BEGIN:VCALENDAR VERSION:2.0 PRODID:-//leHACK//NONSGML Events//EN BEGIN:VEVENT UID:1476 DTSTAMP:20240606T085138 DTSTART:20240707T020000 DTEND:20240707T040000 LOCATION:Zone 3 - OSINT Village - Louis Armand conference stage DESCRIPTION:Searching online in a foreign language can seem daunting to most. Others will pivot to... SUMMARY:How to OSINT in any language ATTACH;FMTTYPE=image/jpeg:https://lehack.org/app/uploads/1680084379657.png URL;VALUE=URI:https://lehack.org/track/how-to-osint-in-any-language/ END:VEVENT BEGIN:VEVENT UID:1474 DTSTAMP:20240610T110156 DTSTART:20240707T003000 DTEND:20240707T020000 LOCATION:Zone 3 - OSINT Village - Louis Armand conference stage DESCRIPTION:An insightful workshop that delves into the world of open-source intelligence (OSINT) through the lens... SUMMARY:OSINT Uncovered: Enhancing Public Investigations with the ObSINT Guidelines ATTACH;FMTTYPE=image/jpeg:https://lehack.org/app/uploads/osint-Open-Source-INTelligence-1280x720-1-1024x576.jpg URL;VALUE=URI:https://lehack.org/track/osint-uncovered-enhancing-public-investigations-with-the-obsint-guidelines/ END:VEVENT BEGIN:VEVENT UID:1544 DTSTAMP:20240701T170120 DTSTART:20240706T230000 DTEND:20240707T003000 LOCATION:ZONE 2 - WORKSHOP ZONE - level -3 - Salle 4D DESCRIPTION:Ce workshop propose d'utiliser Overpass Turbo pour réaliser des opérations de GEOINT. SUMMARY:GEOINT: Mastering Overpass Turbo (session 2) ATTACH;FMTTYPE=image/jpeg: URL;VALUE=URI:https://lehack.org/track/geoint-mastering-overpass-turbo-2/ END:VEVENT BEGIN:VEVENT UID:1547 DTSTAMP:20240701T170028 DTSTART:20240706T224500 DTEND:20240707T003000 LOCATION:ZONE 2 - WORKSHOP ZONE - level -3 - Salle 3C DESCRIPTION:Ce workshop propose d'analyser le disque dur d'une machine victime d'une attaque par une Rubber... SUMMARY:Analyse d'un dump de disque dur suite à une attaque via rubber ducky (session 2) ATTACH;FMTTYPE=image/jpeg: URL;VALUE=URI:https://lehack.org/track/analyse-dun-dump-de-disque-dur-suite-a-une-attaque-via-rubber-ducky-session-2/ END:VEVENT BEGIN:VEVENT UID:1472 DTSTAMP:20240605T130051 DTSTART:20240706T230000 DTEND:20240707T003000 LOCATION:Zone 3 - OSINT Village - Louis Armand conference stage DESCRIPTION:Understanding an attack surface is a necessary first-step to for cyber-defenders looking to protect an... SUMMARY:Attack Surface Discovery with OSINT ATTACH;FMTTYPE=image/jpeg:https://lehack.org/app/uploads/blbl-1024x576.jpg URL;VALUE=URI:https://lehack.org/track/attack-surface-discovery-with-osint/ END:VEVENT BEGIN:VEVENT UID:1548 DTSTAMP:20240702T134013 DTSTART:20240706T213000 DTEND:20240707T000000 LOCATION:ZONE 2 - WORKSHOP ZONE - level -2 - Salle C/D DESCRIPTION:In this workshop I will present the tool NetExec and how to take advantage of... SUMMARY:Active Directory pwnage with NetExec ATTACH;FMTTYPE=image/jpeg: URL;VALUE=URI:https://lehack.org/track/active-directory-pwnage-with-netexec/ END:VEVENT BEGIN:VEVENT UID:1344 DTSTAMP:20240529T101803 DTSTART:20240706T213000 DTEND:20240706T233000 LOCATION:Zone 1 - Gaston Berger conference stage DESCRIPTION:The return of our hit JEOPARDY contest, presented by @virtualab. More information on the dedicated... SUMMARY:Qui veut veut gagner des bitcoins ? ATTACH;FMTTYPE=image/jpeg:https://lehack.org/app/uploads/qui-veux-gagner-des-bitcoins-1024x358.webp URL;VALUE=URI:https://lehack.org/track/qui-veut-veut-gagner-des-bitcoins/ END:VEVENT BEGIN:VEVENT UID:1470 DTSTAMP:20240605T124417 DTSTART:20240706T210000 DTEND:20240706T230000 LOCATION:Zone 3 - OSINT Village - Louis Armand conference stage DESCRIPTION:Join me for an incredible tutorial to unlock the full potential of Web Scraping! From... SUMMARY:Mastering Web Scraping with Scrapoxy ATTACH;FMTTYPE=image/jpeg:https://lehack.org/app/uploads/scrapoxy-warrior.png