BEGIN:VCALENDAR VERSION:2.0 PRODID:-//leHACK//NONSGML Events//EN BEGIN:VEVENT UID:2083 DTSTAMP:20250628T071815 DTSTART:20250629T020000 DTEND:20250629T040000 LOCATION:Zone 2 - Workshop Room 4 DESCRIPTION:This hands-on workshop will guide participants through the process of reverse engineering and modifying Android... SUMMARY:Apkpatcher: Reverse Engineering and Modifying Android Applications Without Rooting ATTACH;FMTTYPE=image/jpeg: URL;VALUE=URI:https://lehack.org/track/apkpatcher-reverse-engineering-and-modifying-android-applications-without-rooting-2/ END:VEVENT BEGIN:VEVENT UID:2021 DTSTAMP:20250628T071815 DTSTART:20250629T020000 DTEND:20250629T040000 LOCATION:Zone 2 - Workshop Rooms DESCRIPTION:--Let me show you how to detect phishing/scam campaigns by analyzing OSINT data and using... SUMMARY:Phishing detection and investigation with OSINT feeds and free softwares. ATTACH;FMTTYPE=image/jpeg: URL;VALUE=URI:https://lehack.org/track/using-osint-to-detect-and-track-phishing-campaigns/ END:VEVENT BEGIN:VEVENT UID:1948 DTSTAMP:20250628T071814 DTSTART:20250629T030000 DTEND:20250629T040000 LOCATION:Zone 2 - Worshop Room 3 DESCRIPTION:The goal of this workshop is to put ourselves in the shoes of a bug... SUMMARY:Insecure time-based secret in web applications and Sandwich attack exploitation ATTACH;FMTTYPE=image/jpeg: URL;VALUE=URI:https://lehack.org/track/insecure-time-based-secret-in-web-applications-and-sandwich-attack-exploitation/ END:VEVENT BEGIN:VEVENT UID:1947 DTSTAMP:20250628T071814 DTSTART:20250629T030000 DTEND:20250629T035500 LOCATION:Zone 2 - Worshop Room 2 DESCRIPTION:Equip participants with the skills to identify and exploit vulnerabilities in AWS cloud environments, ensuring... SUMMARY:Pentesting AWS Cloud Environments ATTACH;FMTTYPE=image/jpeg: URL;VALUE=URI:https://lehack.org/track/pentesting-aws-cloud-environments/ END:VEVENT BEGIN:VEVENT UID:1944 DTSTAMP:20250628T071815 DTSTART:20250629T010000 DTEND:20250629T025500 LOCATION:Zone 2 - Worshop Room 2 DESCRIPTION:Ever wondered how to gain root access to a device via hardware ? Why not... SUMMARY:Hardware Hacking : getting a root shell via UART ATTACH;FMTTYPE=image/jpeg: URL;VALUE=URI:https://lehack.org/track/hardware-hacking-getting-a-root-shell-via-uart/ END:VEVENT BEGIN:VEVENT UID:2022 DTSTAMP:20250628T071815 DTSTART:20250629T000500 DTEND:20250629T020000 LOCATION:Zone 2 - Workshop Rooms DESCRIPTION:This workshop introduces the fundamentals of investigating how cryptocurrency moves across wallets, smart-contracts, bridges, and... SUMMARY:Tracing Crypto and Understanding Context in a Decentralized World ATTACH;FMTTYPE=image/jpeg: URL;VALUE=URI:https://lehack.org/track/tracing-crypto-and-understanding-context-in-a-decentralized-world/ END:VEVENT BEGIN:VEVENT UID:1938 DTSTAMP:20250628T071815 DTSTART:20250628T230000 DTEND:20250629T015500 LOCATION:Zone 2 - Worshop Room 4 DESCRIPTION:Ce workshop propose une découverte de la classification de malware, en partant des bases pour... SUMMARY:Initiation à la classification de malware ATTACH;FMTTYPE=image/jpeg: URL;VALUE=URI:https://lehack.org/track/initiation-a-la-classification-de-malware/ END:VEVENT BEGIN:VEVENT UID:2043 DTSTAMP:20250628T120616 DTSTART:20250628T140000 DTEND:20250629T010000 LOCATION:Zone 2 - S3 DESCRIPTION:The mission of the Red Team Alliance is to