Kraków
speakers
partners
The conference took place on May 23-24, 2012 in Krakow!
During the tenth edition, there were workshops, discussion panels, a stay at Hackers 'Squad, Hackers' contests, Hackers for Charity Roulette, and many more.
Abraham Aranguren | Legal and efficient Web app testing without permission |
Alan Kakareka | Insight into Russian black market |
Alexander Minozhenko | How to hack VMware vCenter server in 60 seconds |
Andreas Bogk | Herding RATs / How to pentest without blowing yourself up |
Andrew Petukhov | You won’t believe that blind can see: benchmarking SQL injection scanners |
Artur Sidorko | Architektura Bezpieczeństwa systemów kontroli przemysłowej |
Babak Javadi | Alarmed About Your Alarm System Yet? |
Bernhard “Bruhns” Brehm | Deniability in messaging protocols |
Brad “RenderMan” Haines | Hacker + Airplanes = No good can come of this |
Dmitriy “D1g1″ Evdokimov | Light and Dark side of Code Instrumentation |
Filip Palian | Simplest Ownage Human Observed… Routers |
Gareth Hayes | Non-alphanumeric JavaScript/PHP and Shared Fuzzing |
Gaweł Mikołajczyk | IPv6 insecurities at First Hop |
Gregor Kopf | Deniability in messaging protocols |
Juraj Somorovsky | All your clouds are belongs to us – security analysis of cloud management interfaces |
John Draper | History of hacking |
Karim Valiev | You won’t believe that blind can see: benchmarking SQL injection scanners |
Keith Howell | Alarmed About Your Alarm System Yet? |
Krzysztof Kotowicz | Something wicked this way comes |
Luiz Eduardo | Introduction to Mobile Snitch |
Magdalena Kurnik | Hackers: Beyond the Edge |
Mario Heiderich | Got your Nose! How to Steal Your Precious Data Without Using Scripts |
Mateusz Kocielski | Simplest Ownage Human Observed… Routers |
Nicolas Grégoire | Attacks on the XML data processing |
Pavol Luptak | Cryptoanarchy – decentralization begin |
Piotr Ciepiela | Architektura Bezpieczeństwa systemów kontroli przemysłowej |
Raoul Chiesa | Ladies and Gentlemen, here’s *Your* Cyber Army! (from a Hacker’s perspective, of course) |
Sandy “Mouse” Clark | Practical Insecurity in Encrypted Radio |
Tomasz Sawiak | Security monitoring use cases |
Zane Lackey | Security at scale: Web application security in a continuous deployment environment |