The event aims to provide a proper platform for the cyber security researchers as well as security enthusiast people who are really interested to learn something and take exposure, share knowledge with others and aware them about latest trends and issues in cyber security also take deep dive into security profession, meet & greet, do networking with fellow like-minded people and establish a community.
We are bringing you the perfect combination of content and experience to ignite your
heart, equip your mind and spark your skill.
Whether you’re new to the speaking field or a seasoned pro you’ll connect
with old colleagues and make valuable new friends.
We are very excited about the program being planned for this Events.
Presentation of the BUG|PWN team and sponsors. The opening of the event
Speaker : BUG|PWN TeamSince its inception in 2005, return-oriented programming (ROP) has been the predominant avenue to thwart W^X mitigation during memory corruption exploitation.
To permanently block ROP attacks, a new hardware-enforced Control Flow Integrity mitigation called Control Enforcement Technology (CET) has been developed by Intel and first shipped on Windows systems roughly two years ago.
In this presentation, we’ll briefly cover how CFI mitigations works, including CET, and how we can leverage COOP to effectively bypass Intel CET on the latest Windows release.
In this talk, I will explain the methodologies employed by Endpoint Detection and Response (EDR) providers for the detection of malware threats. Additionally, I will demonstrate some evasion techniques that can be applied to your payload to circumvent these defenses. Furthermore, I will explain the importance for organizations to raise their security posture with proficient analysts, instead of solely relying on EDR solutions.
Finally, I will show some test results against different EDRs of a proof-of-concept malware tool I built called NightWalker.
Urahara vs 44r0n_M3TA
TheReduc VS Hack2k21
Raphael vs ka3n1x
bloman vs Sora
In the ever-evolving landscape of technological advancements, the integration of Artificial Intelligence (AI), cryptography, and Deep Learning (DL) stands as a formidable alliance reshaping the paradigm of cybersecurity. This talk will explore the intricate interplay between AI, cryptography, and DL, providing a detailed overview of how these technologies converge to fortify data protection, bolster privacy preservation, and secure communication channels.
New Insights and Innovations, Including DL on Cryptographic Protocols
My presentation will unveil several pioneering insights and innovations that define the forefront of this dynamic field including my own research on Cryptographic Protocols
Directives, Rôles et Contournements", je vais plonger au cœur de la sécurité des applications web en explorant en profondeur le Content Security Policy (CSP), un mécanisme crucial. Je vais clarifier le rôle des directives CSP telles que "default-src", "script-src", et "style-src", etc. montrant comment elles contribuent à la prévention des attaques XSS et à la protection des applications web. Je vais révéler également les méthodes de contournement que les attaquants peuvent utiliser pour contourner ces politiques, offrant des conseils pratiques pour les contrer. En mettant en avant l'impact significatif de la sécurité des applications web sur la protection des données et la réputation des entreprises, cette présentation fournit une expertise approfondie, équilibrant une compréhension technique approfondie avec des conseils pratiques pour renforcer la sécurité des applications web.
Speaker : 5c0r7_This talk will be a tour of independent gamedev ecosystem, from gameplay to monetization, and challenges to emerging trends
Speaker : Armand ACCROMBESSIWe are used to seeing threat actors rent dedicated servers to use them as C2 servers for their trojans/RATs. However, they are gradually more and more switching to telegram bots. The question now is why such a change?
I will finish my talk by simulating a case I worked on at work, where I had to track down a TA who was creating Android banking trojans and used Telegram bots as C2 servers to exfiltrate victims' data to a Telegram group.
How you can secure the transmission of messages via network I.e to ensure the message gets to the right recipient without fabrication.
Speaker : Humairah Adamu SidiServer-Side Template Injection (SSTI): Understanding and Exploiting Vulnerabilities n Template engines used by web applications.
Speaker : Gracious YaroIn the realm of cybersecurity, artificial intelligence (AI) systems have emerged as potent tools in safeguarding digital infrastructures. They hold the promise of augmenting threat detection, automating incident response, and enhancing the overall security posture. However, with great power comes great responsibility. This presentation delves into the complex and pressing question of accountability in the context of AI-driven cybersecurity systems.
Speaker : KANONTE MariamMy talk is all about network security using "MITRE ATT&CK" framework.
Think of network security like a shield that guards your computer stuff from bad actors. Imagine a playbook called MITRE ATT&CK that shows all the sneaky moves these bad guys might try. We use this playbook to set up defenses and traps to stop them. It's like playing chess with hackers – we plan ahead to protect our digital world from their tricky tactics. So, network security with MITRE ATT&CK is like having a secret strategy to keep your online stuff safe and sound.
In this talk, we will introduce the fascinating world of post-quantum cryptography, shedding light on the challenges it addresses and the exciting opportunities it presents. Our exploration will delve into the underlying principles and techniques of post-quantum cryptography, demystifying the science and mathematics that underpin its security.
Speaker : Ruben GonzalezAyihun -- Extra ...
Speaker : Saamiya, BUG|PWN, ...We are excited to announce that speaker opportunities are available. If you are interested in participating, we invite you to fill out the form. Don't miss this chance to share your knowledge.
For further info about sponsoring feel free to get in touch with us
For more photo and video visit our social hubs.