Harder, Faster, Better, Stronger: The (Re)Evolution of the Hacker Con
November 20, 11:30|45min|hall Mir
Our industry is strange - our gatherings even stranger.

Dhillon (L33tdawg) Kannabhiran
HITB
November 20, 11:30|45min|hall Mir
Our industry is strange - our gatherings even stranger.
Dhillon (L33tdawg) Kannabhiran
HITB
November 20, 12:25|45min|hall Mir
Unmonitored and unpatched BMC (remote administration hardware feature for servers) are an almost certain source of chaos.
Alexandre Gazet
Airbus
Fabien Perigaud (0xf4b)
Synacktiv
Joffrey Czarny (@_Sn0rkY)
Medallia
November 20, 13:20|15min|hall Mir
Given the rise of exposed IoT routers, UPnP is quite an interesting attack vector to enter network of a target.
x0rz
November 20, 13:45|45min|hall Mir
The substitution of foreign ICS systems is an interesting process from the point of view of vulnerability searching.
Vladimir Dashchenko
November 20, 14:40|45min|hall Mir
Often, when doing reverse engineering projects, one needs to import symbols from Open Source or «leaked» code bases into IDA databases.
Joxean Koret
Activision
November 20, 15:35|15min|hall Mir
In recent years, there has been a considerable increase in the number of applications that use nodejs on desktop devices.
Boris Ryutin
November 20, 16:00|45min|hall Mir
It is a fact, software has bugs and compilers (software which build other software) are not an exception.
David Baptiste
November 20, 16:55|30min|hall Mir
A major and most significant approach to UEFI BIOS security is to prevent it from being illegitimately modified and the SPI flash memory from being overwritten.
Alexander Ermolov
Ruslan Zakirov
November 20, 17:35|15min|hall Mir
Over the life of CentOS 7, its repository has collected 58 different versions of the kernel.
dump_stack()
November 20, 18:00|45min|hall Mir
It has been years since NTLM authentication protocol is introduced in Windows.
Jianing Wang
Tencent Security Xuanwu Lab
Junyu Zhou
Tencent Security Xuanwu Lab