Talks
2 Days of TROOPERS Trainings
All Inclusive
Conference Package
Talks
-
Adobe and SAP: All Your Business Documents Belong To Us
Yvan Genuer Fabian Hagg
-
Anti-Forensics - You are doing it wrong (Believe me, I'm an IR consultant)
Stephan Berger
-
Authenticating through Windows Hello for Business, a reverse engineering story
Dr. Baptiste David Tillmann Oßwald
-
BSI Project SiPra: Security of Doctor's Office Software
Dennis Heinze Pascal Jeschke
-
Becoming the Trainer: Attacking ML Training Infrastructure
Brett Hawkins
-
Beyond LSASS: Cutting-Edge Techniques for Undetectable Threat Emulation
Priyank
-
Breaking Boundaries: Unraveling AD Cross-Forest Attack Paths
Jonas Bülow Knudsen
-
Breaking Down macOS Intune SSO: PRT Cookie Token Theft and Platform Comparison
Kazma Ye Shang-De Jiang
-
Building Zero Trust Architecture in Public Health
Bianca Kastl Benedikt Waldvogel Sven Nobis
-
Caught in the FortiNet: Compromising Organizations Using Endpoint Protection
Yaniv Nizry
-
DHL Hackstation: What's inside?
Frederik Reiter
-
Decoding RFID: A comprehensive overview of security, attacks, and the latest innovations
Kirils Solovjovs Iceman
-
Demystifying Managed Service Accounts: Unveiling Best Practices And Security Measures To Reduce Risk And Impact
Jorge de Almeida Pinto
-
Eastern Promises: Mobile VRP Lessons For Bug Hunters
Daniel Komaromy Laszlo Szapula
-
Eerie Glow:Unveiling Security Vulnerabilities in Open-Source Satellite Communication Protocols
Vic Huang
-
Finding Entra ID CA Bypasses - the structured way
Dirk-jan Mollema Fabian Bader
-
Getting developers to follow standards is easy, and other lies we tell ourselves
Eric Woodruff
-
Happy Little Accidents: The Overvoltage Glitch that almost broke the Mercedes-Benz Immobilizer
Jonas Horreis Gerd Scheidhauer Enrico Pozzobon
-
Hopping Accross Devices: Expanding Lateral Movement through Pass-the-Certificate Attack
Yuya Chudo
-
Misconfiguration Manager: Still Overlooked, Still Overprivileged
Duane Michael Garrett Foster
-
No title due to currently running responsible disclosure process
Frieder Steinmetz Dennis Heinze
-
One approach to a Cloud-Native Application Protection Platform from a Defender's perspective
Pascal Güldiken
-
Over the Garden Wall — Let's steal data from your iPhone
Nils Rollshausen
-
RBAC: The Shady Place Behind Basic Entra ID Security
Martin Haller
-
Restless Guest: A Novel Entra ID Vulnerability
Simon Maxwell-Stewart
-
Revisiting Cross Session Activation attacks
Fabian Mosch
-
Roaming Agreements - The Hidden 5G Attack Surface
Swantje Lange
-
SBOMs the right way
Michael Messner Benedikt Kühne
-
Say Cheese! How We Pwned Your Security Camera
Emanuele Barbeno Yves Bieri
-
Scriptless Attacks: Why CSS is My Favorite Programming Language
Paul Gerste
-
Securing the Airwaves: Emulation, Fuzzing, and Reverse Engineering of iPhone Baseband Firmware
Luca Glockow Rachna Shriwas Bruno Produit
-
Spoofed & Trusted: Next-Generation Email Attacks Targeting Email Design and Implementation Flaws
Hao Wang Caleb Sargent
-
The Crypto Game of North Korea: Stealing Money with Chrome 0-days
Boris Larin
-
The Ultimate Guide for Protecting Hybrid Identities in Entra ID
Nestori Syynimaa
-
iOS Inactivity Reboot
Jiska Classen