URL;VALUE=URI:https://lehack.org/track/mastering-web-scraping-with-scrapoxy/ END:VEVENT BEGIN:VEVENT UID:1543 DTSTAMP:20240702T133803 DTSTART:20240706T213000 DTEND:20240706T230000 LOCATION:ZONE 2 - WORKSHOP ZONE - level -3 - Salle 4D DESCRIPTION:Ce workshop propose d'utiliser Overpass Turbo pour réaliser des opérations de GEOINT. SUMMARY:GEOINT: Mastering Overpass Turbo (session 1) ATTACH;FMTTYPE=image/jpeg: URL;VALUE=URI:https://lehack.org/track/geoint-mastering-overpass-turbo/ END:VEVENT BEGIN:VEVENT UID:1546 DTSTAMP:20240701T170016 DTSTART:20240706T210000 DTEND:20240706T224500 LOCATION:ZONE 2 - WORKSHOP ZONE - level -3 - Salle 3C DESCRIPTION:Ce workshop propose d'analyser le disque dur d'une machine victime d'une attaque par une Rubber... SUMMARY:Analyse d'un dump de disque dur suite à une attaque via rubber ducky (session 1) ATTACH;FMTTYPE=image/jpeg: URL;VALUE=URI:https://lehack.org/track/analyse-dun-dump-de-disque-dur-suite-a-une-attaque-via-rubber-ducky-session-1/ END:VEVENT BEGIN:VEVENT UID:1542 DTSTAMP:20240702T133538 DTSTART:20240706T200000 DTEND:20240706T213000 LOCATION:ZONE 2 - WORKSHOP ZONE - level -3 - Salle 2B DESCRIPTION:Ce Workshop s'articulera sur les explications et l'utilisations de plusieurs librairies qui permette de s'interfacez... SUMMARY:Network protocol abuse: driving ICS equipment mad ATTACH;FMTTYPE=image/jpeg: URL;VALUE=URI:https://lehack.org/track/network-protocol-abuse-driving-ics-equipment-mad/ END:VEVENT BEGIN:VEVENT UID:1343 DTSTAMP:20240518T150658 DTSTART:20240706T203000 DTEND:20240706T204500 LOCATION:Zone 1 - Gaston Berger conference stage DESCRIPTION:The OSINT challenge game will come to an end with the reward ceremony. SUMMARY:OSINT Challenge Prize Ceremony ATTACH;FMTTYPE=image/jpeg:https://lehack.org/app/uploads/osint-1024x576.jpg URL;VALUE=URI:https://lehack.org/track/osint-challenge-prize-ceremony/ END:VEVENT BEGIN:VEVENT UID:1342 DTSTAMP:20240528T150801 DTSTART:20240706T194500 DTEND:20240706T203000 LOCATION:Zone 1 - Gaston Berger conference stage DESCRIPTION:On nous parle souvent de clés brevetées, clés incopiables, à reproduction interdite ou encore de... SUMMARY:Clés incopiables : contournements, exceptions et paradoxes ATTACH;FMTTYPE=image/jpeg:https://lehack.org/app/uploads/OIG2-1.jpg URL;VALUE=URI:https://lehack.org/track/cles-incopiables-contournements-exceptions-et-paradoxes/ END:VEVENT BEGIN:VEVENT UID:1341 DTSTAMP:20240520T203750 DTSTART:20240706T190000 DTEND:20240706T194500 LOCATION:Zone 1 - Gaston Berger conference stage DESCRIPTION:Since we were children we wanted to go to the arcade and play for hours... SUMMARY:Insert coin: Hacking arcades for fun ATTACH;FMTTYPE=image/jpeg:https://lehack.org/app/uploads/anselme-de-pertat-compo-v03-1024x576.jpg URL;VALUE=URI:https://lehack.org/track/insert-coin-hacking-arcades-for-fun/ END:VEVENT BEGIN:VEVENT UID:1469 DTSTAMP:20240605T123516 DTSTART:20240706T163000 DTEND:20240706T193000 LOCATION:Zone 3 - OSINT Village - Louis Armand conference stage DESCRIPTION:More information and the rules of engagement on the dedicated page: What are RUMP SESSIONS? SUMMARY:RUMPS Session OSINT et Hacking ATTACH;FMTTYPE=image/jpeg:https://lehack.org/app/uploads/Danger-zone-warning-red-frame-hud-design-Graphics-72053169-1.jpg URL;VALUE=URI:https://lehack.org/track/rumps-session-osint-et-hacking/ END:VEVENT BEGIN:VEVENT UID:1571 DTSTAMP:20240704T144146 DTSTART:20240706T170000 DTEND:20240706T190000 LOCATION:ZONE 2 - WORKSHOP ZONE - level -3 - Salle 3C DESCRIPTION:Join us for an engaging and interactive workshop where we introduce RF Swift, a cutting-edge... SUMMARY:SIGINT made easy with RF Swift ATTACH;FMTTYPE=image/jpeg: URL;VALUE=URI:https://lehack.org/track/sigint-made-easy-with-rf-swift/ END:VEVENT BEGIN:VEVENT UID:1340 DTSTAMP:20240518T150658 DTSTART:20240706T184500 