FULL TIMELINE

[TALK] 🇫🇷 - OSINT ET LES INVESTIGATIONS JUDICIAIRES

osint village
  • 24/06/22
    10:00 > 11:00
  • LOUIS ARMAND
  • Lieutenant Yann Derweduwen

About Yann Derweduwen

Chef du département OSINT du C3N, COMCYBERGEND

MORE ↦

[TALK] 🇫🇷 CECI NʼEST PAS UNE KEYNOTE ( THIS, IS NOT A KEYNOTE )

talk
  • 24/06/22
    10:00 > 10:15
  • CONFERENCE AREA
  • HZV TEAM

Just a preliminary word for the HZV team.

HZV is an non-profit organization.

HZV only is able to produce leHACK because of the support of adherent members and hard benevolent work from the team.

If you're interested in supporting HZV, you can...

MORE ↦

[TALK] 🇬🇧 THE RANSOMWARE PROTECTION FULL OF HOLES

talk
  • 24/06/22
    10:15 > 11:00
  • CONFERENCE AREA
  • Soya Aoyama

In the fall of 2017, in response to the WannaCry outbreak, Microsoft implemented Ransomware Protection in Windows 10 as a countermeasure. The basis of the ransomware protection is Controlled Folder Access, but this feature is full of holes and many...

MORE ↦

[TALK] 🇫🇷 - INVESTIGATION OSINT : LE CAS DE KILLNET

osint village
  • 24/06/22
    11:00 > 12:00
  • LOUIS ARMAND
  • Marion Lachiver

About Marion Lachiver

Analyste CTI au CERT de OWN

MORE ↦

BREAK

  • 24/06/22
    11:00 > 11:15

[TALK] 🇫🇷 FORGING GOLDEN HAMMER AGAINST ANDROID SOFTWARE PROTECTION TOOLS

talk
  • 24/06/22
    11:15 > 12:00
  • CONFERENCE AREA
  • Georges-Bastien Michel

Today most of serious mobile applications relay on industrial-grade software protection tools to detect and slow down reverse engineering. It forces attackers to waste a precious time bypassing obfuscation and RASP before deep diving into app speci...

MORE ↦

[TALK] 🇬🇧 DISSECTING AND COMPARING DIFFERENT BINARIES TO MALWARE ANALYSIS

talk
  • 24/06/22
    12:00 > 12:45
  • CONFERENCE AREA
  • Filipi Pires

Demonstrate different kind of structures in the binaries as a PE (header and your sessions) , ELF (header and your sessions), PDF(header/ body/cross-reference table/trailer), explaining how each session works within a binary, what are the technique...

MORE ↦

LUNCH BREAK

  • 24/06/22
    12:45 > 14:00

[TALK] 🇬🇧 WHAT’S NEXT AFTER DOMAIN ADMIN?

talk
  • 24/06/22
    14:00 > 14:45
  • CONFERENCE AREA
  • Venkatraman Kumar // Sriraam Natarajan

Organizations are increasingly relying on cloud services from Azure, as there is native support from Microsoft. After obtaining Domain Admin privileges, it is essential to always think of attack paths or scenarios to escalate our privileges or desc...

MORE ↦

[TALK] 🇫🇷 - UTILISER LES TECHNIQUES DʼOSINT DANS LE CADRE DʼENQUÊTES PRIVÉES : LʼEXEMPLE DU TRAFIC DʼOEUVRES DʼART

osint village
  • 24/06/22
    14:00 > 15:00
  • LOUIS ARMAND
  • Camille Dolé

About Camille Dolé

Détective privée au sein de l’agence Art’théna Investigations.

MORE ↦

[TALK] 🇬🇧 JUST HACKERS THINGS WITH JAYSON E STREET

talk
  • 24/06/22
    14:45 > 15:30
  • CONFERENCE AREA
  • Jayson E Street

More to come.

