Title: Lightning Talks
Speaker: .*
Country of origin: .*
A slot will be reserved for lightning talks. Just get up on stage and talk about whatever you want. Worst that can happen we throw pierogi at you.
[---
Title: Drones Don't Fly When the Sky is Grey
Speaker: @kuasar
Country of origin: Spain aka Vacationland
We will have a screening of the short movie "Drones Don't Fly When the Sky is Grey" about government surveillance and hacking, followed by a round of questions and answers with director Bea Cabrera (@kuasar).
http://www.imdb.com/title/tt5839300/
[---
Title: Finding Game Secrets... AT SCALE!
Speaker: charlinhos
Country of origin: Brazil aka HuEhuEland
Some video game secrets and cheats took years/decades to be discovered. From debug menus, to unused graphics or levels, many games also have content never meant to be seen by anybody but the developers. Hopefully, sites like tcrf.net are dedicated to unearthing and researching unused and cut content from video games.
This talk gives an overview of how we can apply our infosec skills to reverse games and uncover all sorts of secrets... AT SCALE! Live demos will include fuzzing, disassembling, debugging and memory watching techniques. And yes, they are all deemed to fail during the presentation.
[---
Title: How to hide your browser 0-days (Free offense tips included)
Speaker: @zh4ck
Country of origin: Hungary aka Goulashland
Zero-day exploits targeting browsers are usually very short-lived. These zero-days are actively gathered and analyzed by security researchers. Whenever a new 0-day becomes known by the security industry, protections against the exploit are shared, AV/IDS signatures are made, patches are deployed, and the precious 0-day loses its value.
During my presentation, I will propose solutions for defenders to analyze these attacks, countermeasures for attackers to further complicate this kind of analysis and release a POC Ruby code which can be integrated into Metasploit. So far, no encrypted browser exploit delivery code is available in the public to test or implement these attacks.
[---
Title: Cutting the Gordian Knot off Oracle Forms
Speaker: @buherator
Country of origin: Hungary aka Goulashland
As we all know Oracle software is generally unbreakable[1]. But while security testing is obviously superfluous, those poor souls who are tasked to build, maintain and debug applications built on Oracle Forms[2] still need weapons to fight the circles of horror that manifests under the layers of enterprise-level abstraction:
- The Circle of the Impalpable Server State
- The Circle of Rape of Protocols
- ... and The Infinite Circle of Java 1.4
While yours truly published in-depth analysis of the framework internals[3], automated testing is still generally considered as an unresolved problem. In this talk I will present a new approach and tools that drastically reduce the complexity of the problem and allow automated testing of applications for those who prove worthy. Walkthrough of the design and implementation of new techniques will hopefully help to approach similar systems of insanity too.
[1]
http://www.itweb.co.za/index.php?option=com_content&view=article&id=89339 (yes, this is a Joomla! site)
[2]
http://www.oracle.com/technetwork/developer-tools/forms/overview/index.html
[3]
https://www.sans.org/reading-room/whitepapers/testing/automated-security-testing-oracle-forms-applications-35970
[---
Title: Nobody cares - it's a single track conference, so you have to watch it anyway.
Speakers: @akat1_pl
Country of origin: Poland aka Cebulandia
$ id
uid=65534(nobody) gid=65534(nobody) groups=65534(nobody)
$ ./a.out
# id
uid=0(root) gid=0(wheel) (...)
[---
Title: How to get STUNned?
Speaker: |_ Y /\/\ P |-| 0
Country of origin: Poland aka Cebulandia
Down the Rabbit-Hole! Have you also been stunned by last year's Mirai - how many insecure devices have public IP? Well, you will get really STUNned when you find out how many more devices you can pwn. I will show you how using Sessi0n Trav3rsal Utiliti3s f0r NAT jump through firewalls directly to millions of cameras, doorbells, baby monitors, etc. not exposed publicly and build mirai^4. Live demo and free vodka included!
[---
Title: Red teaming in Poland - test cases
Speaker: borys
Country of origin: Poland aka Cebulandia
The presentation will be about real examples of redteam attacks targeted at Polish customers. We will show the advantages and disadvantages of certain type of attacks and our failures and successes. We will summarize the most important best practices to protect against a redteam and good advices on how to attack effectively and be more stealthly.
#phishing, #malware, #physicalsecurity, #hackinggadgets.
[---
Title: Poor man's air gapped network
Speaker: Esteban
Country of origin: Spain aka Vacationland
I will explain how to set up a gapped environment to protect your data/your communications in non trusted environments for very little money, and some use cases.
[---
Title: Rainbows: Creating and Looking up
Speaker: msoos
Country of origin: UK aka Brexitland
The pain and suffering of rainbow tables, all without getting high.
[---
Title: Python in a hacker's toolbox vol. 2
Speaker: Disconnect3d
Country of origin: Poland aka Cebulandia
Inspired by Gynvael Coldwind's talk on PyCon PL 2015 about the topic, here comes vol 2. The talk will present some IPython tricks and interesting Python libraries used both in CTF and security field.
[---
Title: Monero
Speaker: ?
Country of origin: ?
(Content may not be published. You'll have to come here to find out!)