Wodociągi Kraków
speakers
partners
Mariusz Sawczuk, Jochen Belke | Invisible attacks – visible in your network. How to see and follow the tracks? | Video |
Ilja van Sprundel | Linux Desktop Insecurity | Video |
Nguyen Anh Quynh | Opticode: machine code deobfuscation for malware analysts | Video |
Yaniv Miron, MC | Ph0k 0-days, We Will Pwn U with Hardware Mofos | Video |
Gynvael Coldwind,Mateusz “j00ru” Jurczyk | Beyond MOV ADD XOR – the unusual and unexpected in x86 | Video |
Robert Lipovsky | The “Facebook PokerAgent” | Video |
Georgia Weidman | Can You Hear Me Now: Leveraging Mobile Devices on Pentests | Video |
Nikita Tarakanov | Exploiting Hardcore Pool Corruptions in Microsoft Windows Kernel | Video |
Arseny Reutov | PHP Object Injection revisted | Video |
Julian Bangert, Sergey Bratus | ELF Eccentricities | Video |
Grzegorz Niemirowski | Podatności aplikacji desktopowych | Video |
Devesh Bhatt | My Experiments with truth: a different route to bug hunting | Video |
Gaweł Mikołajczyk | Networking Security Treasures | Video |
Rebecca Bx Shapiro,Julian Bangert, Sergey Bratus | Any Input Is a Program: Weird Machines in ABI and architecture metadata | Video |
Felix “fx” Lindner, Gregor Kopf | Cisco in the Sky with Diamonds | Video |
Fernando Gont | Network Reconnaissance in IPv6 Networks | Video |
Jesse Burns | Securing Data in Mobile Application Suites | Video |
Meredith L. Patterson | LANGSEC 2011-2016 | Video |
Michał Sajdak | Embedded Devices Hacking | Video |
Adam ‘pi3′ Zabrocki | Crashdumps: hunt 0days and rootkits | Video |
Dmitriy Chastuchin | Breaking, Forensicating and Anti-Forensicating SAP Portal and J2EE Engine | Video |
Yury Chemerkin | Insecurities in blackberry | Video |
Marek Zmysłowski | Testy penetracyjne – 7 grzechów głównych |