-
Orange Is The New Black
- Fish_ and Cherry & Stef
-
Cybersecurity’s New Imperative: Metawar
Defending The Cognitive Infrastructure
- Winn Schwartau
-
Low Energy To High Energy:
Hacking Nearby EV-Chargers Over Bluetooth
- Daan Keuper
-
Making Penetration Testing Auditable
- Brenno De Winter
-
Securing Devices Or Profits? Examining The
Device Security Of A Network Appliance Vendor
- Hal Martin
-
The Registry Rundown
- Cedric Van Bockhaven & Max Grim
-
From COM Object Fundamentals To UAC Bypasses
- Tijme Gommers
-
Securing OT, Too Hard Or Not For Me?
- Erwin Paternotte
-
Exploiting The Core: A Deep Dive Into
Kernel Driver Vulnerability Hunting
- Jan-Jaap Korpershoek
-
Protecting Organizations
Against AITM: Lessons Learned
- Rik Van Duijn & Wesley
-
An Angel, Python, Root And
Config Walked Into A Bar...
- Timothy Hjort
-
Offensive Development In Modern Languages
- Cas Van Cooten
-
All Cops Are Broadcasting:
Breaking TETRA After Decades In The Shadows
- Wouter Bokslag
-
Attacking Primary Refresh Tokens
Using Their MacOS Implementation
- Dirk-Jan Mollema & Olaf Hartong
-
How To Crack
Seven Billion Passwords?
- Jeroen Van Beek
-
Graph API Mastery:
Logs To Real World Attacks
- Shiva P & Parthiban R
-
Confusion Attacks: Exploiting Hidden
Semantic Ambiguity In Apache HTTP Server!
- Orange Tsai
-
Closing Keynote: U-Matter
- Inge Bryan
-
Closing Ceremony
- Fish_ and Cherry & Stef