Title: Heliradare
Speaker: Pedro
Country of origin: Spain
(Content may not be published. You'll have to come here to find out!)
[---
Title: Some cool ELF shit & some other cheap ELF shittery to break some shit
Speaker: nitr0us
Country of origin: Mexico
Basically I'd like to show some cool things I've seen while playing with ELFs.
For example:
- ELF + crypto
- PKI in ELF execs (digitally signed, etc.)
- Some recent ELF VXs and their infection techn1quez as well as some cheap tricks to protect your binaries against infection
- Recent programs to identify malicious stuff in ELFs
- Some anti-debugging techn1quez aka "let's corrupt our ELFs and crash the debuggers"
- ELF file format fuzzing and how I found and analyzed the latest OpenBSD kernel panic() [1]
- Some other cool shit I don't remember right now
[1]
https://www.exploit-db.com/exploits/36799/
[---
Title: Guerrilla Tor
Speaker: b0rh / critter
Country of origin: Spain / Argentina aka Uboatland
(Content may not be published. You'll have to come here to find out!)
[---
Title: Using SMT solvers, concolic execution, second-order logic and knot theory to identify bugs in software a.k.a polish fuzzy lop.
Speakers: shm as akat1, s1m0n and n1x0n
Country of origin: Poland aka Kaczynskiland
...nah that was just a bad joke, we all know that this shitty scientific stuff does not work, instead of that we're going to present a new hammer in town.
Last year, we announced to release one of our fuzzers, it's high time to do it. We're going to talk about concept behind this stuff, its guts and how to use it to find useless bugs in OpenSSL or libc in minutes (or hours).
<marketing>If you want to impress your family/employer/friends by identifying 0days in libshit, don't miss this talk.</marketing>
[---
Title: Hello Quark! Fitbit firmware reversing (Lessons learned)
Speaker: dsrc
Country of origin: Brazil aka HuehuEland
Fitbit Flex is an activity tracker device created by fitbit.com that essentially tracks users' body activity by reading sensors data from a wristband. All data collected by the Fitbit tracker is processed, encrypted and sent to a remote server, leaving the user with no access to the raw data. This talk aims to provide a walk-through over the Fitbit Flex architecture, its protocol and firmware.
Tools and methodology utilized to obtain access to the firmware as well as reverse it will be presented and discussed during the talk.
[---
Title: What bug is this in my house?
Speaker: ovid
Country of origin: Brazil aka HuEhuEland
This presentation will show a practical application of Deep Neural Networks to classify Malwares. We will present results of classification over two different perspectives:
- by using static data: which can be useful for evaluating the effectiveness of this technique applied as engines for AVs);
- by using dynamic data: which can be used as starting step for collecting in-depth information about criminal groups (targets, distribution mechanisms and infra-structure).
Experiments were carried out with 1.000 Malware samples (collected in February and March 2016) from the 6 most popular families.
[---
Title: Reversing education
Speaker: ciphersheep
Country of origin: The Netherlands
This talk gives a comical overview of the current state of security education in a country not to be named, providing a walkthrough of various problems. Some of the problems we will cover are the rise of "cyber", the revenge of the CISSP, and the fact that lecturing about the CIA triad followed by multiple-choice exams is cheaper than in-depth technical coverage. How do we turn this tide? How to we teach students the hacker mindset instead of pouring useless ISO 27001 facts into their skulls?
We will present tentative answers to these questions, based on experimental courses given at a university of applied science. Among other things, we will illustrate the need for a bottom-up instead of a top-down approach to curriculum development, as the latter only leads to more CISSPs.
[---
Title: I see London, I see France, I see a Virtual Machine's underpants!
Speaker: @buherator
Country of origin: Hungary aka Goulashland
Virtual Machine Introspection (VMI) is a technique to inspect the execution of virtualized hosts from the level of the hypervisor[1]. This way the guest operating systems and their applications generally won't have a clue that creepy eyes are watching them that provides some interesting opportunities[2]. This talk will give a high level overview on VMI and will show how this technique was utilized in offensive research after repurposing a nice neighbors defensive tool. Tips and tricks will be presented to give the audience a head-start for developing new tools and avoiding #FAILs.
[1]
http://wiki.xenproject.org/wiki/Virtual_Machine_Introspection
[2]
https://www.youtube.com/watch?v=ms-jT4s98No
[---
Title: Lightning Talks
Speaker: .*
Country of origin: .*
A slot will be reserved for lightning talks. Just get up on stage and talk about whatever you want. Worst that can happen we throw pierogi at you.