DTEND:20240706T190000 LOCATION:Zone 1 - Gaston Berger conference stage DESCRIPTION: SUMMARY:leBREAK ATTACH;FMTTYPE=image/jpeg:https://lehack.org/app/uploads/Banger-Samples-Trippin-Art-Cover_Up-1024x1024.jpg URL;VALUE=URI:https://lehack.org/track/lebreak-4/ END:VEVENT BEGIN:VEVENT UID:1339 DTSTAMP:20240520T203537 DTSTART:20240706T180000 DTEND:20240706T184500 LOCATION:Zone 1 - Gaston Berger conference stage DESCRIPTION:Reflets.info est un journal qui a été co-fondé par un expert en sécurité informatique et... SUMMARY:OSINT et journalisme ATTACH;FMTTYPE=image/jpeg:https://lehack.org/app/uploads/defining-osint-blog.jpeg URL;VALUE=URI:https://lehack.org/track/osint-et-journalisme/ END:VEVENT BEGIN:VEVENT UID:1563 DTSTAMP:20240701T170409 DTSTART:20240706T150000 DTEND:20240706T180000 LOCATION:ZONE 2 - WORKSHOP ZONE - level -3 - Salle 4D DESCRIPTION:Ce prototype de jeu de plateau a pour vocation de rendre ludique la sensibilisation à... SUMMARY:Serious HAC : serious game pour l'homologation et l'apprentissage de la cybersécurité (run 4) ATTACH;FMTTYPE=image/jpeg: URL;VALUE=URI:https://lehack.org/track/serious-hac-serious-game-pour-lhomologation-et-lapprentissage-de-la-cybersecurite-run-4/ END:VEVENT BEGIN:VEVENT UID:1338 DTSTAMP:20240520T203344 DTSTART:20240706T171500 DTEND:20240706T180000 LOCATION:Zone 1 - Gaston Berger conference stage DESCRIPTION:Après avoir un talk l'année dernière sur quelques techniques de contournement d'EDR (unhooking, direct syscalls),... SUMMARY:Take your revenge on this fucking EDR ATTACH;FMTTYPE=image/jpeg:https://lehack.org/app/uploads/klllaasss779kk1_generated-1024x639.jpg URL;VALUE=URI:https://lehack.org/track/take-your-revenge-on-this-fucking-edr/ END:VEVENT BEGIN:VEVENT UID:1337 DTSTAMP:20240518T150658 DTSTART:20240706T163000 DTEND:20240706T171500 LOCATION:Zone 1 - Gaston Berger conference stage DESCRIPTION:Nous sommes tous plus ou moins paresseux. On utilise désormais des IA pour générer des... SUMMARY:A praise to laziness (or why hackers are awesome people) ! ATTACH;FMTTYPE=image/jpeg:https://lehack.org/app/uploads/image-20161213-1605-14pnete-1024x526.jpg URL;VALUE=URI:https://lehack.org/track/a-praise-to-laziness-or-why-hackers-are-awesome-people/ END:VEVENT BEGIN:VEVENT UID:1336 DTSTAMP:20240518T150658 DTSTART:20240706T161500 DTEND:20240706T163000 LOCATION:Zone 1 - Gaston Berger conference stage DESCRIPTION: SUMMARY:leBREAK ATTACH;FMTTYPE=image/jpeg:https://lehack.org/app/uploads/Banger-Samples-Trippin-Art-Cover_Up-1024x1024.jpg URL;VALUE=URI:https://lehack.org/track/lebreak-3/ END:VEVENT BEGIN:VEVENT UID:1550 DTSTAMP:20240626T135209 DTSTART:20240706T143000 DTEND:20240706T163000 LOCATION:ZONE 2 - WORKSHOP ZONE - level -3 - Salle 3C DESCRIPTION:Vous rêvez d’accéder au code source d’une application pour mieux la comprendre, pour découvrir ses... SUMMARY:Rétro-ingénierie d’un logiciel de drone avec Ghidra (architecture ARM) (session 2) ATTACH;FMTTYPE=image/jpeg: URL;VALUE=URI:https://lehack.org/track/retro-ingenierie-dun-logiciel-de-drone-avec-ghidra-architecture-arm-session-2/ END:VEVENT BEGIN:VEVENT UID:1467 DTSTAMP:20240610T105857 DTSTART:20240706T153000 DTEND:20240706T163000 LOCATION:Zone 3 - OSINT Village - Louis Armand conference stage DESCRIPTION:As we navigate through the rapidly altering landscape of Open-Source Intelligence, Nico will try to... SUMMARY:OSINT field stories and future considerations ATTACH;FMTTYPE=image/jpeg:https://lehack.org/app/uploads/1_baGmLq87rwbz-wvFQP3UWA.jpg URL;VALUE=URI:https://lehack.org/track/osint-field-stories-and-future-considerations/ END:VEVENT BEGIN:VEVENT UID:1335 DTSTAMP:20240520T203132 DTSTART:20240706T153000 DTEND:20240706T161500 LOCATION:Zone 1 - Gaston Berger conference stage DESCRIPTION:As cellular technologies continue to become more integrated into IoT