DefCamp Archives
SPEAKER |
PRESENTATION |
MEDIA RESOURCES & DOCS |
|||
---|---|---|---|---|---|
Abdullah Al-Sultani | Cloud-squatting: the never-ending misery of deleted and forgotten cloud assets | SLIDES | |||
Abdullah Joseph | Nothing To Hide: Privacy-Preserving Cryptographic Authentication In Practice | SLIDES | |||
Adrian Furtuna | Kittens falling from the skies (OpRomania) | SLIDES | |||
Alexandru Persunaru | Security on the Edge - Safeguarding Smart Homes | SLIDES | |||
Anca Coltescu | How to build a successful Security Team | SLIDES | |||
Andrei Cotaie | Using RPA for a fast, reliable and repeatable Incident Response process | SLIDES | |||
Andrei Grigoras | Building a Resilient Red Team Infrastructure | SLIDES | |||
Andrei Niculae | Hunting / Scraping with Favicons (Lightning Talk) | SLIDES | |||
Arun Mane | Hardware Backdooring an e-Scooter | ||||
Bogdan Stefan | Architectural challenges and solutions involved in creating a dynamic cyber range solution | SLIDES | |||
Carina Deaconu | From bits to breaches: the nuts and bolts of vulnerability detection in multi-cloud environments | SLIDES | |||
Chris Kubecka | The JARM’ing Adventures of a Weaponized Security Tool | SLIDES | |||
Cristian Done | Monitoring malware behavior through kernel syscall tracing | SLIDES | |||
Cristian Miron | Using RPA for a fast, reliable and repeatable Incident Response process | SLIDES | |||
Cristian Pop | What are BadUSB attacks and how can you implement them? | SLIDES | |||
Eduard Agavriloae | The C2 tool no one talks about: AWS SSM - Run Command | SLIDES | |||
Eva Telecka | How to build a Successful Security Team | SLIDES | |||
George-Andrei Iosif | The Open Source Fortress: Finding Vulnerabilities in Your Codebase Using Open Source Tools | SLIDES | |||
Hrishikesh Somchatwar | Wheels of Wonder: Unveiling Car Hacking Poetry at DefCamp | SLIDES | |||
Inbar Raz | No Code Malware: Windows 11 At Your Service | SLIDES | |||
Ioan Constantin | Rough seas & ships in storms – A retrospective of 2023 from an MSSP perspective | SLIDES | |||
Ioana Stancioiu | From bits to breaches: the nuts and bolts of vulnerability detection in multi-cloud environments | SLIDES | |||
Ionut Leonte | Security on the Edge - Safeguarding Smart Homes | SLIDES | |||
Jan Rynes | Have you heard about DNS DR? How this can shift your security from responsive to proactive! | SLIDES | |||
Joe Beeton | Attacking Developer Environment Through Drive-by Localhost Attacks | SLIDES | |||
Joey Geralnik | Party Time: Building a Private Game Server by Reverse Engineering | SLIDES | |||
Julien Ducarroz | Introduction to DefCamp 2023 | ||||
Kirils Solovjovs | MITM on PSTN -- novel methods for intercepting phone calls | SLIDES | |||
Konrad Jedrzejczyk | ChatNMI & Beyond: Pushing the ‘Easy Button’ in Home-based AI Deployment – A Comparative Review of Leading Software Solutions | SLIDES | |||
Maksim Iavich | Verkle based Post-quantum digital signature with lattices | SLIDES | |||
Marek Zmysłowski | ChatNMI & Beyond: Pushing the 'Easy Button' in Home-based AI Deployment - A Comparative Review of Leading Software Solutions | SLIDES | |||
Matei Badanoiu | 5.0 Shades of Java Exploitation | SLIDES | |||
Matei Josephs | A deep-dive Into DLL Hijacking - Discovery, Automation and Impact | SLIDES | |||
Mihai Vasilescu | Monitoring malware behavior through kernel syscall tracing | SLIDES | |||
Mihail-Iulian Plesa | The best of both worlds: privacy and security | SLIDES | |||
Muhammad Mudassar Yamin | Weaponized AI for cyber attacks | SLIDES | |||
Nenad Zaric | Cloudy with a Chance of Exposures: Dissecting Web Server Risks Across Top Cloud Providers | SLIDES | |||
Nir Chervoni | Conceal, Don’t Feel, Don’t Let Them Know | SLIDES | |||
Octavian Purcaru | Sherlock - an OpenSource configurable platform for applying LLMs to security use-cases | SLIDES | |||
Radu Boncea | ICI InnoLabs: A safer approach to building research infrastructure | SLIDES | |||
Radu Chivereanu | Machine Learning Engineer Intern | SLIDES | |||
Radu Ionicioiu | Cybersecurity in the Quantum Era | SLIDES | |||
Radu Ticiu | Bringing Kids to CyberSec in a CoderDojo Setting | SLIDES | |||
Radu Tudorica | Abusing GCPW for lateral movement from local to cloud | SLIDES | |||
Razvan Chitu | Architectural challenges and solutions involved in creating a dynamic cyber range solution | SLIDES | |||
Remi Gascou | Graph-oriented approach for SSTI payload optimization: Usecase of jinja2 | SLIDES | |||
Sebastian Avarvarei | I Still See Your AppSec Contractual Sins | SLIDES | |||
Simona David | Moving Target Defense | SLIDES | |||
Ta-Lun Yen | Backdooring an entire country's 4 million modems with 6 bugs in a week | SLIDES | |||
Todor Todorov | Supply Chain Shenanigans: Evil npm & Shady NuGet | SLIDES | |||
Tudor Damian | The NIS2 Directive: Europe's Response to Cyber Shenanigans | SLIDES | |||
Vladimir Ghita | AI Powered Security Operation Center – SOC. Myth or reality? | SLIDES | |||
Walter Belgers | Hacking a magnetic lock; successes and failures | SLIDES | |||
Wojciech Reguła | macOS Red Teaming in 2023 [0-day edition] | SLIDES | |||
Yashin Mehaboobe | Attacking Vehicle Fleet Management Systems | SLIDES |
SPEAKER |
PRESENTATION |
MEDIA RESOURCES & DOCS |
|||
---|---|---|---|---|---|
Adrian Furtuna | Penetration Testers versus Initial Access Brokers. Helping the good guys win | SLIDES | WATCH VIDEO (EN) | ||
