du 10 au 13 Novembre 2015
Amsterdam
PAYS BAS
Briefings : présentations de 25 à 50 minutes
-
IN-)SECURITY OF BACKEND-AS-A-SERVICE
-
A PEEK UNDER THE BLUE COAT
-
ALL YOUR ROOT CHECKS BELONG TO US: THE SAD STATE OF ROOT DETECTION
-
ANDROBUGS FRAMEWORK: AN ANDROID APPLICATION SECURITY VULNERABILITY SCANNER
-
ATTACKING THE XNU KERNEL IN EL CAPITAIN
-
AUTHENTICATOR LEAKAGE THROUGH BACKUP CHANNELS ON ANDROID
-
AUTOMATING LINUX MALWARE ANALYSIS USING LIMON SANDBOX
-
BREAKING ACCESS CONTROLS WITH BLEKEY
-
BYPASSING LOCAL WINDOWS AUTHENTICATION TO DEFEAT FULL DISK ENCRYPTION
-
BYPASSING SELF-ENCRYPTING DRIVES (SED) IN ENTERPRISE ENVIRONMENTS
-
COMMIX: DETECTING AND EXPLOITING COMMAND INJECTION FLAWS
-
CONTINUOUS INTRUSION: WHY CI TOOLS ARE AN ATTACKERS BEST FRIENDS
-
CRACKING ONLINE BANKS – EXPLOITING TEMENOS
-
CYBERCRIME IN THE DEEP WEB
-
CYBERSECURITY FOR OIL AND GAS INDUSTRIES: HOW HACKERS CAN MANIPULATE OIL STOCKS
-
DEFENDING AGAINST MALICIOUS APPLICATION COMPATIBILITY SHIMS
-
EVEN THE LASTPASS WILL BE STOLEN DEAL WITH IT!
-
EXPLOITING ADOBE FLASH PLAYER IN THE ERA OF CONTROL FLOW GUARD
-
FAUX DISK ENCRYPTION: REALITIES OF SECURE STORAGE ON MOBILE DEVICES
-
FUZZING ANDROID: A RECIPE FOR UNCOVERING VULNERABILITIES INSIDE SYSTEM COMPONENTS IN ANDROID
-
GOING AUTH THE RAILS ON A CRAZY TRAIN
-
HEY MAN HAVE YOU FORGOTTEN TO INITIALIZE YOUR MEMORY?
-
HIDING IN PLAIN SIGHT – ADVANCES IN MALWARE COVERT COMMUNICATION CHANNELS
-
HOW TO BREAK XML ENCRYPTION – AUTOMATICALLY
-
IMPLEMENTING PRACTICAL ELECTRICAL GLITCHING ATTACKS
-
IS YOUR TIMESPACE SAFE? – TIME AND POSITION SPOOFING OPENSOURCELY
-
LESSONS FROM DEFENDING THE INDEFENSIBLE
-
LOCKNOTE: CONCLUSIONS AND KEY TAKEAWAYS FROM BLACK HAT EUROPE 2015
-
LTE & IMSI CATCHER MYTHS
-
NEW (AND NEWLY-CHANGED) FULLY QUALIFIED DOMAIN NAMES: A VIEW OF WORLDWIDE CHANGES TO THE INTERNETS DNS
-
NEW TOOL FOR DISCOVERING FLASH PLAYER 0-DAY ATTACKS IN THE WILD FROM VARIOUS CHANNELS
-
PANEL: WHAT YOU NEED TO KNOW ABOUT THE CHANGING REGULATORY LANDSCAPE IN INFORMATION SECURITY
-
SELF-DRIVING AND CONNECTED CARS: FOOLING SENSORS AND TRACKING DRIVERS
-
SILENTLY BREAKING ASLR IN THE CLOUD
-
STEGOSPLOIT – EXPLOIT DELIVERY WITH STEGANOGRAPHY AND POLYGLOTS
-
TRIAGING CRASHES WITH BACKWARD TAINT ANALYSIS FOR ARM ARCHITECTURE
-
UNBOXING THE WHITE-BOX: PRACTICAL ATTACKS AGAINST OBFUSCATED CIPHERS
-
VOIP WARS: DESTROYING JAR JAR LYNC
-
VULNERABILITY EXPLOITATION IN DOCKER CONTAINER ENVIRONMENTS
-
WATCHING THE WATCHDOG: PROTECTING KERBEROS AUTHENTICATION WITH NETWORK MONITORING
-
YOUR SCRIPTS IN MY PAGE – WHAT COULD POSSIBLY GO WRONG?
Cours : le 10 et 11 Novembre
-
ADVANCED INFRASTRUCTURE HACKING
-
ADVANCED OSINT FOR SOCIAL ENGINEERS
-
ADVERSARY HUNTING AND INCIDENT RESPONSE: NETWORK EDITION
-
BEYOND THE BEAST: DEEP DIVES INTO CRYPTO VULNERABILITIES
-
CLOUD SECURITY HANDS-ON (CCSK-PLUS)
-
DARK SIDE OPS: CUSTOM PENETRATION TESTING
-
ENTERPRISE INFRASTRUCTURE BOOTCAMP
-
HANDS-ON HARDWARE HACKING AND REVERSE ENGINEERING
-
MALWARE ANALYSIS CRASH COURSE
-
OFFENSIVE IOT EXPLOITATION
Mais aussi des Ateliers, Special Events …
Pour plus d’informations, cliquer ici