RootCon 16 Sept. 27, 2022 to Sept. 30, 2022, Tagaytay, Philippines

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Microsoft Defender Will Be Defended: MemoryRanger Prevents Blinding Windows AV Igor Pogonin Windows OS is facing a huge rise in kernel attacks. An overview of popular techniques ...
Human-Controlled Fuzzing With AFL Maxim (@igorkorkin) Early detection of new bugs is crucial for all modern software products. Fuzzing techniques are ...
A new secret stash for fileless malware Denis Legezo Today, attacks using fileless malware have become more complex and the actors behind them have ...
Security Like the 80's : How I stole your RF Ayyappan Rajesh The issue about convenience vs. security has been spoken about for years now, with most ...
DDexec Carlos Gutiérrez Running binaries in memory from a reverse shell on the target machine is very common ...
Gazing into the Crystal Ball - The Fog of Cyberwarfare Escalations Harshit Agrawal (@harshitnic) Every new technology presents the possibility of new weapons, and for every new weapon, there’s ...
Building defensive playbooks from others misfortune Chester Wisniewski Building defensive strategies is difficult at the best of times and too often is confused ...
Web Penetration Testing Jeswin Kale With the ubiquity of web applications, understanding their security and being able to audit them ...
Network Penetration Testing Nishant Sharma With the increasing number of hacks day by day, the requirements of security professionals are ...
China’s Cyber Capabilities: Espionage, Warfare, and Implications Aaron Aubrey Ng Over the past decade, there has been an alarming rise in the frequency and sophistication ...
How Did I Get Here? I still don’t know what I’m doing: Getting into The Lifelong Adventure of Learning Cybersecurity & Incident Response James Kainth (@j3st3rjames) Where will your journey take you? My adventures have taken me from feeling confident about ...
Signs, Signs, Everywhere There are Signs of a Ransomware Intrusion Allan Liska Threat hunting is great way for organizations with even a limited security budget to look ...
An introductory course to hacking all the things Emman Want to start offensive security operations but have no idea where? Wonder how they hack ...
Wild IoT Tales: from power grids to oil pipelines Barak Sternberg In this talk, we will analyze 3 of the wildest IoT attack stories happened last ...
Alternative ways to detect mimikatz Balazs @xoreipeip mimikatz is detected by AVs and EDRs in different ways, mostly based on signatures and ...
A Teardown of Starting Your Very Own Car Hacking Test Bench 3m@n0n Building a car hacking test bench takes both time and patience, from sourcing usable parts, ...
Streamline security with shift left: A cloud approach Avinash Jain In the agile world, continuous iteration of development and testing happens throughout the software development ...
After-Dark Party N/a N/A
Understanding and Re-creating Process Injection Techniques through Nimjector Ariz Ar33zy Process injection is one of the prominent techniques used by threat actors to execute malicious ...
Web Pentesting 101 - Basic Web Penetration Testing using Burpsuite Jayson Vallente A Basic and Fundamental training on Web Pentesting for newbie pentesters and security practitioners. This ...
Let's Get Down with canTot: quick and dirty canbus h4xing framework for car hackers Jay Turla canTot is a python-based cli framework based on sploitkit and is easy to use because ...
The Simple, Yet Lethal, Anatomy of a Software Supply Chain Attack Yehuda Galb Security teams nowadays are struggling to contain the risk of software supply chain attacks on ...
AWSGoat : A Damn Vulnerable AWS Infrastructure Jeswin Mathai , Shantanu Mahunta Compromising an organization's cloud infrastructure is like sitting on a gold mine for attackers. And ...
Pwnppeteer - Phishing Post {Exploi/Automa}tion at Scale Sn0rky N/A
Malware Analysis 101 Louisa Pamintuan , And Denisse Layco In Malware Analysis 101, we will be defining malware and then quickly go over the ...