Alex “Jay” Balan | Place your bets! How we run security for the whole Superbet group and still have time to play Stray ;) | SLIDES | WATCH VIDEO (EN) | ||
Amirhossein Aliakbarian | To log, or not to log! That is the question | SLIDES | WATCH VIDEO (EN) | ||
Andrei Iordan | The Secret Sauce(s) of Cybersecurity Operations | SLIDES | WATCH VIDEO (EN) | ||
Antonio Macovei | Mario Kart Tour - Owned | SLIDES | WATCH VIDEO (EN) | ||
Bianca Lewis | Secrets Of Social Media PsyOps | SLIDES | WATCH VIDEO (EN) | ||
Bogdan Glazov | IoT firmware analysis | SLIDES | WATCH VIDEO (EN) | ||
Catalin Filip | How we analyzed and built an exploit PoC for CVE-2022-24086, a Magento RCE | SLIDES | WATCH VIDEO (EN) | ||
Chris Dale | When alerts become opportunities - Planning and building an Offensive SOC | SLIDES | WATCH VIDEO (EN) | ||
Cosmin Anghel | Cynergy ISAC - first Romanian ISAC | SLIDES | WATCH VIDEO (EN) | ||
Cosmin Vilcu | DNS protocol in hands of attacker | ||||
Cristian Cornea | How (in)secure is Windows Defender - Let's Bypass Together | SLIDES | WATCH VIDEO (EN) | ||
Cristian Pațachia-Sultănoiu | DefCamp 2022 Opening Speech | SLIDES | WATCH VIDEO (EN) | ||
Dan Demeter | Internet Balkanization in an era of military conflict | SLIDES | WATCH VIDEO (EN) | ||
Dr Nestori Syynimaa | Abusing Azure AD pass-through authentication vulnerabilities | SLIDES | WATCH VIDEO (EN) | ||
Eduard Agavriloae | Cloud Configure Review - The new internal pentest | SLIDES | WATCH VIDEO (EN) | ||
Gabriel Mihai Tanase | SOC…1,2,3… | WATCH VIDEO (EN) | |||
George-Andrei Iosif | MutableSecurity: Life’s too short. Automate everything! | SLIDES | WATCH VIDEO (EN) | ||
Giorgi Akhalaia | Device Tracking Threats in 5G Network | SLIDES | WATCH VIDEO (EN) | ||
Greg Charitonos | Mario Kart Tour - Owned | SLIDES | WATCH VIDEO (EN) | ||
Ioan Constantin | 2022 is a tough one. An MSSPs Perspective | SLIDES | WATCH VIDEO (EN) | ||
Ioan Iacob | The Anatomy of Wiper Malware | SLIDES | WATCH VIDEO (EN) | ||
Ionut Cernica | Deanonymization of TOR HTTP hidden services | SLIDES | WATCH VIDEO (EN) | ||
Jan Rynes | DNS protocol in hands of attacker | SLIDES | WATCH VIDEO (EN) | ||
Jayson E. Street | Deception Via Perception (From Blue Tractors to A Blue & Black Dress) | SLIDES | WATCH VIDEO (EN) | ||
Madalin Ionita | The Anatomy of Wiper Malware | SLIDES | WATCH VIDEO (EN) | ||
Maksim Iavich | The model of post-quantum signature using Verkle Tree | SLIDES | WATCH VIDEO (EN) | ||
Marian Gusatu | Techniques of a prevalent banker over the years through an offensive perspective | SLIDES | WATCH VIDEO (EN) | ||
Matei Radulea | Tell us More: How to Harden Your Sandboxes against malware evasions | SLIDES | WATCH VIDEO (EN) | ||
Max van der Horst | WSL 2 and Security: Productivity Booster or Achilles Heel? | SLIDES | WATCH VIDEO (EN) | ||
Mihail Plesa | Augment cybersecurity through A.I. | SLIDES | WATCH VIDEO (EN) | ||
Monica Obogeanu | Scaling security: creating new products to support the good fight | SLIDES | WATCH VIDEO (EN) | ||
Radu Chiscariu | Tell us More: How to Harden Your Sandboxes against malware evasions | SLIDES | WATCH VIDEO (EN) | ||
Radu Niculita | The role of the network in the Zero-Trust world | SLIDES | WATCH VIDEO (EN) | ||
Rares Bratean | WSL 2 and Security: Productivity Booster or Achilles Heel? | SLIDES | WATCH VIDEO (EN) | ||
Razvan Bocu | Personal Medical Data Management Using Virtualized Symmetric 5G Data Channels | SLIDES | WATCH VIDEO (EN) | ||
Sebastian Avarvarei | What if I told you that Security is here to help? (a.k.a. The 7 habits of highly effective Security leaders) | SLIDES | WATCH VIDEO (EN) | ||
Sebastian Pitei | From lonely wolf to the pack | SLIDES | WATCH VIDEO (EN) | ||
Sorin Portase | A cure for Botnets? Fighting Credential Stuffing at Adobe | SLIDES | WATCH VIDEO (EN) | ||
Tudor Damian | Personal Security in a Post-Pandemic Age | SLIDES | WATCH VIDEO (EN) | ||
Vencel Cserháti | 5G Security - A shared responsibility | SLIDES | WATCH VIDEO (EN) | ||
Volodymyr T. | Impactful Cyber Army Workflows | WATCH VIDEO (EN) | |||
Yordan Ganchev | Beyond Security Operations | SLIDES | WATCH VIDEO (EN) |
SPEAKER |
PRESENTATION |
MEDIA RESOURCES & DOCS |
|||
---|---|---|---|---|---|
Adrian Furtuna | Automatic exploitation of critical CVEs using Sniper: ProxyShell, OMIGOD, Confluence RCE and more | WATCH VIDEO (EN) | |||
Alex “Jay” Balan | 5 years of IoT vulnerability research and countless 0days - A retrospective | WATCH VIDEO (EN) | |||
Alex Birnberg | WATCH VIDEO (EN) | ||||
Anatol Prisacaru | MEV explained or How to rescue a 6-figure amount from a compromised wallet | WATCH VIDEO (EN) | |||
Andra Zaharia | Panel: Cybersecurity - the fine line between technology and the human element | WATCH VIDEO (EN) | |||
Andrada Fiscutean | Panel: Cybersecurity - the fine line between technology and the human element | WATCH VIDEO (EN) | |||
Andrei Bozeanu | Deceptive Ops & Honeynet Design | WATCH VIDEO (EN) | |||
Andrei Cotaie | WATCH VIDEO (EN) | ||||
Andrei Iordan | Panel: Cybersecurity - the fine line between technology and the human element | WATCH VIDEO (EN) | |||
Brian Contos | Cybersecurity & The Board: Choosing success over the Sarlacc Pit | WATCH VIDEO (EN) | |||
Calin Badea | Organizational Data Asset Lifecycle – Redefining the Cyber-attack surface | WATCH VIDEO (EN) | |||
Chloe Messdaghi | Burnout: Destabilizing Goals and Threatening Organizational Security | WATCH VIDEO (EN) | |||
