44CON2022 2022 Sept. 15, 2022 to Sept. 16, 2022, London, UK

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Lord of War - Investigating the theft of a gambling platform and outsmarting the thieves Peter Allwright The presentation focuses on a forensic investigation into the theft of a gaming platform in ...
Using SliverC2 for Red Team Operations Matt Lorentzen Whilst Cobalt Strike is still arguably the most popular red teaming toolkit as a commercial ...
The Need For a Human Touch In Cyber Security Erlend Andreas Gjære In a technical world of cyber, crypto and cloud, it is easy to forget that ...
Ciphers and Crime Klaus Schmeh This talk is about encrypted messages related to crimes
I'm the Captain Now! Cybergibbons When I first watched Hackers in 1998, the idea of being able to remotely control ...
The Office of Danger: a choose your own adventure story! Phil Eveleigh This session will put the audience in the driving seat of a real-life social engineering ...
the security communications wargame Threat Condition THREAT CONDITION is a cyber security wargame that highlights the internal and external communication aspects ...
YTCracker Ytcracker YTCracker is a rapper, former cracker, and Internet entrepreneur. YTCracker began producing rap music in ...
Registration opens Registration Opens Doors open for day 2
Morning tea, excellent coffee and pastries Morning Pastries , Tom Hocker Morning tea, excellent coffee and pastries
The Log4J Rollercoaster - from an incident response perspective Guy Barnhart-magen Log4J was a merry Christmas call for many teams around the world. This talk will ...
Threat Hunting: From Bodging to Efficiency in 7 Steps Melissa Goldsmith Many people feel that threat hunting is a special skill reserved for only the select ...
Build Your Own AWS Security Scanner Paco Hope In this session you’ll learn to how to use AWS APIs to not just discover ...
Codecepticon - Building an obfuscator to bypass Modern EDR and AV Pavel Tsakalidis During Purple and sometimes even Red Team engagements, in order to provide more value for ...
Exploring a New Class of Kernel Exploit Primitive Andrew Ruddick Microsoft Security Response Center receives and examines many interesting bug classes. Often, the exploitability of ...
Closing Keynote Haroon Meer Haroon opened the first 44CON in 2011, he will close the 10th physical event in ...
44CON 2022 Closing Adrian N/A