• Most recent
  • Conferences
  • For organizers
  • The rig
  • Buy me a Mate
  • Search
  • Fundraiser
  • Bluesky
  • 2025
  • 2024
  • 2023
  • 2019
  • 2018
  • 2017
  • 2016
Edition logo

Hack.lu 2016

2016-10-18 - 2016-10-20
  • Thumbnail for the video - click to play

    ►

    Stressed Out? Denial Of Service Attacks From The Providers' Perspective
    - Alice Hutchings
  • Thumbnail for the video - click to play

    ►

    Metabrik Meets CVE-Search by GomoR
    - GomoR
  • Thumbnail for the video - click to play

    ►

    When Your Firewall Turns Against You
    - Rene Freingruber
  • Thumbnail for the video - click to play

    ►

    Cracking An Egg And Cooking The Chicken
    - Jacob I. Torrey
  • Thumbnail for the video - click to play

    ►

    Exploiting And Attacking Seismological Networks Remotely
    - Bertin Bervis Bonilla and James Jara
  • Thumbnail for the video - click to play

    ►

    HIDden Secrets In Soft Token: A Security Study Of HID Global Soft Token
    - Mouad Abouhali
  • Thumbnail for the video - click to play

    ►

    KillTheHashes 30 Million Malware DNA Profiling Exercise
    - Luciano Martins,Rodrigo Cetera and Javier Bassi
  • Thumbnail for the video - click to play

    ►

    Unveiling The Attack Chain Of Russian-Speaking Cybercriminals
    - Wayne Huang and Sun Huang
  • Thumbnail for the video - click to play

    ►

    Of Mice And Keyboards: On The Security Of Modern Wireless Desktop Sets
    - Matthias Deeg and Gerhard Klostermeier
  • Thumbnail for the video - click to play

    ►

    Windows Systems & Code Signing Protection
    - Paul Rascagnères
  • Thumbnail for the video - click to play

    ►

    Cyber Grand Shellphish: Shellphish And The DARPA Cyber Grand Challenge
    - Kevin Borgolte
  • Thumbnail for the video - click to play

    ►

    The Metabrik Platform: Rapid Development Of Reusable Security Tools
    - Patrice Auffret
  • Thumbnail for the video - click to play

    ►

    2016: The Infosec Crossroads
    - Saumil Shah
  • Thumbnail for the video - click to play

    ►

    Exploit Generation And JavaScript Analysis Automation With WinDBG
    - Fitzl Csaba and Miklos Desbordes-Korcsev
  • Thumbnail for the video - click to play

    ►

    A Network Of Sorrows: Small Adversaries And Small Allies
    - Quinn Norton
  • Thumbnail for the video - click to play

    ►

    Start-up Pitch: securityscorecard.io
    - Chris Meidinger
  • Thumbnail for the video - click to play

    ►

    Start-up Pitch: redowl.com
    - Peter Heim
  • Thumbnail for the video - click to play

    ►

    Sisyphe, All IP Data In One Place
    - GomoR
  • Thumbnail for the video - click to play

    ►

    Exploiting New Default Accounts In SAP Systems
    - Joris Van De Vis
  • Thumbnail for the video - click to play

    ►

    badGPO - Using GPOs For Persistence And Lateral Movement
    - Yves Kraft and Immanuel Willi
  • Thumbnail for the video - click to play

    ►

    Machine Duping: Pwning Deep Learning Systems
    - Clarence Chio
  • Thumbnail for the video - click to play

    ►

    Credential Assessment: Mapping Privilege Escalation At Scale
    - Matt Weeks
  • Thumbnail for the video - click to play

    ►

    When Crypto Fails
    - Yaniv Balmas and Ben Herzog
  • Thumbnail for the video - click to play

    ►

    Bootstrapping An Architectural Research Platform
    - Jacob I. Torrey
  • Thumbnail for the video - click to play

    ►

    Hadoop Safari: Hunting For Vulnerabilities
    - Thomas Debize and Mahdi Braik
  • Thumbnail for the video - click to play

    ►

    Illusions And Reality Of CERT Business
    - Sascha Rommelfangen
  • Thumbnail for the video - click to play

    ►

    0Patch: Be Your Own Software Doctor
    - Mitja Kolsek
  • Thumbnail for the video - click to play

    ►

    BtleJuice: The Bluetooth Smart Man In The Middle Framework
    - Damien Cauquil
  • Thumbnail for the video - click to play

    ►

    Where Should I Host My Malware?
    - Attila Marosi
  • Thumbnail for the video - click to play

    ►

    Interesting Malware - No, I'm Not kidding
    - Marion Marschalek
  • Thumbnail for the video - click to play

    ►

    Enhancing Infrastructure Cybersecurity In Europe
    - Rossella Mattioli
  • Thumbnail for the video - click to play

    ►

    Lama Project
    - Valentin Giannini
  • Thumbnail for the video - click to play

    ►

    Geeks Without Bounds
    - Chris Kebecka
  • Thumbnail for the video - click to play

    ►

    Hardware Shredder
    - Stefan Chorus
  • Thumbnail for the video - click to play

    ►

    iOS Forensics
    - Pasquale Stirparo
  • Thumbnail for the video - click to play

    ►

    EmailMadeIn.lu
    - Martin Bosslet
  • Thumbnail for the video - click to play

    ►

    House Intercoms Attacks: When Frontdoors Become Backdoors
    - Sébastien Dudek
  • Video will not be published
    When Practice Informs Technology
    - Mahsa Alimardani
  • Thumbnail for the video - click to play

    ►

    Bridging Political Gaps With Code
    - Okhin
  • Thumbnail for the video - click to play

    ►

    WiFi Exploitation: How Passive Interception Leads To Active Exploitation
    - Solomon Sonya
  • Thumbnail for the video - click to play

    ►

    Fraud Detection And Forensics On Telco Networks
    - Vladimir Kropotov and Dmitry Kurbatov
  • Thumbnail for the video - click to play

    ►

    The Legend Of Windows: A Link To The Hash
    - m4xk and sıx
  • Thumbnail for the video - click to play

    ►

    CTF Prize Ceremony
    - Fluxfingers