About Jayson E Street

A "notorious hacker" by FOX25 Boston, "World Class Hacker" by National Geographic Breakthrough Series and described as a "paunchy hacker" by Rolling Stone Magazine. He however prefers if people refer to him s...

MORE ↦

[TALK] 🇫🇷 - COMMENT LʼOSINT AIDE À COMPRENDRE UNE STRATÉGIE GÉOPOLITIQUE : LE CAS DE LA RUSSIE EN AFRIQUE FRANCOPHONE

osint village
  • 24/06/22
    15:00 > 16:00
  • LOUIS ARMAND
  • Kevin Limonier

About Kevin Limonier

Directeur-adjoint de GEODE - Géopolitique de la Datasphère

MORE ↦

[TALK] 🇫🇷 ABUSER DES TOKENS WINDOWS DANS LE BUT DE COMPROMETTRE UN ACTIVE DIRECTORY

talk
  • 24/06/22
    15:30 > 16:15
  • CONFERENCE AREA
  • Aurélien CHALOT

Sous Windows, l'authentification est gérée par le processus Lsass. La plupart du temps lorsqu'un attaquant compromet une machine il va tenter de dumper la RAM du processus LSASS dans le but d'en extraire les secrets d'authentification présents. Il...

MORE ↦

[TALK] 🇫🇷 - CACTÉES ET SUCCULENTES, ANATOMIE DE LA DESINFORMATION.

osint village
  • 24/06/22
    16:00 > 17:00
  • LOUIS ARMAND
  • Hervé et Hervé de OpenFacto

About Hervé et Hervé de OpenFacto

MORE ↦

BREAK

  • 24/06/22
    16:15 > 16:30

[TALK] 🇫🇷 THERE IS NO PLACE TO RUN : ASSESSING SAP FOCUSED RUN SECURITY

talk
  • 24/06/22
    16:30 > 17:15
  • CONFERENCE AREA
  • Yvan Genuer

│║ SAP Focused Run is the brand new product in the SAP world. Introduced in │║ 2020 it is the replacement of the current well known SAP Solution Manager. │║ It is a dedicated type of SAP System to manage all others in the company │║ landscape....

MORE ↦

[TALK] 🇬🇧 WHAT ARE WE MISSING IN WEB APPLICATIONS?

talk
  • 24/06/22
    17:15 > 18:00
  • CONFERENCE AREA
  • Mirza Burhan Baig

In today's world, we have a modern and stable web application framework to develop on. That is already so much secured from the attacks, regardless of the OS. If you design the system properly, attacker cannot injection the system. Or attacker cann...

MORE ↦

[TALK] 🇫🇷 HONEYPOT IN ICS ENVIRONNEMENT

talk
  • 24/06/22
    18:00 > 18:45
  • CONFERENCE AREA
  • CyberSec ICS

Qu'est-ce que l'environnement ICS ? Protocoles différents des protocoles "traditionnels", souvent hérité de communication "bus" non IP Équipements différents : Automates, Convertisseur IP/Série, Capteurs etc... Une maturité cyber très variable Pour...

MORE ↦

[TALK] 🇬🇧 SWAPPING ASPIRIN FORMULAS WITH MDMA WHILE RED TEAMING A BILLION DOLLAR PHARMACEUTICAL

talk
  • 25/06/22
    10:15 > 11:00
  • CONFERENCE AREA
  • Aman Sachdev

The talk revolves around one of the most extreme Red team exercises us hackers ever did wherein the target was a billion-dollar pharmaceutical company dealing in all sorts of modern medicine. We were mandated to showcase control of the CROWN JEWELs...

