Talks
2 Days of TROOPERS Trainings
All Inclusive
- 2 days of training
- 2 days of conference
- Roundtable sessions on Friday
Conference Package
Talks
-
(Windows) Hello from the other side
Dirk-jan Mollema
-
All your parcel are belong to us
Dennis Kniel
-
Attacking Ultra-Wideband: Security Analysis of UWB Applications in Smartphones
Jiska Classen Alexander Heinrich
-
Beyond Java: Obfuscating Android Apps with Purely Native Code
Laurie Kirk
-
Cat & Mouse - or chess?
Fabian Mosch
-
Das IT-Security-Lagebild aus Heise-Sicht
Jürgen Schmidt aka ju
-
Detection And Blocking With BPF Via YAML
Kev Sheldrake
-
Dumping NTHashes from Azure AD
Nestori Syynimaa
-
Everyone knows SAP, everyone uses SAP, everyone uses RFC, no one knows RFC: From RFC to RCE 16 years later
Fabian Hagg
-
Fact Based Post Exploitation - Office365 Edition
Melvin Langvik
-
Fault Injection Attacks on Secure Automotive Bootloaders
Nils Weiss Enrico Pozzobon
-
Forensic Examination of Ceph
Florian Bausch
-
Forensic analysis on real incidents inside Microsoft Remote Desktop Services
Catarina de Faria Cristas
-
GPT-like Pre-Training on Unlabeled System Logs for Malware Detection
Dmitrijs Trizna Luca Demetrio
-
Hidden Pathways: Exploring the Anatomy of ACL-Based Active Directory Attacks and Building Strong Defenses
Jonas Bülow Knudsen Alexander Schmitt
-
Homophonic Collisions: Hold me closer Tony Danza
Justin Ibarra Reagan Short
-
Horror Stories from the Automotive Industry
Thomas Sermpinis
-
Internal Server Error: Exploiting Inter-Process Communication in SAP’s HTTP Server
Martin Doyhenard
-
Jupysec: Auditing Jupyter to Improve AI Security
Joe Lucas
-
Monitoring Solutions: Attacking IT Infrastructure at its Core
Stefan Schiller
-
OAuth and Proof of Possession - The long way round
Dominick Baier
-
OopsSec - The bad, the worst and the ugly of APT’s operations security
Tomer Bar
-
Priority for Effective Action - A Practical Model for quantifying the Risk of Active Directory Attacks
Mars Cheng Dexter Chen
-
Real world detection engineering in a multi-cloud environment
Aaron Jewitt
-
Reportly - keep your head in the clouds. A new Azure visualization tool for analyzing user activities.
Sapir Federovsky
-
SAP (Anti-)Forensics: Detecting White-Collar Cyber-Crime
Yvan Genuer
-
Security Heroes versus the Power of Privacy
Avi D Kim Wuyts
-
So You Performed A Forest Recovery. How Do You Reconnect Your AD Again With Azure AD?
Jorge de Almeida Pinto
-
Spooky authentication at a distance
Tamas Jos
-
Stay fit: Hack a Jump Rope
Axelle Apvrille
-
Testing and Fuzzing the Kubernetes Admission Configuration
Benjamin Koltermann Maximilian Rademacher
-
The Power of Coercion Techniques in Windows Environments
Martin Grottenthaler
-
The Wire on Fire: The Spies Who Loved Telcos
Aleksandar Milenkoski Julien Reisdorffer
-
Vulnerabilities in the TPM 2.0 reference implementation code
Francisco Falcon