Chris Kubecka | Revenge is Best Served over IOT | WATCH VIDEO (EN) | |||
Cristian Cornea | WATCH VIDEO (EN) | ||||
Cristian Pațachia-Sultănoiu | WATCH VIDEO (EN) | ||||
Daniel Tomescu | Abusing postMessage API for 6 figures/year | WATCH VIDEO (EN) | |||
Danny Henderson Jr. | Curse of the Mirage Forest: An Incident Responder's Tale | WATCH VIDEO (EN) | |||
Don Smith | Responding to the ever evolving threat landscape | WATCH VIDEO (EN) | |||
Gratiela Magdalinoiu | Panel: Ladies in Cybersecurity | WATCH VIDEO (EN) | |||
Ioan Constantin | Training SecOps: Education through Gamification. | WATCH VIDEO (EN) | |||
Ionut Cernica | Hack the hackers: Leaking data over SSL/TLS | WATCH VIDEO (EN) | |||
Jan Glos | Automotive Cybersecurity – needs, methods, and future challenges | WATCH VIDEO (EN) | |||
Ljubica Pendaroska | Panel: Ladies in Cybersecurity | WATCH VIDEO (EN) | |||
Lucian Constantin | Panel: Threats and lessons learned from the pandemic | WATCH VIDEO (EN) | |||
Lucian Nitescu | Recipe for a beginner in bug bounty hunting | WATCH VIDEO (EN) | |||
Lukas Stefanko | Vulnerabilities discovered in Android stalkerware apps | WATCH VIDEO (EN) | |||
Maksim Iavich | Post-quantum scheme with the novel random number generator with the corresponding certification method. | WATCH VIDEO (EN) | |||
Marek Zmysłowski | WATCH VIDEO (EN) | ||||
Monica Obogeanu | Panel: Entrepreneurship in cybersecurity - should I go there? Powered by ORANGE Fab | WATCH VIDEO (EN) | |||
Muhammad Mudassar Yamin | Cyber range in a nutshell | WATCH VIDEO (EN) | |||
Paul Coggin | WATCH VIDEO (EN) | ||||
Piotr Bazydło | WATCH VIDEO (EN) | ||||
Radu Stanescu | Panel: Cybersecurity - the fine line between technology and the human element | WATCH VIDEO (EN) | |||
Radu-Emanuel Chiscariu | A Deep-Learning Approach to Phishing Detection. | WATCH VIDEO (EN) | |||
Raphaël Lheureux | Leveraging threat intelligence in the selection and prioritization of detection sources | WATCH VIDEO (EN) | |||
Robert Vulpe | What it takes to be good at bug bounty hunting | WATCH VIDEO (EN) | |||
Simona David | Adversary Emulation on Windows | WATCH VIDEO (EN) | |||
Tiberiu Boros | WATCH VIDEO (EN) | ||||
Tudor Damian | WATCH VIDEO (EN) | ||||
Valentine Mairet | WATCH VIDEO (EN) |
SPEAKER |
PRESENTATION |
MEDIA RESOURCES & DOCS |
|||
---|---|---|---|---|---|
Adrian Furtuna | Pentesting on Steroids (live demo) - How to perform faster and better pentest engagements | WATCH VIDEO (EN) | |||
Adrian Hada | Emulating Packed Linux Malware Using the Unicorn Emulator Framework | WATCH VIDEO (EN) | |||
Alex “Jay” Balan | Next-Gen IoT Botnets #3 - Moar ownage | WATCH VIDEO (EN) | |||
Alex Matrosov | The Advanced Threats Evolution: Researchers Arm Race | WATCH VIDEO (EN) | |||
Alexandru Razvan Caciulescu | Fuzzing the Stack for Fun and Profit | WATCH VIDEO (EN) | |||
Andrei Bozeanu | Lions at the watering hole – one year after | WATCH VIDEO (EN) | |||
Andrei Masalovich | Live smart, live longer. On modern intelligent cyberweapon | WATCH VIDEO (EN) | |||
Arun Mane | Hacking ICS devices for Fun Penetration Testing of Vehicle Components (ECU and FMS) | WATCH VIDEO (EN) WATCH VIDEO (EN) | |||
Bianca Lewis | The U.S. Election System, Can we fix it? YES WE CAN! | WATCH VIDEO (EN) | |||
Chris Yule | In the Midst of Fire – Lessons Learned from Serious Incidents | WATCH VIDEO (EN) | |||
Christina Kubecka | The Road to Hell is Paved with Bad Passwords | WATCH VIDEO (EN) | |||
Constantin Cosmin Craciun | Hacking The Hacker: The Story | WATCH VIDEO (EN) | |||
Cristian Gogosila | Can Your Cloud Keep a Secret? | WATCH VIDEO (EN) | |||
Dan Demeter | Raise Ya False Flags: A history about pirates and APTs | WATCH VIDEO (EN) | |||
Dan Tofan | How come we have not solved security by now? | WATCH VIDEO (EN) | |||
Dragos Dabija | Connected Vehicle Security | WATCH VIDEO (EN) | |||
Eva Galperin | #Spouseware and #Stalkerware: Where Do We Go from Here? | WATCH VIDEO (EN) | |||
Filip Stojkovski | Intelligent Threat Intel - 'LEAD' Framework | WATCH VIDEO (EN) | |||
Gabriel Cirlig | Rotten to the core: Android worms in the wild | WATCH VIDEO (EN) | |||
Gabriel Ciubotaru | CAN Bit-Stomping attack Prevention | WATCH VIDEO (EN) | |||
Ilya Kostyulin | Cybergames with AMPIRE. NextGen Cyber Warfare and Operations Awareness & Training Polygon | WATCH VIDEO (EN) | |||
Inbar Raz | Under Pressure: Real world damage with TPMS spoofing | WATCH VIDEO (EN) | |||
Ioan Constantin | Simjacker – billion dollar mobile security vs. one tiny piece of plastic | WATCH VIDEO (EN) | |||
Ionel Chirita | Threat Intelligence - Common Mistakes & Stories Form The Field | WATCH VIDEO (EN) | |||
Jayson E. Street | I PWN thee, I PWN thee not! | WATCH VIDEO (EN) | |||
Jeff Man | More Tales from the Crypt...Analyst | WATCH VIDEO (EN) | |||
Jelena Milosevic | Privacy in the healthcare: The good, the bad and the ugly | WATCH VIDEO (EN) | |||
JUN LI | Secure them all—From Silicon to the Cloud | WATCH VIDEO (EN) | |||
Koen Vanhees | Machine Learning and Advanced Analytics in Today’s Cyber Security | WATCH VIDEO (EN) | |||
Luca Pellegrino | Red Team Engagements and The Forgotten Risk of Mobile Devices | WATCH VIDEO (EN) | |||
Lukas Štefanko | Story of the new Android banking Trojan – Cerberus | WATCH VIDEO (EN) | |||
Maksim Iavich | Post quantum digital signature with OQRNG (optical quantum random number generator) | WATCH VIDEO (EN) | |||
Marius Manica | Project SCOUT. Deep Learning for malicious code detection | WATCH VIDEO (EN) | |||
