Talks
2 Days of TROOPERS Trainings
All Inclusive
Conference Package
Talks
-
Adobe and SAP: All Your Business Documents Belong To Us
Yvan Genuer Fabian Hagg
-
BSI Project SiPra: Security of Doctor's Office Software
Dennis Heinze Pascal Jeschke
-
Becoming the Trainer: Attacking ML Training Infrastructure
Brett Hawkins
-
Beyond LSASS: Cutting-Edge Techniques for Undetectable Threat Emulation
Priyank
-
Breaking Boundaries: Unraveling AD Cross-Forest Attack Paths
Jonas Bülow Knudsen
-
Breaking Down macOS Intune SSO: PRT Token Theft and Platform Comparison
Shang-De Jiang Kazma Ye
-
Building Zero Trust Architecture in Public Health
Sven Nobis Bianca Kastl Benedikt Waldvogel
-
Decoding RFID: A comprehensive overview of security, attacks, and the latest innovations
Kirils Solovjovs Iceman
-
Demystifying Managed Service Accounts: Unveiling Best Practices And Security Measures To Reduce Risk And Impact
Jorge de Almeida Pinto
-
Eastern Promises: Mobile VRP Lessons For Bug Hunters
Daniel Komaromy Laszlo Szapula
-
Finding Entra ID CA Bypasses - the structured way
Dirk-jan Mollema Fabian Bader
-
Getting developers to follow standards is easy, and other lies we tell ourselves
Eric Woodruff
-
Happy Little Accidents: The Overvoltage Glitch that almost broke the Mercedes-Benz Immobilizer
Nils Weiss Gerd Scheidhauer
-
Hopping Accross Devices: Expanding Lateral Movement through Pass-the-Certificate Attack
Yuya Chudo
-
Misconfiguration Manager: Still Overlooked, Still Overprivileged
Duane Michael Garrett Foster
-
One approach to a Cloud-Native Application Protection Platform from a Defender's perspective
Pascal Güldiken
-
Over the Garden Wall — Let's steal data from your iPhone
Nils Rollshausen
-
RBAC: The Shady Place Behind Basic Entra ID Security
Martin Haller
-
Restless Guest: A Novel Entra ID Vulnerability
Simon Maxwell-Stewart
-
Revisiting Cross Session Activation attacks
Fabian Mosch
-
Roaming Agreements - The Hidden 5G Attack Surface
Swantje Lange
-
Securing the Airwaves: Emulation, Fuzzing, and Reverse Engineering of iPhone Baseband Firmware
Luca Glockow Rachna Shriwas Bruno Produit
-
Spoofed & Trusted: Next-Generation Email Attacks Targeting Email Design and Implementation Flaws
Hao Wang Caleb Sargent
-
iOS Inactivity Reboot
Jiska Classen