devices, there has been a... SUMMARY:Exploration of Cellular Based IoT Technology ATTACH;FMTTYPE=image/jpeg:https://lehack.org/app/uploads/CELLULAR-IOT-1024x576.jpg URL;VALUE=URI:https://lehack.org/track/exploration-of-cellular-based-iot-technology/ END:VEVENT BEGIN:VEVENT UID:1334 DTSTAMP:20240531T213310 DTSTART:20240706T144500 DTEND:20240706T153000 LOCATION:Zone 1 - Gaston Berger conference stage DESCRIPTION:Durant cette conférence, nous explorerons les faiblesses des systèmes de satellites et les méthodes pour... SUMMARY:Hacking Satellites: From SDR to RCE. ATTACH;FMTTYPE=image/jpeg:https://lehack.org/app/uploads/spaceship-orbits-planet-surveilling-alien-discovery-outer-space-generated-by-ai-1536x878-1-1024x585.webp URL;VALUE=URI:https://lehack.org/track/hacking-satellites-from-sdr-to-rce/ END:VEVENT BEGIN:VEVENT UID:1465 DTSTAMP:20240610T105811 DTSTART:20240706T143000 DTEND:20240706T153000 LOCATION:Zone 3 - OSINT Village - Louis Armand conference stage DESCRIPTION:This presentation will introduce the world of bulletproof hosting and Intelligence Agencies Hosting (IAH) and... SUMMARY:Intelligence Agencies Hosting: When Threat Intelligence and OSINT lead to delightful discoveries ATTACH;FMTTYPE=image/jpeg:https://lehack.org/app/uploads/desktop-wallpaper-fonds-dcran-data-center-tous-les-data.jpg URL;VALUE=URI:https://lehack.org/track/intelligence-agencies-hosting-when-threat-intelligence-and-osint-lead-to-delightful-discoveries/ END:VEVENT BEGIN:VEVENT UID:1333 DTSTAMP:20240520T202734 DTSTART:20240706T140000 DTEND:20240706T144500 LOCATION:Zone 1 - Gaston Berger conference stage DESCRIPTION:Aaaaah l'infosec... Ce milieu truffé de codes, d’histoire, de choses à savoir, d'opportunités et de... SUMMARY:Trouver sa place dans l'infosec ATTACH;FMTTYPE=image/jpeg:https://lehack.org/app/uploads/e599c980-86d1-11eb-ac6d-269416f3b637-1024x433.webp URL;VALUE=URI:https://lehack.org/track/trouver-sa-place-dans-linfosec/ END:VEVENT BEGIN:VEVENT UID:1462 DTSTAMP:20240610T105647 DTSTART:20240706T133000 DTEND:20240706T143000 LOCATION:Zone 3 - OSINT Village - Louis Armand conference stage DESCRIPTION:Can an ambiguity in a popular file format be used to geolocate customers of a... SUMMARY:Fingerprinting at the Frontier: How Edge Cases and Ambiguities can help Attribute Digital Attacks ATTACH;FMTTYPE=image/jpeg:https://lehack.org/app/uploads/IP_Sniffing.jpg URL;VALUE=URI:https://lehack.org/track/fingerprinting-at-the-frontier-how-edge-cases-and-ambiguities-can-help-attribute-digital-attacks/ END:VEVENT BEGIN:VEVENT UID:1332 DTSTAMP:20240518T150658 DTSTART:20240706T123000 DTEND:20240706T140000 LOCATION:Zone 1 - Gaston Berger conference stage DESCRIPTION: SUMMARY:leLUNCH ATTACH;FMTTYPE=image/jpeg:https://lehack.org/app/uploads/lunch.jpg URL;VALUE=URI:https://lehack.org/track/lelunch-2/ END:VEVENT BEGIN:VEVENT UID:1535 DTSTAMP:20240612T082842 DTSTART:20240706T120000 DTEND:20240706T133000 LOCATION: DESCRIPTION: SUMMARY:Lunch Time! ATTACH;FMTTYPE=image/jpeg:https://lehack.org/app/uploads/lunch.jpg URL;VALUE=URI:https://lehack.org/track/lunch-time-again/ END:VEVENT BEGIN:VEVENT UID:1562 DTSTAMP:20240701T170402 DTSTART:20240706T103000 DTEND:20240706T130000 LOCATION:ZONE 2 - WORKSHOP ZONE - level -3 - Salle 4D DESCRIPTION:Ce prototype de jeu de plateau a pour vocation de rendre ludique la sensibilisation à... SUMMARY:Serious HAC : serious game pour l'homologation et l'apprentissage de la cybersécurité (run 3) ATTACH;FMTTYPE=image/jpeg: URL;VALUE=URI:https://lehack.org/track/serious-hac-serious-game-pour-lhomologation-et-lapprentissage-de-la-cybersecurite-run-3/ END:VEVENT BEGIN:VEVENT UID:1554 DTSTAMP:20240702T133121 DTSTART:20240706T103000 DTEND:20240706T123000 LOCATION:ZONE 2 - WORKSHOP ZONE - level -3 - Salle 2B DESCRIPTION:Venez l'espace de quelques