Schedule

<Talks_That_Break_Boundaries/>

08:30

08:45

Lilla Szervátiusz – Opening Ceremony

08:45

09:25

Santi Abastante
Santi Abastante – Practical AWS Antiforensics

09:30

10:10

Roland Nagy
Roland NagY – How to find rootkits in the Linux kernel

10:10

10:20

Cofee Break

10:20

11:00

Bálint Bianka
Bianka Bálint – Demystifying Internal Threat Intelligence

11:05

11:45

Konrad Jędrzejczyk
Konrad Jędrzejczyk & Marek Zmyslowski – AI in Adversarial Hands
Masterminds and Machines

11:50

12:30

Tobias Schrödel
Tobias Schrödel – Real RansomChats
This session is LIVE ONLY and will not be recorded or accessible afterward.

12:30

13:30

Lunch Break

13:35

13:55

Szilárd Pfeiffer
Szilárd Pfeiffer – TOTP is not a silver bullet

14:00

14:40

Sean Hopkins – Full Stack Red Team
From Code to Hardware
This session is LIVE ONLY and will not be recorded or accessible afterward.

14:40

14:50

Reboot

14:50

15:30

József Ottucsak
JÓzsef Ottucsak– The Big Software Supply Chain Security Problem

15:35

16:15

Dániel Markovics
János Kovács
Dominik Maksa
Dániel Markovics, János Kovács, Maksa Dominik – Where the treasure is
Security Scanning the DICOM stack of Medical IT environments

16:20

17:00

M. Shahmeer Amir
Shahmeer Amir – Hack the Sky
Exploring Satellite Vulnerabilities and Cyber Threats

17:05

17:45

Marta Janus
Marta Janus – AI Security Landscape
Tales and Techniques from the Frontlines

17:50

18:10

Gábor Arányi – Challenges while developing a ransomware-proof backup solution
This session is LIVE ONLY and will not be recorded or accessible afterward.

18:15

18:20

Attila Marosi-Bauer – Closing notes

08:45

09:25

Aurelio Picon Lopez
Aurelio Picon Lopez – At Home with the Enemy
How APTs Weaponize IoT Devices as Residential Proxies

09:30

10:10

Vikas Khanna
Vikas Khanna – Unlocking the Gates
Understanding Authentication Bypass Vulnerabilities

10:10

10:20

Cofee Break

10:20

11:00

Chen Shiri – How I took over two platforms of Google including Google Cloud, Google Collaboratory and Used It on Gemini AI

11:05

11:45

Dániel HegeDűs – Anti-Bot Measures Gone Wild
The Rise of Legitimate Malware

11:50

12:30

Vincenzo Santucci
Vincenzo Santucci – Revamping Reflection
Enhancing the Timeless Concept of Reflective Loading

12:30

13:30

Lunch Break

13:35

13:55

Matthias Kesenheimer
Dr. Matthias Keisenheimer – Your SoC implements a glitch detector?
Hold my beer!

14:00

14:40

Giorgio Perticone
Giorgio Perticone – Crafting effective Security Operations tactics
Deep Dive Forensics VS Rapid Response

14:40

14:50

Reboot

14:50

15:30

Ananda Krishna
Ananda Krishna – Ghost Math: Syscall-Only Injection, Deterministic Shellcode & QUIC C2
A Full Kill-Chain that Slipped Past CrowdStrike Falcon

15:35

16:15

Gabor Fuchs – Targeted Attacks on the TLSH Similarity Digest Scheme

16:20

17:00

Shubham Kumar
Sagar Tiwari
Shubham Kumar, Sagar Tiwari – Dark Ships & Transparent Seas
Tracking Vessels with Open-Source Intelligence

17:05

17:45

Balázs Gerlei
Balázs Gerlei – Don’t let attackers exploit your Android app via Intents

room #5

Don’t miss out!
click here to register for the workshop today.

09:00

11:00

Thomas Fischer
Thomas Fischer – Masterclass connecting your car

11:15

13:15

William Robinet
William Robinet – In bed with Qubes OS
tips & tricks exchange party

13:30

15:30

Santi Abastante
Santi Abastante – Attacking AWS
From initial access to hardcore persistance

Don’t miss out!
Click here to register for the workshop today.

room #1

Don’t miss out!
Click here to register for the workshop today.

09:00

11:00

Fsociety – Spoofed Skies and Signal Lies
Tracking Aircraft and Unmasking Deception in the Age of GPS War

11:15

13:15

Kirils Solovjovs
Kirils Solovjovs – So you’re interested in social engineering?
The very first steps

13:30

15:30

Craig Balding
Craig Balding – Pair Programming with Aider to Create High-Performance Web Security Tools

15:45

17:45

Vikas Khanna
Vikas Khanna – AI Security Fundamentals

Don’t miss out!
Click here to register for the workshop today.

room #8

09:00

09:30

Welcome & Introduction
Goals, rules, and team formation

09:30

10:00

Expert Talk
Insights on children’s mental health in digital spaces

10:00

12:00

Ideation Session
Teams brainstorm and develop solution concepts

12:00

13:00

Lunch

13:00

14:30

Concept Development
Teams refine ideas, create visuals, or slides

14:30

15:15

Mentor Check-ins
Optional guidance on strategy, security, or feasibility

15:15

15:45

Team Presentations
Short pitches, slides, or prototypes to the jury

15:45

16:00

Awards & Closing

room #7

09:00

17:45

hackcenter