Jun, 19
09:15 Welcoming speechwith Winn Schwartau
09:30 Social Forensication: A Multidisciplinary Approach to Successful Social Engineering
10:15 Cracking the Perimeter with SharpShooter with Dominic Chell
11:25 DPAPI and DPAPI-NG: Decrypting All Users’ Secrets and PFX Passwords
12:10 whoami /priv – show me your privileges and I will lead you to SYSTEM with andrea pierini
14:15 Introduction to IoT Reverse Engineering with an example on a home router with Valerio Di Giampietro
15:00 Who watches the watchmen? Adventures in red team infrastructure herding and blue team OPSEC failures
15:45 BMS is destroyed by “smart button” with Egor Litvinov
17:00 Hacker Jeopardy in Paris with Winn Schwartau
Jun, 20
09:00 All your GPS Trackers belong to US with Chaouki Kasmi and Pierre Barre
09:45 Exploits in Wetware
10:55 You « try » to detect mimikatz with Vincent Le Toux
11:40 IronPython… OMFG with Marcello Salvati
13:45 Sneaking Past Device Guard with Philip Tsukerman
14:30 Using Machines to exploit Machines – harnessing AI to accelerate exploitation with Guy Barnhart-Magen and Ezra Caltum
15:40 Abusing Google Play Billing for fun and unlimited credits! with Guillaume Lopes
16:25 RHme3: Hacking through failure with Ben Gardiner, Colin DeWinter and Jonathan Beverley
17:10 In NTDLL I Trust – Process Reimaging and Endpoint Security Solution Bypass with Eoin Carroll
Jun, 16
Pentesting Industrial Control Systems (3 days)with Arnaud Soullié
Corelan “ADVANCED” (3 days)with Peter Van Eeckhoutte
Masterclass: Hacking and Securing Windows Infrastructure (3 days)with Mike Jankowski-Lorek
Masterclass: System Forensics and Incident Handling (3 days)with Paula Januszkiewicz
Hacking IPv6 Networks v5.0 (3 days)with Fernando Gont
Practical IoT Hacking (3 days)with Arun Magesh and Aseem Jakhar
Advanced Web Hacking (3 days)
RCE and analysis-aware techniques in Windows programs (2 days)with Ricardo J. Rodríguez
Jun, 17
Attacking and securing BLE and NFC/RFID devices based on smart locks and access control systems (2 days)with Slawomir Jasek
Windows Post-Exploitation Subverting the Core (2 days)with Ruben Boonen
Bug Hunting Millionaire: Mastering Web Attacks with Full-Stack Exploitation (2 days)with Dawid Czagan
Mobile Hacking Training (2 days)