Jump to content

User:SteveClement: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
Created page with '== Tuesday 22/10, Wednesday 23/10 & Thursday 24/10 : Lecture == {| border="0" style="width: 1400px;" |- valign="top" | <br> | '''Tuesday 22.10.2013''' | style...'
 
No edit summary
Line 260: Line 260:
| style="width: 5%;" | 18:30
| style="width: 5%;" | 18:30
| style="width: 20%;" | <font size="2"></font> <font size="2"></font>
| style="width: 20%;" | <font size="2"></font> <font size="2"></font>
<br>
_<br>


|- valign="top"
|- valign="top"

Revision as of 07:44, 30 September 2013

Tuesday 22/10, Wednesday 23/10 & Thursday 24/10 : Lecture


Tuesday 22.10.2013 Wednesday 23.10.2013 Thursday 24.10.2013






8:45

Open/Registration/Refreshment

8:30

Physical (in)security - It's not -all- about Cyber by Inbar Raz

8:30

Do you know who's watching you?: An in-depth examination of IP cameras attack surface by Francisco Falcon and Nahuel Riva

9:20


Workshops Workshop Agenda

9:10

Wiretapping an entire Cisco VOIP environment - Exploiting the Call Manager by Fran Cisco

9:30

Deanonymzing members of French political forums by breaking gravatar hashes by Dominique Bongard



10:15 Refreshment Break 10:30 Refreshment Break
11:00

Workshops Workshop Agenda

10:45

The Big Evil in Small Pieces - A malware Reverser's Fairytale by Marion Marschalek

11:00

Exploit Krawler Framework by Sebastien Larinier and Guillaume Arcas




11:45

TCP Idle Scans in IPv6 by Mathis Morbitzer

11:30

Practical exploitation of rounding vulnerabilities in internet banking applications by Adrian Fortuna


11:45  Lunch Break 12:15 Lunch Break 12:30 Lunch Break
13:00

13:30 Lightning talks 13:30 Lightning talks
13:30

Automated vulnerability scanning and exploitation by Thijs Houtenbos and Dennis Pellikaan

14:00

Fully arbitrary 802.3 packet injection: maximizing the Ethernet attack surface by Andrea Barisani and Daniele Bianco

14:00

Playing Hide and Seek with Dalvik executables by Axelle Apvrille


14:30

Debugging and Reversing the HTC Android Bootloader by Cedric Halbronn and Nicolas Hureau





15:30 Refreshment Break 15:00 Refreshment Break 15:00 Refreshment Break
16:00

Spin: Static intrumentation for binary reverse engineering by David Guillen Fandos

15:20

Time to evolve. Applying red and blue team CTF tactics in IT security by David Szili and Mihaly Zagon

15:30

Unveiling online banking authentication devices by Philippe Teuwen


17:00

Grand Theft Android: Phishing with permission by Joany Boutet and Tom Leclerc

16:20

Pearls of Cybercrime: malicious campaigns of year 2013 by [http://2013.hack.lu/index.php/List#Bio:_Fyodor_Yarochkin Fyodor Yarochkin and Vladimir Kropotov


16:30 Deobfuscation by Shift

17:30

Abusing Dalvik Beyond Recognition by Jurriaan Bremer

17:20

BIOS Chronomacy: Fixing the Core Root of Trust for Measurement by Jon Butterworth and Corey Kallenberg and Xeno Kovah



18:30

_





20:00  Electro HAL party