Schedule

09h00 - 09h45

Breakfast

talk presented by

Cité du vin

Description

Go to the cité du vin to share pastries before attacking the conference day

10h00 - 10h30

Keynote

talk presented by

Yassir KAZAR

Description

Opening of the conference day by CEO and co-founder of Yogosha

10h30 - 11h15

AFL, QBDI et KSE sont sur un bateau...

talk presented by

Gabrielle Viala

Description

KSE is a Windows kernel component enabling legit hooks on drivers' API calls. Its situation makes it a perfect target for vulnerability research. This talk aims at presenting an uncommon but efficient, somewhat fun but really painful way to audit such a component by fuzzing it with AFL and a DBI.

11h20 - 12h05

Introducing the OWASP ZAP HUD

talk presented by

Simon Bennetts

Description

The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular and best maintained free and open source security tools. It has a powerful desktop UI, a highly functional API and is used by everyone from people new to security, including developers and QA, right up to professional pentesters. It’s also more complex for newcomers than we would like. We are therefore introducing a new Heads Up Display (HUD) interface which overlays data and controls for ZAP over the web based application being tested.

12h05 - 13h45

Drink'n'food

talk presented by

Café maritime

Description

Time to chat around a glass of wine ( Bassin à flot n°1, Quai Armand Lalande )

14h00 - 14h45

Silent wire hacking

talk presented by

Erwan BROQUAIRE & Pierre-Yves TANNIOU

Description

Beaucoup de réseaux sont accessibles depuis l’extérieur, les câbles RJ45 étant visibles aux abords de divers équipements : caméras de vidéosurveillance, panneaux d’affichage, etc. L’utilisation d’un tel point d’accès est tentante dans le cadre d’une attaque red team ou pour un attaquant réel. Dans un réseau bien configuré, l’intrusion sera détectée par un changement d’état des ports RJ45 (link-down, link-up). Les conséquences peuvent être la levée d’une alerte au sein des équipes de sécurité et/ou la fermeture du port. Nous allons voir un dispositif rendant l’intrusion indétectable et permettant à l’attaquant de se positionner en Man In The Middle.

14h50 - 15h35

Heapple pie

talk presented by

Eloi Benoist-Vanderbeken

Description

This talk will focus on the macOS/iOS heap from an exploitation point of view. Tons of papers exist on glibc and Windows allocators but very few on the macOS/iOS one and, worse, some are even wrong. We will try our best to describe how it really works, which attacks it mitigates, how to debug it and finally how to exploit it.

15h35 - 15h50

Break

talk presented by

Break

Description

Rest time !

15h50 - 16h35

PWNER PWNED

talk presented by

Lionel BIAMI

Description

Analyse d'une RCE dans Cobalt Strike (pour les versions inférieures à la 3.51). Détails sur le protocole de communication entre un beacon et son C&C (team server), comment sont chiffrées les données, extraction des informations depuis la DLL d’un beacon… A l’aide de toutes ces informations, nous verrons que nous pouvons forger notre propre beacon et prendre la main sur le serveur d’un attaquant.

16h40 - 17h25

RUMP Sessions

talk presented by

YOU

Description

On conference day, send us your presentations for the rump sessions !

17h30 - 17h45

Thank you !

talk presented by

Staff Sthack

Description

Thank you and see you next time !

20h00 - 08h00

Capture the flag

talk presented by

Staff

Description

Come to play CTF by team.