Martin Žember | Why usual pentests suck? | WATCH VIDEO (EN) | |||
Mihai Belu | Security meets the world of gaming | WATCH VIDEO (EN) | |||
Mihai Petre | CAN Bit-Stomping attack Prevention | WATCH VIDEO (EN) | |||
Mihail-Iulian Pleșa | How to implement a quantum key distribution protocol on IBM's quantum computer (a practical example of quantum programming) | WATCH VIDEO (EN) | |||
Milan Gabor | HID (Human Interface Danger) | WATCH VIDEO (EN) | |||
Mircea Hasegan | Consensual Surveillance | WATCH VIDEO (EN) | |||
Muhammad Mudassar Yamin | Windows Based Exploit Chains and Their Detection Mechanism | WATCH VIDEO (EN) | |||
Neil Roebert | Securing DevOps: Common misconceptions | WATCH VIDEO (EN) | |||
Petr Kunstat | How to exploit Cloud adoption for making your IT more secure and convenient for end users | WATCH VIDEO (EN) | |||
Radu Emanuel Chiscariu | Investigating Windows Graphics Vulnerabilities: A Reverse Engineering and Fuzzing Story | WATCH VIDEO (EN) | |||
Raluca Stanciu | Can Your Cloud Keep a Secret? | WATCH VIDEO (EN) | |||
Raphael Robert | Messaging Layer Security: Towards a New Era of Secure Group Messaging | WATCH VIDEO (EN) | |||
Raziel Einhorn | Under Pressure: Real world damage with TPMS spoofing | WATCH VIDEO (EN) | |||
Razvan Bocu | A Secure Distributed e-Health System for the Management of Personal Health Metrics Data | WATCH VIDEO (EN) | |||
Sebastian Avarvarei | The Decalogue(ish) of Contractual Security Sins | WATCH VIDEO (EN) | |||
Sergey Ovchinnikov | Cybergames with AMPIRE. NextGen Cyber Warfare and Operations Awareness & Training Polygon | WATCH VIDEO (EN) | |||
Steve McGregory | Implementing Continuous Offense, to Measure and Monitor Cybersecurity Defenses | WATCH VIDEO (EN) | |||
Tiberiu Boros | Project SCOUT. Deep Learning for malicious code detection | WATCH VIDEO (EN) | |||
Tudor Damian | Security & Compliance in the Cloud | WATCH VIDEO (EN) | |||
Valentin Necoara | Challenges in creating challenges | WATCH VIDEO (EN) | |||
Yury Chemerkin | Breaking Smart. Hacking health, wearable and smart apps to prevent leaking | WATCH VIDEO (EN) |
SPEAKER |
PRESENTATION |
MEDIA RESOURCES & DOCS |
|||
---|---|---|---|---|---|
Abdullah Joseph | Stealing Traffic: Analyzing a Mobile Fraud Intro to Reversing Malware | SLIDES SLIDES | WATCH VIDEO (EN) WATCH VIDEO (EN) | ||
Adrian Furtuna | Let's Make Pentesting Fun Again! Report writing in 5 minutes. | SLIDES | WATCH VIDEO (EN) | ||
Adrian Hada | Applying Fuzzy Hashing to Phishing Page Identification (Lightning Talk) From Mirai to Monero – One Year’s Worth of Honeypot Data | SLIDES SLIDES | WATCH VIDEO (EN) WATCH VIDEO (EN) | ||
Adrian Tudor | Catch Me If You Can - Finding APTs in your network | SLIDES | WATCH VIDEO (EN) | ||
Alex “Jay” Balan | Privacy: Between Hype and Need | SLIDES | WATCH VIDEO (EN) | ||
Alex Negrea | Web Isolation 101: Securing Web Apps against data exfiltration and shielding corporate endpoints from web-borne threats | SLIDES | WATCH VIDEO (EN) | ||
Andrei Costin | IoT Malware: Comprehensive Survey, Analysis Framework and Case Studies | SLIDES | WATCH VIDEO (EN) | ||
Arun Mane | Backdooring DVR/NVR devices | WATCH VIDEO (EN) | |||
Bozeanu Andrei | The lions and the watering hole | SLIDES | WATCH VIDEO (EN) | ||
Cosmin Anghel | Back to the future: how to respond to threats against ICS environments. | WATCH VIDEO (EN) | |||
Cosmin Radu | Burp-ing through your cryptography shield | SLIDES | WATCH VIDEO (EN) | ||
Cotaie Andrei | Weaponizing Neural Networks. In your browser! | SLIDES | WATCH VIDEO (EN) | ||
Cristian Pațachia-Sultănoiu | Opening Speech | SLIDES | WATCH VIDEO (EN) | ||
Dan Demeter | The Hitchhiker's Guide to Disinformation, Public Opinion Swinging and False Flags | SLIDES | WATCH VIDEO (EN) | ||
Daniel Tomescu | One year after a major attack | WATCH VIDEO (EN) | |||
Dimitri van de Giessen | What happened behind the closed doors at MS | SLIDES | WATCH VIDEO (EN) | ||
Dmitry Sklyar | We will charge you. How to [b]reach vendor’s network using EV charging station. | SLIDES | WATCH VIDEO (EN) | ||
Gabriel Cirlig | AutoHotKey Malware – The New AutoIT Applying Honey to the Pot - The Saga of Port 5555 (Lightning Talk) | WATCH VIDEO (EN) WATCH VIDEO (EN) | |||
Gabriel Tanase | One year after a major attack | WATCH VIDEO (EN) | |||
Georg Knabl | Tailored, Machine Learning-driven Password Guessing Attacks and Mitigation | SLIDES | WATCH VIDEO (EN) | ||
Ioan Constantin | Needles, Haystacks and Algorithms: Using Machine Learning to detect complex threats | SLIDES | WATCH VIDEO (EN) | ||
Ioan Iacob | In search of unique behaviour | SLIDES | WATCH VIDEO (EN) | ||
Ionut Georgescu | Back to the future: how to respond to threats against ICS environments. | WATCH VIDEO (EN) | |||
Ionut-Cristian Bucur | Tor .onions: The Good, The Rotten and The Misconfigured | SLIDES | WATCH VIDEO (EN) | ||
Ivan Petrov | Timing attacks against web applications: Are they still practical? | SLIDES | WATCH VIDEO (EN) | ||
Jan Kopriva | OSSTMM: The “Measure, Don’t Guess” Security Testing Methodology Open Directories: Sensitive data (not) hiding in plain sight | SLIDES SLIDES | WATCH VIDEO (EN) WATCH VIDEO (EN) | ||
Jayson E. Street | You're right, this talk isn't really about you! | WATCH VIDEO (EN) | |||
Jelena Milosevic | The challenge of building a secure and safe digital environment in healthcare | SLIDES | WATCH VIDEO (EN) | ||
