7:44
Discours d'ouverture du Hackfest 2018 avec l'honorable Karina Gould
Hackfest Communication
37:51
Parlons d’enjeux nationaux sécurité informatique envers la démocratie: Un état de situation (panel)
34:57
So You Want To Be A Consultant? Here’s The Fine Print… (Justin Ryder)
25:41
Finding Valuable Needles in Global Source Code Haystacks with Automation (Jay Lagorio)
37:56
Don’t Bring Me Down: Weaponized Botnets Anyone? (Cheryl Biswas)
32:49
“Blazing Secure” Egress Traffic with Smokescreen ( Marc-André Tremblay)
18:34
Automatisation de la réponse, introduction au standard OpenC2 (David Girard)
19:44
Throwing it out the Windows: Exfiltration d’identifiants Active Directory (Léanne Dutil)
41:56
More MitM Makes Mana Mostly Mediate Mischievous Message (Dominic White)
40:21
Who wrote this smart contract? Privacy and Anonymity in Blockchain (Alina Matyukhina)
39:38
Surviving a Cat-astrophe: The Art of Crisis Management as told through LOLcatz (Jen Ellis)
45:12
Breach Analytica: Exploring the history & design of hacked data services (Trevor and Pamela)
49:15
Mise à jour des menaces et des risques informatique au Canada (Steve Waterhouse)
50:18
Your Bank’s Digital Side Door (Steven Danneman)
48:55
Shut Up and Take My Money: Scraping the Venmo Public Feed (Johnny Xmas)
33:58
How to bypass an IDS with netcat and linux (Kirill Shipulin)
RHme3 : hacking through failure (Colin DeWinter & Jonathan Beverley & Ben Gardiner)
31:35
Utilisation de GPU pour l’inspection de trafic réseau (Martin Dubois)
49:33
CAN Signal Extraction from Openxc with Radare2 (Ben Gardiner)
52:28
Digital Certificate Cybercrime Exploitation and Decentralizing using Blockchain (Mahsa Moosavi)
LIVE
[Private video]
43:02
Hacking COMBUS in a Paradox security system (Kirils Solovjovs)
37:03
Exploiting Connected Medical Devices: Lessons Learned & Data Earned (Saurabh Harit)
23:04
RGPD en Europe : 6 mois d’expériences (Damien Bancal)
32:45
Vibing Your Way Through an Enterprise – How Attackers are Becoming More Sneaky (Matt Eidelberg)
33:09
Harakiri: Manipulating binaries to optimize closed source fuzzing (Sebastien Feldman)
33:42
ICS: A deeper dive into defending and attacking operational technology (Liam Graves)
33:45
La chasse aux menaces est ouverte - Débuter le Threat Hunting (Éric Gagnon)