advance the discipline of security by... SUMMARY:Lockpicking- Red Team Alliance ATTACH;FMTTYPE=image/jpeg: URL;VALUE=URI:https://lehack.org/track/lockpicking-red-team-alliance/ END:VEVENT BEGIN:VEVENT UID:2023 DTSTAMP:20250628T081953 DTSTART:20250628T210000 DTEND:20250628T235500 LOCATION:Zone 2 - Workshop Rooms DESCRIPTION:Join us for a thrilling workshop where you’ll learn the basics of Windows malware analysis,... SUMMARY:OSINT 101: an introduction to Windows malware analysis and OSINT ATTACH;FMTTYPE=image/jpeg: URL;VALUE=URI:https://lehack.org/track/re-osint-101-an-introduction-to-windows-malware-analysis-and-osint/ END:VEVENT BEGIN:VEVENT UID:1943 DTSTAMP:20250628T071815 DTSTART:20250628T210000 DTEND:20250628T235500 LOCATION:Zone 2 - Workshop Room 2 DESCRIPTION:In this workshop, we will show you how to take advantage of NetExec to efficiently... SUMMARY:Active Directory pwnage with NetExec ATTACH;FMTTYPE=image/jpeg: URL;VALUE=URI:https://lehack.org/track/active-directory-pwnage-with-netexec/ END:VEVENT BEGIN:VEVENT UID:1939 DTSTAMP:20250628T071814 DTSTART:20250628T210000 DTEND:20250628T235500 LOCATION:Zone 2 - Worshop Room 3 DESCRIPTION:Originally developed by MIT, Kerberos is widely used in Microsoft Active Directory environments. Therefore, this... SUMMARY:Breaking into Hades' realm: an advanced Kerberos exploitation ATTACH;FMTTYPE=image/jpeg: URL;VALUE=URI:https://lehack.org/track/breaking-into-hades-realm-an-advanced-kerberos-exploitation/ END:VEVENT BEGIN:VEVENT UID:1945 DTSTAMP:20250628T071815 DTSTART:20250628T210000 DTEND:20250628T230000 LOCATION:Zone 2 - Worshop Room 4 DESCRIPTION:Ce Workshop s'articulera sur les explications et l'utilisations de plusieurs librairies qui permette de s'interfacez... SUMMARY:Network protocol abuse: driving ICS equipent mad. ATTACH;FMTTYPE=image/jpeg: URL;VALUE=URI:https://lehack.org/track/network-protocol-abuse-driving-ics-equipent-mad/ END:VEVENT BEGIN:VEVENT UID:2086 DTSTAMP:20250628T105720 DTSTART:20250628T173000 DTEND:20250628T193000 LOCATION:Zone 3 - Salle Louis Armand DESCRIPTION:RUMPS SESSION SUMMARY:RUMPS ATTACH;FMTTYPE=image/jpeg: URL;VALUE=URI:https://lehack.org/track/rumps/ END:VEVENT BEGIN:VEVENT UID:1891 DTSTAMP:20250521T182636 DTSTART:20250628T184500 DTEND:20250628T190000 LOCATION:Zone 1 - Gaston Berger conference stage DESCRIPTION: SUMMARY:leBREAK ATTACH;FMTTYPE=image/jpeg:https://lehack.org/app/uploads/Banger-Samples-Trippin-Art-Cover_Up-1024x1024.jpg URL;VALUE=URI:https://lehack.org/track/lebreak-copy-4/ END:VEVENT BEGIN:VEVENT UID:2076 DTSTAMP:20250627T131226 DTSTART:20250628T163000 DTEND:20250628T183000 LOCATION:Zone 3 - Louis Armand Conference Room DESCRIPTION:As OSINT investigative journalists, we sometimes need to combine open-source techniques with on-the-ground reporting to... SUMMARY:Russian Embargo: How to Circumvent Sanctions ATTACH;FMTTYPE=image/jpeg: URL;VALUE=URI:https://lehack.org/track/russian-embargo-how-to-circumvent-sanctions/ END:VEVENT BEGIN:VEVENT UID:2055 DTSTAMP:20250624T092615 DTSTART:20250628T100000 DTEND:20250628T180000 LOCATION:Cité des sciences - Main Entrance - Outdoor Parvis Nord DESCRIPTION:Car hacking (June 27 et June 28 th- 10:00 / 18:00) @RatZillaS will animate a... SUMMARY:CAR HACKING s2 ATTACH;FMTTYPE=image/jpeg:https://lehack.org/app/uploads/062422-121422-683x1024.jpg