DefCamp Archives
SPEAKER |
PRESENTATION |
MEDIA RESOURCES & DOCS |
|||
---|---|---|---|---|---|
![]() | Abdullah Al-Sultani | Cloud-squatting: the never-ending misery of deleted and forgotten cloud assets | SLIDES | ||
![]() | Abdullah Joseph | Nothing To Hide: Privacy-Preserving Cryptographic Authentication In Practice | SLIDES | ||
![]() | Adrian Furtuna | Kittens falling from the skies (OpRomania) | SLIDES | ||
![]() | Alexandru Persunaru | Security on the Edge - Safeguarding Smart Homes | SLIDES | ||
![]() | Anca Coltescu | How to build a successful Security Team | SLIDES | ||
![]() | Andrei Cotaie | Using RPA for a fast, reliable and repeatable Incident Response process | SLIDES | ||
![]() | Andrei Grigoras | Building a Resilient Red Team Infrastructure | SLIDES | ||
![]() | Andrei Niculae | Hunting / Scraping with Favicons (Lightning Talk) | SLIDES | ||
![]() | Arun Mane | Hardware Backdooring an e-Scooter | |||
![]() | Bogdan Stefan | Architectural challenges and solutions involved in creating a dynamic cyber range solution | SLIDES | ||
![]() | Carina Deaconu | From bits to breaches: the nuts and bolts of vulnerability detection in multi-cloud environments | SLIDES | ||
![]() | Chris Kubecka | The JARM’ing Adventures of a Weaponized Security Tool | SLIDES | ||
![]() | Cristian Done | Monitoring malware behavior through kernel syscall tracing | SLIDES | ||
![]() | Cristian Miron | Using RPA for a fast, reliable and repeatable Incident Response process | SLIDES | ||
![]() | Cristian Pop | What are BadUSB attacks and how can you implement them? | SLIDES | ||
![]() | Eduard Agavriloae | The C2 tool no one talks about: AWS SSM - Run Command | SLIDES | ||
![]() | Eva Telecka | How to build a Successful Security Team | SLIDES | ||
![]() | George-Andrei Iosif | The Open Source Fortress: Finding Vulnerabilities in Your Codebase Using Open Source Tools | SLIDES | ||
![]() | Hrishikesh Somchatwar | Wheels of Wonder: Unveiling Car Hacking Poetry at DefCamp | SLIDES | ||
![]() | Inbar Raz | No Code Malware: Windows 11 At Your Service | SLIDES | ||
![]() | Ioan Constantin | Rough seas & ships in storms – A retrospective of 2023 from an MSSP perspective | SLIDES | ||
![]() | Ioana Stancioiu | From bits to breaches: the nuts and bolts of vulnerability detection in multi-cloud environments | SLIDES | ||
![]() | Ionut Leonte | Security on the Edge - Safeguarding Smart Homes | SLIDES | ||
![]() | Jan Rynes | Have you heard about DNS DR? How this can shift your security from responsive to proactive! | SLIDES | ||
![]() | Joe Beeton | Attacking Developer Environment Through Drive-by Localhost Attacks | SLIDES | ||
![]() | Joey Geralnik | Party Time: Building a Private Game Server by Reverse Engineering | SLIDES | ||
![]() | Julien Ducarroz | Introduction to DefCamp 2023 | |||
![]() | Kirils Solovjovs | MITM on PSTN -- novel methods for intercepting phone calls | SLIDES | ||
![]() | Konrad Jedrzejczyk | ChatNMI & Beyond: Pushing the ‘Easy Button’ in Home-based AI Deployment – A Comparative Review of Leading Software Solutions | SLIDES | ||
![]() | Maksim Iavich | Verkle based Post-quantum digital signature with lattices | SLIDES | ||
![]() | Marek Zmysłowski | ChatNMI & Beyond: Pushing the 'Easy Button' in Home-based AI Deployment - A Comparative Review of Leading Software Solutions | SLIDES | ||
![]() | Matei Badanoiu | 5.0 Shades of Java Exploitation | SLIDES | ||
![]() | Matei Josephs | A deep-dive Into DLL Hijacking - Discovery, Automation and Impact | SLIDES | ||
![]() | Mihai Vasilescu | Monitoring malware behavior through kernel syscall tracing | SLIDES | ||
![]() | Mihail-Iulian Plesa | The best of both worlds: privacy and security | SLIDES | ||
![]() | Muhammad Mudassar Yamin | Weaponized AI for cyber attacks | SLIDES | ||
![]() | Nenad Zaric | Cloudy with a Chance of Exposures: Dissecting Web Server Risks Across Top Cloud Providers | SLIDES | ||
![]() | Nir Chervoni | Conceal, Don’t Feel, Don’t Let Them Know | SLIDES | ||
![]() | Octavian Purcaru | Sherlock - an OpenSource configurable platform for applying LLMs to security use-cases | SLIDES | ||
![]() | Radu Boncea | ICI InnoLabs: A safer approach to building research infrastructure | SLIDES | ||
![]() | Radu Chivereanu | Machine Learning Engineer Intern | SLIDES | ||
![]() | Radu Ionicioiu | Cybersecurity in the Quantum Era | SLIDES | ||
![]() | Radu Ticiu | Bringing Kids to CyberSec in a CoderDojo Setting | SLIDES | ||
![]() | Radu Tudorica | Abusing GCPW for lateral movement from local to cloud | SLIDES | ||
![]() | Razvan Chitu | Architectural challenges and solutions involved in creating a dynamic cyber range solution | SLIDES | ||
![]() | Remi Gascou | Graph-oriented approach for SSTI payload optimization: Usecase of jinja2 | SLIDES | ||
![]() | Sebastian Avarvarei | I Still See Your AppSec Contractual Sins | SLIDES | ||
![]() | Simona David | Moving Target Defense | SLIDES | ||
![]() | Ta-Lun Yen | Backdooring an entire country's 4 million modems with 6 bugs in a week | SLIDES | ||
![]() | Todor Todorov | Supply Chain Shenanigans: Evil npm & Shady NuGet | SLIDES | ||
![]() | Tudor Damian | The NIS2 Directive: Europe's Response to Cyber Shenanigans | SLIDES | ||
![]() | Vladimir Ghita | AI Powered Security Operation Center – SOC. Myth or reality? | SLIDES | ||
![]() | Walter Belgers | Hacking a magnetic lock; successes and failures | SLIDES | ||
![]() | Wojciech Reguła | macOS Red Teaming in 2023 [0-day edition] | SLIDES | ||
![]() | Yashin Mehaboobe | Attacking Vehicle Fleet Management Systems | SLIDES |
SPEAKER |
PRESENTATION |
MEDIA RESOURCES & DOCS |
|||
---|---|---|---|---|---|
![]() | Adrian Furtuna | Penetration Testers versus Initial Access Brokers. Helping the good guys win | SLIDES | WATCH VIDEO (EN) | |
