Talks
2 Days of TROOPERS Trainings
All Inclusive
Conference Package
Talks
-
A SIM Hacking Odyssey: Can a SIM hack YOU?
Tomasz Lisowski Marius Muench
-
Agentic Chaos: Weaponizing Autonomous AI
Alon Friedman
-
Backbones under attack: software vulnerabilities in core routers
Pierre Emeriaud
-
Breaking the Control Plane: Exploiting MCP Servers in AI Workflows
Yotam
-
Confused Recovery: A New Attack Class on Windows Recovery
Alon Leviev
-
Counteroffensive AI: Pwning AI Pentesters
Markus Vervier
-
Delete Is Easy – Recovery Is Not: The Reality of Entra ID Backup & Restore
Klaus Bierschenk
-
ESC17: Using ADCS to Attack HTTPS-Enabled WSUS Clients
Alexander Neff Phil Knüfer
-
ETA when? Reporting on cybercrime
Hakan
-
Every Component Passed Review — So How Did the Agent Exfiltrate Everything?
Christian Schneider
-
From Code to Coverage: A Detection Engineer's Journey Through the LDAP Wilderness
Andrew S.
-
From Packets to Intent: Hunting Adversaries in AI Telemetry
Raz Tel-Vered
-
Get in Loser, We're Upgrading the Internet -- Lessons from Deploying Post-Quantum Cryptography across Akamai's global Content Delivery Network
Jan Schaumann
-
I'm_in_your_cloud_v4_FINAL.pdf - hacking everyone's cloud
Dirk-jan Mollema
-
Integrating Incident Analysis and Digital Forensics Tooling for Automated Compromise Detection
Ann-Marie Belz
-
KDS Root Keys: All Secrets Finally Revealed
Michael Grafnetter
-
Living Off The Pipeline: Defensive Research, Weaponized
François Proulx
-
Modern Adventures in Azure Privilege Escalation
Karl Fosaaen Thomas Elling
-
Nested APP Authentication - Undocumented Risk and Conditional Access Bypass
Jun Sheng Shi Shang-De Jiang
-
Novel attack techniques targeting the underlying infrastructure of Bedrock applications
Maya Parizer
-
Our Journey, from SBOM to ASSBOMB
Martin Schmiedecker
-
Popping Microsoft's Sandbox: What Falls Out of a Dataverse Container
Simon Maxwell-Stewart
-
Priceless: Hacking Electronic Shelf Labels
Marius Karstedt
-
Taking a Bite at Apple's Network Stack: Reversing Proprietary Multi-Device Protocols with logfuse
Henri Jäger
-
Tier Breakers: Blind Spots in Cloud-Managed PAWs
Thomas Naunheim Martin Sohn Christensen
-
Trusted by Design: How Windows Uses TPM to Secure PRTs
Dr Nestori Syynimaa
-
Unshelling VShell at Scale
Kazuya Nomura Rintaro Koike
-
V2X Wardriving - They Drive, We Listen
Dieter Schuster Nikolai Puch
-
Watch Your Kids: Hacking Children's Smartwatches
Nils Rollshausen
-
WhatsApp View Once: Four Exploits and a Funeral
Tal Be'ery
-
Windows Deployment Service: An AD Blind Spot?
Geoffrey Sauvageot-Berland