• Most recent
  • Conferences
  • For organizers
  • The rig
  • Buy me a Mate
  • Search
  • Fundraiser
  • Bluesky
  • 2025
  • 2024
  • 2023
  • 2022
  • 2019
  • 2018
Edition logo

Insomni'hack 2018

2018-03-22 - 2018-03-23
  • Thumbnail for the video - click to play

    ►

    Take Or Buy
    - Michael Hausding
  • Thumbnail for the video - click to play

    ►

    Abusing Android In-app Billing feature
    - Jérémy Matos
  • Thumbnail for the video - click to play

    ►

    How To Adapt The SDLC For DevSecOps
    - Zane Lackey
  • Thumbnail for the video - click to play

    ►

    GLibC Malloc for Exploiters: Leak It, Write It, Become a Wizard
    - Yannay Livneh
  • Thumbnail for the video - click to play

    ►

    SAP Incident Response, Real Life Examples On How To Attack And Defend
    - Jordan Santarsieri
  • Thumbnail for the video - click to play

    ►

    Reducing The Cyber Exposure Gap From Cloud To Containers
    - Thomas Cueni
  • Thumbnail for the video - click to play

    ►

    Microarchitectural Attacks And The Case Of Meltdown And Spectre
    - Daniel Gruss
  • Thumbnail for the video - click to play

    ►

    Security By Design: Reality Vs Expectations
    - Julien Patriarca
  • Thumbnail for the video - click to play

    ►

    Unmasking Stealth Operations Using UBA Super Powers
    - Snir Ben-Shimol
  • Thumbnail for the video - click to play

    ►

    Quantum Cyber Blockchain IoT
    - JP Aumasson
  • Thumbnail for the video - click to play

    ►

    Threats Of Tomorrow: Using Artificial Intelligence To Predict Malicious Infrastructure Activity
    - Staffan Truvé
  • Thumbnail for the video - click to play

    ►

    A Brief History Of CTF
    - Jordan Wiens
  • Thumbnail for the video - click to play

    ►

    Hijacking The Boot Process - Ransomware Style
    - Raul Alvarez
  • Thumbnail for the video - click to play

    ►

    DPAPI And DPAPI-NG: Decrypting All Users' Secrets And PFX Passwords
    - Paula Januszkewicz
  • Thumbnail for the video - click to play

    ►

    Battle Of The Smarts: Hacking Smartphones With Bluetooth Smart
    - Tal Melamed
  • Thumbnail for the video - click to play

    ►

    A Walk With Shannon: A Walkthrough Of A Pwn2Own Baseband Exploit
    - Amat Cama
  • Thumbnail for the video - click to play

    ►

    How To build Least Privilege Security Architecture For Virtualization And Cloud Environments
    - Ghaleb Zekri
  • Thumbnail for the video - click to play

    ►

    Ph0wn Smart Devices CTF: Behind The Scenes
    - Axelle Apvrille and Philippe Paget
  • Thumbnail for the video - click to play

    ►

    Attacking .NET Deserialization
    - Alvaro Muñoz
  • Thumbnail for the video - click to play

    ►

    Email SPFoofing: Modern Email Security Features And How To Break Them
    - Roberto Clapis
  • Thumbnail for the video - click to play

    ►

    Maximize The Power Of Hex-Rays Decompiler
    - Igor Kirillov