Cristian Pop
Cyber Security Engineer Garmin
BIOGRAPHY
After around 5 years of doing penetration testing on web applications, mobile applications and IoT devices, I went into DevSecOps and started using my security knowledge to defend systems against some of the vulnerabilities that I was exploiting before. However, my passion for hacking and understanding attacks & vulnerabilities remained the same. Once a hacker, always a hacker. I also enjoy taking part in CTFs and making writeups to help others get into CTFs as well, trying to grow the local cyber-security communities and testing new, interesting software in my homelab.
What are BadUSB attacks and how can you implement them?
In recent years, BadUSB attacks have gained notoriety, being utilized by some APT groups and even drawing warnings from institutions like the FBI. As media attention continues to rise, it is important to understand the mechanics behind these attacks.
But what exactly are BadUSB attacks? BadUSB attacks leverage the inherent trust that we (and our computers!) place in USB devices, using that trust in order to seamlessly interact with systems.
This presentation aims to demystify BadUSB attacks, providing attendees with some brief insights into what those attacks are, why do these attacks work, how do they look like and how likely they are.
We will explore three different methods for implementing and using BadUSB attacks yourself, compare them and discuss their potential applications as part of red-team engagements.
Drawing from my perssonal experiences, I will share some findings and lessons learned while working on this project: what were the unexpected challenges that I faced and what were the things that worked almost too well.
Shifting to the defensive perspective, we are going to discuss some tips on how you can guard against BadUSB attacks personally or in your organization.
Are you the next cyber security superstar?
If you are passionate about an information security topic or you have strong technical skills developing researches on your own, you should definitely Apply at Call for Papers. By submitting you will have the chance to showcase your work to +2000 attendees.
Other speakers joining this year
Radu Chivereanu
Machine Learning Engineer Intern Adobe
Muhammad Mudassar Yamin
Associate Professor Norwegian University of Science and Technology
Jan Rynes
Solutions Architect Infoblox
Ready for this year's presentations?
By registering you will unlock access to 60+ speakers and two full days with cyber security news & showcases from worldwide leaders.
COMPETITIONS
Sponsors & Partners
They help us make this conference possible.
POWERED BY
Orange Romania is part of the Orange Group, one of the largest global telecommunications operators that connects hundreds of millions of customers worldwide. With over 11 million local customers and an annual turnover exceeding 1.5 billion euros, Orange Romania connects 1 in 2 Romanians and offers an extensive range of communication solutions for both individual and corporate customers, from basic connectivity services to complete mobile, fixed internet, TV packages, and complex IT&C solutions through Orange Business.
Orange Romania is the number 1 operator in terms of network performance, and also holds nine consecutive Top Employer certifications, which confirm that Orange Romania, in addition to the remarkable products and services it offers, pays special attention to its employees and working environment. In the past 3 years Orange has launched two 5G Labs in Bucharest and Iasi, that aim to support researchers, startups and companies to test their 5G solutions in advance.
In addition, Orange is a long-term supporter of the startup ecosystem through the Orange Fab accelerator program designed to support entrepreneurs in the development of innovative products and their distribution locally and internationally.