Technology
HACK IN PARIS 2018 - INTERNATIONAL CYBER SECURITY CONFERENCE
June 25th to 29th 2018
HACK IN PARIS 2018 - (R) Winn SCHWARTAU (Source: © Ruby BIRD & Yasmina BEDDOU)
USPA NEWS -
Every Year brings together, during Different Events, the World´s Leading Cyber Security Doers to share Latest researches and Knowledge. Those Days are meant for the International Information Security community : promoting, demonstrating & spreading Awareness regarding the Field of Information Security. The Main Motive is to establish a Platform for Talented Security Researchers to showcase their Skills & to spread Awareness about the Real Insights of Hacking and Security...
Every Year brings together, during Different Events, the World´s Leading Cyber Security Doers to share Latest researches and Knowledge. Those Days are meant for the International Information Security community : promoting, demonstrating & spreading Awareness regarding the Field of Information Security. The Main Motive is to establish a Platform for Talented Security Researchers to showcase their Skills & to spread Awareness about the Real Insights of Hacking and Security.
A Few Events took place in France but until now, no one had covered Hacking Practices with a Technical Approach including both Professional Training and Information Aspects. Hack In Paris aims at filling this Gap. After the success of the Latest Edition with more than 650 Attendees, this 5 days Corporate Event will be held for the Eighth Time in France, at the "La Maison de la Chimie" (Paris). Hack In Paris Attendees could discover the Realities of Hacking, and its Consequences for Companies. The Program includes State of the Art IT Security, Industrial Espionage, Penetration Testing, Physical Security, Forensics, Malware Analysis Techniques and Countermeasures.
Hack In Paris was held from June 25th to 29th 2018 exclusively in English :
* Trainings - June 25th to 27th, Three Days of Trainings by Security Officers (CISOs, CIOs) and Technical Experts.
The First Three Days of Hack In Paris were devoted to Trainings. Twelve International Experts taught a Set of Theoretical and Practical Knowledge on Different Topics during their Trainings.
* Trainings - June 25th to 27th, Three Days of Trainings by Security Officers (CISOs, CIOs) and Technical Experts.
The First Three Days of Hack In Paris were devoted to Trainings. Twelve International Experts taught a Set of Theoretical and Practical Knowledge on Different Topics during their Trainings.
- Corelan Live Bootcamp with Peter Van Eeckhoutte
- Practical IoT Hacking with Aseem Jakhar
- Hacking IPv6 Networks v4.0 with Fernando Gont
- Infrastructure Security Assessment with Abhisek Datta, Omair
- Hacking and Securing Windows Infrastructure with Paula Januszkiewicz
- Bug Hunting Millionaire: Mastering Web Attacks with Full-Stack Exploitation with Dawid Czagan
- Windows Post-Exploitation Subverting the Core with Ruben Boonen
- Reverse Code Engineering in Win32 apps protecting yourself in-the-wild
with Ricardo Rodriguez
- "Smart lockpicking" - hands on exploiting flaws in IoT devices based on electronic locks and access control systems with Slawomir Jasek
- Practical Industrial Control System (ICS) Hacking with Arun Mane
- Pentesting Industrial Control Systems with Arnaud Soullié
- CCISO with Jeroen van der Vlies
- Practical IoT Hacking with Aseem Jakhar
- Hacking IPv6 Networks v4.0 with Fernando Gont
- Infrastructure Security Assessment with Abhisek Datta, Omair
- Hacking and Securing Windows Infrastructure with Paula Januszkiewicz
- Bug Hunting Millionaire: Mastering Web Attacks with Full-Stack Exploitation with Dawid Czagan
- Windows Post-Exploitation Subverting the Core with Ruben Boonen
- Reverse Code Engineering in Win32 apps protecting yourself in-the-wild
with Ricardo Rodriguez
- "Smart lockpicking" - hands on exploiting flaws in IoT devices based on electronic locks and access control systems with Slawomir Jasek
- Practical Industrial Control System (ICS) Hacking with Arun Mane
- Pentesting Industrial Control Systems with Arnaud Soullié
- CCISO with Jeroen van der Vlies
* Talks - June 28th & 29th, Two Days of Talks given by International Speakers and Technical Experts.
Talks then took Place 28-29 June. This Year for the First Time, Talks were Live translated in French! A Real Success for the French People very Comfortable in English. With a Huge Success like every year, a Debate was organized with the AI Topic (Artificial Intelligence).
