Talks
2 Days of TROOPERS Trainings
All Inclusive
All packages include
Talks
-
A Vulnerability Analysis of Endpoint Management & Monitoring Solutions
Dennis Mantz Fabian Ullrich
-
Abusing Family Refresh Tokens for Unauthorized Access and Persistence in Azure Active Directory
Ryan Marcotte Cobb
-
AirGuard - Protecting Android Users From Stalking Attacks By Apple Find My Devices
Alexander Heinrich
-
Attack on Titan M: Vulnerability Research on a Modern Security Chip
Damiano Melotti Maxime Rossi Bellom
-
Automotive Network Scans with Scapy
Nils Weiss Enrico Pozzobon
-
Azure AD cloud native CBA - use your smartcards in the cloud
Stefan van der Wiele
-
Better Passwords Project: The State of Active Directory Passwords
Adrian Vollmer
-
Breaking Azure AD joined endpoints in zero-trust environments
Dirk-jan Mollema
-
Building a Cyber Defense Center in a highly regulated Environment
Thomas Biege
-
CWA and CovPass: Two Years of Pandemic-Related Security Assessments
Dennis Heinze Pascal Jeschke
-
Coffee Break
-
Coffee Break
-
Coffee Break
-
Coffee Break
-
Coffee Break
-
Coffee Break
-
Coffee Break
-
Coffee Break
-
Coffee Break
-
Coffee Break
-
Coffee Break
-
Coffee Break
-
DDoS Testing Your Infrastructure, including IPv6 SYN floods
Henrik Kramselund
-
EMBA – Open-Source Firmware Security Testing
Michael Messner Pascal Eckmann
-
Eight ways to compromise AD FS certificates
Nestori Syynimaa
-
Hack my Talk! But it's deployed on Kubernetes
Benjamin Koltermann
-
How an Android application can drain your wallet
Dimitrios Valsamaras Sang Shin Jung
-
How hard can it be?
Jarmo Lahtiranta
-
I am become loadbalancer, owner of your network
Nate Warfield
-
Kates’ Pot: Finding Attacks Against Kubernetes Deployments
Matthias Meidinger
-
Lifting the veil, a look at MDE under the hood
Olaf Hartong
-
Lunch Break
-
Lunch Break
-
Medical Device Security - Learnings From Countless Security Assessments
Julian Suleder
-
Neutralizing Keyloggers, an intimate story between the keyboard and the system
Dr. Baptiste David
-
OT:ICEFALL - Revisiting a decade of OT insecure-by-design practices
Jos Wetzels
-
Project TEMPA - Demystifying Tesla's Bluetooth Passive Entry system
Martin Herfurt
-
Resurrecting Active Directory After a Ransomware Attack
Jorge de Almeida Pinto
-
Route Sixty-Sink: Connecting Application Inputs to Sinks Using Static Analysis
Dillon Franke Michael Maturi
-
Security Engineering for Machine Learning
Gary McGraw
-
The Past 10 Years of Automotive Vulnerabilities
Martin Schmiedecker
-
There Is No Place To Run : Assessing SAP Focused Run Security
Yvan GENUER
-
Tinker Telco Soldier Spy
Ben Jackson Will Bonner
-
UDS Fuzzing and the Path to Game Over
Thomas Sermpinis
-
Unorthodox Lateral Movement: Stepping Away from the Standard Tradecraft
Riccardo Ancarani
-
When Wireless Malware Stays On After Turning Off iPhones
Jiska Classen
-
macOS vulnerabilities hiding in plain sight
Csaba Fitzl