heures vous mettre dans la peau d'un hacker et laissez vous... SUMMARY:Capture The Flag d'un drone miniature (session 2) ATTACH;FMTTYPE=image/jpeg: URL;VALUE=URI:https://lehack.org/track/capture-the-flag-dun-drone-miniature-session-2/ END:VEVENT BEGIN:VEVENT UID:1331 DTSTAMP:20240520T202522 DTSTART:20240706T114500 DTEND:20240706T123000 LOCATION:Zone 1 - Gaston Berger conference stage DESCRIPTION:Au cours de ce talk nous explorerons en détail l'usage de LLMs dans le cadre... SUMMARY:Enhancing Training and Pentesting tasks with LLMs: what can and can’t be done ATTACH;FMTTYPE=image/jpeg:https://lehack.org/app/uploads/1-_IJ3lTKXlru7f0VbtBSe1A-1024x585.webp URL;VALUE=URI:https://lehack.org/track/enhancing-training-and-pentesting-tasks-with-llms-what-can-and-cant-be-done/ END:VEVENT BEGIN:VEVENT UID:1525 DTSTAMP:20240610T111539 DTSTART:20240706T110000 DTEND:20240706T120000 LOCATION:Zone 3 - OSINT Village - Louis Armand conference stage DESCRIPTION:Have you ever wanted to find out where a photo posted online was taken? In... SUMMARY:No Metadata No Problem, Predicting photo locations from pixels using AI ATTACH;FMTTYPE=image/jpeg:https://lehack.org/app/uploads/1_TUXT_umpWBUH5kZYselQmg-1024x576.jpg URL;VALUE=URI:https://lehack.org/track/no-metadata-no-problem-predicting-photo-locations-from-pixels-using-ai/ END:VEVENT BEGIN:VEVENT UID:1330 DTSTAMP:20240518T150658 DTSTART:20240706T113000 DTEND:20240706T114500 LOCATION:Zone 1 - Gaston Berger conference stage DESCRIPTION: SUMMARY:leBREAK ATTACH;FMTTYPE=image/jpeg:https://lehack.org/app/uploads/Banger-Samples-Trippin-Art-Cover_Up-1024x1024.jpg URL;VALUE=URI:https://lehack.org/track/lebreak-2/ END:VEVENT BEGIN:VEVENT UID:1329 DTSTAMP:20240520T202334 DTSTART:20240706T104500 DTEND:20240706T113000 LOCATION:Zone 1 - Gaston Berger conference stage DESCRIPTION:This talk is an attempt to reconstruct the technical approach that hacktivists might take to... SUMMARY:Be better than the hacktivist: Structure a campagne of Bruteforce on OT equipment in the internet ATTACH;FMTTYPE=image/jpeg:https://lehack.org/app/uploads/1-V6GGUY98NV7yFsIL-AHSjg-1024x576.webp URL;VALUE=URI:https://lehack.org/track/be-better-than-the-hacktivist-structure-a-campagne-of-bruteforce-on-ot-equipment-in-the-internet/ END:VEVENT BEGIN:VEVENT UID:1524 DTSTAMP:20240610T111308 DTSTART:20240706T100000 DTEND:20240706T110000 LOCATION:Zone 3 - OSINT Village - Louis Armand conference stage DESCRIPTION:Web scraping is gaining momentum, particularly with the advent of Large Language Models (LLMs). Access... SUMMARY:Cracking the Code: Decoding Anti-Bot Systems! ATTACH;FMTTYPE=image/jpeg:https://lehack.org/app/uploads/gpt-scraper-chatgpt-access-internet-4-1024x503.jpg URL;VALUE=URI:https://lehack.org/track/cracking-the-code-decoding-anti-bot-systems/ END:VEVENT BEGIN:VEVENT UID:1328 DTSTAMP:20240520T202155 DTSTART:20240706T100000 DTEND:20240706T104500 LOCATION:Zone 1 - Gaston Berger conference stage DESCRIPTION:With the evolution of attack surfaces, attacker skills, zero-day exploits and supply chain attacks, it... SUMMARY:The Red and the Blue: a tale of stealth and detection ATTACH;FMTTYPE=image/jpeg:https://lehack.org/app/uploads/1-XnAD5RcZPpgr8_VhJRd1cw.jpg URL;VALUE=URI:https://lehack.org/track/the-red-and-the-blue-a-tale-of-stealth-and-detection/ END:VEVENT BEGIN:VEVENT UID:1499 DTSTAMP:20240628T084124 DTSTART:20240705T100000 DTEND:20240705T200000 LOCATION:Zone 2 - Workshop Rooms DESCRIPTION:Serrurier et collectionneur ,chercheur et grand découvreur de ces petits détails qui font la différence, Jean-christophe vous enjoint à observer en taille réelle les quelques trouvailles, réalisations et improbables Mécaniques sorties du cerveau humain aux seules fins de "hacker" les serrures du quotidien censées nous isoler en une révolution