Jesper Larsson | Security pitfalls in script-able infrastructure pipelines. | SLIDES | WATCH VIDEO (EN) | ||
Khalil Bijjou | Well, that escalated quickly! - a penetration tester's approach to privilege escalation | SLIDES | WATCH VIDEO (EN) | ||
Kirill Puzankov | Mobile signaling threats and vulnerabilities - real cases and statistics from our experience | SLIDES | WATCH VIDEO (EN) | ||
Konrad Jędrzejczyk | WiFi practical hacking "Show me the passwords!" | SLIDES | WATCH VIDEO (EN) | ||
Leo Neagu | Catch Me If You Can - Finding APTs in your network | SLIDES | WATCH VIDEO (EN) | ||
Maksim Iavich | Lattice based Merkle for post-quantum epoch | SLIDES | WATCH VIDEO (EN) | ||
Manuel Wiesinger | CPU vulnerabilities - where are we now? | SLIDES | WATCH VIDEO (EN) | ||
Marek Zmysłowski | How to Fuzz like a Hacker | SLIDES | WATCH VIDEO (EN) | ||
Marius Bucur | In search of unique behaviour | SLIDES | WATCH VIDEO (EN) | ||
Mihai Vasilescu | From Mirai to Monero – One Year’s Worth of Honeypot Data | SLIDES | WATCH VIDEO (EN) | ||
Mike Spicer | Year of the #WiFiCactus | SLIDES | WATCH VIDEO (EN) | ||
Mircea Nenciu | Trust, but verify – Bypassing MFA | SLIDES | WATCH VIDEO (EN) | ||
Muhammad Mudassar Yamin | Implementation of information security techniques on modern android based Kiosk ATM/remittance machines | SLIDES | WATCH VIDEO (EN) | ||
Mushegh Hakhinian | Building application security with 0 money down | SLIDES | WATCH VIDEO (EN) | ||
Neil “Grifter” Wyler | Threat Hunting: From Platitudes to Practical Application | SLIDES | WATCH VIDEO (EN) | ||
Octavian Guzu | Hacking at the ECSC | WATCH VIDEO (EN) | |||
Radu-Emanuel Chiscariu | Drupalgeddon 2 – Yet Another Weapon for the Attacker | SLIDES | WATCH VIDEO (EN) | ||
Raluca Stanciu | Economical Denial of Sustainability in the Cloud (EDOS) | SLIDES | WATCH VIDEO (EN) | ||
Razvan Bocu | Secure and privacy-preserving data transmission and processing using homomorphic encryption | SLIDES | WATCH VIDEO (EN) | ||
Razvan Todor | Bridging the gap between CyberSecurity R&D and UX | SLIDES | WATCH VIDEO (EN) | ||
Stefan Mitroi | Trust, but verify – Bypassing MFA | SLIDES | WATCH VIDEO (EN) | ||
Stefan Tanase | Internet Balkanization: Why Are We Raising Borders Online? | SLIDES | WATCH VIDEO (EN) | ||
Stefan Zarinschi | The Charter of Trust | SLIDES | WATCH VIDEO (EN) | ||
Stephan Gerling | Remote Yacht Hacking | SLIDES | WATCH VIDEO (EN) | ||
Tiberiu Boros | Weaponizing Neural Networks. In your browser! | SLIDES | WATCH VIDEO (EN) | ||
Yury Chemerkin | Mobile, IoT, Clouds… It’s time to hire your own risk manager! | SLIDES | WATCH VIDEO (EN) |
SPEAKER |
PRESENTATION |
MEDIA RESOURCES & DOCS |
|||
---|---|---|---|---|---|
Adrian Furtuna | Pentest-Tools.com - The first online penetration testing framework | WATCH VIDEO (EN) | |||
Adrian Hada | Eternal Blues with EternalBlue | SLIDES | WATCH VIDEO (EN) | ||
Alexandru Ariciu | BlackBox Debugging of Embedded Systems | SLIDES | WATCH VIDEO (EN) | ||
Alexandru Musat | Sharper than a Phisher's Hook - The Story of an Email Autopsy | SLIDES | WATCH VIDEO (EN) | ||
Alexandru Stoian | Incident Busters. A 2017 retrospective | SLIDES | WATCH VIDEO (EN) | ||
Alexandru Suditu | Evolution of threats to Electric Power Grid Operations | SLIDES | WATCH VIDEO (EN) | ||
Alexey Osipov | ATM: every day trouble | SLIDES | WATCH VIDEO (EN) | ||
Alin Puncioiu | Fileless malware - beyond a cursory glance | SLIDES | WATCH VIDEO (EN) | ||
April C Wright | Orange is the New Purple - How and Why to Integrate Development Teams with Red/Blue Teams to Build More Secure Software | SLIDES | WATCH VIDEO (EN) | ||
Arun Mane | ICS Humla | SLIDES | WATCH VIDEO (EN) | ||
Bogdan Simion | Are we alone in our infrastructure? A look into the dark corners of endpoints with Hubble. | SLIDES | WATCH VIDEO (EN) | ||
Carel van Rooyen | Attacking Mongoose OS on Xtensa platforms | SLIDES | WATCH VIDEO (EN) | ||
Catalin Patrascu | Incident Busters. A 2017 retrospective | SLIDES | WATCH VIDEO (EN) | ||
Cosmin Radu | Weaponized RaspberryPi in Red Team Engagements | SLIDES | WATCH VIDEO (EN) | ||
Dan Demeter | Back to the IoT Future: Where Marty controls all your routers | SLIDES | WATCH VIDEO (EN) | ||
Daniel Barbu | Splunking the Clouds: finding the needle in AWS & Azure. | SLIDES | WATCH VIDEO (EN) | ||
Daniel Tomescu | Minute-hacks against Robi the Robot | SLIDES | WATCH VIDEO (EN) | ||
David Wong | SHA-3 vs the world | SLIDES | WATCH VIDEO (EN) | ||
Dorin Enache | Road to ECSC 2017 | SLIDES | WATCH VIDEO (EN) | ||
Dr.-Ing. Martin Pohlack | Keeping customer data safe in EC2 – a deep dive | SLIDES | WATCH VIDEO (EN) | ||
Gabriel Cirlig | Drive safely on the internet lane: how smart cars can leak your data | WATCH VIDEO (EN) | |||
Inbar Raz | In Soviet Russia, Vulnerability Finds You | ||||
Ionut Marin | Sharper than a Phisher's Hook - The Story of an Email Autopsy | SLIDES | WATCH VIDEO (EN) | ||
Irina Nicolae | Efficient Defenses Against Adversarial Examples for Deep Neural Networks | SLIDES | WATCH VIDEO (EN) | ||
J Wolfgang Goerlich | Securing without Slowing | SLIDES | WATCH VIDEO (EN) | ||
John Torakis | Unexpected Shells with "covertutils" | SLIDES | WATCH VIDEO (EN) | ||
Kirill Shipulin | Turning IDS signatures against an IDS itself: a new evasion technique | SLIDES | WATCH VIDEO (EN) | ||
Konrad Jędrzejczyk | Are you keeping up with the Commodore, 'cause the Commodore is keeping up with you! | SLIDES | WATCH VIDEO (EN) | ||
