• Most recent
  • Conferences
  • For organizers
  • The rig
  • Buy me a Mate
  • Search
  • Fundraiser
  • Bluesky
  • 2025
  • 2024
  • 2023
  • 2022
  • 2019
  • 2018
Edition logo

Insomni'hack 2022

2022-03-24 - 2022-03-25
  • Video will not be published
    Keynote
    - Riccardo Sibilia
  • Thumbnail for the video - click to play

    ►

    It’s Raining Shells - How To Find New Attack Primitives In Azure
    - Andy Robbins
  • Thumbnail for the video - click to play

    ►

    How We've Built One Of The Most Secure Media Companies In The World
    - Andreas Schneider
  • Thumbnail for the video - click to play

    ►

    Cyberterrorism And The Energy Sector: A Framework To Improve Collaboration Between Lawmakers And Cybersecurity Experts
    - Chris Esquire
  • Thumbnail for the video - click to play

    ►

    Delegating Kerberos To Bypass Kerberos Delegation Limitation
    - Charlie Bromberg
  • Video will not be published
    Introduction To Open Source Investigations
    - Aiganysh Aidarbekova
  • Thumbnail for the video - click to play

    ►

    Securing Critical Infrastructures With Fortinet
    - Dino-Boris Dougoud
  • Thumbnail for the video - click to play

    ►

    Breaking SecureBoot With SMM
    - Itai Liba & Assaf Carlsbad
  • Thumbnail for the video - click to play

    ►

    An Insider Threat: What Is Social Engineering?
    - Crux Conception
  • Thumbnail for the video - click to play

    ►

    Exploiting WebKit To Break Authentication And Authorization
    - Sachin Thakuri & Prakash Sharma
  • Thumbnail for the video - click to play

    ►

    Raising Employee Awareness: Which Training Strategy To Go For?
    - Eric Bärenzung
  • Thumbnail for the video - click to play

    ►

    Automatically Extracting Static Anti-virus Signatures
    - Vladimir Meier
  • Thumbnail for the video - click to play

    ►

    Practical Exploitation Of Zigbee-class Networks With USB-based RF Transceivers & Open Source Software
    - Nitin Lakshmanan & Sunil Kumar
  • Thumbnail for the video - click to play

    ►

    REW-sploit: Dissect Payloads With Ease
    - Cesare Pizzi
  • Thumbnail for the video - click to play

    ►

    Forging Golden Hammer Against Android App Protections
    - Georges-Bastien Michel
  • Thumbnail for the video - click to play

    ►

    Adventurous Tales Of Online Voting In Switzerland
    - Christian Folini
  • Thumbnail for the video - click to play

    ►

    Two Bugs To Rule Them All: Taking Over The PHP Supply Chain
    - Thomas Chauchefoin
  • Thumbnail for the video - click to play

    ►

    Managing Large-Scale Response
    - Mathias Fuchs
  • Thumbnail for the video - click to play

    ►

    Ransomware Encryption Internals: A Behavioral Characterization
    - Antonio Cocomazzi
  • Thumbnail for the video - click to play

    ►

    A Common Bypass Pattern To Exploit Modern Web Apps
    - Simon Scannell
  • Video will not be published
    The Rat-Race Detection Game
    - Myriam Leggieri
  • Thumbnail for the video - click to play

    ►

    Noise And Signals – Digging Through Threat- And APT-stories
    - Marco Preuss
  • Thumbnail for the video - click to play

    ►

    Hook, Line And Sinker: Pillaging API Webhooks
    - Abhay Bhargav
  • Thumbnail for the video - click to play

    ►

    Stop This Car || GTFO
    - Karim Sudki
  • Thumbnail for the video - click to play

    ►

    Telsys & AWS: A Trusted Cooperation To Support Swiss Customers On Their Cloud Journey.
    - Colin Szajkowski,Geoffray Schmitt and Stephane Broquere
  • Thumbnail for the video - click to play

    ►

    Symbolic Execution Demystified
    - Jannis Kirschner
  • Thumbnail for the video - click to play

    ►

    Future Proofing Your Security Operations Center
    - Amitabh Singh
  • Thumbnail for the video - click to play

    ►

    Void Balaur: A Cyber Mercenary From The Underground
    - Feike Hacquebord
  • Thumbnail for the video - click to play

    ►

    Attacking Bluetooth LE Design And Implementation In Mobile + Wearables Ecosystems
    - Rahul Umapathi and Nitin Lakshmanan
  • Thumbnail for the video - click to play

    ►

    Hunting For Bugs In "Ethereum 2.0"
    - Denis Kolegov and JP Aumasson
  • Thumbnail for the video - click to play

    ►

    Loose Lips Might Sink Clouds
    - Jason Hill and Dvir Sason
  • Thumbnail for the video - click to play

    ►

    Blacksmith: A Blackbox Fuzzer For Bypassing Rowhammer Mitigations On DDR4 DRAM Devices
    - Patrick Jattke and Stijn Gunter
  • Thumbnail for the video - click to play

    ►

    Practical Bruteforce Of Military Grade AES-1024
    - Sylvain Pelissier and Boi Sletterink
  • Thumbnail for the video - click to play

    ►

    The Nym Network Deep-dive
    - Simon Wicky