Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nullam blandit hendrerit faucibus turpis dui.
Call For Papers
Tickets & Merch
Sponsorship
Presentations
Workshop sessions
Speakers
Venue info
Copyright @ Select-themes
Follow us
Ignat Korchagin
Exploiting USB/IP in Linux
Dalma Dojcsák, Balázs Bencsik, Buherátor & Csaba Krasznay
Ethical hacking in Hungary: Roundtable discussion (in Hungarian)
Csaba Fitzl
How to convince a malware to avoid us?
Julien Thomas
Limitations of Android permission system
Roland Kamarás
Locky: anti-analysis techniques used by the ransomware
Mateusz Olejarka
REST API, pentester’s perspective
Exploit generation with WinDGB
Omar Eissa
Network Automation is not your Safe Haven
Kirils Solovjovs
Tools for effortless reverse engineering of MikroTik routers
Anto Joseph
Bug hunting using symbolic virtual machines
Ben Seri & Gregory Vishnepolsky
BlueBorne Explained
Mehmet Ince
A heaven for Hackers: Breaking Log/SIEM Products
Adrian Vollmer
Attacking RDP with Seth
Haroon Meer
Time to play “D”
Attila Szász & Gergő Hosszú
Dive into Magenta – fuzzing Google’s new kernel
Harman Singh
Active Directory Threats & Detection
Zoltán Balázs
How to pwn a Windows domain?
Bálint Varga-Perke (Buherátor)
Corrupting Ancient Spirits – Penetration Testing Oracle Forms
Leigh-Anne Galloway
Money makes money: How to buy an ATM and what you can do with it
Travis Goodspeed
Some Thoughts on Literate Disassembly and Symbol Porting
Zoltán Wollner
Behind the Rabbit and beyond the USB
How to hide your browser 0-days
Costin Raiu
APT Paleontology in the age of cyber