Lucian Sararu | Fileless malware - beyond a cursory glance | SLIDES | WATCH VIDEO (EN) | ||
Mihai Vasilescu | IoT botnets? How do they work? | SLIDES | WATCH VIDEO (EN) | ||
Mike Spicer | What the WiFiCactus?!?!?! | SLIDES | WATCH VIDEO (EN) | ||
Mohamed Bedewi | Active Defense Untangled | SLIDES | WATCH VIDEO (EN) | ||
Neculai Balaban | Road to ECSC 2017 | SLIDES | WATCH VIDEO (EN) | ||
Olga Kochetova | ATM: every day trouble | SLIDES | WATCH VIDEO (EN) | ||
Paul Coggin | Twisting Layer 2 Protocols | SLIDES | WATCH VIDEO (EN) | ||
Philipp Promeuschel | Attacking Mongoose OS on Xtensa platforms | SLIDES | WATCH VIDEO (EN) | ||
Ralf C. Staudemeyer | Smart Cities under Attack: Cybercrime and Technology Response | WATCH VIDEO (EN) | |||
Raul Alvarez | Hijacking the Boot Process - Ransomware Style | SLIDES | WATCH VIDEO (EN) | ||
René Freingruber | Fuzzing closed source applications | SLIDES | WATCH VIDEO (EN) | ||
Sabin POTÎRCĂ | Remote Attacks against IoT | WATCH VIDEO (EN) | |||
Sneha Rajguru | ICS Humla | SLIDES | WATCH VIDEO (EN) | ||
Stefan Nicula | Minute-hacks against Robi the Robot | SLIDES | WATCH VIDEO (EN) | ||
Stefan Tanase | Drive safely on the internet lane: how smart cars can leak your data | WATCH VIDEO (EN) | |||
Steve McGregory | The Business of Cybersecurity: Life-Lessons Learned | SLIDES | WATCH VIDEO (EN) | ||
Tudor Damian | GDPR - T minus 6 months. Are you ready? | SLIDES | WATCH VIDEO (EN) | ||
Uzoma OGBONNA | Splunking the Clouds: finding the needle in AWS & Azure. | SLIDES | WATCH VIDEO (EN) | ||
Vlad Sorici | Supporting innovation in cybersecurity through acceleration program – Orange Fab | SLIDES | WATCH VIDEO (EN) | ||
Vladimir Taratushka | Bug bounty conspiracy and 50 shades of gray hat. Who owns the vulnerability? | SLIDES | WATCH VIDEO (EN) | ||
Walter Belgers | Lockpicking and IT Security | SLIDES | WATCH VIDEO (EN) | ||
Yehia Mamdouh | You Fail in SE If You Make Those Mistakes | SLIDES | WATCH VIDEO (EN) | ||
Yury Chemerkin | The rise of security assistants over security audit services | SLIDES | WATCH VIDEO (EN) |
SPEAKER |
PRESENTATION |
MEDIA RESOURCES & DOCS |
|||
---|---|---|---|---|---|
Adrian Hada | From Threat Intelligence to Rapsheets in just a few steps | SLIDES | WATCH VIDEO (EN) | ||
Alin Boncioaga | InterPlanetary File System (IPFS) | SLIDES | WATCH VIDEO (EN) | ||
Amihai Neiderman | How I hacked my city DVB-T Hacking | WATCH VIDEO (EN) WATCH VIDEO (EN) | |||
Andrei Bozeanu | Detecting Drive-By Attacks by Analyzing Malicious Javascript in Big Data Environments | SLIDES | WATCH VIDEO (EN) | ||
Axelle Apvrille | Infecting Internet of Things | SLIDES | WATCH VIDEO (EN) | ||
Bryson Loughmiller | Threat Intelligence! DIY! | SLIDES | WATCH VIDEO (EN) | ||
Ciprian Bof | Online Alter Ego - A Simple Button for Military Security | SLIDES | WATCH VIDEO (EN) | ||
Cristian Driga | Knock knock.." "Who's there?" .."The Law! Open up! | SLIDES | WATCH VIDEO (EN) | ||
Cristian Pațachia-Sultănoiu | Security through open innovation and data sharing | SLIDES | WATCH VIDEO (EN) | ||
Cristian Sandu | Security of Mobile Cryptocoin Wallets | SLIDES | WATCH VIDEO (EN) | ||
Cristian Zaharia | Social Engineering - Security through education | SLIDES | WATCH VIDEO (EN) | ||
Daniel Barbu | Threat Intelligence! DIY! | SLIDES | WATCH VIDEO (EN) | ||
Dave Chronister | Split Personalities: The Psychology of Social Engineering | SLIDES | WATCH VIDEO (EN) | ||
David Jacoby | Real-world Lessons about Spies Every Security Researcher Should Know | ||||
Dragos Comaneci | From Threat Intelligence to Rapsheets in just a few steps | SLIDES | WATCH VIDEO (EN) | ||
Gabriel Tanase | Testers vs Writers: pentests quality in assurance projects | SLIDES | WATCH VIDEO (EN) | ||
Inbar Raz | Do Tinder Bots Dream of Electric Toys? | SLIDES | WATCH VIDEO (EN) | ||
Ionut Popescu | Windows shellcodes: To be continued | SLIDES | WATCH VIDEO (EN) | ||
Jayson E. Street | …And bad mistakes…I've made a few… | WATCH VIDEO (EN) | |||
Kereszturi Laszlo | Moving forward with cybersecurity | SLIDES | WATCH VIDEO (EN) | ||
Khalil Bijjou | Web Application Firewall Bypassing | SLIDES | WATCH VIDEO (EN) | ||
Mark Felegyhazi | Bad software is eating the world! Let's fix it! | SLIDES | WATCH VIDEO (EN) | ||
Matt Suiche | Follow the Money. | SLIDES | |||
Mihai Neagu | Browser instrumentation for exploit analysis | SLIDES | WATCH VIDEO (EN) | ||
Mohamed Bedewi | Crafting the Unavoidable | SLIDES | WATCH VIDEO (EN) | ||
Ovidiu Diaconescu | Online Alter Ego - A Simple Button for Military Security | SLIDES | WATCH VIDEO (EN) | ||
Raul Alvarez | Reversing a Polymorphic File-Infecting Ransomware | SLIDES | WATCH VIDEO (EN) | ||
Raul Popa | Making hacking and social engineering harder with typing biometrics. | SLIDES | WATCH VIDEO (EN) | ||
Stefan Tanase | Real-world Lessons about Spies Every Security Researcher Should Know | ||||
Tobias Mueller | Functionality, Security, Usability: Choose any two. Or GNOME. | SLIDES | WATCH VIDEO (EN) | ||
Vlad Sorici | Securing the Openness. The operator challenge. | SLIDES | WATCH VIDEO (EN) | ||
Yehia Mamdouh ElGhaly | SE Exploit by improvisación | SLIDES | WATCH VIDEO (EN) | ||
Yury Chemerkin | Riskware Betrayer. Who is the biggest one? | SLIDES | WATCH VIDEO (EN) |
SPEAKER |
PRESENTATION |
MEDIA RESOURCES & DOCS |
|||
---|---|---|---|---|---|
