Events

  Title Speakers
Event_small
A BEAST and a POODLE celebrating SWEET32
POODLE, BEAST, CRIME, SWEET32 ... So many SSL/TLS vulnerabilities, so little...
Event_small
After Party
    Logo-retro
    Amateur radio activity days
    During Balccon2k19 we will be active making amateur radio QSOs (contacts)...
    Event_small
    Application security screw-ups, vintage of 2019
    This talk will show some application security problems that while untreated,...
    Event_small
    BGP Workshop
    We will run our own routers and set up our own BGP peering mesh again.
    Event_small
    Building the School 2.0
    Can we unite on building the School 2.0 as public, free and open common...
    Event_small
    Busting Advance Botnets
    We all are aware of the malware attacks and bot-net's behind this massive...
    Event_small
    CFT review
      Event_small
      Closing Ceremony
        Event_small
        Digital (Anti-)Forensics
        Digital forensics is a well-established discipline within information...
        Emoji__how_do_they_even_work_
        Emoji, how do they even work?
        Emoji are used everywhere these days and cannot be retracted from our daily...
        Hqdefault
        Eyes for Robots
        Sensing the world and potential obstacles, becomes a crucial aspect of every...
        Screenshot-2018-11-13-at-19-15-11
        Generating Art With Neural Nets
        Let's use Machine Learning to make pretty pictures! Or horrifying pictures,...
        Images
        Hebocon
        Build a small crappy robot from old junk and battle against other...
        Event_small
        HID Apocalipse is here!
        HID devices are capable of many good things. On the other HID devices can...
        Event_small
        Infotainment systems hacking
        Infotainment systems in modern cars are very powerful devices which can...
        Event_small
        Into a climate changed world: Uncharted Waters
        Climate change and environmental degradation is here to stay and get worse....
        Event_small
        Intro: BalCCon Beginner CTF
        <b>CTF? WTF!</b> CTF is an acronym for Capture the Flag. It is not only a...
        Performous
        Karaoke Night
        Karaoke! Everbody's favourite drinking game!
        Event_small
        Known and less known methods of user tracking
        Anonymity doesn't exist on the Internet, you can try to hide but eventually...
        Event_small
        Lazy Red
        Attackers and attacker tools can also be prone to the attacks and...
        Event_small
        Legitimate tools or weapons of mass compromise?
        Windows desktop and servers contain a large number of legitimate tools which...
        Event_small
        Lessons learned while Pentesting Travel Industry
        As the current CEO of Enigmasec a Cybersecurity firm in Spain myself and my...
        Event_small
        Lightning Talk
          Event_small
          Lock Picking 101/102
          Introduction to common types of locks and locksport tools, from beginner...
          Event_small
          Looking through Muddy Waters: Insight into TTPs of a Middle Eastern threat actor
          The presentation will be about MuddyWater APT, which is a threat actor from...
          Wargames
          Modern Commandline-Tools (Final Last Version)
          Linux without a command line is like the sky without stars. But most of the...
          Event_small
          Network Access Uncontrolled
          During an internal pentest, the red teamers often access the local area...
          Cityhall-code-001.v01
          No IT security without Free Software
          IT security is one of the most challenging global issues of recent years. But...
          Event_small
          No More Whack-a-Mole: How to Find and Prevent Entire Classes of Security Vulnerabilities
          We frequently see the same types of security vulnerabilities appearing...
          Event_small
          NOTH1NG T0 HID3
          This talk revisits the theme of personal privacy in the digital world, this...
          Event_small
          Opening
          Event_small
          Possible effects from electromagnetic pollution of micro and millimeter waves
          There are studies on the Effects on the human health by microwaves since 50...
          6ab0f800090cec43340d07aca10330ce3e11cd9d_full
          Rakija Leaks
          Rakija connecting people! Rakia is one of the most popular alcoholic drink...
            Event_small
            RPKI Validation
            I will talk about the history of the internet, how networks connect together,...
            Event_small
            seccomp — Your Next Layer of Defence
            Why should you allow all possible system calls from your application when you...
            Logo
            Secure Design Principles
            Software security needs to be addressed throughout the whole software...
            Event_small
            So, is Android a Linux?
            In this talk, I will try to give overview of various (older) Android ARM CPUs...
            48104848193_51977da875_k_(1)
            spispy: Open source SPI flash emulation
            spispy is an open source hardware tool for emulating SPI flash chips that...
            Event_small
            That one time someone tried to blackmail KPN
            In February 2018, the Dutch and Slowakian police coordinated an international...
            Screen_shot_2019-06-19_at_18.57.24
            The day I reverse engineered a Gameboy Advance game
            Hey, let’s learn how you can create your own rom hacking for your favorite...
            Event_small
            The leak of billions of passwords
            Beginning of 2019 marked the time of many underground user:password databases...
            Isis_50_million_dollars
            The Road to Hell is Paved with Bad Passwords
            Ever wonder what incident management is like when an embassy gets hacked by...
            Event_small
            Threat Hunting Workshop
            Become the hunter In the heat of a crisis, every keystroke counts and...
            Event_small
            Ultimate Mobile OPSEC
            Nation-state adversaries use mobile devices to geolocate, track, and even...
            Event_small
            Where is my cache? Architectural patterns for caching microservices by example
            Everybody knows that we need a cache, but where exactly to put it? Inside...
            Proxy.duckduckgo.com
            Workshop: Kali Linux and Metasploit for Beginners
            As a gray/whithat hacker or as a member of a red/blue team? Kicking off your...