52:26
Static-Analysis Tools: Now you’re Playing with Power! (Philippe Arteau)
Hackfest Communication
39:48
The Black Art of Wireless Post-Exploitation (Gabriel Ryan)
49:56
Hadoop safari : Hunting for vulnerabilities (Mahdi Braik & Thomas Debize)
45:22
Fingerprinting Android malware packaging thru static analysis identify creator (François Gagnon)
1:05:35
How To Pwn an Enterprise in 2017 (or 2016, or 2015. . .) (Johnny Xmas)
48:21
Attack Driven Development: Getting Started in Application Security (Keith Hoodlet)
52:31
Lessons Learned Hunting IoT Malware (Olivier Bilodeau)
51:07
Selenium: dark side of the moon (Adam Reiser)
39:38
Genetic Algorithms for Brute Forcing (Christopher Ellis)
45:54
Dissecting a Metamorphic File-Infecting Ransomware (Raul Alvarez)
46:55
Rage Against the Weaponized A.I. Propaganda Machine (Chris Sumner)
51:55
BITSInject - control your BITS, get SYSTEM (Dor Azouri)
40:12
SniffAir – OpenSource Framework for WiFi Security Assessments (Matthew Eidelberg & Steven Daracott)
52:06
Vaccination - An Anti-Honeypot Approach (Gal Bitensky)
17:48
100 Facebooks accounts per day through internet searches (Guillermo Buendia & Yael Basurto)
38:01
Between You and Me and the Network Security Boundary (Patrick Fussell)
1:02:34
Banking on Insecurity: Why Attackers Can Take the Money and Run (Cheryl Biswas)
43:32
Creating a Professional-Quality Embedded Device on a Budget (Michael Vieau & Kevin Bong)
36:46
Practical Analysis of Awareness (Kendra Coooley)
40:52
Introducing CSE’s open source AssemblyLine (Steve Garon & John O’Brien)
43:41
The New Wave Of Account Checkers And Underground Rewards Fraud (Benjamin Brown)
38:30
Your configs are bad and you should feel bad (Stephen Hall)
40:41
Unveiling One of the World’s Biggest and Oldest Cybercrime Gangs (Sun Huang & Wayne Huang)
35:41
This Phish Goes To 11 (Stephanie “Snow” Carruthers)
55:51
How I Darkweb Economies (and You Can Too!) (Johnny Xmas & Benjamin Brown)
39:11
Game Hacking Exposed (Mickael Nadeau)
49:31
Adversarial Simulation: Why your defenders are the Fighter Pilots (Chris Nickerson)
58:01
A Stuxnet for Mainframes (Cheryl Biswas)
52:57
Come Bring all your Drones to the Yard (Blake Cornell)
30:11
Windows systems & code signing protection (Paul Rascagnères)
21:57
Abusing PHP 7’s OPcache to Spawn Webshells (Ian Bouchard)
53:17
Make iOS Hacking Great Again: The Easy Wins! (Aaron Guzman)
29:52
Pentesting Cruise Ships OR Hacking the High Seas (Chad M. Dewey)
20:08
Exploit Kits: The Biggest Threat You Know Nothing About (Sunny Wear)
45:02
Hypotheses on burnout and stress related illnesses in relation to Cyber Security practitioners
49:15
Blue Team Reboot (Cheryl Biswas & Haydn Johnson)
1:01:50
Hacking the Internet of Dongs (RenderMan and Murdoch_Monkey)
38:53
Clogging the Futures Series of Tubes: A look at HTTP2 DDoS Attacks (Michael Bennet)
20:32
Hunting with LimaCharlie (Maxime Lamothe-Brassard)
48:24
Fixing the Java Serialization mess (Pierre Ernst)
41:53
Untangling the Dark Web: Unmasking Onion Services (Sarah Jamie Lewis)
Racing the Web (Aaron Hnatiw)
25:40
Catching IMSI Catchers (Geoffrey Vaughan)
47:36
Hackfest 2015: Olivier Bilodeau & Thomas Dupuy presented Internet of {Things,Threats}
51:51
Hackfest 2015: Roy Firestein presented "Cymon – An Open Threat Intelligence System"
44:25
Hackfest 2015: Shane MacDougall presented "A SE Journey Through An IT Pro’s Social Media Profile"
27:11
Hackfest 2015; John McAfee presented "The unconventional truth"
32:11
Hackfest 2015: Mike Larkin presented "Kernel W^X Improvements In OpenBSD"
53:53
Hackfest 2015: Theo de Raadt presented "Pledge: A new security technology in openbsd"
50:21
Hackfest 2015: Johnny Xmas presented "1993 BC: Get Off my LAN!"