URL;VALUE=URI:https://lehack.org/track/car-hacking-2/ END:VEVENT BEGIN:VEVENT UID:2000 DTSTAMP:20250619T160214 DTSTART:20250628T153000 DTEND:20250628T163000 LOCATION:Zone 3 - Louis Armand Conference Room DESCRIPTION:Criminals want to own their villa on french riviera or their apartment in Dubai. No... SUMMARY:OSINT & KLEPTOCRATS ATTACH;FMTTYPE=image/jpeg: URL;VALUE=URI:https://lehack.org/track/osint-kleptocrats/ END:VEVENT BEGIN:VEVENT UID:1890 DTSTAMP:20250521T182635 DTSTART:20250628T161500 DTEND:20250628T163000 LOCATION:Zone 1 - Gaston Berger conference stage DESCRIPTION: SUMMARY:leBREAK ATTACH;FMTTYPE=image/jpeg:https://lehack.org/app/uploads/Banger-Samples-Trippin-Art-Cover_Up-1024x1024.jpg URL;VALUE=URI:https://lehack.org/track/lebreak-copy-3/ END:VEVENT BEGIN:VEVENT UID:2001 DTSTAMP:20250622T141834 DTSTART:20250628T143000 DTEND:20250628T153000 LOCATION:Zone 3 - Louis Armand Conference Room DESCRIPTION:This talk discusses web scraping techniques for the Chinese internet, covering sources like social media... SUMMARY:Scraping the Chinese Internet: Challenges, opportunities and approaches ATTACH;FMTTYPE=image/jpeg: URL;VALUE=URI:https://lehack.org/track/scraping-the-chinese-internet-challenges-opportunities-and-approaches/ END:VEVENT BEGIN:VEVENT UID:2002 DTSTAMP:20250619T155646 DTSTART:20250628T133000 DTEND:20250628T143000 LOCATION:Zone 3 - Louis Armand Conference Room DESCRIPTION:Bread & butter of defence OSINT, OSINT goes to war in the Black Sea, the... SUMMARY:OSINT Goes To War ATTACH;FMTTYPE=image/jpeg: URL;VALUE=URI:https://lehack.org/track/osint-goes-to-war/ END:VEVENT BEGIN:VEVENT UID:2003 DTSTAMP:20250619T160443 DTSTART:20250628T110000 DTEND:20250628T120000 LOCATION:Zone 3 - Louis Armand Conference Room DESCRIPTION:The Federal intelligence service says in its annual report around 20% of Russian diplomats in... SUMMARY:Red Alert in Geneva ATTACH;FMTTYPE=image/jpeg: URL;VALUE=URI:https://lehack.org/track/red-alert-in-geneva/ END:VEVENT BEGIN:VEVENT UID:1886 DTSTAMP:20250521T182635 DTSTART:20250628T113000 DTEND:20250628T114500 LOCATION:Zone 1 - Gaston Berger conference stage DESCRIPTION: SUMMARY:leBREAK ATTACH;FMTTYPE=image/jpeg:https://lehack.org/app/uploads/Banger-Samples-Trippin-Art-Cover_Up-1024x1024.jpg URL;VALUE=URI:https://lehack.org/track/lebreak-copy-2/ END:VEVENT BEGIN:VEVENT UID:2004 DTSTAMP:20250619T160852 DTSTART:20250628T100000 DTEND:20250628T110000 LOCATION:Zone 3 - Louis Armand Conference Room DESCRIPTION:Since the disappearance of Yevgeny Prigozhin in August 2023, the future of the Wagner PMC's... SUMMARY:“AI-Freak”: An Informational Modus Operandi ATTACH;FMTTYPE=image/jpeg: URL;VALUE=URI:https://lehack.org/track/ai-freak-an-informational-modus-operandi/ END:VEVENT BEGIN:VEVENT UID:1973 DTSTAMP:20250618T162108 DTSTART:20250627T000000 DTEND:20250628T000000 LOCATION:Confessionnal mobile DESCRIPTION:Le Confessionnal ZATAZ est un espace anonymisé proposé lors d'événements comme la NdH, leHack ou... SUMMARY:Confessionnal ZATAZ ATTACH;FMTTYPE=image/jpeg: URL;VALUE=URI:https://lehack.org/track/confessionnal-zataz/ END:VEVENT BEGIN:VEVENT UID:1851 DTSTAMP:20250625T085818 DTSTART:20250628T153000 DTEND:20250628T000000 LOCATION:Zone 1 - Gaston Berger conference stage DESCRIPTION:French company GiFi sold in 2024 and early 2025 a cheap smartwatch under