HackLu 2008 Oct. 22, 2008 to Oct. 24, 2008, Luxembourg,Luxembourg
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Opening Speech: Malware of the future - When mathematics work for the dark side. | Eric Filiol | Computer security deals with the essential problem of the sword against shield issue. Attackers aim ... | |
Browser Exploits - A new model for Browser Security | Saumil Udayan Shah | Browser exploits have taken centre stage as the next wave of practical exploitation of systems. ... | |
Investigating individuals and groups using open source intelligence | Roelof ( RT ) Temmingh | In this presentation we will show how the abundance of information on the Internet (using ... | |
Hacking Internet Kiosks | Paul Craig | Internet Kiosk's have become common place in today's internet centric society. Public internet Kiosk's can ... | |
User Authentication at the Firewall level | Eric Leblond , Vincent Deffontaines , Sbastien Tricaud | This talk focuses on how firewalls can work at the TCP/IP network layer and handle ... | |
Cracking into embedded devices and beyond! | Adrian ‘pagvac’ Pastor | The presentation covers cracking into embedded devices by exploiting vulnerabilities present on default software running ... | |
The end of the internet" aka "Self replicating malware on home routers | Naxxatoe | This talk is about devices that close to everybody has in their homes and offices. ... | |
Immersed network discovery and attacks, specifics of telecom Core Network (CN SS7/SIGTRAN) insider attacks | Philippe Langlois | The number of security perimeters is increasing for every companies thanks to new vectors such ... | |
Going outside Citrix context | Joffrey Czarny | Citrix is a Remote Desktop application that is very popular and is often used between ... | |
How to make smartcards resistant to hackers' lightsabers? | Philippe Teuwen | Cracking smartcards has always been a prized hobby, for the academic glory , for fun ... | |
A little journey inside Windows memory | Damien Aumatre | In 2005 and 2006, two security researchers, Maximilian Dornseif and Adam Boileau, showed an offensive ... | |
Browser Rootkits | Julien Lenoir , Christophe Devaux | For a few years now, people have learnt to configure firewalls. Very few ports are ... | |
Rustock.C - When a myth comes true | Frank Boldewin | Todays top notch spambots have one in common - next to the ability to send ... | |
Anti-virus 2.0 - "Compilers in disguise" | Mihai Chiriac | Early viruses were easily detected using simple pattern matching algorithms, but quickly evolved. Techniques such ... | |
Bridging the Gap between the Enterprise and You - or - Who's the JBoss now? | Patrick Hof , Jens Liebchen | The JBoss Application Server (JBoss AS) is a widely used open source Java application server. ... | |
Server-side Virus scanning | Dumitru Codreanu | Long are the days when antiviruses featured as little as few hundreds of virus signatures ... | |
Analysis of an undocumented network protocol | Jean-baptiste Bdrune | This presentation deals with a methodology used during the analysis of an undocumented and encrypted ... | |
Egregious use of TOR servers | F.w.j Geelkerken | From the early nineties of last century onward the importance of information and communication technology ... | |
gFuzz: An Instrumented Web Application Fuzzing Environment | Ezequiel David Gutesman | Web application fuzzers have traditionally been used by security experts as a first step in ... | |
RFIDIOts!!! Practical RFID hacking (without soldering irons). | Adam ( Major Malfunction ) Laurie | RFID is being embedded in everything... From Passports to Pants. Door Keys to Credit Cards. ... | |
How the Leopard Hides his Spots: OS X Anti-Forensic Techniques | The Grugq | Anti-Forensics is the new buzzword within forensic circles. Despite significant interest, no significant new information ... |