Alexandru Balan | A new Hope - CTF stories & IoT Hacking IoT Village Awards | SLIDES | WATCH VIDEO (EN) WATCH VIDEO (EN) | ||
Amit Ashbel | Game of Hacks: Play, Hack & Track | SLIDES | WATCH VIDEO (EN) | ||
Andrei Costin | (In)Security of Embedded Devices' Firmware – Fast and Furious at Large Scale Hacking and Securing Network Monitoring Systems: End-to-end walkthrough example on Ganglia | SLIDES SLIDES | WATCH VIDEO (EN) WATCH VIDEO (EN) | ||
Andrey Lovyannikov | IoT Security | SLIDES | WATCH VIDEO (EN) | ||
Anton Prokhorov | IoT Security | SLIDES | WATCH VIDEO (EN) | ||
Beau Woods | From Hype Hangover to Happy Hacking: Shaping the World through Shaping Actions | SLIDES | WATCH VIDEO (EN) | ||
Catalin Cosoi | A new Hope - CTF stories & IoT Hacking | SLIDES | WATCH VIDEO (EN) | ||
Cosmin Anghel | What's in a name? DNS use for exfiltration, and monitoring for detection | SLIDES | WATCH VIDEO (EN) | ||
Costel Maxim | Finding media bugs in Android using file format fuzzing | SLIDES | WATCH VIDEO (EN) | ||
Cristian Patachia | White hat hacker bounty program to improve online environment security Orange about Bug Bounty and Innovation Labs 2016 | SLIDES SLIDES | WATCH VIDEO (EN) WATCH VIDEO (EN) | ||
Danijel Grah | ELK stack for Hackers | SLIDES | WATCH VIDEO (EN) | ||
David Sancho | When Steganography Stops Being Cool | SLIDES | WATCH VIDEO (EN) | ||
Georgia Weidman | Integrating Mobile Devices into Your Penetration Testing Program | SLIDES | WATCH VIDEO (EN) | ||
Gustavo Grieco | Toward large-scale vulnerability discovery using Machine Learning | SLIDES | WATCH VIDEO (EN) | ||
Jayson Street | Breaking in Bad (I'm the one who doesn't knock) | SLIDES | WATCH VIDEO (EN) | ||
Konrad Jedrzejczyk | Modern approaches to Wi-Fi attacks | SLIDES | WATCH VIDEO (EN) | ||
Mohamed Bedewi | Building a Weaponized Honeybot (part I) || Building a Weaponized Honeybot (part II) | SLIDES | WATCH VIDEO (EN) | ||
Omer Coskun | Why nation-state malwares target Telco Networks: Dissecting technical capabilities of Regin and its counterparts | SLIDES | WATCH VIDEO (EN) | ||
Paul Coggin | Defending the Enterprise Against Network Infrastructure Threats | SLIDES | WATCH VIDEO (EN) | ||
Raul Alvarez | Challenges on Reversing Layered Malware | SLIDES | WATCH VIDEO (EN) | ||
Razvan-Costin IONESCU | How to mess with Android Intents | SLIDES | WATCH VIDEO (EN) | ||
Robert Knapp | Cryptography – our weapon in the 21st century | WATCH VIDEO (EN) | |||
Rogerio Winter | Luke 8:17 – Misleading implementations that compromise the privacy and information security || Abstract Apoc@lypse Technique | SLIDES | WATCH VIDEO (EN) | ||
Shah Sheikh | Building a Cyber Security Operations Center | SLIDES | WATCH VIDEO (EN) | ||
Sneha Rajguru | Pentesting Android Applications - Workshop | SLIDES | WATCH VIDEO (EN) | ||
Teodor Cimpoesu | What's in a name? DNS use for exfiltration, and monitoring for detection | SLIDES | WATCH VIDEO (EN) | ||
Tudor Damian | IDS Evasion Techniques | SLIDES | WATCH VIDEO (EN) | ||
Yury Chemerkin | Untrusted Mobile Applications. State of Art of Security App-Apocalypse | SLIDES | WATCH VIDEO (EN) |
SPEAKER |
PRESENTATION |
MEDIA RESOURCES & DOCS |
|||
---|---|---|---|---|---|
Adrian Furtuna | PuttyRider - Pivoting from Windows to Linux in a penetration test | SLIDES | WATCH VIDEO (EN) | ||
Alex “Jay” Balan | Owning the girl next door | SLIDES | WATCH VIDEO (EN) | ||
Alexandru George Andrei | All your bitcoins belong to us! | SLIDES | |||
Andrei Costin | A Pyrotechnic Composition: Fireworks, Embedded Wireless and Insecurity-by-Design | SLIDES | WATCH VIDEO (EN) | ||
Andrei Hodorog | SSH Tunneling - a gate to freedom and a threat | SLIDES | WATCH VIDEO (EN) | ||
Anthony Guess-Johnson | Leading and Developing the Cyber Workforce | SLIDES | |||
Benjamin Brown | Cognitive Bias and Critical Thinking in Open Source Intelligence (OSINT) | SLIDES | WATCH VIDEO (EN) | ||
Catalin Cosoi | A look into Bullet Proof Hosting | SLIDES | WATCH VIDEO (EN) | ||
Celil ÜNÜVER | SCADA Software or Swiss Cheese Software? | SLIDES | WATCH VIDEO (EN) | ||
Cernica Ionut-Cosmin | A Practical Study of Security Problems on One of the Most Efficient Web Application Firewall | SLIDES | WATCH VIDEO (EN) | ||
Cristian Stoica | Managing Risk Effectively | SLIDES | WATCH VIDEO (EN) | ||
Dragos Comaneci | Securing Networks using SDN and Machine Learning | SLIDES | WATCH VIDEO (EN) | ||
Fadli B. Sidek | Vulnerability Assessments on SCADA Networks: Outsmarting the Smart Grid. | SLIDES | WATCH VIDEO (EN) | ||
Fahad Ehsan | Memory Forensics & Security Analytics: Detecting Unknown Malware | SLIDES | WATCH VIDEO (EN) | ||
Julie Gommes | Security Nightmares for Journalists, why we must all be SysAdmins | SLIDES | WATCH VIDEO (EN) | ||
Laurent Chrzanovski | Finding a European way for a safer cyberworld integrating our continent's millenary humanistic values, pluralist educational and philosophical systems, and overpassing its actual political weaknesses | SLIDES | WATCH VIDEO (EN) | ||
Marek Zmysłowski | Penetration Testing – 7 Deadly Sins | SLIDES | WATCH VIDEO (EN) | ||
Marion Marschalek | What happens in Windows 8 stays in Windows 8 | SLIDES | WATCH VIDEO (EN) | ||
Marius Münch | CubeSats – A fairy tale; How academia got the chance to implement satellite (in-)security and how I tried to fix it | SLIDES | WATCH VIDEO (EN) | ||
Matthew Halchyshak | Cyber Necromancy: Reverse Engineering Dead Protocols | SLIDES | WATCH VIDEO (EN) | ||