MORE ↦

COVFEFE BREAK / LA PAUSE

  • 25/06/22
    11:00 > 11:15

[TALK] 🇫🇷 DÉLÉGUER KERBEROS POUR CONTOURNER DES LIMITATIONS DE LA DÉLÉGATION KERBEROS

talk
  • 25/06/22
    11:15 > 12:00
  • CONFERENCE AREA
  • Charlie Bromberg

Les service de domaine Active Directory offrent un enchevêtrement de mécanismes et protocoles complexes, dont la délégation Kerberos. Les délégations Kerberos permettent à des services d'obtenir l'accès à des ressources du domaine en tant qu'un aut...

MORE ↦

[TALK] 🇫🇷 SO YOU HACKED A WIFI ROUTER, AND NOW WHAT ?

talk
  • 25/06/22
    12:00 > 12:45
  • CONFERENCE AREA
  • Damien Cauquil

Avoir un shell root sur un équipement connecté via l'exploitation d'une ou de plusieurs vulnérabilités semble être le Graal de tout chercheur en sécurité, qui de fait considère la sécurité du système comme étant complètement réduite à néant une foi...

MORE ↦

LUNCH BREAK

  • 25/06/22
    12:45 > 14:00

[TALK] 🇫🇷 HOW TO BECOME THE SOCK PUPPETS MASTER ?

talk
  • 25/06/22
    14:00 > 14:45
  • CONFERENCE AREA
  • Palenath Megadose

Créer des comptes sur les réseaux sociaux de manière anonyme et peu coûteuse a toujours été compliqué, au vue du nombre de sécurités mises en place.

Le besoin est pourtant bien présent pour les red teams, investigations osint ou des hacktivistes....

MORE ↦

[TALK] 🇬🇧 STEAL MANY PASSWORDS FROM 1PASSWORD

talk
  • 25/06/22
    14:45 > 15:30
  • CONFERENCE AREA
  • Soya Aoyama

Passwords should be long enough, complex enough, and unique to each site. Unfortunately, our memory is limited and we cannot remember such passwords. This is where password manager come into play. The basis of password manager is that it centrally...

MORE ↦

[TALK] 🇫🇷 PWNING A NETGEAR ROUTER FROM WAN - MITM STYLE

talk
  • 25/06/22
    15:30 > 16:15
  • CONFERENCE AREA
  • Kevin Denis & Antide Petit

Plusieurs fois par an, ZDI organise un concours appelé Pwn2Own dans lequel des chercheurs en sécurité doivent prendre le contrôle de matériel et logiciel grand public. Cette conférence explique la démarche utilisée par Mitsurugi et xarkes lors de c...

MORE ↦

BREAK / LA PAUSE

  • 25/06/22
    16:15 > 16:30

[TALK] 🇬🇧 CYBER SECURITY RISK REDUCTION VIA MACHINE-LEARNING BASED IDS

talk
  • 25/06/22
    16:30 > 17:15
  • CONFERENCE AREA
  • Ali Abdollahi

In today modern network, many technologies used to bring a high rate and stable communication between end users. Network infrastructure is heart of communication, which include all nodes and passing traffic. Therefore, it is vital to protect infras...

MORE ↦

[TALK] 🇫🇷 PROTOTYPE POLLUTION

talk

In this talk, we will try to get a basic understanding of Prototype Pollution: A type of vulnerability that allows attackers to exploit the rules of the JavaScript programming language and compromise applications in various ways. So, how does this...

MORE ↦

[TALK] 🇫🇷 OUVRIR UNE SERRURE, AU DOIGT ET À L’OEIL !

talk
  • 25/06/22
    18:00 > 18:45
  • CONFERENCE AREA
  • Alexandre {MrJack} Triffault // Jean-Christophe {VidoQ} Cuniasse

A talk by Alexandre {MrJack} Triffault // Jean-Christophe {VidoQ} Cuniasse

Les films laissent souvent penser qu'on ouvre un Coffre Fort en écoutant les clics, mais en réalité le plus souvent, c'est à l'oeil et au toucher que le travail se fait.

