Talks

speaker

Remotely Compromising a Modern iOS Device
(2) reviewers

Author: Marco Grassi
Liang Chen
Category: Vulnerability Research
Summary: Achieving a successful remote compromise of a modern Apple iOS device has become in recent years particularly challenging for an ...

speaker

Fried apples: Jailbreak DIY
(2) reviewers

Author: Max Bazaliy
Alex Hude
Vlad Putin
Category: Vulnerability Research
Summary: In this talk we focus on challenges that Fried Apple team solved in a process of making untethered 9.0-9.3.x jailbreak. ...

speaker

COM in Sixty Seconds! (well minutes more likely)
(2) reviewers

Author: James Forshaw
Category: Vulnerability Research
Summary: The Component Object Model has been part of Windows for over 20 years, in that time it’s gained new abilities ...

speaker

Hunting For Vulnerabilities in Signal
(1) reviewers

Author: Jean-Philippe Aumasson
Markus Vervier
Category: Vulnerability Development
Summary: Signal is the most trusted secure messaging and secure voice application, recommended by Edward Snowden and the Grugq. And indeed ...

speaker

Logic Bug Hunting in Chrome on Android
(1) reviewers

Author: Georgi Geshev
Rober Miller
Category: Vulnerability Development
Summary: Memory corruption exploits are requiring greater and greater investment in time and effort to bypass the latest mitigations in applications ...

speaker

The Shadow over Android: Heap exploitation assistance for Android's libc allocator
(1) reviewers

Author: Vasilis Tsaousoglou / Patroklos Argyroudis
Category: Exploit Development
Summary: The jemalloc allocator has been adopted as the default libc malloc(3) implementation on Android since version 5.0, and is being ...

speaker

Be a Binary Rockstar: Next-level static analyses for vulnerability research
(1) reviewers

Author: Sophia d'Antoine
Peter LaFosse
Rusty Wagner
Category: Vulnerability Research
Summary: Program Analysis is often hampered when source code is not available. Many static program analysis tools depend on the availability ...

speaker

Teaching An Old Shellcode New Tricks
(1) reviewers

Author: Josh Pitts
Category: Mitigation Bypass, Payload Development
Summary: Metasploit Windows x86/x86_64 shellcodes have been defeated by EMET and other techniques not only in exploit deployment but through using ...

speaker

OSINT For the Win - Tools & Techniques to Maximize Effectiveness of Your Social Engineering Attack
(1) reviewers

Author: Joe Gray
Category: OSINT
Summary: Social engineering attacks remain the most effective way to gain a foothold in a targeted organization. But those attacks are ...

speaker

Defeating Device Guard with Microsoft's Implant Since Windows 2000
(1) reviewers

Author: Christopher Truncer
Category: Penetration Testing
Summary: Windows 10 and Server 2016 immediately provide defensive technologies that can be used to secure endpoints within your domain. Both ...

speaker

Synesthesia: Modern Shellcode Synthesis under Arbitrary Encoding Restrictions
(1) reviewers

Author: Rolf Rolles
Category: Exploit Development
Summary: The problems of shellcode generation and of memory corruption exploit development share a birthday. In brief, memory corruption exploits must ...

speaker

Bootstrapping SMT binary analysis tools by analyzing emulator binaries
(1) reviewers

Author: Alex Kropivny
Category: Vulnerability Development
Summary: SMT solvers are nifty, and pretty easy to apply to simple or repetitive binary analysis problems. Implementing instruction semantics for ...

speaker

Sierra Had a Little Lamb: A Userland Kit for MacOS
(0) reviewers

Author: Stephanie Archibald
Category: Exploit Development
Summary: Long gone are the days of trivially exploiting services to gain root; these days, multiple exploits are typically strung together ...

speaker

Getting bank transaction history and bank balance of anyone
(0) reviewers

Author: Indrajeet Bhuyan
Category: Penetration Testing
Summary: Recently Indian government launched a mega scheme 'Jan Dhan Yojana'. On the inaugural day 15 Millions of bank accounts were ...

speaker

Forget Enumerating a Network, Hack the SIEM and Win the War
(0) reviewers

Author: John Grigg
Category: Penetration Testing
Summary: Every company, big and small, is hopping on the SIEM bandwagon. And while they are being sold a solution to ...

speaker

802.11 Protocol Chaos
(0) reviewers

Author: Andres Blanco
Category: Vulnerability Research
Summary: Over the last few years, IEEE 802.11 standard for wireless connectivity usage has turned massive. Wireless devices are everywhere, from ...

speaker

Hadoop Safari: hunting for vulnerabilities
(0) reviewers

Author: Mahdi BRAIK / Thomas DEBIZE
Category: Vulnerability Research
Summary: With the growth of data traffic and data volumetric analysis needs, “Big Data” has become one of the most popular ...

speaker

Hidden Insider Threats - Hunting the adversary Pipes
(0) reviewers

Author: Almog Ohayon
Category: APT
Summary: Lateral movement over Named Pipes is a great method to evade defenders and it was being used in many well-known ...