de clef. SUMMARY:RE-TOUR DE CLEFS - L’EXPO ATTACH;FMTTYPE=image/jpeg:https://lehack.org/app/uploads/unnamed.jpg URL;VALUE=URI:https://lehack.org/track/re-tour-de-clefs-lexpo/ END:VEVENT BEGIN:VEVENT UID:1327 DTSTAMP:20240520T202023 DTSTART:20240705T184500 DTEND:20240705T193000 LOCATION:Zone 1 - Gaston Berger conference stage DESCRIPTION:A.I. may be seen as a cost-effective way to replace workers. We will look closer... SUMMARY:S.E. with A.I. & Defending against it with H.I. ATTACH;FMTTYPE=image/jpeg:https://lehack.org/app/uploads/Blog-19-Network-Analysis-Intrusion-Detectionblog-1.webp URL;VALUE=URI:https://lehack.org/track/s-e-with-a-i-defending-against-it-with-h-i/ END:VEVENT BEGIN:VEVENT UID:1326 DTSTAMP:20240520T201558 DTSTART:20240705T180000 DTEND:20240705T184500 LOCATION:Zone 1 - Gaston Berger conference stage DESCRIPTION:Docker est aujourd'hui un outil de conteneurisation incontournable, largement adopté dans le développement logiciel. Cette... SUMMARY:Supply Chain Attack : Le cas du Registre Privé Docker ATTACH;FMTTYPE=image/jpeg:https://lehack.org/app/uploads/Docker_header-1024x576.webp URL;VALUE=URI:https://lehack.org/track/supply-chain-attack-le-cas-du-registre-prive-docker/ END:VEVENT BEGIN:VEVENT UID:1325 DTSTAMP:20240518T150658 DTSTART:20240705T171500 DTEND:20240705T180000 LOCATION:Zone 1 - Gaston Berger conference stage DESCRIPTION:BEAM (Bogdan/Björn's Erlang Abstract Machine) is a virtual machine designed by Ericsson used to run... SUMMARY:Prism, a light BEAM disassembler ATTACH;FMTTYPE=image/jpeg:https://lehack.org/app/uploads/Screenshot-2024-05-18-161817-1024x628.png URL;VALUE=URI:https://lehack.org/track/prism-a-light-beam-disassembler/ END:VEVENT BEGIN:VEVENT UID:1559 DTSTAMP:20240701T170355 DTSTART:20240705T150000 DTEND:20240705T180000 LOCATION:ZONE 2 - WORKSHOP ZONE - level -3 - Salle 4D DESCRIPTION:Ce prototype de jeu de plateau a pour vocation de rendre ludique la sensibilisation à... SUMMARY:Serious HAC : serious game pour l'homologation et l'apprentissage de la cybersécurité (run 2) ATTACH;FMTTYPE=image/jpeg: URL;VALUE=URI:https://lehack.org/track/serious-hac-serious-game-pour-lhomologation-et-lapprentissage-de-la-cybersecurite-run-2/ END:VEVENT BEGIN:VEVENT UID:1324 DTSTAMP:20240520T201246 DTSTART:20240705T163000 DTEND:20240705T171500 LOCATION:Zone 1 - Gaston Berger conference stage DESCRIPTION:“There are two ways to be fooled. One is to believe what isn’t true; the... SUMMARY:The Metawar Thesis: How To Adapt to and Coexist with the Technologies We Have Created ATTACH;FMTTYPE=image/jpeg:https://lehack.org/app/uploads/pexels-cottonbro-studio-8721339-scaled-1-1024x683.jpg URL;VALUE=URI:https://lehack.org/track/the-metawar-thesis-how-to-adapt-to-and-coexist-with-the-technologies-we-have-created/ END:VEVENT BEGIN:VEVENT UID:1323 DTSTAMP:20240518T150657 DTSTART:20240705T161500 DTEND:20240705T163000 LOCATION:Zone 1 - Gaston Berger conference stage DESCRIPTION: SUMMARY:leBREAK ATTACH;FMTTYPE=image/jpeg:https://lehack.org/app/uploads/Banger-Samples-Trippin-Art-Cover_Up-1024x1024.jpg URL;VALUE=URI:https://lehack.org/track/lebreak/ END:VEVENT BEGIN:VEVENT UID:1549 DTSTAMP:20240702T125843 DTSTART:20240705T143000 DTEND:20240705T163000 LOCATION:ZONE 2 - WORKSHOP ZONE - level -3 - Salle 2B DESCRIPTION:Vous rêvez d’accéder au code source d’une application pour mieux la comprendre, pour découvrir ses... SUMMARY:Rétro-ingénierie d’un logiciel de drone avec Ghidra (architecture ARM) (session 1) ATTACH;FMTTYPE=image/jpeg: URL;VALUE=URI:https://lehack.org/track/retro-ingenierie-dun-logiciel-de-drone-avec-ghidra-architecture-arm-session-1/ END:VEVENT BEGIN:VEVENT UID:1522 DTSTAMP:20240610T111010 DTSTART:20240705T153000 DTEND:20240705T163000 LOCATION:Zone 3 - OSINT Village - Louis Armand conference stage