... MORE ↦

[TALK] 🇬🇧 DECEPTION VIA PERCEPTION (FROM BLUE TRACTORS TO A BLUE & BLACK DRESS)

talk
  • 25/06/22
    18:45 > 19:30
  • CONFERENCE AREA
  • Jayson E Street

What we perceive sometimes to be happening sometimes can be the opposite of what is occurring. We are not talking about magic tricks. Just how as humans we tend to see things we expect to see. Like an unknown person in your office with a clipboard...

MORE ↦

[TALK] 🇬🇧 EXPLOITING ADVANCED VOLATILE MEMORY ANALYSIS CHALLENGES FOR FUN AND PROFIT

talk
  • 25/06/22
    19:30 > 20:15
  • CONFERENCE AREA
  • Solomon Sonya

Malware continues to advance in sophistication and prevalence. Well-engineered malware can obfuscate itself from the user, network, and even the operating system running host-based security applications. But one place malware cannot easily hide its...

MORE ↦

[WORKSHOP] 🇫🇷 - LES CARTES RFID ET LEURS VULNÉRABILITÉS

workshop
  • 25/06/22
    21:00 > 22:00
  • ROOM C
  • juan pablo Barriga

Présentation de l'architecture et mécanismes des tags RFID: Disposition et explication de la mémoire d'un TAG RFID; Présentation : 60% théorique et 40% pratique (démos). Durée : 45min Nombre des sessions: A adapter selon les disponibilité Nombre de...

MORE ↦

[WORKSHOP] 🇫🇷 - L’OSINT DANS L’IDENTIFICATION DE LA HAINE EN LIGNE

osint village
  • 25/06/22
    21:00 > 22:30
  • ROOM 1
  • Hervé & Hervé de Openfacto

About Hervé & Hervé de Openfacto

MORE ↦

[WORKSHOP] 🇫🇷 - OSINT VILLAGE ALL NIGHT

workshop
  • 25/06/22
    21:00 > 05:00
  • ROOM 1
  • various

[WORKSHOP] 🇫🇷 - RF HACKING BY ELECTROLAB

workshop
  • 25/06/22
    21:00 > 02:00
  • ROOM D
  • Marc OLANIE

Marc OLANIE will held a semi-permanent workshop on RadioFrequencies Tech, theory, protocols, and Hardware Hacking.

About

ELECTROLAB is a well-known Hackerspace located in Nanterre, north of Paris, with a specialization in hardware, RF and elec...
MORE ↦

[WORKSHOP] 🇫🇷 - LE CONFESSIONNAL BY ZATAZ

workshop
  • 25/06/22
    21:00 > 05:00
  • ALLEE CENTRALE
  • Damien BANCAL

As a hacker you have sinned. Don't lie we see you. we know you have leaked informations, we know you have covertly exploited vulnerabilities in the wild wild web, we know you know gaping holes in big corporations IT.

The ZATAZ confessional is her...

MORE ↦

[WORKSHOP] 🇫🇷 - ASSOCIATION DES CROCHETEURS DE FRANCE

workshop
  • 25/06/22
    21:00 > 05:00
  • ALLEE CENTRALE
  • ACF

Initiation au crochetage des serrures et présentation de l’Association des Crocheteurs de France + vente d’outils de crochetage.

About

Workshop tenu par l'Association des Crocheteurs de France (ACF)

fa-browser: WEBSITE

MORE ↦

[WORKSHOP] 🇫🇷 - AD PWNAGE WITH CRACKMAPEXEC

workshop
  • 25/06/22
    21:00 > 23:00
  • ROOM 4
  • Martial PUYGRENIER AKA mpgn

Hi, I'm mpgn, developer of the famous CrackMapExec and many other tools !

Creator of the french podcast Hack'n Speak and security constulant at daylight

In this workshop I will present the tool CrackMapExec and how to take adavantage of the to...