![]() | Alex “Jay” Balan | Place your bets! How we run security for the whole Superbet group and still have time to play Stray ;) | SLIDES | WATCH VIDEO (EN) | |
![]() | Amirhossein Aliakbarian | To log, or not to log! That is the question | SLIDES | WATCH VIDEO (EN) | |
![]() | Andrei Iordan | The Secret Sauce(s) of Cybersecurity Operations | SLIDES | WATCH VIDEO (EN) | |
![]() | Antonio Macovei | Mario Kart Tour - Owned | SLIDES | WATCH VIDEO (EN) | |
![]() | Bianca Lewis | Secrets Of Social Media PsyOps | SLIDES | WATCH VIDEO (EN) | |
![]() | Bogdan Glazov | IoT firmware analysis | SLIDES | WATCH VIDEO (EN) | |
![]() | Catalin Filip | How we analyzed and built an exploit PoC for CVE-2022-24086, a Magento RCE | SLIDES | WATCH VIDEO (EN) | |
![]() | Chris Dale | When alerts become opportunities - Planning and building an Offensive SOC | SLIDES | WATCH VIDEO (EN) | |
![]() | Cosmin Anghel | Cynergy ISAC - first Romanian ISAC | SLIDES | WATCH VIDEO (EN) | |
![]() | Cosmin Vilcu | DNS protocol in hands of attacker | |||
![]() | Cristian Cornea | How (in)secure is Windows Defender - Let's Bypass Together | SLIDES | WATCH VIDEO (EN) | |
![]() | Cristian Pațachia-Sultănoiu | DefCamp 2022 Opening Speech | SLIDES | WATCH VIDEO (EN) | |
![]() | Dan Demeter | Internet Balkanization in an era of military conflict | SLIDES | WATCH VIDEO (EN) | |
![]() | Dr Nestori Syynimaa | Abusing Azure AD pass-through authentication vulnerabilities | SLIDES | WATCH VIDEO (EN) | |
![]() | Eduard Agavriloae | Cloud Configure Review - The new internal pentest | SLIDES | WATCH VIDEO (EN) | |
![]() | Gabriel Mihai Tanase | SOC…1,2,3… | WATCH VIDEO (EN) | ||
![]() | George-Andrei Iosif | MutableSecurity: Life’s too short. Automate everything! | SLIDES | WATCH VIDEO (EN) | |
![]() | Giorgi Akhalaia | Device Tracking Threats in 5G Network | SLIDES | WATCH VIDEO (EN) | |
![]() | Greg Charitonos | Mario Kart Tour - Owned | SLIDES | WATCH VIDEO (EN) | |
![]() | Ioan Constantin | 2022 is a tough one. An MSSPs Perspective | SLIDES | WATCH VIDEO (EN) | |
![]() | Ioan Iacob | The Anatomy of Wiper Malware | SLIDES | WATCH VIDEO (EN) | |
![]() | Ionut Cernica | Deanonymization of TOR HTTP hidden services | SLIDES | WATCH VIDEO (EN) | |
![]() | Jan Rynes | DNS protocol in hands of attacker | SLIDES | WATCH VIDEO (EN) | |
![]() | Jayson E. Street | Deception Via Perception (From Blue Tractors to A Blue & Black Dress) | SLIDES | WATCH VIDEO (EN) | |
![]() | Madalin Ionita | The Anatomy of Wiper Malware | SLIDES | WATCH VIDEO (EN) | |
![]() | Maksim Iavich | The model of post-quantum signature using Verkle Tree | SLIDES | WATCH VIDEO (EN) | |
![]() | Marian Gusatu | Techniques of a prevalent banker over the years through an offensive perspective | SLIDES | WATCH VIDEO (EN) | |
![]() | Matei Radulea | Tell us More: How to Harden Your Sandboxes against malware evasions | SLIDES | WATCH VIDEO (EN) | |
![]() | Max van der Horst | WSL 2 and Security: Productivity Booster or Achilles Heel? | SLIDES | WATCH VIDEO (EN) | |
![]() | Mihail Plesa | Augment cybersecurity through A.I. | SLIDES | WATCH VIDEO (EN) | |
![]() | Monica Obogeanu | Scaling security: creating new products to support the good fight | SLIDES | WATCH VIDEO (EN) | |
![]() | Radu Chiscariu | Tell us More: How to Harden Your Sandboxes against malware evasions | SLIDES | WATCH VIDEO (EN) | |
![]() | Radu Niculita | The role of the network in the Zero-Trust world | SLIDES | WATCH VIDEO (EN) | |
![]() | Rares Bratean | WSL 2 and Security: Productivity Booster or Achilles Heel? | SLIDES | WATCH VIDEO (EN) | |
![]() | Razvan Bocu | Personal Medical Data Management Using Virtualized Symmetric 5G Data Channels | SLIDES | WATCH VIDEO (EN) | |
![]() | Sebastian Avarvarei | What if I told you that Security is here to help? (a.k.a. The 7 habits of highly effective Security leaders) | SLIDES | WATCH VIDEO (EN) | |
![]() | Sebastian Pitei | From lonely wolf to the pack | SLIDES | WATCH VIDEO (EN) | |
![]() | Sorin Portase | A cure for Botnets? Fighting Credential Stuffing at Adobe | SLIDES | WATCH VIDEO (EN) | |
![]() | Tudor Damian | Personal Security in a Post-Pandemic Age | SLIDES | WATCH VIDEO (EN) | |
![]() | Vencel Cserháti | 5G Security - A shared responsibility | SLIDES | WATCH VIDEO (EN) | |
![]() | Volodymyr T. | Impactful Cyber Army Workflows | WATCH VIDEO (EN) | ||
![]() | Yordan Ganchev | Beyond Security Operations | SLIDES | WATCH VIDEO (EN) |
SPEAKER |
PRESENTATION |
MEDIA RESOURCES & DOCS |
|||
---|---|---|---|---|---|
![]() | Adrian Furtuna | Automatic exploitation of critical CVEs using Sniper: ProxyShell, OMIGOD, Confluence RCE and more | WATCH VIDEO (EN) | ||
![]() | Alex “Jay” Balan | 5 years of IoT vulnerability research and countless 0days - A retrospective | WATCH VIDEO (EN) | ||
![]() | Alex Birnberg | WATCH VIDEO (EN) | |||
![]() | Anatol Prisacaru | MEV explained or How to rescue a 6-figure amount from a compromised wallet | WATCH VIDEO (EN) | ||
![]() | Andra Zaharia | Panel: Cybersecurity - the fine line between technology and the human element | WATCH VIDEO (EN) | ||
![]() | Andrada Fiscutean | Panel: Cybersecurity - the fine line between technology and the human element | WATCH VIDEO (EN) | ||
![]() | Andrei Bozeanu | Deceptive Ops & Honeynet Design | WATCH VIDEO (EN) | ||
![]() | Andrei Cotaie | WATCH VIDEO (EN) | |||
![]() | Andrei Iordan | Panel: Cybersecurity - the fine line between technology and the human element | WATCH VIDEO (EN) | ||
![]() | Brian Contos | Cybersecurity & The Board: Choosing success over the Sarlacc Pit | WATCH VIDEO (EN) | ||
![]() | Calin Badea | Organizational Data Asset Lifecycle – Redefining the Cyber-attack surface | WATCH VIDEO (EN) | ||
![]() | Chloe Messdaghi | Burnout: Destabilizing Goals and Threatening Organizational Security | WATCH VIDEO (EN) | ||