DESCRIPTION:Exploring the world of compromised IOS XE devices. On the 16th October 2023 Cisco Talos... SUMMARY:The XE-Files: Trust No Router ATTACH;FMTTYPE=image/jpeg:https://lehack.org/app/uploads/feature_image_cisc0-1024x674.webp URL;VALUE=URI:https://lehack.org/track/the-xe-files-trust-no-router/ END:VEVENT BEGIN:VEVENT UID:1322 DTSTAMP:20240606T143132 DTSTART:20240705T153000 DTEND:20240705T161500 LOCATION:Zone 1 - Gaston Berger conference stage DESCRIPTION:Aujourd'hui, l'intrusion physique est devenue un sujet de plus en plus abordé dans le domaine... SUMMARY:Physical intrusion: Defeating On-Site Security ATTACH;FMTTYPE=image/jpeg:https://lehack.org/app/uploads/OIG2.jpg URL;VALUE=URI:https://lehack.org/track/physical-intrusion-defeating-on-site-security/ END:VEVENT BEGIN:VEVENT UID:1520 DTSTAMP:20240610T111048 DTSTART:20240705T143000 DTEND:20240705T153000 LOCATION:Zone 3 - OSINT Village - Louis Armand conference stage DESCRIPTION:In an era where technology is reshaping the way we engage with information, the relationship... SUMMARY:Telling the big stories with a bit of help from AI ATTACH;FMTTYPE=image/jpeg:https://lehack.org/app/uploads/23q2_12b-1024x576.jpg URL;VALUE=URI:https://lehack.org/track/telling-the-big-stories-with-a-bit-of-help-from-ai/ END:VEVENT BEGIN:VEVENT UID:1321 DTSTAMP:20240520T200441 DTSTART:20240705T144500 DTEND:20240705T153000 LOCATION:Zone 1 - Gaston Berger conference stage DESCRIPTION:Locks, whether mechanical, electro-mechanical, or electronic, are complicated and are designed to protect people, assets,... SUMMARY:Lock designs and security vulnerabilities: What can go wrong ATTACH;FMTTYPE=image/jpeg:https://lehack.org/app/uploads/OIG1.jpg URL;VALUE=URI:https://lehack.org/track/lock-designs-and-security-vulnerabilities-what-can-go-wrong/ END:VEVENT BEGIN:VEVENT UID:1320 DTSTAMP:20240606T143500 DTSTART:20240705T140000 DTEND:20240705T144500 LOCATION:Zone 1 - Gaston Berger conference stage DESCRIPTION:Depuis fin 2022, l'équipe forensics du CSIRT INQUEST analyse des attaques informatiques sur des entreprises... SUMMARY:Découverte du groupe APT-C36 sur les réseaux d'une profession libérale réglementée ATTACH;FMTTYPE=image/jpeg:https://lehack.org/app/uploads/apt36_cyberespionage_target_india_malvertising-1024x570-1.png URL;VALUE=URI:https://lehack.org/track/decouverte-du-groupe-apt-c36-sur-les-reseaux-dune-profession-liberale-reglementee/ END:VEVENT BEGIN:VEVENT UID:1518 DTSTAMP:20240610T111037 DTSTART:20240705T133000 DTEND:20240705T143000 LOCATION:Zone 3 - OSINT Village - Louis Armand conference stage DESCRIPTION:In light of recent political developments, the topic of tracing arms flows has gained significant... SUMMARY:Where do the guns go? Mapping Arms Flows with OSINT: Opportunities and Challenges ATTACH;FMTTYPE=image/jpeg:https://lehack.org/app/uploads/1280-google-arms-trade-32-1024x576.jpg URL;VALUE=URI:https://lehack.org/track/where-do-the-guns-go-mapping-arms-flows-with-osint-opportunities-and-challenges/ END:VEVENT BEGIN:VEVENT UID:1319 DTSTAMP:20240518T150657 DTSTART:20240705T124500 DTEND:20240705T140000 LOCATION:Zone 1 - Gaston Berger conference stage DESCRIPTION: SUMMARY:leLUNCH ATTACH;FMTTYPE=image/jpeg:https://lehack.org/app/uploads/lunch.jpg URL;VALUE=URI:https://lehack.org/track/lelunch/ END:VEVENT BEGIN:VEVENT UID:1461 DTSTAMP:20240605T103437 DTSTART:20240705T120000 DTEND:20240705T133000 LOCATION: DESCRIPTION: SUMMARY:Lunch Time! ATTACH;FMTTYPE=image/jpeg:https://lehack.org/app/uploads/lunch.jpg URL;VALUE=URI:https://lehack.org/track/lunch-time/ END:VEVENT BEGIN:VEVENT UID:1558 DTSTAMP:20240701T170348 DTSTART:20240705T103000 DTEND:20240705T130000 LOCATION:ZONE 2 - WORKSHOP ZONE - level -3 - Salle 4D DESCRIPTION:Ce prototype de jeu de plateau a pour vocation de rendre ludique la sensibilisation