• Most recent
  • Conferences
  • For organizers
  • The rig
  • Buy me a Mate
  • Search
  • Fundraiser
  • Bluesky
  • 2025
  • 2024
  • 2023
  • 2019
  • 2018
  • 2017
  • 2016
Edition logo

Hack.lu 2017

2017-10-17 - 2017-10-19
  • Thumbnail for the video - click to play

    ►

    Myths And Realities Of Attribution Manipulation
    - Félix Aimé and Ronan Mouchoux
  • Thumbnail for the video - click to play

    ►

    Snuffleupagus: Killing Bugclasses In PHP 7, Virtual-Patching The Rest
    - Sébastien Blot,Thibault Koechlin and Julien Voisin
  • Thumbnail for the video - click to play

    ►

    Randori, A Low Interaction Honeypot With A Vengeance
    - Bouke van Laethem
  • Thumbnail for the video - click to play

    ►

    Queer Privacy & Building Consensual Systems
    - Sarah Jamie Lewis
  • Thumbnail for the video - click to play

    ►

    Secure Physical Data Destruction
    - Johan Huurman
  • Thumbnail for the video - click to play

    ►

    Gigatron DIY TTL Computer
    - Walter Belgers
  • Thumbnail for the video - click to play

    ►

    Peerlyst 3 Years In
    - Claus Houmann
  • Thumbnail for the video - click to play

    ►

    ManaTI: Web Assistance For The Threat Analyst, Supported By Domain Similarity
    - Raúl B. Netto
  • Thumbnail for the video - click to play

    ►

    Let's Play with WinDBG & .NET
    - Paul Rascagneres
  • Video will not be published
    Device Sensors Meet The Web: A Story Of Sadness And Regret
    - Lukasz Olejnik
  • Thumbnail for the video - click to play

    ►

    Malicious Use Of Microsoft 'Local Administrator Password Solution'
    - Maxime Clementz and Antoine Goichot
  • Thumbnail for the video - click to play

    ►

    The Bicho: An Advanced Car Backdoor Maker
    - Sheila Ayelen Berta and Claudio Caracciolo
  • Video will not be published
    Countering Security Threats By Sharing Information: Emerging Civil Society Practices
    - Becky Kazansky
  • Thumbnail for the video - click to play

    ►

    Intel AMT: Using & Abusing The Ghost In The Machine
    - Parth Shukla
  • Thumbnail for the video - click to play

    ►

    The Struggle: Dealing With Language Designers And Maintainers On Proper Use Of CSPRNGs
    - Aaron Zauner
  • Thumbnail for the video - click to play

    ►

    Keynterceptor: Press Any Key To Continue
    - Niels van Dijkhuizen
  • Thumbnail for the video - click to play

    ►

    A View Into ALPC-RPC
    - Clement Rouault and Thomas Imbert
  • Video will not be published
    The Untold Stories Of Hackers In Detention
    - Azet and JTK
  • Thumbnail for the video - click to play

    ►

    Infosec And Failure
    - Ange Albertini
  • Thumbnail for the video - click to play

    ►

    Fancy Remediation Tracking Tool
    - Daniel Nguyen
  • Thumbnail for the video - click to play

    ►

    Finding The Bad Guys
    - Eric Leblond
  • Thumbnail for the video - click to play

    ►

    Sigma - Generic Signatures For Log Events
    - Thomas Patzke
  • Thumbnail for the video - click to play

    ►

    SMT Solvers In The IT Security: Deobfuscating Binary Code With Logic
    - Thaís Moreira Hamasaki
  • Video will not be published
    Network Automation Is Not Your Safe Haven: Protocol Analysis And Vulnerabilities Of Autonomic Network
    - Omar Eissa
  • Thumbnail for the video - click to play

    ►

    API Design For Cryptography
    - Frank Denis
  • Thumbnail for the video - click to play

    ►

    WTFrance?! Cryptography And Legislation In France
    - Okhin
  • Thumbnail for the video - click to play

    ►

    In Soviet Russia, Vulnerability Finds You
    - Inbar Raz
  • Thumbnail for the video - click to play

    ►

    Hospitals And Infosec: The Consequences Of Bad Security In Health Care
    - Jelena Milosevic
  • Thumbnail for the video - click to play

    ►

    How I've Broken Every Threat Intel Platform I've Ever Had (And Settled on MISP)
    - John Bambenek
  • Thumbnail for the video - click to play

    ►

    Automation Attacks At Scale
    - Will Glazier and Mayank Dhiman
  • Video will not be published
    Front Door Nightmares. When Smart Is Not Secure
    - ObiWan666
  • Thumbnail for the video - click to play

    ►

    What Is The Max Reflected Distributed Denial Of Service (rDDoS) Potential Of IPv4?
    - Éireann Leverett and Aaron Kaplan
  • Thumbnail for the video - click to play

    ►

    Information Flows And Leaks In Social Media
    - Vladimir Kropotov and Fyodor Yarochkin
  • Thumbnail for the video - click to play

    ►

    RetDec: An Open-Source Machine-Code Decompiler
    - Peter Matula
  • Thumbnail for the video - click to play

    ►

    Things That Go Bump In The Night
    - Janusz Urbanowicz
  • Thumbnail for the video - click to play

    ►

    Twitter Settings
    - Aaron K
  • Thumbnail for the video - click to play

    ►

    On Strategy
    - Eleanor Saitta
  • Thumbnail for the video - click to play

    ►

    Digital Vengeance: Exploiting Notorious C&C Toolkits
    - Waylon Grange
  • Thumbnail for the video - click to play

    ►

    Are Your VoLTE And VoWiFi Calls Secure?
    - Sreepriya Chalakkal
  • Thumbnail for the video - click to play

    ►

    Bug Hunting Using Symbolic Virtual Machines!
    - Anto Joseph
  • Thumbnail for the video - click to play

    ►

    Vulnerability Disclosure, Governments And You
    - Jeroen van der Ham
  • Thumbnail for the video - click to play

    ►

    TIDS: A Framework For Detecting Threats In Telecom Networks
    - Alexandre De Oliveira and Cu D. Nguyen
  • Thumbnail for the video - click to play

    ►

    Applying Bug Hunters Methodologies To Your Organisation, Lessons From The Field
    - Paul Amar