![]() | Chris Kubecka | Revenge is Best Served over IOT | WATCH VIDEO (EN) | ||
![]() | Cristian Cornea | WATCH VIDEO (EN) | |||
![]() | Cristian Pațachia-Sultănoiu | WATCH VIDEO (EN) | |||
![]() | Daniel Tomescu | Abusing postMessage API for 6 figures/year | WATCH VIDEO (EN) | ||
![]() | Danny Henderson Jr. | Curse of the Mirage Forest: An Incident Responder's Tale | WATCH VIDEO (EN) | ||
![]() | Don Smith | Responding to the ever evolving threat landscape | WATCH VIDEO (EN) | ||
![]() | Gratiela Magdalinoiu | Panel: Ladies in Cybersecurity | WATCH VIDEO (EN) | ||
![]() | Ioan Constantin | Training SecOps: Education through Gamification. | WATCH VIDEO (EN) | ||
![]() | Ionut Cernica | Hack the hackers: Leaking data over SSL/TLS | WATCH VIDEO (EN) | ||
![]() | Jan Glos | Automotive Cybersecurity – needs, methods, and future challenges | WATCH VIDEO (EN) | ||
![]() | Ljubica Pendaroska | Panel: Ladies in Cybersecurity | WATCH VIDEO (EN) | ||
![]() | Lucian Constantin | Panel: Threats and lessons learned from the pandemic | WATCH VIDEO (EN) | ||
![]() | Lucian Nitescu | Recipe for a beginner in bug bounty hunting | WATCH VIDEO (EN) | ||
![]() | Lukas Stefanko | Vulnerabilities discovered in Android stalkerware apps | WATCH VIDEO (EN) | ||
![]() | Maksim Iavich | Post-quantum scheme with the novel random number generator with the corresponding certification method. | WATCH VIDEO (EN) | ||
![]() | Marek Zmysłowski | WATCH VIDEO (EN) | |||
![]() | Monica Obogeanu | Panel: Entrepreneurship in cybersecurity - should I go there? Powered by ORANGE Fab | WATCH VIDEO (EN) | ||
![]() | Muhammad Mudassar Yamin | Cyber range in a nutshell | WATCH VIDEO (EN) | ||
![]() | Paul Coggin | WATCH VIDEO (EN) | |||
![]() | Piotr Bazydło | WATCH VIDEO (EN) | |||
![]() | Radu Stanescu | Panel: Cybersecurity - the fine line between technology and the human element | WATCH VIDEO (EN) | ||
![]() | Radu-Emanuel Chiscariu | A Deep-Learning Approach to Phishing Detection. | WATCH VIDEO (EN) | ||
![]() | Raphaël Lheureux | Leveraging threat intelligence in the selection and prioritization of detection sources | WATCH VIDEO (EN) | ||
![]() | Robert Vulpe | What it takes to be good at bug bounty hunting | WATCH VIDEO (EN) | ||
![]() | Simona David | Adversary Emulation on Windows | WATCH VIDEO (EN) | ||
![]() | Tiberiu Boros | WATCH VIDEO (EN) | |||
![]() | Tudor Damian | WATCH VIDEO (EN) | |||
![]() | Valentine Mairet | WATCH VIDEO (EN) |
SPEAKER |
PRESENTATION |
MEDIA RESOURCES & DOCS |
|||
---|---|---|---|---|---|
![]() | Adrian Furtuna | Pentesting on Steroids (live demo) - How to perform faster and better pentest engagements | WATCH VIDEO (EN) | ||
![]() | Adrian Hada | Emulating Packed Linux Malware Using the Unicorn Emulator Framework | WATCH VIDEO (EN) | ||
![]() | Alex “Jay” Balan | Next-Gen IoT Botnets #3 - Moar ownage | WATCH VIDEO (EN) | ||
![]() | Alex Matrosov | The Advanced Threats Evolution: Researchers Arm Race | WATCH VIDEO (EN) | ||
![]() | Alexandru Razvan Caciulescu | Fuzzing the Stack for Fun and Profit | WATCH VIDEO (EN) | ||
![]() | Andrei Bozeanu | Lions at the watering hole – one year after | WATCH VIDEO (EN) | ||
![]() | Andrei Masalovich | Live smart, live longer. On modern intelligent cyberweapon | WATCH VIDEO (EN) | ||
![]() | Arun Mane | Hacking ICS devices for Fun Penetration Testing of Vehicle Components (ECU and FMS) | WATCH VIDEO (EN) WATCH VIDEO (EN) | ||
![]() | Bianca Lewis | The U.S. Election System, Can we fix it? YES WE CAN! | WATCH VIDEO (EN) | ||
![]() | Chris Yule | In the Midst of Fire – Lessons Learned from Serious Incidents | WATCH VIDEO (EN) | ||
![]() | Christina Kubecka | The Road to Hell is Paved with Bad Passwords | WATCH VIDEO (EN) | ||
![]() | Constantin Cosmin Craciun | Hacking The Hacker: The Story | WATCH VIDEO (EN) | ||
![]() | Cristian Gogosila | Can Your Cloud Keep a Secret? | WATCH VIDEO (EN) | ||
![]() | Dan Demeter | Raise Ya False Flags: A history about pirates and APTs | WATCH VIDEO (EN) | ||
![]() | Dan Tofan | How come we have not solved security by now? | WATCH VIDEO (EN) | ||
![]() | Dragos Dabija | Connected Vehicle Security | WATCH VIDEO (EN) | ||
![]() | Eva Galperin | #Spouseware and #Stalkerware: Where Do We Go from Here? | WATCH VIDEO (EN) | ||
![]() | Filip Stojkovski | Intelligent Threat Intel - 'LEAD' Framework | WATCH VIDEO (EN) | ||
![]() | Gabriel Cirlig | Rotten to the core: Android worms in the wild | WATCH VIDEO (EN) | ||
![]() | Gabriel Ciubotaru | CAN Bit-Stomping attack Prevention | WATCH VIDEO (EN) | ||
![]() | Ilya Kostyulin | Cybergames with AMPIRE. NextGen Cyber Warfare and Operations Awareness & Training Polygon | WATCH VIDEO (EN) | ||
![]() | Inbar Raz | Under Pressure: Real world damage with TPMS spoofing | WATCH VIDEO (EN) | ||
![]() | Ioan Constantin | Simjacker – billion dollar mobile security vs. one tiny piece of plastic | WATCH VIDEO (EN) | ||
![]() | Ionel Chirita | Threat Intelligence - Common Mistakes & Stories Form The Field | WATCH VIDEO (EN) | ||
![]() | Jayson E. Street | I PWN thee, I PWN thee not! | WATCH VIDEO (EN) | ||
![]() | Jeff Man | More Tales from the Crypt...Analyst | WATCH VIDEO (EN) | ||
![]() | Jelena Milosevic | Privacy in the healthcare: The good, the bad and the ugly | WATCH VIDEO (EN) | ||
![]() | JUN LI | Secure them all—From Silicon to the Cloud | WATCH VIDEO (EN) | ||
![]() | Koen Vanhees | Machine Learning and Advanced Analytics in Today’s Cyber Security | WATCH VIDEO (EN) | ||
![]() | Luca Pellegrino | Red Team Engagements and The Forgotten Risk of Mobile Devices | WATCH VIDEO (EN) | ||
![]() | Lukas Štefanko | Story of the new Android banking Trojan – Cerberus | WATCH VIDEO (EN) | ||
![]() | Maksim Iavich | Post quantum digital signature with OQRNG (optical quantum random number generator) | WATCH VIDEO (EN) | ||
