Events
Title | Speakers | |
---|---|---|
A BEAST and a POODLE celebrating SWEET32
POODLE, BEAST, CRIME, SWEET32 ... So many SSL/TLS vulnerabilities, so little... |
||
After Party
|
|
|
Amateur radio activity days
During Balccon2k19 we will be active making amateur radio QSOs (contacts)... |
||
Application security screw-ups, vintage of 2019
This talk will show some application security problems that while untreated,... |
||
BGP Workshop
We will run our own routers and set up our own BGP peering mesh again. |
||
Building the School 2.0
Can we unite on building the School 2.0 as public, free and open common... |
||
Busting Advance Botnets
We all are aware of the malware attacks and bot-net's behind this massive... |
||
CFT review
|
|
|
Closing Ceremony
|
|
|
Digital (Anti-)Forensics
Digital forensics is a well-established discipline within information... |
||
Emoji, how do they even work?
Emoji are used everywhere these days and cannot be retracted from our daily... |
||
Eyes for Robots
Sensing the world and potential obstacles, becomes a crucial aspect of every... |
||
Generating Art With Neural Nets
Let's use Machine Learning to make pretty pictures! Or horrifying pictures,... |
||
Hebocon
Build a small crappy robot from old junk and battle against other... |
||
HID Apocalipse is here!
HID devices are capable of many good things. On the other HID devices can... |
||
Infotainment systems hacking
Infotainment systems in modern cars are very powerful devices which can... |
||
Into a climate changed world: Uncharted Waters
Climate change and environmental degradation is here to stay and get worse.... |
||
Intro: BalCCon Beginner CTF
<b>CTF? WTF!</b> CTF is an acronym for Capture the Flag. It is not only a... |
||
Karaoke Night
Karaoke! Everbody's favourite drinking game! |
||
Known and less known methods of user tracking
Anonymity doesn't exist on the Internet, you can try to hide but eventually... |
||
Lazy Red
Attackers and attacker tools can also be prone to the attacks and... |
||
Legitimate tools or weapons of mass compromise?
Windows desktop and servers contain a large number of legitimate tools which... |
||
Lessons learned while Pentesting Travel Industry
As the current CEO of Enigmasec a Cybersecurity firm in Spain myself and my... |
||
Lightning Talk
|
|
|
Lock Picking 101/102
Introduction to common types of locks and locksport tools, from beginner... |
||
Looking through Muddy Waters: Insight into TTPs of a Middle Eastern threat actor
The presentation will be about MuddyWater APT, which is a threat actor from... |
||
Modern Commandline-Tools (Final Last Version)
Linux without a command line is like the sky without stars. But most of the... |
||
Network Access Uncontrolled
During an internal pentest, the red teamers often access the local area... |
||
No IT security without Free Software
IT security is one of the most challenging global issues of recent years. But... |
||
No More Whack-a-Mole: How to Find and Prevent Entire Classes of Security Vulnerabilities
We frequently see the same types of security vulnerabilities appearing... |
||
NOTH1NG T0 HID3
This talk revisits the theme of personal privacy in the digital world, this... |
||
Opening
|
||
Possible effects from electromagnetic pollution of micro and millimeter waves
There are studies on the Effects on the human health by microwaves since 50... |
||
Rakija Leaks
Rakija connecting people! Rakia is one of the most popular alcoholic drink... |
|
|
RPKI Validation
I will talk about the history of the internet, how networks connect together,... |
||
seccomp — Your Next Layer of Defence
Why should you allow all possible system calls from your application when you... |
||
Secure Design Principles
Software security needs to be addressed throughout the whole software... |
||
So, is Android a Linux?
In this talk, I will try to give overview of various (older) Android ARM CPUs... |
||
spispy: Open source SPI flash emulation
spispy is an open source hardware tool for emulating SPI flash chips that... |
||
That one time someone tried to blackmail KPN
In February 2018, the Dutch and Slowakian police coordinated an international... |
||
The day I reverse engineered a Gameboy Advance game
Hey, let’s learn how you can create your own rom hacking for your favorite... |
||
The leak of billions of passwords
Beginning of 2019 marked the time of many underground user:password databases... |
||
The Road to Hell is Paved with Bad Passwords
Ever wonder what incident management is like when an embassy gets hacked by... |
||
Threat Hunting Workshop
Become the hunter In the heat of a crisis, every keystroke counts and... |
||
Ultimate Mobile OPSEC
Nation-state adversaries use mobile devices to geolocate, track, and even... |
||
Where is my cache? Architectural patterns for caching microservices by example
Everybody knows that we need a cache, but where exactly to put it? Inside... |
||
Workshop: Kali Linux and Metasploit for Beginners
As a gray/whithat hacker or as a member of a red/blue team? Kicking off your... |