Events
Title | Speakers | |
---|---|---|
![]() |
A BEAST and a POODLE celebrating SWEET32
POODLE, BEAST, CRIME, SWEET32 ... So many SSL/TLS vulnerabilities, so little... |
|
![]() |
After Party
|
|
![]() |
Amateur radio activity days
During Balccon2k19 we will be active making amateur radio QSOs (contacts)... |
|
![]() |
Application security screw-ups, vintage of 2019
This talk will show some application security problems that while untreated,... |
|
![]() |
BGP Workshop
We will run our own routers and set up our own BGP peering mesh again. |
|
![]() |
Building the School 2.0
Can we unite on building the School 2.0 as public, free and open common... |
|
![]() |
Busting Advance Botnets
We all are aware of the malware attacks and bot-net's behind this massive... |
|
![]() |
CFT review
|
|
![]() |
Closing Ceremony
|
|
![]() |
Digital (Anti-)Forensics
Digital forensics is a well-established discipline within information... |
|
![]() |
Emoji, how do they even work?
Emoji are used everywhere these days and cannot be retracted from our daily... |
|
![]() |
Eyes for Robots
Sensing the world and potential obstacles, becomes a crucial aspect of every... |
|
![]() |
Generating Art With Neural Nets
Let's use Machine Learning to make pretty pictures! Or horrifying pictures,... |
|
![]() |
Hebocon
Build a small crappy robot from old junk and battle against other... |
|
![]() |
HID Apocalipse is here!
HID devices are capable of many good things. On the other HID devices can... |
|
![]() |
Infotainment systems hacking
Infotainment systems in modern cars are very powerful devices which can... |
|
![]() |
Into a climate changed world: Uncharted Waters
Climate change and environmental degradation is here to stay and get worse.... |
|
![]() |
Intro: BalCCon Beginner CTF
<b>CTF? WTF!</b> CTF is an acronym for Capture the Flag. It is not only a... |
|
![]() |
Karaoke Night
Karaoke! Everbody's favourite drinking game! |
|
![]() |
Known and less known methods of user tracking
Anonymity doesn't exist on the Internet, you can try to hide but eventually... |
|
![]() |
Lazy Red
Attackers and attacker tools can also be prone to the attacks and... |
|
![]() |
Legitimate tools or weapons of mass compromise?
Windows desktop and servers contain a large number of legitimate tools which... |
|
![]() |
Lessons learned while Pentesting Travel Industry
As the current CEO of Enigmasec a Cybersecurity firm in Spain myself and my... |
|
![]() |
Lightning Talk
|
|
![]() |
Lock Picking 101/102
Introduction to common types of locks and locksport tools, from beginner... |
|
![]() |
Looking through Muddy Waters: Insight into TTPs of a Middle Eastern threat actor
The presentation will be about MuddyWater APT, which is a threat actor from... |
|
![]() |
Modern Commandline-Tools (Final Last Version)
Linux without a command line is like the sky without stars. But most of the... |
|
![]() |
Network Access Uncontrolled
During an internal pentest, the red teamers often access the local area... |
|
![]() |
No IT security without Free Software
IT security is one of the most challenging global issues of recent years. But... |
|
![]() |
No More Whack-a-Mole: How to Find and Prevent Entire Classes of Security Vulnerabilities
We frequently see the same types of security vulnerabilities appearing... |
|
![]() |
NOTH1NG T0 HID3
This talk revisits the theme of personal privacy in the digital world, this... |
|
![]() |
Opening
|
|
![]() |
Possible effects from electromagnetic pollution of micro and millimeter waves
There are studies on the Effects on the human health by microwaves since 50... |
|
![]() |
Rakija Leaks
Rakija connecting people! Rakia is one of the most popular alcoholic drink... |
|
![]() |
RPKI Validation
I will talk about the history of the internet, how networks connect together,... |
|
![]() |
seccomp — Your Next Layer of Defence
Why should you allow all possible system calls from your application when you... |
|
![]() |
Secure Design Principles
Software security needs to be addressed throughout the whole software... |
|
![]() |
So, is Android a Linux?
In this talk, I will try to give overview of various (older) Android ARM CPUs... |
|
![]() |
spispy: Open source SPI flash emulation
spispy is an open source hardware tool for emulating SPI flash chips that... |
|
![]() |
That one time someone tried to blackmail KPN
In February 2018, the Dutch and Slowakian police coordinated an international... |
|
![]() |
The day I reverse engineered a Gameboy Advance game
Hey, let’s learn how you can create your own rom hacking for your favorite... |
|
![]() |
The leak of billions of passwords
Beginning of 2019 marked the time of many underground user:password databases... |
|
![]() |
The Road to Hell is Paved with Bad Passwords
Ever wonder what incident management is like when an embassy gets hacked by... |
|
![]() |
Threat Hunting Workshop
Become the hunter In the heat of a crisis, every keystroke counts and... |
|
![]() |
Ultimate Mobile OPSEC
Nation-state adversaries use mobile devices to geolocate, track, and even... |
|
![]() |
Where is my cache? Architectural patterns for caching microservices by example
Everybody knows that we need a cache, but where exactly to put it? Inside... |
|
![]() |
Workshop: Kali Linux and Metasploit for Beginners
As a gray/whithat hacker or as a member of a red/blue team? Kicking off your... |