![]() | Marius Manica | Project SCOUT. Deep Learning for malicious code detection | WATCH VIDEO (EN) | ||
![]() | Martin Žember | Why usual pentests suck? | WATCH VIDEO (EN) | ||
![]() | Mihai Belu | Security meets the world of gaming | WATCH VIDEO (EN) | ||
![]() | Mihai Petre | CAN Bit-Stomping attack Prevention | WATCH VIDEO (EN) | ||
![]() | Mihail-Iulian Pleșa | How to implement a quantum key distribution protocol on IBM's quantum computer (a practical example of quantum programming) | WATCH VIDEO (EN) | ||
![]() | Milan Gabor | HID (Human Interface Danger) | WATCH VIDEO (EN) | ||
![]() | Mircea Hasegan | Consensual Surveillance | WATCH VIDEO (EN) | ||
![]() | Muhammad Mudassar Yamin | Windows Based Exploit Chains and Their Detection Mechanism | WATCH VIDEO (EN) | ||
![]() | Neil Roebert | Securing DevOps: Common misconceptions | WATCH VIDEO (EN) | ||
![]() | Petr Kunstat | How to exploit Cloud adoption for making your IT more secure and convenient for end users | WATCH VIDEO (EN) | ||
![]() | Radu Emanuel Chiscariu | Investigating Windows Graphics Vulnerabilities: A Reverse Engineering and Fuzzing Story | WATCH VIDEO (EN) | ||
![]() | Raluca Stanciu | Can Your Cloud Keep a Secret? | WATCH VIDEO (EN) | ||
![]() | Raphael Robert | Messaging Layer Security: Towards a New Era of Secure Group Messaging | WATCH VIDEO (EN) | ||
![]() | Raziel Einhorn | Under Pressure: Real world damage with TPMS spoofing | WATCH VIDEO (EN) | ||
![]() | Razvan Bocu | A Secure Distributed e-Health System for the Management of Personal Health Metrics Data | WATCH VIDEO (EN) | ||
![]() | Sebastian Avarvarei | The Decalogue(ish) of Contractual Security Sins | WATCH VIDEO (EN) | ||
![]() | Sergey Ovchinnikov | Cybergames with AMPIRE. NextGen Cyber Warfare and Operations Awareness & Training Polygon | WATCH VIDEO (EN) | ||
![]() | Steve McGregory | Implementing Continuous Offense, to Measure and Monitor Cybersecurity Defenses | WATCH VIDEO (EN) | ||
![]() | Tiberiu Boros | Project SCOUT. Deep Learning for malicious code detection | WATCH VIDEO (EN) | ||
![]() | Tudor Damian | Security & Compliance in the Cloud | WATCH VIDEO (EN) | ||
![]() | Valentin Necoara | Challenges in creating challenges | WATCH VIDEO (EN) | ||
![]() | Yury Chemerkin | Breaking Smart. Hacking health, wearable and smart apps to prevent leaking | WATCH VIDEO (EN) |
SPEAKER |
PRESENTATION |
MEDIA RESOURCES & DOCS |
|||
---|---|---|---|---|---|
![]() | Abdullah Joseph | Stealing Traffic: Analyzing a Mobile Fraud Intro to Reversing Malware | SLIDES SLIDES | WATCH VIDEO (EN) WATCH VIDEO (EN) | |
![]() | Adrian Furtuna | Let's Make Pentesting Fun Again! Report writing in 5 minutes. | SLIDES | WATCH VIDEO (EN) | |
![]() | Adrian Hada | Applying Fuzzy Hashing to Phishing Page Identification (Lightning Talk) From Mirai to Monero – One Year’s Worth of Honeypot Data | SLIDES SLIDES | WATCH VIDEO (EN) WATCH VIDEO (EN) | |
![]() | Adrian Tudor | Catch Me If You Can - Finding APTs in your network | SLIDES | WATCH VIDEO (EN) | |
![]() | Alex “Jay” Balan | Privacy: Between Hype and Need | SLIDES | WATCH VIDEO (EN) | |
![]() | Alex Negrea | Web Isolation 101: Securing Web Apps against data exfiltration and shielding corporate endpoints from web-borne threats | SLIDES | WATCH VIDEO (EN) | |
![]() | Andrei Costin | IoT Malware: Comprehensive Survey, Analysis Framework and Case Studies | SLIDES | WATCH VIDEO (EN) | |
![]() | Arun Mane | Backdooring DVR/NVR devices | WATCH VIDEO (EN) | ||
![]() | Bozeanu Andrei | The lions and the watering hole | SLIDES | WATCH VIDEO (EN) | |
![]() | Cosmin Anghel | Back to the future: how to respond to threats against ICS environments. | WATCH VIDEO (EN) | ||
![]() | Cosmin Radu | Burp-ing through your cryptography shield | SLIDES | WATCH VIDEO (EN) | |
![]() | Cotaie Andrei | Weaponizing Neural Networks. In your browser! | SLIDES | WATCH VIDEO (EN) | |
![]() | Cristian Pațachia-Sultănoiu | Opening Speech | SLIDES | WATCH VIDEO (EN) | |
![]() | Dan Demeter | The Hitchhiker's Guide to Disinformation, Public Opinion Swinging and False Flags | SLIDES | WATCH VIDEO (EN) | |
![]() | Daniel Tomescu | One year after a major attack | WATCH VIDEO (EN) | ||
![]() | Dimitri van de Giessen | What happened behind the closed doors at MS | SLIDES | WATCH VIDEO (EN) | |
![]() | Dmitry Sklyar | We will charge you. How to [b]reach vendor’s network using EV charging station. | SLIDES | WATCH VIDEO (EN) | |
![]() | Gabriel Cirlig | AutoHotKey Malware – The New AutoIT Applying Honey to the Pot - The Saga of Port 5555 (Lightning Talk) | WATCH VIDEO (EN) WATCH VIDEO (EN) | ||
![]() | Gabriel Tanase | One year after a major attack | WATCH VIDEO (EN) | ||
![]() | Georg Knabl | Tailored, Machine Learning-driven Password Guessing Attacks and Mitigation | SLIDES | WATCH VIDEO (EN) | |
![]() | Ioan Constantin | Needles, Haystacks and Algorithms: Using Machine Learning to detect complex threats | SLIDES | WATCH VIDEO (EN) | |
![]() | Ioan Iacob | In search of unique behaviour | SLIDES | WATCH VIDEO (EN) | |
![]() | Ionut Georgescu | Back to the future: how to respond to threats against ICS environments. | WATCH VIDEO (EN) | ||
![]() | Ionut-Cristian Bucur | Tor .onions: The Good, The Rotten and The Misconfigured | SLIDES | WATCH VIDEO (EN) | |
![]() | Ivan Petrov | Timing attacks against web applications: Are they still practical? | SLIDES | WATCH VIDEO (EN) | |
![]() | Jan Kopriva | OSSTMM: The “Measure, Don’t Guess” Security Testing Methodology Open Directories: Sensitive data (not) hiding in plain sight | SLIDES SLIDES | WATCH VIDEO (EN) WATCH VIDEO (EN) | |
![]() | Jayson E. Street | You're right, this talk isn't really about you! | WATCH VIDEO (EN) | ||
![]() | Jelena Milosevic | The challenge of building a secure and safe digital environment in healthcare | SLIDES | WATCH VIDEO (EN) | |
