considered by many to ...
Building on top of Scapy: what could possibly go wrong? Claire Vacherot A while ago, we decided to use Scapy's packet manipulation capabilities as a basis for ...
Use of Machine and Deep Learning on RF Signals Sebastien Dudek An RF Signal is an element that a human cannot see nor hear, but could ...
Ethics in cyberwar times Ivan Kwiatkowski Despite not getting a lot of attention, questions of ethics and morality are everywhere in ...
[Workshop] Malware analysis with Ghidra & x64dbg Paul Rascagneres This workshop is designed to the beginner who want to discover the malware analysis and ...
Abusing archive-based file formats Ange ( ange4771 ) Albertini If a format structure isn't vulnerable, can that change once wrapped in an archive ? ...
Binbloom reloaded Damien "virtualabs" Cauquil Reverse-engineering hardware devices usually requires extracting data from memory, be it from an internal Flash ...
GNU poke, the extensible editor for structured binary data Jose E. Marchesi GNU poke is an interactive editor for binary data. Not limited to editing basic entities ...
The Poor Man's Obfuscator Romain Thomas The purpose of this lightning talk is to present executable files formats tricks (ELF and ...
[Workshop] MI-LXC (Mini-Internet testbed) for network security training and security tools demonstration François Lesueur MI-LXC is a platform to simulate an internet-like environment (BGP routing, DNS hierarchy, several organizations, ...
Sudo logs for Blue Teamers Peter Czanik Using sudo, you can control and log administrative access to your hosts. Recent sudo versions ...
DFIR-IRIS - collaborative incident response platform Théo Amicelli DFIR-IRIS is a collaborative incident response platform recently published in open-source. It provides operational and ...
TAPIR : Trustable Artifact Parser for Incident Response Solal Jacob This talk will present two new open-source incident response tools and a new rust library ...
Improve your Malware Recipes with Cyberchef Xavier Mertens Cyberchef is an awesome tool developed by GCIH (the UK Intelligence Services). Easy to deploy ...
[Workshop] RFID/NFC: Rise of Proxmark3, hands on Philippe Teuwen You will enjoy hacking with RFID/NFC cards and devices by means of open source. You ...
MobSF for penetration testers Antoine Benassouli MobSF is a free and OpenSource security scanner for mobile application. First, this talk will ...
Finding Java deserialization gadgets with CodeQL Hugo Vincent Arbitrary object deserialisation vulnerability in Java applications can be really dangerous, but also worthless if ...
Dissecting NTLM EPA & building a MitM proxy Pierre Milioni Have you ever come across a website that used NTLM-based authentication, and you just could ...
kdigger: A Context Discovery Tool for Kubernetes Penetration Testing Mahé Tardy kdigger, short for "Kubernetes digger", is a context discovery tool for Kubernetes penetration testing. This ...
[Workshop] Threat Hunting with SELKS and Suricata 6 Eric Leblond Threat hunting with network data can be done with Suricata that combines a signature based ...