speaker

Catching 0day Attacks Using Code Signing
(0) reviewers

Author: Dean Sysman
Category: Defense
Summary: Code signing is a powerful method to ensure only validated code will be executed. Using this technique in Windows and ...

speaker

Unveiling Patchwork
(0) reviewers

Author: Dean Sysman
Gadi Evron
Category: APT
Summary: Patchwork is a highly successful nation state targeted attack operation, which infected approximately 2,500 high-value targets such as governments, worldwide. ...

speaker

You're Off the Hook: Blinding Security Software
(0) reviewers

Author: Jeff Tang
Category: Vulnerability Development
Summary: Security companies are increasing their focus on behavior based detection to convict malicious software but thanks to Microsoft's Kernel Patch ...

speaker

It's virtually really happening, virtual reality hacking all of the things
(0) reviewers

Author: Ron Schlecht
Category: Virtual Hacking
Summary: Platform accessibility, programming frameworks, hardware sprawl, and yes....the porn industry are driving how quickly virtual reality is being brought in ...

speaker

(In) Security graph database in real world
(0) reviewers

Author: Alfonso Muñoz
Category: Penetration Testing
Summary: Graph databases are an "emerging" technology useful in the field of cybersecurity, especially in the detection of new threats based ...

speaker

Inside the Threat Actor's Studio
(0) reviewers

Author: Aamir Lakhani
Category: APT
Summary: Cybercrime is risky business but it’s also big business. Lloyd’s of London estimates the cost of cybercrime to businesses at ...

speaker

Creating Your Own Customized Metamorphic Algorithm
(0) reviewers

Author: Raul Alvarez
Category: Vulnerability Development
Summary: Most malware uses metamorphic code to evade Antivirus detection. These techniques also slow down security researchers when digging deeper into ...

speaker

Post Exploitation in Software-Defined Networking: A Controller's Perspective
(0) reviewers

Author: Tommy Chin
Category: Exploit Research
Summary: Software-Defined Networking (SDN) is an emerging paradigm to support and optimize virtualization communication systems. Numerous research development approaches utilize SDN ...

speaker

The Nihilist’s Guide to Wrecking Humans and Systems
(0) reviewers

Author: Christina Camilleri
Category: Exploit Research
Summary: Many can identify the soft, fallible bundle of meat and love that is a human. Humans can be found in ...

speaker

This Will Cut You: Go's Sharper Edges
(0) reviewers

Author: Thomas Shadwell
Category: Exploit Research
Summary: An expression of function within a software ecosystem is inextricably bound to the lexicon used to express it. I explore ...

speaker

How to not become jobless in IoT hacking
(0) reviewers

Author: Anton Tyurin
Alexey Lednyov
Category: Exploit Development
Summary: In this talk we will review security of IoT devices from the hacker's standpoint and cover common developers' mistakes and ...

speaker

Playing Hide n' Seek with IDS
(0) reviewers

Author: Anton Tyurin
Alexey Lednyov
Category: Vulnerability Research
Summary: Today all companies who are concerned about their security use IDS/IPS solutions. But do such systems really make hackers' life ...

speaker

Backslash Powered Scanning: Implementing Human Intuition
(0) reviewers

Author: James Kettle
Category: Vulnerability Research
Summary: Existing web scanners search for server-side injection vulnerabilities by throwing a canned list of technology-specific payloads at a target and ...

speaker

Cloud Post exploitation techniques
(0) reviewers

Author: Andrew Johnson
Sacha Faust
Category: Exploit Research
Summary: The cloud is new to many including red teams and the traditionally post exploitation and other common TTP are sometime ...

speaker

Reaping FATALs
(0) reviewers

Author: Wendy Knox Everette
Category: Vulnerability Development
Summary: Your webapp is probably dumping ERRORs and FATALs to your logs & you’re ignoring them unless your site is down ...

speaker

BugId - automated bug analysis
(0) reviewers

Author: Berend-Jan Wever
Category: Vulnerability Development
Summary: Whether you are looking for vulns, or handling vulns reported by others, at some point you're going to have a ...

speaker

Attacking Mobile Payment Systems - from App to Pay
(0) reviewers

Author: Ki-Taek.Lee
Min-Kyo Seo
Category: Penetration Test
Summary: Recently, the use of mobile payment services (like Apply Pay and PayPal) has been increasingly popular over time. Being closely ...

speaker

Drone Hijacking and other IoT hacking with GNU Radio and XTRX SDR
(0) reviewers

Author: Arthur Garipov
Category: Penetration Test
Summary: Internet of things is surrounding us. Is it secure? Or does its security stand on (deemed) invisibility? SDR (Software-defined radio) ...

speaker

Think Twice before torrenting!
(0) reviewers

Author: Harshad Sathaye
Category: Penetration Test
Summary: Ever wondered how bad, piracy affects the rightful owners of the stuff that you are downloading? Entertainment industry suffers huge ...

speaker

Did I hear a shell popping in your baseband?
(0) reviewers

Author: Ralf-Philipp Weinmann
Category: Vulnerability Research
Summary: While the majority of baseband vendors use lightweight real-time operating systems there's a chipset vendor with substantial market share in ...