![]() | Jesper Larsson | Security pitfalls in script-able infrastructure pipelines. | SLIDES | WATCH VIDEO (EN) | |
![]() | Khalil Bijjou | Well, that escalated quickly! - a penetration tester's approach to privilege escalation | SLIDES | WATCH VIDEO (EN) | |
![]() | Kirill Puzankov | Mobile signaling threats and vulnerabilities - real cases and statistics from our experience | SLIDES | WATCH VIDEO (EN) | |
![]() | Konrad Jędrzejczyk | WiFi practical hacking "Show me the passwords!" | SLIDES | WATCH VIDEO (EN) | |
![]() | Leo Neagu | Catch Me If You Can - Finding APTs in your network | SLIDES | WATCH VIDEO (EN) | |
![]() | Maksim Iavich | Lattice based Merkle for post-quantum epoch | SLIDES | WATCH VIDEO (EN) | |
![]() | Manuel Wiesinger | CPU vulnerabilities - where are we now? | SLIDES | WATCH VIDEO (EN) | |
![]() | Marek Zmysłowski | How to Fuzz like a Hacker | SLIDES | WATCH VIDEO (EN) | |
![]() | Marius Bucur | In search of unique behaviour | SLIDES | WATCH VIDEO (EN) | |
![]() | Mihai Vasilescu | From Mirai to Monero – One Year’s Worth of Honeypot Data | SLIDES | WATCH VIDEO (EN) | |
![]() | Mike Spicer | Year of the #WiFiCactus | SLIDES | WATCH VIDEO (EN) | |
![]() | Mircea Nenciu | Trust, but verify – Bypassing MFA | SLIDES | WATCH VIDEO (EN) | |
![]() | Muhammad Mudassar Yamin | Implementation of information security techniques on modern android based Kiosk ATM/remittance machines | SLIDES | WATCH VIDEO (EN) | |
![]() | Mushegh Hakhinian | Building application security with 0 money down | SLIDES | WATCH VIDEO (EN) | |
![]() | Neil “Grifter” Wyler | Threat Hunting: From Platitudes to Practical Application | SLIDES | WATCH VIDEO (EN) | |
![]() | Octavian Guzu | Hacking at the ECSC | WATCH VIDEO (EN) | ||
![]() | Radu-Emanuel Chiscariu | Drupalgeddon 2 – Yet Another Weapon for the Attacker | SLIDES | WATCH VIDEO (EN) | |
![]() | Raluca Stanciu | Economical Denial of Sustainability in the Cloud (EDOS) | SLIDES | WATCH VIDEO (EN) | |
![]() | Razvan Bocu | Secure and privacy-preserving data transmission and processing using homomorphic encryption | SLIDES | WATCH VIDEO (EN) | |
![]() | Razvan Todor | Bridging the gap between CyberSecurity R&D and UX | SLIDES | WATCH VIDEO (EN) | |
![]() | Stefan Mitroi | Trust, but verify – Bypassing MFA | SLIDES | WATCH VIDEO (EN) | |
![]() | Stefan Tanase | Internet Balkanization: Why Are We Raising Borders Online? | SLIDES | WATCH VIDEO (EN) | |
![]() | Stefan Zarinschi | The Charter of Trust | SLIDES | WATCH VIDEO (EN) | |
![]() | Stephan Gerling | Remote Yacht Hacking | SLIDES | WATCH VIDEO (EN) | |
![]() | Tiberiu Boros | Weaponizing Neural Networks. In your browser! | SLIDES | WATCH VIDEO (EN) | |
![]() | Yury Chemerkin | Mobile, IoT, Clouds… It’s time to hire your own risk manager! | SLIDES | WATCH VIDEO (EN) |
SPEAKER |
PRESENTATION |
MEDIA RESOURCES & DOCS |
|||
---|---|---|---|---|---|
![]() | Adrian Furtuna | Pentest-Tools.com - The first online penetration testing framework | WATCH VIDEO (EN) | ||
![]() | Adrian Hada | Eternal Blues with EternalBlue | SLIDES | WATCH VIDEO (EN) | |
![]() | Alexandru Ariciu | BlackBox Debugging of Embedded Systems | SLIDES | WATCH VIDEO (EN) | |
![]() | Alexandru Musat | Sharper than a Phisher's Hook - The Story of an Email Autopsy | SLIDES | WATCH VIDEO (EN) | |
![]() | Alexandru Stoian | Incident Busters. A 2017 retrospective | SLIDES | WATCH VIDEO (EN) | |
![]() | Alexandru Suditu | Evolution of threats to Electric Power Grid Operations | SLIDES | WATCH VIDEO (EN) | |
![]() | Alexey Osipov | ATM: every day trouble | SLIDES | WATCH VIDEO (EN) | |
![]() | Alin Puncioiu | Fileless malware - beyond a cursory glance | SLIDES | WATCH VIDEO (EN) | |
![]() | April C Wright | Orange is the New Purple - How and Why to Integrate Development Teams with Red/Blue Teams to Build More Secure Software | SLIDES | WATCH VIDEO (EN) | |
![]() | Arun Mane | ICS Humla | SLIDES | WATCH VIDEO (EN) | |
![]() | Bogdan Simion | Are we alone in our infrastructure? A look into the dark corners of endpoints with Hubble. | SLIDES | WATCH VIDEO (EN) | |
![]() | Carel van Rooyen | Attacking Mongoose OS on Xtensa platforms | SLIDES | WATCH VIDEO (EN) | |
![]() | Catalin Patrascu | Incident Busters. A 2017 retrospective | SLIDES | WATCH VIDEO (EN) | |
![]() | Cosmin Radu | Weaponized RaspberryPi in Red Team Engagements | SLIDES | WATCH VIDEO (EN) | |
![]() | Dan Demeter | Back to the IoT Future: Where Marty controls all your routers | SLIDES | WATCH VIDEO (EN) | |
![]() | Daniel Barbu | Splunking the Clouds: finding the needle in AWS & Azure. | SLIDES | WATCH VIDEO (EN) | |
![]() | Daniel Tomescu | Minute-hacks against Robi the Robot | SLIDES | WATCH VIDEO (EN) | |
![]() | David Wong | SHA-3 vs the world | SLIDES | WATCH VIDEO (EN) | |
![]() | Dorin Enache | Road to ECSC 2017 | SLIDES | WATCH VIDEO (EN) | |
![]() | Dr.-Ing. Martin Pohlack | Keeping customer data safe in EC2 – a deep dive | SLIDES | WATCH VIDEO (EN) | |
![]() | Gabriel Cirlig | Drive safely on the internet lane: how smart cars can leak your data | WATCH VIDEO (EN) | ||
![]() | Inbar Raz | In Soviet Russia, Vulnerability Finds You | |||
![]() | Ionut Marin | Sharper than a Phisher's Hook - The Story of an Email Autopsy | SLIDES | WATCH VIDEO (EN) | |
![]() | Irina Nicolae | Efficient Defenses Against Adversarial Examples for Deep Neural Networks | SLIDES | WATCH VIDEO (EN) | |
![]() | J Wolfgang Goerlich | Securing without Slowing | SLIDES | WATCH VIDEO (EN) | |
![]() | John Torakis | Unexpected Shells with "covertutils" | SLIDES | WATCH VIDEO (EN) | |
![]() | Kirill Shipulin | Turning IDS signatures against an IDS itself: a new evasion technique | SLIDES | WATCH VIDEO (EN) | |
![]() | Konrad Jędrzejczyk | Are you keeping up with the Commodore, 'cause the Commodore is keeping up with you! | SLIDES | WATCH VIDEO (EN) | |