1:00:41
Hackfest 2014: RenderMan aka Brad Haines presented "They are doing WHAT! with Air Traffic Control?"
40:29
Hackfest 2014: Jason Gillam presented "Web Penetration Testing with Burp and CO2"
57:31
Hackfest 2014: Ian Amit presented "Red white and blue. Making sense of Red Teaming for good"
48:31
Hackfest 2014: Nadim Kobeissi presented "miniLock - Advances in Usable Cryptography"
1:50
Hackfest 2014: Lockpicking NerfGun Challenge
36:36
Hackfest 2014: Theo de Raadt presented "arc4random - randomization for all occasions"
7:44
Discours d'ouverture du Hackfest 2018 avec l'honorable Karina Gould
37:51
Parlons d’enjeux nationaux sécurité informatique envers la démocratie: Un état de situation (panel)
34:57
So You Want To Be A Consultant? Here’s The Fine Print… (Justin Ryder)
25:41
Finding Valuable Needles in Global Source Code Haystacks with Automation (Jay Lagorio)
37:56
Don’t Bring Me Down: Weaponized Botnets Anyone? (Cheryl Biswas)
32:49
“Blazing Secure” Egress Traffic with Smokescreen ( Marc-André Tremblay)
41:56
More MitM Makes Mana Mostly Mediate Mischievous Message (Dominic White)
40:21
Who wrote this smart contract? Privacy and Anonymity in Blockchain (Alina Matyukhina)
Surviving a Cat-astrophe: The Art of Crisis Management as told through LOLcatz (Jen Ellis)
45:12
Breach Analytica: Exploring the history & design of hacked data services (Trevor and Pamela)
50:18
Your Bank’s Digital Side Door (Steven Danneman)
48:55
Shut Up and Take My Money: Scraping the Venmo Public Feed (Johnny Xmas)
33:58
How to bypass an IDS with netcat and linux (Kirill Shipulin)
RHme3 : hacking through failure (Colin DeWinter & Jonathan Beverley & Ben Gardiner)
49:33
CAN Signal Extraction from Openxc with Radare2 (Ben Gardiner)
52:28
Digital Certificate Cybercrime Exploitation and Decentralizing using Blockchain (Mahsa Moosavi)
43:02
Hacking COMBUS in a Paradox security system (Kirils Solovjovs)
37:03
Exploiting Connected Medical Devices: Lessons Learned & Data Earned (Saurabh Harit)
32:45
Vibing Your Way Through an Enterprise – How Attackers are Becoming More Sneaky (Matt Eidelberg)
33:09
Harakiri: Manipulating binaries to optimize closed source fuzzing (Sebastien Feldman)
33:42
ICS: A deeper dive into defending and attacking operational technology (Liam Graves)
33:46
Everyone is hackable. How long will it take you to notice (Shira Shamban)
46:26
The Mechanics of Malware’s Darkside (Yagnesh Waran P & Laura Harris)
53:22
Design: The Art of Building Security Programs (J. Wolfgang Goerlich)
40:05
7 habits of highly effective adversaries (Joe Gray)
40:06
A more secure management of front-end dependencies (Jérémy Matos)
36:17
Brokers Guild Incident Response (Vincent Marcus)
32:33
A comparative analysis of Open Source Web Application vulnerability scanners (Rana Khalil)
53:34
Mind the gap - managing insecurity in enterprise IoT (Cheryl Biswas)
28:10
Adventures in obfuscated mobile adware (Kristina Balaam)
53:33
Introduction to Security and Machine Learning (Wendy Edwards)
49:27
Unveiling the not-PowerShell cult (Mangatas Tondang)
42:18
Conclusions from Tracking Server attacks at scale (Ophir Harpaz & Daniel Golberg)
18:43
Recent developments in designing price-stable cryptocurrencies (Mahsa Moosavi)
57:10
War in the fifth dimension - An overview of the Weaponization of Information (Alana Stazz)
1:00:02
You shall not pass, even if you look like a hobbit-an appeal to smarter physical sec (Remy Baccino)
1:02:22
Curiosity Killed the Cat: Legal Implications of Off-Duty Vulnerability Exposure (Anna Manley)
33:52
The OSINT Space is Growing! Are we Ready? (Adrian Korn)
LIVE
[Private video]
13:22
Cérémonie de fermeture - Stats et Social Engineering (Patrick & Crew)
18:08
Cérémonie de fermeture - CTF (Franck & Crew)
0:58
PWNKIT - Linux vulnerability lets you be “King of the World”