Talks then took Place 28-29 June. This Year for the First Time, Talks were Live translated in French! A Real Success for the French People very Comfortable in English. With a Huge Success like every year, a Debate was organized with the AI Topic (Artificial Intelligence).
- Day 1 - June 28 :
--Drones the new weapon of choice - also for hackers (Dominique C. Brack)
--Building Systems On Shaky Grounds 10 Tactics To Manage The Modern Supply Chain (Robert Wood)
--Silent Wire Hacking (Erwan Broquaire , Pierre-Yves Tanniou)
--Auditd for the Masses (Philipp Krenn)
--From Printed Circuit Boards to exploits: pwning IoT devices like a boss (Damien Cauquil)
--Mobile Operators vs. Hackers New Security Measures for New Bypassing Techniques (Sergey Puzankov)
--Invoke-DOSfuscation: Techniques FOR %F IN (-style) DO (S-level CMD Obfuscation) - (Daniel Bohannon)
--DEBATE - To Serve Man AI, Machine Learning & Deep Learning in Security (Winn Schwartau, Michael Masucci, Gregory Carpenter)
--Drones the new weapon of choice - also for hackers (Dominique C. Brack)
--Building Systems On Shaky Grounds 10 Tactics To Manage The Modern Supply Chain (Robert Wood)
--Silent Wire Hacking (Erwan Broquaire , Pierre-Yves Tanniou)
--Auditd for the Masses (Philipp Krenn)
--From Printed Circuit Boards to exploits: pwning IoT devices like a boss (Damien Cauquil)
--Mobile Operators vs. Hackers New Security Measures for New Bypassing Techniques (Sergey Puzankov)
--Invoke-DOSfuscation: Techniques FOR %F IN (-style) DO (S-level CMD Obfuscation) - (Daniel Bohannon)
--DEBATE - To Serve Man AI, Machine Learning & Deep Learning in Security (Winn Schwartau, Michael Masucci, Gregory Carpenter)
- Day 2 - June 29
--The Insecure Software Development Lifecycle How to find, fix, and manage Deficiencies within an Existing Methodology (April Wright)
--Knockin' on IPv6's Doors (Fernando Gont)
--The Bicho An Advanced Car Backdoor Maker (Sheila Berta , Claudio Caracciolo)
--The Past, Present & Future of Enterprise Security the 'Golden Age' of Attack Automation (Marcello Salvati)
--Hunting PBX for Vulnerabilities (Sachin Wagh , Himanshu Mehta)
--No Win32_Process Needed Expanding the WMI Lateral Movement Arsenal (Philip Tsukerman)
--How To Bring HID Attacks To The Next Level (Luca Bongiorni)
--NFC Payments The Art of Relay & Replay Attacks (Salvador Mendoza)
Source : Hack In Paris 2018 - Cyber Security Conference - June 25th to 29th 2018 @ Maison De La Chimie.
Ruby BIRD
http://www.portfolio.uspa24.com/
Yasmina BEDDOU
http://www.yasmina-beddou.uspa24.com/
--The Insecure Software Development Lifecycle How to find, fix, and manage Deficiencies within an Existing Methodology (April Wright)
--Knockin' on IPv6's Doors (Fernando Gont)
--The Bicho An Advanced Car Backdoor Maker (Sheila Berta , Claudio Caracciolo)
--The Past, Present & Future of Enterprise Security the 'Golden Age' of Attack Automation (Marcello Salvati)
--Hunting PBX for Vulnerabilities (Sachin Wagh , Himanshu Mehta)
--No Win32_Process Needed Expanding the WMI Lateral Movement Arsenal (Philip Tsukerman)
--How To Bring HID Attacks To The Next Level (Luca Bongiorni)
--NFC Payments The Art of Relay & Replay Attacks (Salvador Mendoza)
Source : Hack In Paris 2018 - Cyber Security Conference - June 25th to 29th 2018 @ Maison De La Chimie.
Ruby BIRD
http://www.portfolio.uspa24.com/
Yasmina BEDDOU
http://www.yasmina-beddou.uspa24.com/
Ruby Bird Yasmina Beddou Silicon Valley Hack In Paris 2018 Cyber Security Conference June 25th To 29th 5 Days Corporate Event Hacking Practices Technical Approach Professional Training Information Aspects
Liability for this article lies with the author, who also holds the copyright. Editorial content from USPA may be quoted on other websites as long as the quote comprises no more than 5% of the entire text, is marked as such and the source is named (via hyperlink).