Materials
16 - 17 november 2017
|
Moscow, CC ZIL

Materials

StatusFull NameSubmission name
KeynotesThomas Dullien (aka Halvar Flake)"Machine learning, offense, and the future of automation"
KeynotesShay Gueron"Attacks on encrypted memory: Beyond the single bit conditionals"
TalksAbdul-Aziz Hariri, Brian Gorenc, Jasiel Spelman"For the Greater Good: Leveraging VMware's RPC Interface for fun and profit"
TalksLucas Apa"Hacking Robots Before Skynet"
TalksJames Lee "Playing with IE11 ActiveX 0days"
TalksAlexey Pertsev, Egor Karbutov"Chat with hacker"
TalksVladimir Dashchenko, Sergey Temnikov"Silver bullet vulnerabilities and backdoor. Hunting +30K vendors using tiny license tokens"
TalksJames Forshaw"Abusing Access Tokens for UAC Bypasses"
TalksMaxwell Koh, Keith Lee "Bypass 2FA, Stealing Private Keys without Social Engineering, and the Introduction to "2FAssassin"."
TalksNicolas Alejandro Economou "Abusing GDI for ring0 exploit primitives: Evolution"
TalksJohn DUnlap "Jumping the Fence: Comparison and Improvements for Existing Jump Oriented Programming Tools"
TalksRalf-Philipp Weinmann "Hardware-based tracing on ARM"
TalksAleksey Pertsev "DAO for Pentesters"
TalksSaplt, Nikolay Kolintsev "Gone in Sixty Seconds"
TalksIdo Naor, Amihai Neiderman "Gas is too expensive! Let's make it free."
TalksNguyen Anh Quynh "Building Advanced Coverage-guided Fuzzer for Program Binaries"
TalksStephan Gerling "Front door nightmare"
TalksAleksey Tiurin "MITM Attacks on HTTPS: Another Perspective"
TalksAlex Matrosov "Betraying the BIOS: Where the Guardians of the BIOS are Failing"
TalksMatt Oh "Recent Exploit Trend and Mitigation, detection Tactics"
TalksJiashui Wang, Tianxiang Li "Gain remote code execution in your smart devices!"
Defensive TrackAndrey Labunets "Bootstrapping secure by design processes in a low-process, peer-to-peer engineering organization"
Defensive TrackKelly Shortridge "Defensive Exploitation: How to Pwn Your Attacker's Decision-making"
Defensive TrackAlexey Troshichev "Compressed signature and Public key recovery with GOST R 34.10-2012"
Defensive TrackAlexander Antukh "Security Champions Playbook"
Defensive TrackAndrey Kovalev "How to Implement SDL and Not Turn Grey"
Defensive TrackAnton Sapozhnikov "Securing clouds in GCP"
Defensive TrackKarim Valiev "How to Stop Using Cryptography and Start Living"
Defensive TrackMaxim Suhanov "In-depth forensic analysis of Windows registry files"
Defensive TrackDenis Kolegov, Oleg Broslavsky, Nikita Oleksov "Angine ABAC Framework"
Defensive TrackTeymur Kheirkhabarov "Hunting for Credentials Dumping in Windows Environment"
Defensive TrackAleksandr Yermakov "Attacks Using Signaling System No. 7. Myths, Reality, and Security Measures"
Defensive TrackEldar Zaitov, Andrey Abakumov "Automation of Web Application Scanning With Burp Suite"
Defensive TrackYuri Doroshenko "OpenSource Sandbox in Corporate Environment"
Defensive TrackTaras Ivaschenko "Implementing Content Security Policy at a Large Scale"
FastTrackNikolay Klendar "Exploiting e-mail sandbox: backdoor it with one evil e-mail"
FastTrackAlexey Sintsov, Maxim Andreyanov "Reverse DNS tunnel extension for Meterpreter"
FastTrackIvan Zhuravlev"Vector of telephone flood attack via callback services"
FastTrackAleksey Busygin "Legacy of Heartbleed: MITM and Revoked Certificates"
FastTrackTatiana Mikhailova "Play by Your Own Rules!"
FastTrackAleksey Mescheryakov "Vulnerability in Apps on React"
FastTrackMikhail Yegorov "Tricks for Bypassing CSRF Protection"
FastTrackAndrey Biryukov
"Creating Backdoors Using Legal Applications"
WorkshopKrassimir Tzvetanov"Fundamentals of DDoS mitigation"
WorkshopSergey Ponomarkov, Nikita Konovalov, Maxim Romodin, Igor Lyrchikov"Monitoring systems: Capturing the entire server and hosts (Pentesters’ view)"

Registration

Buy ticket

Where to find us?

Moscow, Culture Center ZIL