-
Opening Ceremony
- AREA41 Team
-
Hacker's Perspective On New Risks:
Revising The Cybersecurity Priorities For 2024
- Paula Januszkiewicz
-
Switching 400'000 Volts With A TCP Packet
- Cyrill Brunschwiler
-
Action Anomalies:
A Hackers Guide To Github Actions
- Elliot Ward
-
Nearing The EPOcalypse: A Tale Of Vulnerabilities
And Incentives In The Infosec Industry
- Alain Mowat
-
Insert Coin:
Hacking Arcades For Fun
- Ignacio Navarro
-
Armored Witness:
Building A Trusted Notary For Bare Metal
- Andrea Barisani
-
Shufflecake, AKA Truecrypt
On Steroids For Linux
- Tommaso Gagliardoni
-
Automating Malware Development:
A Red Teamer's Journey
- Gian Demarmels
-
Did You Say Out Of Scope? Reconsidering Self-XSS
And Exploring Novel Attacks With Cookie Tossing
- Thomas Houhou
-
Intelligence-Driven Threat Hunting:
Exposing The Invisible Enemy
- Sylvain Hirsch
-
Call On Me, Unify!
Hacking Desktop Phones
- Michael Oelke
-
New Stories Of Money:
Crypto, DeFi, Hacks & Attacks
- Marco Preuss
-
Guardians Of The Grid:
Purple Playoffs In OT Adversary Emulation
- Jeroen Vandeleur and Nick Foulon
-
Exploiting Bluetooth:
From Your Car To The Bank Account$$
- yso
-
Eyes Wide Open: Mastering The Art Of Supply
Chain Attacks With Client-Side Monitoring
- Juerg Fischer and Dai Littlewood
-
The CTF To Career Pipeline
- Jam (Vie) Polintan
-
Cloud-native Software Supply Chain Security:
The Hard Truth
- Daniel Drack
-
Shells At Midnight:
Turning A Spam Filter Against Itself
- Michael Imfeld
-
Balancing Efficiency And Security:
Unveiling The Risks In Cloud-Based Endpoint Management
- Oleksandr Kazymyrov
-
Defeating Behavior Detection Of Remote Code Injection
Abusing Shared Sections And Handle Inheritance
- Rafael Salema Marques
-
Public Cloud Public Attacks:
A Summary Of Attacks Seen By CloudIntel
- Himanshu Anand
-
Phishing The Phishing Resistant:
Phishing For Primary Refresh Tokens In Microsoft Entra
- Dirk-Jan Mollema
-
Actionable Incident Response Documentation:
When The Ink Meets The Road
- Gergana Karadzhova-Dangela
-
Technical Deep Dive Into The XZ Backdoor
- Timo Schmid
-
Digital Self Defense For
Investigative Journalists
- Rico
-
Machine Learning For Enhanced
Malware Detection & Classification
- Solomon Sonya
-
Red Cell - Mimicking Threat
Actors For Realistic Responses
- Thomas Chopitea
-
Closing Ceremony
- AREA41 Team