MORE ↦

[WORKSHOP] 🇬🇧 - 5G SECURITY AND EXPLOITATION.

workshop
  • 25/06/22
    21:00 > 00:00
  • ROOM 2
  • Ali Abdollahi

[WORKSHOP][FR/EN][21:00|00:15|01:15] - EXPLOITATION OF UNCOMMON WEB VULNERABILITIES

workshop
  • 25/06/22
    21:00 > 01:15
  • ROOM 3
  • Zakaria Brahimi

3 x 1Hour sessions:

  • 21:00
  • 00:15
  • 01:15

This hands-on workshop deals with the exploitation of less common web vulnerabilities although they can be critical under certain conditions. the practical workshop will be presented in the form of a mi...

MORE ↦

[WORKSHOP][FR/EN] - INTRODUCTION TO HARDWARE HACKING WITH HYDRABUS

workshop
  • 25/06/22
    22:00 > 01:00
  • ROOM C
  • Nicolas Oberli (Balda) & Karim Sudki (Azox)

Ever wondered how to start with hardware hacking ? This workshop will present you some simple techniques you'll need to get you started. Of course, the best way to learn is by doing so we prepared a target device for you to fiddle with during the w...

MORE ↦

[WORKSHOP] 🇫🇷 - OSINT PAR MOT DE PASSE AVEC H8MAIL

osint village
  • 25/06/22
    22:30 > 23:30
  • ROOM 1
  • khast3x

About khast3x

MORE ↦

[WORKSHOP] 🇫🇷 - EXPLOITATION DE LʼAUTORITÉ DE CERTIFICATION ACTIVE DIRECTORY.

workshop
  • 25/06/22
    23:00 > 01:00
  • ROOM 4
  • Thomas Seigneuret & Hocine MAHTOUT

Description

Les certificats sont des éléments clés dans un domaine Active Directory. Ils sont utilisés pour signer des applications, pour mettre en place du chiffrement TLS, pour les connexions RDP, mais également pour l'authentification d'utilis...

MORE ↦

[WORKSHOP] 🇫🇷 - COMBINER LʼOSINT ET LʼENQUÊTE DE TERRAIN POUR UN DÉTECTIVE PRIVÉ

osint village
  • 25/06/22
    23:30 > 01:00
  • ROOM 1
  • Camille Dolé

About Camille Dolé

Détective privée au sein de l’agence Art’théna Investigations

MORE ↦

[WORKSHOP] 🇬🇧 - MASTER CLASS * ADVANCED VOLATILE MEMORY ANALYSIS FOR FUN AND PROFIT

workshop
  • 26/06/22
    00:15 > 03:00
  • ROOM 2
  • Solomon Sonya

Malware continues to advance in sophistication and prevalence. Well-engineered malware can obfuscate itself from the user, network, and even the operating system running host-based security applications. But one place malware cannot easily hide itse...

MORE ↦

[WORKSHOP] 🇫🇷 - OSINT ON DISCORD, SOCIAL ENGINEERING AND NIGHTMARE FOR ANONYMITY

osint village
  • 26/06/22
    01:00 > 02:30
  • ROOM 1
  • Darcosion

About Darcosion

MORE ↦

[WORKSHOP] 🇫🇷 - USB ATTACK : KEYBOARD, TARGET AND ATTACK VECTOR

workshop
  • 26/06/22
    01:00 > 03:00
  • ROOM 4
  • François MEHAULT & Hugo SABOURAL

L’objectif de ce workshop est de présenter des attaques ciblant les claviers et souris sans fil (MouseJacking), ainsi que l’émulation de clavier virtuel (HID Attack) par l’utilisation de périphériques malveillants. Le workshop sera constituée de de...

MORE ↦

[WORKSHOP] 🇫🇷 - LETʼS TRACK INTERPOL SUPER VILLAINS

osint village
  • 26/06/22
    02:30 > 04:00
  • ROOM 1
  • Erys / Aurélie Dumont

About Erys / Aurélie Dumont

Analyste consultante en OSINT

MORE ↦