FULL TIMELINE

[FR] Keynote par Gaël Delalleau

talk

À propos de Gaël Delalleau @gaeldelalleau

Gaël Delalleau est un organisme biologique cellulaire de type humain, généré il y a bientôt quarante ans. Très jeune, son habitat naturel a évolué, passant du BASIC et de l'assembleur Z80 sur Ams...

MORE ↦
+

Bug Bounty Opening

talk
  • 30/06/18
    10:30 > 10:45
  • CONFERENCE AREA

Qwant.com is funding our Bug Bounty, we'll give you the rules.

MORE ↦
+

[FR]USB-HID l'ami de la “Red Team” par Jérôme Poggi

talk

Cette présentation se propose de montrer avec des démonstration qu'un accès USB à un poste de travail ou un serveur permet de le compromettre simplement et avec peu de moyen.

About Jérôme Poggi @EdGtslFcbngq6sk

Passionné d'informatique et tom...

MORE ↦
+

[FR] Virtualization In-app sous Android afin de maitriser l'exécution des applications virtualisées with Julien Thomas

talk

La virtualisation "in-app", propre a Android et variants, permet aux développeurs de développer des applications souples et adaptées aux utilisateurs. Cette fonctionnalité permet en effet de fournir des fonctionnalités uniques et avancées, nota...

MORE ↦
+

[FR] A story of metadata par Alexandre Pujol

talk

Et les métadonnées?

À chaque fois que vous accédez à un fichier sur un serveur vous générez des métadonnées. Ces métadonnées peuvent être l’adresse du fichier, sa taille, la date actuelle, l'identifiant du propriétaire du fichier... Un...

MORE ↦
+

LUNCH TIME

talk
  • 30/06/18
    13:00 > 14:00
+

[FR] Qu'est-ce que le hacking social ? par Gull et Viciss

talk

Cette conférence a pour finalité d'introduire le hacking social.

Le hacking social est une certaine mentalité, une éthique, associée à des activités spécifiques consistant à interroger les différentes structures et normes sociales, à les c...

MORE ↦

[FR] Breaking privacy in software par Maria Christofi

talk

The need to store more and more data on mobile phones and/or IoT devices introduces new privacy and security issues. Malicious actors can target not only databases hosted by servers but also users phones or IoT devices which can lead to bigger data a...

MORE ↦
+

[FR] (Not) All Quiet on the Eastern Front par Maliciarogue

talk

The infamous Russian hackers make life difficult, but spicy, for everyone. Advantageously hidden by their chapkas (a culturally compatible replacement to the outrageous hood of the Western hacker), they want to rule the US, France and our money.

Th...

MORE ↦
+

BREAK / LA PAUSE

talk
  • 30/06/18
    16:30 > 17:30
+

[FR] From corrupted memory dump to rootkit detection par Stéfan Le Berre

talk

Durant ce talk nous parlerons d'analyse de dumps mémoires. Nous verrons qu'il est difficile d'obtenir une image mémoire propre d'un système quand elle est faite à chaud, mais explorerons des pistes pour tout de même réussir à travailler sur un...

MORE ↦
+

[EN] Side-channel Attack of a Quantum Key Distribution System with Martina Bodini

talk

We are never so vulnerable than when we feel safe. Quantum key distribution systems are the first place to go if looking for best state-of-art secure transmission. They rely on an intrinsic principle, a system cannot be measured without perturbing it...

MORE ↦
+

[EN] Hardware Slashing, Smashing, Deconstructing and Reconstruction for root access with Deral Heiland

talk

During this presentation I will be focusing on what is typically referred to as destructive methods for data acquisition from embedded devices. Focusing on the process of removing embedded Multimedia Media Controller (eMMC) devices from circuit board...

MORE ↦

[EN] Breaking Apps with Frida with Jahmel Harris

workshop

Frida well know by mobile application testers as a way to bypass security controls such as root detection or SSL pinning. At its core, frida is a framework for injecting JavaScript into running applications that makes things significantly easier whe...

MORE ↦

[FR] Reverse-engineering Waze: A story about MASF, protobuf and a Raspberry Pi with Maliciarogue

workshop

Most of our everyday mobile applications take advantage of services provided by Google. Back in 2001, Google designed the Protocol Buffers, a.k.a protobuf. This serialisation protocol, also known as marshalling an object, is widely used to ensure co...

MORE ↦

[EN] Introduction to Bro Network Security Monitor with David Szili and Eva Szilagyi

workshop

Bro is an open-source Network Security Monitor (NSM) and analytics platform. Even though it has been around since the mid 90's, its main user base was primarily universities, research labs and supercomputing centers. In the past few years, however,...

MORE ↦

[FR] La Nintendo Switch hackée en live par XavBox

workshop
  • 30/06/18
    20:00 > 06:00
  • WORKSHOP AREA
  • XavBox

A security breach was found for the Nintendo Switch, this breach is hardware, Nintendo can’t correct it without change hardware of his console,we show you the different possibility for hacking the Switch, come to the Nuit du Hack with your Switch a...

MORE ↦

[FR] Workshop Lockpicking par l'ACF

workshop
  • 30/06/18
    20:00 > 06:00
  • WORKSHOP AREA
  • ACF

Description workshop

About the ACF

L’Association des Crocheteurs de France est une association de loi 1901 fondée par des passionnés d’ouverture fine. Cette activité de loisir consiste en l’ouverture de serrures de toutes sortes, caden...

MORE ↦

(FR] Automate all the ZAPs with Zack and Daniel Wozniak

workshop

OWASP ZAP is one of the worlds most popular free and open source web application security tools. It has an extremely powerful scripting interface that provides full access to all of the ZAP code and data structures.

In this workshop we will quickl...

MORE ↦

[FR] Reverse Engineering a (M)MORPG with Antonin Beaujeant

workshop

This workshop will cover the basics of reverse engineering a (M)MORPG (Pwn Adventure 3 from Vector35). While reversing a video game might not seem interesting for some security professionals, the techniques and methodologies we will cover are simila...

MORE ↦

[EN] AWS Hardening with Deniz Parlak

workshop

Today, we are at a time when cloud technologies are used predominantly. At this point, AWS meets most of its market share. The presentation will describe practical security methods for common services (EC2, S3, KMS, etc.) in AWS, hardening applicati...

MORE ↦
+

BREAK / LA PAUSE

talk
  • 30/06/18
    20:30 > 21:30
+

[FR] Smart backdooring 2.0 par Paul Daher

talk

La technique classique de lockpicking des cadenas et des serrures commence à devenir obsolète avec l'arrivée des objets connectés permettant d'effectuer un contrôle d'accès. Ces objets sont généralement pilotés à distance avec un smartphone...

MORE ↦
+

[EN]How to borrow a car in 60,000 millisecond par Robert Leale

talk

Vehicle immobilizer are intended to prevent theft. They create a 100% electronic staying system and then the keep the secret key in the physical key right?

Maybe not so much. In this talk in discuss my 7+ years of immobilizer bypass work and talk a...

MORE ↦

[EN] Car Hacking 101

workshop

Let's show people how to get started hacking cars. I'll bring hardware and tools and give make a fun interactive workshop on how to get started hacking cars.

About Robert Leale @carfucar

Robert Leale is an eclectic in the field of vehicle ele...

MORE ↦