Archiv - Hacktivity 2017

Name Talk .pdf Video (hun) Video (eng)
#Hacktivity2017 Summary of the conference - October 20-21, 2017
Costin Raiu Keynote presentation: APT Paleontology in the age of cyber
Zoltán Balázs How to hide your browser 0-days?
Zoltán Wollner Behind the Rabbit and beyond the USB
Travis Goodspeed Some Thoughts on Literate Disassembly and Symbol Porting
Leigh-Anne Galloway Money makes money: How to buy an ATM and what you can do with it
Bálint Varga-Perke (Buherátor) Corrupting Ancient Spirits - Penetration Testing Oracle Forms
Zoltán Balázs How to pwn a Windows domain?
Harman Singh Active Directory Threats & Detection: Heartbeat that keeps you alive may also kill you!
Gergő Hosszú , Attila Szász Dive into Magenta – fuzzing Google’s new kernel
Omar Eissa Network Automation is not your Safe Haven: Protocol Analysis and Vulnerabilities of Autonomic Network
Csaba Fitzl Exploit generation with WinDGB
Mateusz Olejarka REST API, pentester's perspective
Roland Kamarás Locky - anti-analysis techniques used by the ransomware
Julien Thomas Limitations of Android permission system: packages, processes and user privacy
Csaba Fitzl How to convince a malware to avoid us?
Dojcsák Dalma , Csaba Krasznay , Bálint Varga-Perke (Buherátor) , Balázs Bencsik Ethical hacking in Hungary: Roundtable discussion (in Hungarian)
Ignat Korchagin Exploiting USB/IP in Linux
Haroon Meer Haroon Meer - Keynote presentation: Time to play "D"
Tobias Schrödel Hacking drones and buying passwords in the Darknet
Adrian Vollmer Attacking RDP with Seth – How to eavesdrop on poorly secured RDP connections
Mehmet Ince A heaven for Hackers: Breaking Log/SIEM Products
Ben Seri , Gregory Vishnepolsky BlueBorne Explained: Exploiting Android devices over the air
Anto Joseph Bug hunting using symbolic virtual machines
Dmitry Yudin PeopleSoft: HACK THE Planet^W university
Kirils Solovjovs Tools for effortless reverse engineering of MikroTik routers