• Image

Virtual Conference of

Hacking

04 to 08 December 2023 - Online

Live

Virtual Conference of Hacking

The event aims to provide a proper platform for the cyber security researchers as well as security enthusiast people who are really interested to learn something and take exposure, share knowledge with others and aware them about latest trends and issues in cyber security also take deep dive into security profession, meet & greet, do networking with fellow like-minded people and establish a community.

DATE 04 until 08 December 2023

LOCATION Online

SPEAKERS +10 Professional Speakers

Speakers

We are bringing you the perfect combination of content and experience to ignite your
heart, equip your mind and spark your skill.

Image

Matteo Malvica Senior Vulnerability Research @ OffSec

Image

Ruben Gonzalez Security Researcher, PhD Candidate in Post-Quantum Crypto

Image

Raja Majumdar Security Researcher

Image

Gracious Yaro Security Researcher @ Synack Red Team

Image

KANONTE Mariam Research Assistant

Image

Wilfrid (aka daphnia) Cybercrime investigator

Image

Armand ACCROMBESSI Game designer

Image

ph3n1x redteamer, Malware developer

Image

Pooja Pawar Student

Image

5c0r7_ Security researcher @ bjCSIRT

Image

Humairah Adamu Sidi Security researcher

Topics Covered

Whether you’re new to the speaking field or a seasoned pro you’ll connect
with old colleagues and make valuable new friends.

Topics

  • Malware and reverse engineering
  • Cyber Crime, Cyber Forensics
  • Cyber Law and IP Trademark
  • Application Security
  • Exploit shell coding
  • Hardware hacking
  • Risk compliance management
  • Emerging technologies
  • National security
  • Data security

Conference Schedule

We are very excited about the program being planned for this Events.

Conference Days

  • Day 1 - 04 December 2023
  • Day 2 - 05 December 2023
  • Day 3 - 06 December 2023
  • Day 4 - 07 December 2023
  • Day 5 - 08 December 2023
  • Day 1 - 04 December 2023
    10:00 AM - 11:00 AM (UTC+1) Conference Opening

    Presentation of the BUG|PWN team and sponsors. The opening of the event

    Speaker : BUG|PWN Team
    11:00 AM - 12:00PM (UTC+1) Bypassing Intel CET with Counterfeit Objects (COOP)

    Since its inception in 2005, return-oriented programming (ROP) has been the predominant avenue to thwart W^X mitigation during memory corruption exploitation.
    To permanently block ROP attacks, a new hardware-enforced Control Flow Integrity mitigation called Control Enforcement Technology (CET) has been developed by Intel and first shipped on Windows systems roughly two years ago.
    In this presentation, we’ll briefly cover how CFI mitigations works, including CET, and how we can leverage COOP to effectively bypass Intel CET on the latest Windows release.

    Speaker : Matteo Malvica
    12:00 PM - 01:00 PM (UTC+1) Offensive Tradecraft: NightWalker

    In this talk, I will explain the methodologies employed by Endpoint Detection and Response (EDR) providers for the detection of malware threats. Additionally, I will demonstrate some evasion techniques that can be applied to your payload to circumvent these defenses. Furthermore, I will explain the importance for organizations to raise their security posture with proficient analysts, instead of solely relying on EDR solutions.
    Finally, I will show some test results against different EDRs of a proof-of-concept malware tool I built called NightWalker.

    Speaker : ph3n1x
    01:00 PM - 04:00 PM (UTC+1) battleCTF round 1

    Urahara vs 44r0n_M3TA

    04:00 PM - 05:00 PM (UTC+1) Break
    05:00 PM - 08:00 PM (UTC+1) battleCTF round 2

    TheReduc VS Hack2k21

  • Day 2 - 05 December 2023
    10:00 AM - 01:00 PM (UTC+1) battleCTF round 3

    Raphael vs ka3n1x

    01:00 PM - 02:00 PM (UTC+1) Break
    02:00 PM - 05:00 PM (UTC+1) battleCTF round 4

    bloman vs Sora

    05:00 PM - 06:00 PM (UTC+1) Artificial Intelligence x Cryptography: A Game-Changer for Cybersecurity

    In the ever-evolving landscape of technological advancements, the integration of Artificial Intelligence (AI), cryptography, and Deep Learning (DL) stands as a formidable alliance reshaping the paradigm of cybersecurity. This talk will explore the intricate interplay between AI, cryptography, and DL, providing a detailed overview of how these technologies converge to fortify data protection, bolster privacy preservation, and secure communication channels.
    New Insights and Innovations, Including DL on Cryptographic Protocols
    My presentation will unveil several pioneering insights and innovations that define the forefront of this dynamic field including my own research on Cryptographic Protocols

    Speaker : Raja Majumdar
    06:00 PM - 07:00 PM (UTC+1) Content Security Policy (CSP) : Directives, Rôles et Contournements

    Directives, Rôles et Contournements", je vais plonger au cœur de la sécurité des applications web en explorant en profondeur le Content Security Policy (CSP), un mécanisme crucial. Je vais clarifier le rôle des directives CSP telles que "default-src", "script-src", et "style-src", etc. montrant comment elles contribuent à la prévention des attaques XSS et à la protection des applications web. Je vais révéler également les méthodes de contournement que les attaquants peuvent utiliser pour contourner ces politiques, offrant des conseils pratiques pour les contrer. En mettant en avant l'impact significatif de la sécurité des applications web sur la protection des données et la réputation des entreprises, cette présentation fournit une expertise approfondie, équilibrant une compréhension technique approfondie avec des conseils pratiques pour renforcer la sécurité des applications web.