![]() | Lucian Sararu | Fileless malware - beyond a cursory glance | SLIDES | WATCH VIDEO (EN) | |
![]() | Mihai Vasilescu | IoT botnets? How do they work? | SLIDES | WATCH VIDEO (EN) | |
![]() | Mike Spicer | What the WiFiCactus?!?!?! | SLIDES | WATCH VIDEO (EN) | |
![]() | Mohamed Bedewi | Active Defense Untangled | SLIDES | WATCH VIDEO (EN) | |
![]() | Neculai Balaban | Road to ECSC 2017 | SLIDES | WATCH VIDEO (EN) | |
![]() | Olga Kochetova | ATM: every day trouble | SLIDES | WATCH VIDEO (EN) | |
![]() | Paul Coggin | Twisting Layer 2 Protocols | SLIDES | WATCH VIDEO (EN) | |
![]() | Philipp Promeuschel | Attacking Mongoose OS on Xtensa platforms | SLIDES | WATCH VIDEO (EN) | |
![]() | Ralf C. Staudemeyer | Smart Cities under Attack: Cybercrime and Technology Response | WATCH VIDEO (EN) | ||
![]() | Raul Alvarez | Hijacking the Boot Process - Ransomware Style | SLIDES | WATCH VIDEO (EN) | |
![]() | René Freingruber | Fuzzing closed source applications | SLIDES | WATCH VIDEO (EN) | |
![]() | Sabin POTÎRCĂ | Remote Attacks against IoT | WATCH VIDEO (EN) | ||
![]() | Sneha Rajguru | ICS Humla | SLIDES | WATCH VIDEO (EN) | |
![]() | Stefan Nicula | Minute-hacks against Robi the Robot | SLIDES | WATCH VIDEO (EN) | |
![]() | Stefan Tanase | Drive safely on the internet lane: how smart cars can leak your data | WATCH VIDEO (EN) | ||
![]() | Steve McGregory | The Business of Cybersecurity: Life-Lessons Learned | SLIDES | WATCH VIDEO (EN) | |
![]() | Tudor Damian | GDPR - T minus 6 months. Are you ready? | SLIDES | WATCH VIDEO (EN) | |
![]() | Uzoma OGBONNA | Splunking the Clouds: finding the needle in AWS & Azure. | SLIDES | WATCH VIDEO (EN) | |
![]() | Vlad Sorici | Supporting innovation in cybersecurity through acceleration program – Orange Fab | SLIDES | WATCH VIDEO (EN) | |
![]() | Vladimir Taratushka | Bug bounty conspiracy and 50 shades of gray hat. Who owns the vulnerability? | SLIDES | WATCH VIDEO (EN) | |
![]() | Walter Belgers | Lockpicking and IT Security | SLIDES | WATCH VIDEO (EN) | |
![]() | Yehia Mamdouh | You Fail in SE If You Make Those Mistakes | SLIDES | WATCH VIDEO (EN) | |
![]() | Yury Chemerkin | The rise of security assistants over security audit services | SLIDES | WATCH VIDEO (EN) |
SPEAKER |
PRESENTATION |
MEDIA RESOURCES & DOCS |
|||
---|---|---|---|---|---|
![]() | Adrian Hada | From Threat Intelligence to Rapsheets in just a few steps | SLIDES | WATCH VIDEO (EN) | |
![]() | Alin Boncioaga | InterPlanetary File System (IPFS) | SLIDES | WATCH VIDEO (EN) | |
![]() | Amihai Neiderman | How I hacked my city DVB-T Hacking | WATCH VIDEO (EN) WATCH VIDEO (EN) | ||
![]() | Andrei Bozeanu | Detecting Drive-By Attacks by Analyzing Malicious Javascript in Big Data Environments | SLIDES | WATCH VIDEO (EN) | |
![]() | Axelle Apvrille | Infecting Internet of Things | SLIDES | WATCH VIDEO (EN) | |
![]() | Bryson Loughmiller | Threat Intelligence! DIY! | SLIDES | WATCH VIDEO (EN) | |
![]() | Ciprian Bof | Online Alter Ego - A Simple Button for Military Security | SLIDES | WATCH VIDEO (EN) | |
![]() | Cristian Driga | Knock knock.." "Who's there?" .."The Law! Open up! | SLIDES | WATCH VIDEO (EN) | |
![]() | Cristian Pațachia-Sultănoiu | Security through open innovation and data sharing | SLIDES | WATCH VIDEO (EN) | |
![]() | Cristian Sandu | Security of Mobile Cryptocoin Wallets | SLIDES | WATCH VIDEO (EN) | |
![]() | Cristian Zaharia | Social Engineering - Security through education | SLIDES | WATCH VIDEO (EN) | |
![]() | Daniel Barbu | Threat Intelligence! DIY! | SLIDES | WATCH VIDEO (EN) | |
![]() | Dave Chronister | Split Personalities: The Psychology of Social Engineering | SLIDES | WATCH VIDEO (EN) | |
![]() | David Jacoby | Real-world Lessons about Spies Every Security Researcher Should Know | |||
![]() | Dragos Comaneci | From Threat Intelligence to Rapsheets in just a few steps | SLIDES | WATCH VIDEO (EN) | |
![]() | Gabriel Tanase | Testers vs Writers: pentests quality in assurance projects | SLIDES | WATCH VIDEO (EN) | |
![]() | Inbar Raz | Do Tinder Bots Dream of Electric Toys? | SLIDES | WATCH VIDEO (EN) | |
![]() | Ionut Popescu | Windows shellcodes: To be continued | SLIDES | WATCH VIDEO (EN) | |
![]() | Jayson E. Street | …And bad mistakes…I've made a few… | WATCH VIDEO (EN) | ||
![]() | Kereszturi Laszlo | Moving forward with cybersecurity | SLIDES | WATCH VIDEO (EN) | |
![]() | Khalil Bijjou | Web Application Firewall Bypassing | SLIDES | WATCH VIDEO (EN) | |
![]() | Mark Felegyhazi | Bad software is eating the world! Let's fix it! | SLIDES | WATCH VIDEO (EN) | |
![]() | Matt Suiche | Follow the Money. | SLIDES | ||
![]() | Mihai Neagu | Browser instrumentation for exploit analysis | SLIDES | WATCH VIDEO (EN) | |
![]() | Mohamed Bedewi | Crafting the Unavoidable | SLIDES | WATCH VIDEO (EN) | |
![]() | Ovidiu Diaconescu | Online Alter Ego - A Simple Button for Military Security | SLIDES | WATCH VIDEO (EN) | |
![]() | Raul Alvarez | Reversing a Polymorphic File-Infecting Ransomware | SLIDES | WATCH VIDEO (EN) | |
![]() | Raul Popa | Making hacking and social engineering harder with typing biometrics. | SLIDES | WATCH VIDEO (EN) | |
![]() | Stefan Tanase | Real-world Lessons about Spies Every Security Researcher Should Know | |||
![]() | Tobias Mueller | Functionality, Security, Usability: Choose any two. Or GNOME. | SLIDES | WATCH VIDEO (EN) | |
![]() | Vlad Sorici | Securing the Openness. The operator challenge. | SLIDES | WATCH VIDEO (EN) | |
![]() | Yehia Mamdouh ElGhaly | SE Exploit by improvisación | SLIDES | WATCH VIDEO (EN) | |
![]() | Yury Chemerkin | Riskware Betrayer. Who is the biggest one? | SLIDES | WATCH VIDEO (EN) |
SPEAKER |
PRESENTATION |
MEDIA RESOURCES & DOCS |
|||
---|---|---|---|---|---|
![]() | Alexandru Balan | A new Hope - CTF stories & IoT Hacking IoT Village Awards | SLIDES | WATCH VIDEO (EN) WATCH VIDEO (EN) | |
