PLANNING: talk

[TALK] 🇫🇷 CECI NʼEST PAS UNE KEYNOTE ( THIS, IS NOT A KEYNOTE )

talk
  • 24/06/22
    10:00 > 10:15
  • CONFERENCE AREA
  • HZV TEAM

Just a preliminary word for the HZV team.

HZV is an non-profit organization.

HZV only is able to produce leHACK because of the support of adherent members and hard benevolent work from the team.

If you're interested in supporting HZV, you can...

MORE ↦

[TALK] 🇬🇧 THE RANSOMWARE PROTECTION FULL OF HOLES

talk
  • 24/06/22
    10:15 > 11:00
  • CONFERENCE AREA
  • Soya Aoyama

In the fall of 2017, in response to the WannaCry outbreak, Microsoft implemented Ransomware Protection in Windows 10 as a countermeasure. The basis of the ransomware protection is Controlled Folder Access, but this feature is full of holes and many...

MORE ↦

BREAK

  • 24/06/22
    11:00 > 11:15

[TALK] 🇫🇷 FORGING GOLDEN HAMMER AGAINST ANDROID SOFTWARE PROTECTION TOOLS

talk
  • 24/06/22
    11:15 > 12:00
  • CONFERENCE AREA
  • Georges-Bastien Michel

Today most of serious mobile applications relay on industrial-grade software protection tools to detect and slow down reverse engineering. It forces attackers to waste a precious time bypassing obfuscation and RASP before deep diving into app speci...

MORE ↦

[TALK] 🇬🇧 DISSECTING AND COMPARING DIFFERENT BINARIES TO MALWARE ANALYSIS

talk
  • 24/06/22
    12:00 > 12:45
  • CONFERENCE AREA
  • Filipi Pires

Demonstrate different kind of structures in the binaries as a PE (header and your sessions) , ELF (header and your sessions), PDF(header/ body/cross-reference table/trailer), explaining how each session works within a binary, what are the technique...

MORE ↦

LUNCH BREAK

  • 24/06/22
    12:45 > 14:00

[TALK] 🇬🇧 WHAT’S NEXT AFTER DOMAIN ADMIN?

talk
  • 24/06/22
    14:00 > 14:45
  • CONFERENCE AREA
  • Venkatraman Kumar // Sriraam Natarajan

Organizations are increasingly relying on cloud services from Azure, as there is native support from Microsoft. After obtaining Domain Admin privileges, it is essential to always think of attack paths or scenarios to escalate our privileges or desc...

MORE ↦

[TALK] 🇬🇧 JUST HACKERS THINGS WITH JAYSON E STREET

talk
  • 24/06/22
    14:45 > 15:30
  • CONFERENCE AREA
  • Jayson E Street

More to come.

About Jayson E Street

A "notorious hacker" by FOX25 Boston, "World Class Hacker" by National Geographic Breakthrough Series and described as a "paunchy hacker" by Rolling Stone Magazine. He however prefers if people refer to him s...

MORE ↦

[TALK] 🇫🇷 ABUSER DES TOKENS WINDOWS DANS LE BUT DE COMPROMETTRE UN ACTIVE DIRECTORY

talk
  • 24/06/22
    15:30 > 16:15
  • CONFERENCE AREA
  • Aurélien CHALOT

Sous Windows, l'authentification est gérée par le processus Lsass. La plupart du temps lorsqu'un attaquant compromet une machine il va tenter de dumper la RAM du processus LSASS dans le but d'en extraire les secrets d'authentification présents. Il...

MORE ↦

BREAK

  • 24/06/22
    16:15 > 16:30

[TALK] 🇫🇷 THERE IS NO PLACE TO RUN : ASSESSING SAP FOCUSED RUN SECURITY

talk
  • 24/06/22
    16:30 > 17:15
  • CONFERENCE AREA
  • Yvan Genuer

│║ SAP Focused Run is the brand new product in the SAP world. Introduced in │║ 2020 it is the replacement of the current well known SAP Solution Manager. │║ It is a dedicated type of SAP System to manage all others in the company │║ landscape....

MORE ↦

[TALK] 🇬🇧 WHAT ARE WE MISSING IN WEB APPLICATIONS?

talk
  • 24/06/22
    17:15 > 18:00
  • CONFERENCE AREA
  • Mirza Burhan Baig

In today's world, we have a modern and stable web application framework to develop on. That is already so much secured from the attacks, regardless of the OS. If you design the system properly, attacker cannot injection the system. Or attacker cann...

MORE ↦

[TALK] 🇫🇷 HONEYPOT IN ICS ENVIRONNEMENT

talk
  • 24/06/22
    18:00 > 18:45
  • CONFERENCE AREA
  • CyberSec ICS

Qu'est-ce que l'environnement ICS ? Protocoles différents des protocoles "traditionnels", souvent hérité de communication "bus" non IP Équipements différents : Automates, Convertisseur IP/Série, Capteurs etc... Une maturité cyber très variable Pour...

MORE ↦

[TALK] 🇬🇧 SWAPPING ASPIRIN FORMULAS WITH MDMA WHILE RED TEAMING A BILLION DOLLAR PHARMACEUTICAL

talk
  • 25/06/22
    10:15 > 11:00
  • CONFERENCE AREA
  • Aman Sachdev

The talk revolves around one of the most extreme Red team exercises us hackers ever did wherein the target was a billion-dollar pharmaceutical company dealing in all sorts of modern medicine. We were mandated to showcase control of the CROWN JEWELs...