Miguel Mota Veiga | I can track you! They can track you! Everybody can track you! | SLIDES | WATCH VIDEO (EN) | ||
Mika Lauhde | Crypto as a global business | SLIDES | WATCH VIDEO (EN) | ||
Moti Joseph | What happens in Windows 8 stays in Windows 8 | SLIDES | WATCH VIDEO (EN) | ||
Paul de Souza | Cyber Ranges | SLIDES | WATCH VIDEO (EN) | ||
Ralf C. Staudemeyer | Android(in)Security | SLIDES | WATCH VIDEO (EN) | ||
Raoul “Nobody” Chiesa | Democracy and massive-control in the post-Snowden age | SLIDES | WATCH VIDEO (EN) | ||
Roger W. Kuhn, Jr | The 80% Solution at 20% of the Cost'. The Utilization of 'Cyber Hygiene' to Mitigate SCADA System Vulnerabilities | SLIDES | |||
Silviu Sofronie | A look into Bullet Proof Hosting | SLIDES | WATCH VIDEO (EN) | ||
Tudor Damian | Social Engineering, or "hacking people" | SLIDES | WATCH VIDEO (EN) | ||
Yury Chemerkin | Privacy in Mobile Apps. Enterprise Opportunities | SLIDES |
SPEAKER |
PRESENTATION |
MEDIA RESOURCES & DOCS |
|||
---|---|---|---|---|---|
Adrian Furtună | Scanning Romania with Nessus | ||||
Alex Negrea | DRM to p0wn NSA in a few easy steps | SLIDES | |||
Alexandru Cîtea | Android hacking techniques | SLIDES | |||
Andrei Costin | Exploring Bucharest for Free with RATB/Metrorex – RFID Mifare Classic attacks, frauds and countermeasures | ||||
Bogdan Alecu | 0class2DOS | SLIDES | |||
Bogdan Manolea | A few cybercrime cases that could make us think… | SLIDES | |||
Bogdan-Ioan Şuta | An overview of in vehicle CAN network security | SLIDES | |||
Brindusa Stefan Cristian | The limit between law and surveillance | ||||
Carsten Eiram | 10 Years Later: Are We There Yet? | SLIDES | |||
Dan Cătălin Vasile | Does it pay to be a black-hat hacker? | SLIDES | |||
Ionut Popescu | SSL Ripper - All your encrypted traffic belongs to us | SLIDES | |||
Kizz MyAnthia | Into The Worm Hole: Metasploit for Web PenTesting | SLIDES | |||
Marius Barat | Android hacking techniques | SLIDES | |||
Milan Gabor & Danijel Grah | AAA – Analyzing Android APKs (our way) | ||||
Nathan LaFollette “httphacker” | HTTP Header Analysis | SLIDES | |||
Raoul “Nobody” Chiesa | Peering in the soul of Hackers: HPP (the United Nations Hacker’s Profiling Project by UNICRI) v2.0 reloaded | SLIDES | |||
Robert Knapp | The NSA activities are a violation of the human rights and it is time to take action | ||||
Round table | Cops hacking into computers to investigate crimes. What could go wrong? | SLIDES |
SPEAKER |
PRESENTATION |
MEDIA RESOURCES & DOCS |
|||
---|---|---|---|---|---|
Adrian Furtuna | Digipass Instrumentation for Fun and Profit | SLIDES | |||
Adriana Petrescu | Human brain, friend or foe? | SLIDES | |||
Andras Kabai | Hunting and Exploiting Bugs in Kernel Drivers | SLIDES | |||
Andrei Avădănei | DefCamp 2012 Opening Speech | SLIDES | |||
Bogdan Alecu | Mobile networks: exploiting HTTP headers and data traffic | SLIDES | |||
Bogdan Belu | Web Applications - Security and Scalability Checklist | SLIDES | |||
Bogdan Cazacu | Detecting and Defending against Advanced Persistent Threats | SLIDES | |||
Bogdan Gabriel Torcescu | Social Engineering | SLIDES | |||
Bogdan Sergiu Dragos | Blended Threat Concept in Web Applications | SLIDES | |||
Cris | NVidia CUDA for Bruteforce Attacks | SLIDES | |||
Dragos Gaftoneanu | SMART Project | SLIDES | |||
Ioan – Carol Plangu | Attacks Against Captcha Systems | SLIDES | |||
Ionut Popescu | How does a 0day work? | SLIDES | |||
Marian Ventuneac | OWASP Overview of Projects You Can Use Today | SLIDES | |||
Marian Ventuneac | Social Enterprise Rises! …and so are the Risks | SLIDES | |||
Milan Gabor | Hacking beyond hacking - Forgotten Chapters | SLIDES | |||
Prisăcaru Anatolie | Critical vulnerabilities in the online services of a romanian telephony company | SLIDES | |||
Rotariu Dan-Andrei | The importance of logs | SLIDES | |||
Teodor Pripoae | CensorMeOrNot - P2P System of DNS Caches | SLIDES | |||
Zoltán Balázs | Zombie browsers spiced with rootkit extensions | SLIDES |
SPEAKER |
PRESENTATION |
MEDIA RESOURCES & DOCS |
|||
---|---|---|---|---|---|
Alexandru Popescu | Evolution & Analysis of Web Vulnerabilities | SLIDES | |||
Andrei Avădănei | SYDO - Secure Your Data by Obscurity | SLIDES | |||
Andrei Avădănei | SmartFender | SLIDES | |||
Andrei Avădănei | DefCamp 2011 - Call 2 action | SLIDES | |||
Dragos & Andrei | Chess Club - Ground Zero Security | SLIDES | |||
Dragos Gaftoneanu | Forms Injections | SLIDES | |||
Ionuţ Maroi | Advanced data mining in my sql injections using subqueries and custom variables | SLIDES | |||
Ionut Popescu | PE Format | SLIDES | |||
Valentin Ilie | Security in 21st century | SLIDES | |||
Vlad Horatiu | Cross Site Request Forgery Attacks | SLIDES |
SPEAKER |
PRESENTATION |
MEDIA RESOURCES & DOCS |
|||
---|---|---|---|---|---|
Andrei Avădănei | DefCamp 2011 Opening Speech | SLIDES | |||
Andrei Ghiciac | High Security Web Server | SLIDES | |||
Avădănei Andrei | Virtual Anonimity – What? Why? When? How? | SLIDES | |||
Bogdan Alecu | Mobile Security - SMS Attacks | SLIDES | |||
Bogdan Alecu | Attacking SIM Toolkit | SLIDES | |||
Bogdan Botezatu | 0-day vulnerabilities in main stream software | SLIDES | |||
Bogdan Cazacu | Corporate Network Security 101 | SLIDES | |||
Teofil Cojocariu | Information means power. | SLIDES | |||
Weiss Willy | How to generate persistent errors in BIOS | SLIDES |
SPEAKER |
PRESENTATION |
MEDIA RESOURCES & DOCS |
|||
---|---|---|---|---|---|
No speakers found. |