ATM hardware security

Harder, Faster, Better, Stronger: The (Re)Evolution of the Hacker Con

November 20, 11:3045minhall Mir

Our industry is strange - our gatherings even stranger.

Dhillon (L33tdawg) Kannabhiran


Turning your BMC into a revolving door

November 20, 12:2545minhall Mir

Unmonitored and unpatched BMC (remote administration hardware feature for servers) are an almost certain source of chaos.

Alexandre Gazet


Fabien Perigaud (0xf4b)


Joffrey Czarny (@_Sn0rkY)


Abusing UPnP to create the perfect cloaking framework

November 20, 13:2015minhall Mir

Given the rise of exposed IoT routers, UPnP is quite an interesting attack vector to enter network of a target.


Denial, anger, bargaining, depression and acceptance: Stages of reporting 0-days to Russian vendors

November 20, 13:4545minhall Mir

The substitution of foreign ICS systems is an interesting process from the point of view of vulnerability searching.

Vladimir Dashchenko

Diffing C source codes to binaries

November 20, 14:4045minhall Mir

Often, when doing reverse engineering projects, one needs to import symbols from Open Source or «leaked» code bases into IDA databases.

Joxean Koret


Issues in Nodejs Desktop applications (hypster_mode_ON in development)

November 20, 15:3515minhall Mir

In recent years, there has been a considerable increase in the number of applications that use nodejs on desktop devices.

Boris Ryutin

Vulnerability in compiler leads to stealth backdoor in software

November 20, 16:0045minhall Mir

It is a fact, software has bugs and compilers (software which build other software) are not an exception.

David Baptiste

NUClear explotion

November 20, 16:5530minhall Mir

A major and most significant approach to UEFI BIOS security is to prevent it from being illegitimately modified and the SPI flash memory from being overwritten.

Alexander Ermolov

Ruslan Zakirov

Ways to automate testing Linux kernel exploits

November 20, 17:3515minhall Mir

Over the life of CentOS 7, its repository has collected 58 different versions of the kernel.


Ntlm Relay Reloaded: Attack methods you do not know

November 20, 18:0045minhall Mir

It has been years since NTLM authentication protocol is introduced in Windows.

Jianing Wang

Tencent Security Xuanwu Lab

Junyu Zhou

Tencent Security Xuanwu Lab

More talks