MORE ↦

COVFEFE BREAK / LA PAUSE

  • 25/06/22
    11:00 > 11:15

[TALK] 🇫🇷 DÉLÉGUER KERBEROS POUR CONTOURNER DES LIMITATIONS DE LA DÉLÉGATION KERBEROS

talk
  • 25/06/22
    11:15 > 12:00
  • CONFERENCE AREA
  • Charlie Bromberg

Les service de domaine Active Directory offrent un enchevêtrement de mécanismes et protocoles complexes, dont la délégation Kerberos. Les délégations Kerberos permettent à des services d'obtenir l'accès à des ressources du domaine en tant qu'un aut...

MORE ↦

[TALK] 🇫🇷 SO YOU HACKED A WIFI ROUTER, AND NOW WHAT ?

talk
  • 25/06/22
    12:00 > 12:45
  • CONFERENCE AREA
  • Damien Cauquil

Avoir un shell root sur un équipement connecté via l'exploitation d'une ou de plusieurs vulnérabilités semble être le Graal de tout chercheur en sécurité, qui de fait considère la sécurité du système comme étant complètement réduite à néant une foi...

MORE ↦

LUNCH BREAK

  • 25/06/22
    12:45 > 14:00

[TALK] 🇫🇷 HOW TO BECOME THE SOCK PUPPETS MASTER ?

talk
  • 25/06/22
    14:00 > 14:45
  • CONFERENCE AREA
  • Palenath Megadose

Créer des comptes sur les réseaux sociaux de manière anonyme et peu coûteuse a toujours été compliqué, au vue du nombre de sécurités mises en place.

Le besoin est pourtant bien présent pour les red teams, investigations osint ou des hacktivistes....

MORE ↦

[TALK] 🇬🇧 STEAL MANY PASSWORDS FROM 1PASSWORD

talk
  • 25/06/22
    14:45 > 15:30
  • CONFERENCE AREA
  • Soya Aoyama

Passwords should be long enough, complex enough, and unique to each site. Unfortunately, our memory is limited and we cannot remember such passwords. This is where password manager come into play. The basis of password manager is that it centrally...

MORE ↦

[TALK] 🇫🇷 PWNING A NETGEAR ROUTER FROM WAN - MITM STYLE

talk
  • 25/06/22
    15:30 > 16:15
  • CONFERENCE AREA
  • Kevin Denis & Antide Petit

Plusieurs fois par an, ZDI organise un concours appelé Pwn2Own dans lequel des chercheurs en sécurité doivent prendre le contrôle de matériel et logiciel grand public. Cette conférence explique la démarche utilisée par Mitsurugi et xarkes lors de c...

MORE ↦

BREAK / LA PAUSE

  • 25/06/22
    16:15 > 16:30

[TALK] 🇬🇧 CYBER SECURITY RISK REDUCTION VIA MACHINE-LEARNING BASED IDS

talk
  • 25/06/22
    16:30 > 17:15
  • CONFERENCE AREA
  • Ali Abdollahi

In today modern network, many technologies used to bring a high rate and stable communication between end users. Network infrastructure is heart of communication, which include all nodes and passing traffic. Therefore, it is vital to protect infras...

MORE ↦

[TALK] 🇫🇷 PROTOTYPE POLLUTION

talk

In this talk, we will try to get a basic understanding of Prototype Pollution: A type of vulnerability that allows attackers to exploit the rules of the JavaScript programming language and compromise applications in various ways. So, how does this...

MORE ↦

[TALK] 🇫🇷 OUVRIR UNE SERRURE, AU DOIGT ET À L’OEIL !

talk
  • 25/06/22
    18:00 > 18:45
  • CONFERENCE AREA
  • Alexandre {MrJack} Triffault // Jean-Christophe {VidoQ} Cuniasse

A talk by Alexandre {MrJack} Triffault // Jean-Christophe {VidoQ} Cuniasse

Les films laissent souvent penser qu'on ouvre un Coffre Fort en écoutant les clics, mais en réalité le plus souvent, c'est à l'oeil et au toucher que le travail se fait.

... MORE ↦

[TALK] 🇬🇧 DECEPTION VIA PERCEPTION (FROM BLUE TRACTORS TO A BLUE & BLACK DRESS)

talk
  • 25/06/22
    18:45 > 19:30
  • CONFERENCE AREA
  • Jayson E Street

What we perceive sometimes to be happening sometimes can be the opposite of what is occurring. We are not talking about magic tricks. Just how as humans we tend to see things we expect to see. Like an unknown person in your office with a clipboard...

MORE ↦

[TALK] 🇬🇧 EXPLOITING ADVANCED VOLATILE MEMORY ANALYSIS CHALLENGES FOR FUN AND PROFIT

talk
  • 25/06/22
    19:30 > 20:15
  • CONFERENCE AREA
  • Solomon Sonya

Malware continues to advance in sophistication and prevalence. Well-engineered malware can obfuscate itself from the user, network, and even the operating system running host-based security applications. But one place malware cannot easily hide its...

MORE ↦

GENERAL MAP