à... SUMMARY:Serious HAC : serious game pour l'homologation et l'apprentissage de la cybersécurité (run 1) ATTACH;FMTTYPE=image/jpeg: URL;VALUE=URI:https://lehack.org/track/serious-hac-serious-game-pour-lhomologation-et-lapprentissage-de-la-cybersecurite-run-1/ END:VEVENT BEGIN:VEVENT UID:1552 DTSTAMP:20240702T125806 DTSTART:20240705T103000 DTEND:20240705T123000 LOCATION:ZONE 2 - WORKSHOP ZONE - level -3 - Salle 2B DESCRIPTION:Venez l'espace de quelques heures vous mettre dans la peau d'un hacker et laissez vous... SUMMARY:Capture The Flag d'un drone miniature (session 1) ATTACH;FMTTYPE=image/jpeg: URL;VALUE=URI:https://lehack.org/track/capture-the-flag-dun-drone-miniature-session-1/ END:VEVENT BEGIN:VEVENT UID:1318 DTSTAMP:20240518T150657 DTSTART:20240705T114500 DTEND:20240705T123000 LOCATION:Zone 1 - Gaston Berger conference stage DESCRIPTION:Malware continues to increase in prevalence and sophistication. VirusTotal reported a daily submission of 2M+... SUMMARY:AI for Cybersecurity: Applying Machine Learning to Enhance Malware Analysis ATTACH;FMTTYPE=image/jpeg:https://lehack.org/app/uploads/OIG31.jpg URL;VALUE=URI:https://lehack.org/track/ai-for-cybersecurity-applying-machine-learning-to-enhance-malware-analysis/ END:VEVENT BEGIN:VEVENT UID:1459 DTSTAMP:20240605T103437 DTSTART:20240705T110000 DTEND:20240705T120000 LOCATION:Zone 3 - OSINT Village - Louis Armand conference stage DESCRIPTION:For 15 years, investigation on plane crashs has accelerated thanks to collective intelligence and open... SUMMARY:Open source analysis in plane crashs ATTACH;FMTTYPE=image/jpeg:https://lehack.org/app/uploads/image-2-1024x576.png URL;VALUE=URI:https://lehack.org/track/open-source-analysis-in-plane-crashs/ END:VEVENT BEGIN:VEVENT UID:1317 DTSTAMP:20240520T195933 DTSTART:20240705T110000 DTEND:20240705T114500 LOCATION:Zone 1 - Gaston Berger conference stage DESCRIPTION:Openly neurodivergent and navigating a matrix of other personal challenges, K Melton's journey not only... SUMMARY:Phishing for Potential: The "RTFM" Guide to Hacking Your Brain-frame ATTACH;FMTTYPE=image/jpeg:https://lehack.org/app/uploads/original_jEuUBZW5kPbDpGPbWr6H7TwZ7QG-1024x614.webp URL;VALUE=URI:https://lehack.org/track/phishing-for-potential-the-rtfm-guide-to-hacking-your-brain-frame/ END:VEVENT BEGIN:VEVENT UID:1456 DTSTAMP:20240605T103437 DTSTART:20240705T100000 DTEND:20240705T110000 LOCATION:Zone 3 - OSINT Village - Louis Armand conference stage DESCRIPTION:Disinformation has flooded social networks. Once posted, it is sometimes too late to react. Investigating... SUMMARY:Disinformation as Infrastructure ATTACH;FMTTYPE=image/jpeg:https://lehack.org/app/uploads/6800fb_2_disinfo_fact-checking_globeandmail_article.jpg URL;VALUE=URI:https://lehack.org/track/disinformation-as-infrastructure/ END:VEVENT BEGIN:VEVENT UID:1316 DTSTAMP:20240520T195623 DTSTART:20240705T101500 DTEND:20240705T110000 LOCATION:Zone 1 - Gaston Berger conference stage DESCRIPTION:Have you ever wanted a network device that's small enough to fit in your pocket... SUMMARY:Sending network boxes to the edge of the world for fun but mostly profit ATTACH;FMTTYPE=image/jpeg:https://lehack.org/app/uploads/perform-network-based-attacks-with-sbc-implant.1280x600-1024x480.jpg URL;VALUE=URI:https://lehack.org/track/sending-network-boxes-to-the-edge-of-the-world-for-fun-but-mostly-profit/ END:VEVENT BEGIN:VEVENT UID:1315 DTSTAMP:20240518T151307 DTSTART:20240705T100000 DTEND:20240705T101500 LOCATION:Zone 1 - Gaston Berger conference stage DESCRIPTION:leHACK is 20 years old. We made a full temporal loop: a full revolution. Future... SUMMARY:REVOLUTION!!! ATTACH;FMTTYPE=image/jpeg:https://lehack.org/app/uploads/square@2x-1024x1021.png URL;VALUE=URI:https://lehack.org/track/revolution/ END:VEVENT END:VCALENDAR