Hi, I'm mpgn, developer of the famous CrackMapExec and many other tools !
Creator of the french podcast Hack'n Speak and security constulant at daylight
In this workshop I will present the tool CrackMapExec and how to take adavantage of the to...
MORE ↦As a hacker you have sinned. Don't lie we see you. we know you have leaked informations, we know you have covertly exploited vulnerabilities in the wild wild web, we know you know gaping holes in big corporations IT.
The ZATAZ confessional is her...
MORE ↦Marc OLANIE will held a semi-permanent workshop on RadioFrequencies Tech, theory, protocols, and Hardware Hacking.
Présentation de l'architecture et mécanismes des tags RFID: Disposition et explication de la mémoire d'un TAG RFID; Présentation : 60% théorique et 40% pratique (démos). Durée : 45min Nombre des sessions: A adapter selon les disponibilité Nombre de...
MORE ↦This hands-on workshop deals with the exploitation of less common web vulnerabilities although they can be critical under certain conditions. the practical workshop will be presented in the form of a mi...
MORE ↦Ever wondered how to start with hardware hacking ? This workshop will present you some simple techniques you'll need to get you started. Of course, the best way to learn is by doing so we prepared a target device for you to fiddle with during the w...
MORE ↦During his Black Hat 2015 presentation, James Kettle explained how template injections could lead to code execution
At the end of the talk, he recommended running application in containers with limited privileges and read-only file system.
S...
MORE ↦Les certificats sont des éléments clés dans un domaine Active Directory. Ils sont utilisés pour signer des applications, pour mettre en place du chiffrement TLS, pour les connexions RDP, mais également pour l'authentification d'utilis...
MORE ↦Malware continues to advance in sophistication and prevalence. Well-engineered malware can obfuscate itself from the user, network, and even the operating system running host-based security applications. But one place malware cannot easily hide itse...
MORE ↦L’objectif de ce workshop est de présenter des attaques ciblant les claviers et souris sans fil (MouseJacking), ainsi que l’émulation de clavier virtuel (HID Attack) par l’utilisation de périphériques malveillants. Le workshop sera constituée de de...
MORE ↦