Wodociągi Kraków
speakers
partners
| Mariusz Sawczuk, Jochen Belke | Invisible attacks – visible in your network. How to see and follow the tracks? | Video |
| Ilja van Sprundel | Linux Desktop Insecurity | Video |
| Nguyen Anh Quynh | Opticode: machine code deobfuscation for malware analysts | Video |
| Yaniv Miron, MC | Ph0k 0-days, We Will Pwn U with Hardware Mofos | Video |
| Gynvael Coldwind,Mateusz “j00ru” Jurczyk | Beyond MOV ADD XOR – the unusual and unexpected in x86 | Video |
| Robert Lipovsky | The “Facebook PokerAgent” | Video |
| Georgia Weidman | Can You Hear Me Now: Leveraging Mobile Devices on Pentests | Video |
| Nikita Tarakanov | Exploiting Hardcore Pool Corruptions in Microsoft Windows Kernel | Video |
| Arseny Reutov | PHP Object Injection revisted | Video |
| Julian Bangert, Sergey Bratus | ELF Eccentricities | Video |
| Grzegorz Niemirowski | Podatności aplikacji desktopowych | Video |
| Devesh Bhatt | My Experiments with truth: a different route to bug hunting | Video |
| Gaweł Mikołajczyk | Networking Security Treasures | Video |
| Rebecca Bx Shapiro,Julian Bangert, Sergey Bratus | Any Input Is a Program: Weird Machines in ABI and architecture metadata | Video |
| Felix “fx” Lindner, Gregor Kopf | Cisco in the Sky with Diamonds | Video |
| Fernando Gont | Network Reconnaissance in IPv6 Networks | Video |
| Jesse Burns | Securing Data in Mobile Application Suites | Video |
| Meredith L. Patterson | LANGSEC 2011-2016 | Video |
| Michał Sajdak | Embedded Devices Hacking | Video |
| Adam ‘pi3′ Zabrocki | Crashdumps: hunt 0days and rootkits | Video |
| Dmitriy Chastuchin | Breaking, Forensicating and Anti-Forensicating SAP Portal and J2EE Engine | Video |
| Yury Chemerkin | Insecurities in blackberry | Video |
| Marek Zmysłowski | Testy penetracyjne – 7 grzechów głównych |