    Speaker : 5c0r7_
  • Day 3 - 06 December 2023
    10:00 AM - 01:00 PM (UTC+1) battleCTF Semi-Final

    01:00 PM - 02:00 PM (UTC+1) Break
    02:00 PM - 05:00 PM (UTC+1) battleCTF Semi-Final

    05:00 PM - 06:00 PM (UTC+1) Indie Game Development in 2023 and beyond

    This talk will be a tour of independent gamedev ecosystem, from gameplay to monetization, and challenges to emerging trends

    Speaker : Armand ACCROMBESSI
    06:00 PM - 07:00 PM (UTC+1) C2 servers: From dedicated servers to Telegram bots

    We are used to seeing threat actors rent dedicated servers to use them as C2 servers for their trojans/RATs. However, they are gradually more and more switching to telegram bots. The question now is why such a change?
    I will finish my talk by simulating a case I worked on at work, where I had to track down a TA who was creating Android banking trojans and used Telegram bots as C2 servers to exfiltrate victims' data to a Telegram group.

    Speaker : Wilfrid (aka daphnia)
  • Day 4 - 07 December 2023
    10:00 AM - 11:00 AM (UTC+1) Network security

    How you can secure the transmission of messages via network I.e to ensure the message gets to the right recipient without fabrication.

    Speaker : Humairah Adamu Sidi
    11:00 AM - 12:00 PM (UTC+1) Server-Side Template Injection (SSTI)

    Server-Side Template Injection (SSTI): Understanding and Exploiting Vulnerabilities n Template engines used by web applications.

    Speaker : Gracious Yaro
    12:00 PM - 02:00 PM (UTC+1) Break
    02:00 PM - 03:00 PM (UTC+1) Responsibility of AI Systems in Cybersecurity: Who Is Accountable?

    In the realm of cybersecurity, artificial intelligence (AI) systems have emerged as potent tools in safeguarding digital infrastructures. They hold the promise of augmenting threat detection, automating incident response, and enhancing the overall security posture. However, with great power comes great responsibility. This presentation delves into the complex and pressing question of accountability in the context of AI-driven cybersecurity systems.

    Speaker : KANONTE Mariam
    03:00 PM - 04:00 PM (UTC+1) Guarding Your Online World: The ABCs of Network Security

    My talk is all about network security using "MITRE ATT&CK" framework.
    Think of network security like a shield that guards your computer stuff from bad actors. Imagine a playbook called MITRE ATT&CK that shows all the sneaky moves these bad guys might try. We use this playbook to set up defenses and traps to stop them. It's like playing chess with hackers – we plan ahead to protect our digital world from their tricky tactics. So, network security with MITRE ATT&CK is like having a secret strategy to keep your online stuff safe and sound.

    Speaker : Pooja Pawar
  • Day 5 - 08 December 2023
    10:00 AM - 11:00 AM (UTC+1) Deploying Post-Quantum Cryptography: Obstacles and Opportunities

    In this talk, we will introduce the fascinating world of post-quantum cryptography, shedding light on the challenges it addresses and the exciting opportunities it presents. Our exploration will delve into the underlying principles and techniques of post-quantum cryptography, demystifying the science and mathematics that underpin its security.

    Speaker : Ruben Gonzalez
    11:00 AM - 02:00 PM (UTC+1) gaming 🎮, art 🎨, culture, extra, Music, ...

    Ayihun -- Extra ...

    Speaker : Saamiya, BUG|PWN, ...
    02:00 PM - 06:00 PM (UTC+1) battleCTF Final

    06:00 PM (UTC+1) Closing Event
Image

Time left until the conference start

04 to 08 December 2023 with over 10 sessions

Call For Speakers

We are excited to announce that speaker opportunities are available. If you are interested in participating, we invite you to fill out the form. Don't miss this chance to share your knowledge.

This virtual conference
is free.

  • “ Showcase you research. “
  • “ Opportunity to highlight yourself. “
  • “ Networking with other speakers. “
    • Hacker
    • Speaker form
    • 🗣️Let's kickstart this journey together
    • Fill out the form

Bigup to Our Sponsors

For further info about sponsoring feel free to get in touch with us

Image
Image
Image
Image
Image
Image