![]() | Amit Ashbel | Game of Hacks: Play, Hack & Track | SLIDES | WATCH VIDEO (EN) | |
![]() | Andrei Costin | (In)Security of Embedded Devices' Firmware – Fast and Furious at Large Scale Hacking and Securing Network Monitoring Systems: End-to-end walkthrough example on Ganglia | SLIDES SLIDES | WATCH VIDEO (EN) WATCH VIDEO (EN) | |
![]() | Andrey Lovyannikov | IoT Security | SLIDES | WATCH VIDEO (EN) | |
![]() | Anton Prokhorov | IoT Security | SLIDES | WATCH VIDEO (EN) | |
![]() | Beau Woods | From Hype Hangover to Happy Hacking: Shaping the World through Shaping Actions | SLIDES | WATCH VIDEO (EN) | |
![]() | Catalin Cosoi | A new Hope - CTF stories & IoT Hacking | SLIDES | WATCH VIDEO (EN) | |
![]() | Cosmin Anghel | What's in a name? DNS use for exfiltration, and monitoring for detection | SLIDES | WATCH VIDEO (EN) | |
![]() | Costel Maxim | Finding media bugs in Android using file format fuzzing | SLIDES | WATCH VIDEO (EN) | |
![]() | Cristian Patachia | White hat hacker bounty program to improve online environment security Orange about Bug Bounty and Innovation Labs 2016 | SLIDES SLIDES | WATCH VIDEO (EN) WATCH VIDEO (EN) | |
![]() | Danijel Grah | ELK stack for Hackers | SLIDES | WATCH VIDEO (EN) | |
![]() | David Sancho | When Steganography Stops Being Cool | SLIDES | WATCH VIDEO (EN) | |
![]() | Georgia Weidman | Integrating Mobile Devices into Your Penetration Testing Program | SLIDES | WATCH VIDEO (EN) | |
![]() | Gustavo Grieco | Toward large-scale vulnerability discovery using Machine Learning | SLIDES | WATCH VIDEO (EN) | |
![]() | Jayson Street | Breaking in Bad (I'm the one who doesn't knock) | SLIDES | WATCH VIDEO (EN) | |
![]() | Konrad Jedrzejczyk | Modern approaches to Wi-Fi attacks | SLIDES | WATCH VIDEO (EN) | |
![]() | Mohamed Bedewi | Building a Weaponized Honeybot (part I) || Building a Weaponized Honeybot (part II) | SLIDES | WATCH VIDEO (EN) | |
![]() | Omer Coskun | Why nation-state malwares target Telco Networks: Dissecting technical capabilities of Regin and its counterparts | SLIDES | WATCH VIDEO (EN) | |
![]() | Paul Coggin | Defending the Enterprise Against Network Infrastructure Threats | SLIDES | WATCH VIDEO (EN) | |
![]() | Raul Alvarez | Challenges on Reversing Layered Malware | SLIDES | WATCH VIDEO (EN) | |
![]() | Razvan-Costin IONESCU | How to mess with Android Intents | SLIDES | WATCH VIDEO (EN) | |
![]() | Robert Knapp | Cryptography – our weapon in the 21st century | WATCH VIDEO (EN) | ||
![]() | Rogerio Winter | Luke 8:17 – Misleading implementations that compromise the privacy and information security || Abstract Apoc@lypse Technique | SLIDES | WATCH VIDEO (EN) | |
![]() | Shah Sheikh | Building a Cyber Security Operations Center | SLIDES | WATCH VIDEO (EN) | |
![]() | Sneha Rajguru | Pentesting Android Applications - Workshop | SLIDES | WATCH VIDEO (EN) | |
![]() | Teodor Cimpoesu | What's in a name? DNS use for exfiltration, and monitoring for detection | SLIDES | WATCH VIDEO (EN) | |
![]() | Tudor Damian | IDS Evasion Techniques | SLIDES | WATCH VIDEO (EN) | |
![]() | Yury Chemerkin | Untrusted Mobile Applications. State of Art of Security App-Apocalypse | SLIDES | WATCH VIDEO (EN) |
SPEAKER |
PRESENTATION |
MEDIA RESOURCES & DOCS |
|||
---|---|---|---|---|---|
![]() | Adrian Furtuna | PuttyRider - Pivoting from Windows to Linux in a penetration test | SLIDES | WATCH VIDEO (EN) | |
![]() | Alex “Jay” Balan | Owning the girl next door | SLIDES | WATCH VIDEO (EN) | |
![]() | Alexandru George Andrei | All your bitcoins belong to us! | SLIDES | ||
![]() | Andrei Costin | A Pyrotechnic Composition: Fireworks, Embedded Wireless and Insecurity-by-Design | SLIDES | WATCH VIDEO (EN) | |
![]() | Andrei Hodorog | SSH Tunneling - a gate to freedom and a threat | SLIDES | WATCH VIDEO (EN) | |
![]() | Anthony Guess-Johnson | Leading and Developing the Cyber Workforce | SLIDES | ||
![]() | Benjamin Brown | Cognitive Bias and Critical Thinking in Open Source Intelligence (OSINT) | SLIDES | WATCH VIDEO (EN) | |
![]() | Catalin Cosoi | A look into Bullet Proof Hosting | SLIDES | WATCH VIDEO (EN) | |
![]() | Celil ÜNÜVER | SCADA Software or Swiss Cheese Software? | SLIDES | WATCH VIDEO (EN) | |
![]() | Cernica Ionut-Cosmin | A Practical Study of Security Problems on One of the Most Efficient Web Application Firewall | SLIDES | WATCH VIDEO (EN) | |
![]() | Cristian Stoica | Managing Risk Effectively | SLIDES | WATCH VIDEO (EN) | |
![]() | Dragos Comaneci | Securing Networks using SDN and Machine Learning | SLIDES | WATCH VIDEO (EN) | |
![]() | Fadli B. Sidek | Vulnerability Assessments on SCADA Networks: Outsmarting the Smart Grid. | SLIDES | WATCH VIDEO (EN) | |
![]() | Fahad Ehsan | Memory Forensics & Security Analytics: Detecting Unknown Malware | SLIDES | WATCH VIDEO (EN) | |
![]() | Julie Gommes | Security Nightmares for Journalists, why we must all be SysAdmins | SLIDES | WATCH VIDEO (EN) | |
![]() | Laurent Chrzanovski | Finding a European way for a safer cyberworld integrating our continent's millenary humanistic values, pluralist educational and philosophical systems, and overpassing its actual political weaknesses | SLIDES | WATCH VIDEO (EN) | |
![]() | Marek Zmysłowski | Penetration Testing – 7 Deadly Sins | SLIDES | WATCH VIDEO (EN) | |
![]() | Marion Marschalek | What happens in Windows 8 stays in Windows 8 | SLIDES | WATCH VIDEO (EN) | |
![]() | Marius Münch | CubeSats – A fairy tale; How academia got the chance to implement satellite (in-)security and how I tried to fix it | SLIDES | WATCH VIDEO (EN) | |
![]() | Matthew Halchyshak | Cyber Necromancy: Reverse Engineering Dead Protocols | SLIDES | WATCH VIDEO (EN) | |
![]() | Miguel Mota Veiga | I can track you! They can track you! Everybody can track you! | SLIDES | WATCH VIDEO (EN) | |
