Talks
2 Days of TROOPERS Trainings
All Inclusive
Conference Package
Talks
-
10 years of Windows Privilege Escalation with "Potatoes"
Andrea Pierini
-
A Decade of Active Directory Attacks: What We've Learned & What's Next
Sean Metcalf
-
ADillesHeel: Making the Impossible Possible in AD Attack Path Analysis
SHANG-DE JIANG Che Yu Lin Cheng-Lin Yang
-
Analyzing and Executing ADCS Attack Paths with BloodHound
Andy Robbins Jonas Bülow Knudsen
-
Apple CarPlay - What's Under the Hood
Hannah Nöttgen
-
Attacking Primary Refresh Tokens using their MacOS implementation
Olaf Hartong Dirk-jan Mollema
-
Attacking and Defending Kubernetes Cluster with KubeHound Attack Graph Model
Julien Terriac
-
Breaking Barriers and Boundaries: Free, Global, and Stealthy SMS Communication via Satellite on iPhones
Alexander Heinrich Jiska Classen
-
Complexity Kills: Examining IT Security Challenges in Healthcare Facilities
Julian Suleder Peter Hecko
-
Considerations on AI Security
Florian Grunow Hannes Mohr
-
Decrypting the Directory: A Journey into a static analysis of the Active Directory NTDS to identify misconfigurations and vulnerabilities
Bastien Cacace Florian Duthu
-
Deep Dive into Windows Defender: Smart App Control and ETW
Tillmann Oßwald Dr. Baptiste David
-
DoubleDrive: Double Agents Hide Behind The Clouds
Or Yair
-
Exploiting Token-Based Authentication: Attacking and Defending Identities in the 2020s.
Dr Nestori Syynimaa
-
Forensic Security Monitoring in Automotive Cybersecurity: Unveiling Challenges and Prospects
Dr. Karsten Schmidt Christopher Corbett
-
From ASCII to UTF-16: Leveraging Encodings to Break Software
Stefan Schiller
-
Fuzzing at Mach Speed: Uncovering IPC Vulnerabilities on MacOS
Dillon Franke
-
Hitchhiker's Guide to Automotive Container Security using eBPF
Reinhard Kugler
-
How to travel the C SAFely with .json when there are no Argonauts
Dr. Dina C. Truxius
-
IBM i for Wintel Hackers
Bálint Varga-Perke Zoltán Pánczél
-
Insert coin: Hacking arcades for fun
Ignacio Navarro
-
Keynote - A question of time
Ange Albertini
-
Misconfiguration Manager: Overlooked and Overprivileged
Duane Michael Chris Thompson
-
Open Source vulnerability management for software development and cloud environments
Stefan Fleckenstein
-
Relay Your Heart Away: An OPSEC-Conscious Approach to 445 Takeover
Nick Powers
-
Resurrecting Stuxnet in 2024: Leveraging Emulated Read-Only Filesystems and NTFS Glitches for Infection and Persistence
Alessandro Magnosi
-
Say Hello to your new cache flow!
Geoffrey Bertoli Rémi Jullian Théo Gordyjan (@___t0___)
-
So I became a node: Kubernetes bootstrap tokens and AKS
Paul Barbé Kévin Schouteeten
-
So You Performed A Forest Recovery. How Do You Reconnect Your AD Again With Azure AD? – The Sequel
Jorge de Almeida Pinto
-
The (almost) complete LDAP guide
Sapir Federovsky
-
The Hidden Dangers Lurking in Your Pocket – Pwning Apple Wallet ecosystem and its apps
Priyank Nigam
-
The Registry Rundown
Cedric Van Bockhaven Max Grim
-
The red teamer’s guide to deception
Balthasar Martin Niklas van Dornick
-
V2GEvil: Ghost in the wires
Thomas Sermpinis (a.k.a. Cr0wTom) Pavel Khunt
-
WatchWitch — Hacking the Apple Watch
Nils Rollshausen