![]() | Mika Lauhde | Crypto as a global business | SLIDES | WATCH VIDEO (EN) | |
![]() | Moti Joseph | What happens in Windows 8 stays in Windows 8 | SLIDES | WATCH VIDEO (EN) | |
![]() | Paul de Souza | Cyber Ranges | SLIDES | WATCH VIDEO (EN) | |
![]() | Ralf C. Staudemeyer | Android(in)Security | SLIDES | WATCH VIDEO (EN) | |
![]() | Raoul “Nobody” Chiesa | Democracy and massive-control in the post-Snowden age | SLIDES | WATCH VIDEO (EN) | |
![]() | Roger W. Kuhn, Jr | The 80% Solution at 20% of the Cost'. The Utilization of 'Cyber Hygiene' to Mitigate SCADA System Vulnerabilities | SLIDES | ||
![]() | Silviu Sofronie | A look into Bullet Proof Hosting | SLIDES | WATCH VIDEO (EN) | |
![]() | Tudor Damian | Social Engineering, or "hacking people" | SLIDES | WATCH VIDEO (EN) | |
![]() | Yury Chemerkin | Privacy in Mobile Apps. Enterprise Opportunities | SLIDES |
SPEAKER |
PRESENTATION |
MEDIA RESOURCES & DOCS |
|||
---|---|---|---|---|---|
![]() | Adrian Furtună | Scanning Romania with Nessus | |||
![]() | Alex Negrea | DRM to p0wn NSA in a few easy steps | SLIDES | ||
![]() | Alexandru Cîtea | Android hacking techniques | SLIDES | ||
![]() | Andrei Costin | Exploring Bucharest for Free with RATB/Metrorex – RFID Mifare Classic attacks, frauds and countermeasures | |||
![]() | Bogdan Alecu | 0class2DOS | SLIDES | ||
![]() | Bogdan Manolea | A few cybercrime cases that could make us think… | SLIDES | ||
![]() | Bogdan-Ioan Şuta | An overview of in vehicle CAN network security | SLIDES | ||
![]() | Brindusa Stefan Cristian | The limit between law and surveillance | |||
![]() | Carsten Eiram | 10 Years Later: Are We There Yet? | SLIDES | ||
![]() | Dan Cătălin Vasile | Does it pay to be a black-hat hacker? | SLIDES | ||
![]() | Ionut Popescu | SSL Ripper - All your encrypted traffic belongs to us | SLIDES | ||
![]() | Kizz MyAnthia | Into The Worm Hole: Metasploit for Web PenTesting | SLIDES | ||
![]() | Marius Barat | Android hacking techniques | SLIDES | ||
![]() | Milan Gabor & Danijel Grah | AAA – Analyzing Android APKs (our way) | |||
![]() | Nathan LaFollette “httphacker” | HTTP Header Analysis | SLIDES | ||
![]() | Raoul “Nobody” Chiesa | Peering in the soul of Hackers: HPP (the United Nations Hacker’s Profiling Project by UNICRI) v2.0 reloaded | SLIDES | ||
![]() | Robert Knapp | The NSA activities are a violation of the human rights and it is time to take action | |||
![]() | Round table | Cops hacking into computers to investigate crimes. What could go wrong? | SLIDES |
SPEAKER |
PRESENTATION |
MEDIA RESOURCES & DOCS |
|||
---|---|---|---|---|---|
![]() | Adrian Furtuna | Digipass Instrumentation for Fun and Profit | SLIDES | ||
![]() | Adriana Petrescu | Human brain, friend or foe? | SLIDES | ||
![]() | Andras Kabai | Hunting and Exploiting Bugs in Kernel Drivers | SLIDES | ||
![]() | Andrei Avădănei | DefCamp 2012 Opening Speech | SLIDES | ||
![]() | Bogdan Alecu | Mobile networks: exploiting HTTP headers and data traffic | SLIDES | ||
![]() | Bogdan Belu | Web Applications - Security and Scalability Checklist | SLIDES | ||
![]() | Bogdan Cazacu | Detecting and Defending against Advanced Persistent Threats | SLIDES | ||
![]() | Bogdan Gabriel Torcescu | Social Engineering | SLIDES | ||
![]() | Bogdan Sergiu Dragos | Blended Threat Concept in Web Applications | SLIDES | ||
![]() | Cris | NVidia CUDA for Bruteforce Attacks | SLIDES | ||
![]() | Dragos Gaftoneanu | SMART Project | SLIDES | ||
![]() | Ioan – Carol Plangu | Attacks Against Captcha Systems | SLIDES | ||
![]() | Ionut Popescu | How does a 0day work? | SLIDES | ||
![]() | Marian Ventuneac | OWASP Overview of Projects You Can Use Today | SLIDES | ||
![]() | Marian Ventuneac | Social Enterprise Rises! …and so are the Risks | SLIDES | ||
![]() | Milan Gabor | Hacking beyond hacking - Forgotten Chapters | SLIDES | ||
![]() | Prisăcaru Anatolie | Critical vulnerabilities in the online services of a romanian telephony company | SLIDES | ||
![]() | Rotariu Dan-Andrei | The importance of logs | SLIDES | ||
![]() | Teodor Pripoae | CensorMeOrNot - P2P System of DNS Caches | SLIDES | ||
![]() | Zoltán Balázs | Zombie browsers spiced with rootkit extensions | SLIDES |
SPEAKER |
PRESENTATION |
MEDIA RESOURCES & DOCS |
|||
---|---|---|---|---|---|
![]() | Alexandru Popescu | Evolution & Analysis of Web Vulnerabilities | SLIDES | ||
![]() | Andrei Avădănei | SYDO - Secure Your Data by Obscurity | SLIDES | ||
![]() | Andrei Avădănei | SmartFender | SLIDES | ||
![]() | Andrei Avădănei | DefCamp 2011 - Call 2 action | SLIDES | ||
![]() | Dragos & Andrei | Chess Club - Ground Zero Security | SLIDES | ||
![]() | Dragos Gaftoneanu | Forms Injections | SLIDES | ||
![]() | Ionuţ Maroi | Advanced data mining in my sql injections using subqueries and custom variables | SLIDES | ||
![]() | Ionut Popescu | PE Format | SLIDES | ||
![]() | Valentin Ilie | Security in 21st century | SLIDES | ||
![]() | Vlad Horatiu | Cross Site Request Forgery Attacks | SLIDES |
SPEAKER |
PRESENTATION |
MEDIA RESOURCES & DOCS |
|||
---|---|---|---|---|---|
![]() | Andrei Avădănei | DefCamp 2011 Opening Speech | SLIDES | ||
![]() | Andrei Ghiciac | High Security Web Server | SLIDES | ||
![]() | Avădănei Andrei | Virtual Anonimity – What? Why? When? How? | SLIDES | ||
![]() | Bogdan Alecu | Mobile Security - SMS Attacks | SLIDES | ||
![]() | Bogdan Alecu | Attacking SIM Toolkit | SLIDES | ||
![]() | Bogdan Botezatu | 0-day vulnerabilities in main stream software | SLIDES | ||
![]() | Bogdan Cazacu | Corporate Network Security 101 | SLIDES | ||
![]() | Teofil Cojocariu | Information means power. | SLIDES | ||
![]() | Weiss Willy | How to generate persistent errors in BIOS | SLIDES |
SPEAKER |
PRESENTATION |
MEDIA RESOURCES & DOCS |
|||
---|---|---|---|---|---|
No speakers found. |