its Homday... SUMMARY:Fun with watches: hacking a 12€ smartwatch with Bluetooth Low Energy and 3 wires ATTACH;FMTTYPE=image/jpeg:https://lehack.org/app/uploads/630391_F5.png URL;VALUE=URI:https://lehack.org/track/fun-with-watches-hacking-a-12e-smartwatch-with-bluetooth-low-energy-and-3-wires/ END:VEVENT BEGIN:VEVENT UID:2005 DTSTAMP:20250619T154928 DTSTART:20250627T170000 DTEND:20250627T210000 LOCATION:Zone 3 - Louis Armand Conference Room DESCRIPTION:We'll be running Tracelabs Search Party CTF live in Paris during leHACK! The event will... SUMMARY:Tracelabs Search Party CTF IRL ATTACH;FMTTYPE=image/jpeg: URL;VALUE=URI:https://lehack.org/track/tracelabs-search-party-ctf-irl/ END:VEVENT BEGIN:VEVENT UID:1853 DTSTAMP:20250620T150014 DTSTART:20250627T184500 DTEND:20250627T193000 LOCATION:Zone 1 - Gaston Berger conference stage DESCRIPTION:"Hear from a lifelong imposter who has been fooling people for decades! Watch examples of... SUMMARY:The imposter’s guide to Hacking (With DEMOs!) ATTACH;FMTTYPE=image/jpeg:https://lehack.org/app/uploads/3-janus-roman-god-photo-researchers.jpg URL;VALUE=URI:https://lehack.org/track/the-imposters-guide-to-hacking-with-demos/ END:VEVENT BEGIN:VEVENT UID:1985 DTSTAMP:20250624T092515 DTSTART:20250627T100000 DTEND:20250627T180000 LOCATION:Cité des sciences - Main Entrance - Outdoor Parvis Nord DESCRIPTION:Car hacking (June 27 et June 28 th- 10:00 / 18:00) @RatZillaS will animate a... SUMMARY:CAR HACKING ATTACH;FMTTYPE=image/jpeg:https://lehack.org/app/uploads/062422-121422-683x1024.jpg URL;VALUE=URI:https://lehack.org/track/car-hacking/ END:VEVENT BEGIN:VEVENT UID:1885 DTSTAMP:20250521T182635 DTSTART:20250627T173000 DTEND:20250627T174500 LOCATION:Zone 1 - Gaston Berger conference stage DESCRIPTION: SUMMARY:leBREAK ATTACH;FMTTYPE=image/jpeg:https://lehack.org/app/uploads/Banger-Samples-Trippin-Art-Cover_Up-1024x1024.jpg URL;VALUE=URI:https://lehack.org/track/lebreak-copy/ END:VEVENT BEGIN:VEVENT UID:2006 DTSTAMP:20250619T161104 DTSTART:20250627T153000 DTEND:20250627T163000 LOCATION:Zone 3 - Louis Armand Conference Room DESCRIPTION:In this talk, Marwan Ouarab, founder of Find My Scammer, reveals how open-source intelligence (OSINT)... SUMMARY:Hunting the Fake Brad Pitts: OSINT Against a Global Romance Scam ATTACH;FMTTYPE=image/jpeg: URL;VALUE=URI:https://lehack.org/track/hunting-the-fake-brad-pitts-osint-against-a-global-romance-scam/ END:VEVENT BEGIN:VEVENT UID:1336 DTSTAMP:20250521T182635 DTSTART:20250627T153000 DTEND:20250627T154500 LOCATION:Zone 1 - Gaston Berger conference stage DESCRIPTION: SUMMARY:leBREAK ATTACH;FMTTYPE=image/jpeg:https://lehack.org/app/uploads/Banger-Samples-Trippin-Art-Cover_Up-1024x1024.jpg URL;VALUE=URI:https://lehack.org/track/lebreak-3/ END:VEVENT BEGIN:VEVENT UID:2010 DTSTAMP:20250619T161623 DTSTART:20250627T143000 DTEND:20250627T153000 LOCATION:Zone 3 - Louis Armand Conference Room DESCRIPTION:This talk presents an original investigation at the crossroads of OSINT and cybercrime: the analysis... SUMMARY:UNO Reverse Card: Exposing threat actors Through Their Own Infected Devices ATTACH;FMTTYPE=image/jpeg: URL;VALUE=URI:https://lehack.org/track/uno-reverse-card-exposing-threat-actors-through-their-own-infected-devices/ END:VEVENT BEGIN:VEVENT UID:2007 DTSTAMP:20250622T141733 DTSTART:20250627T133000 DTEND:20250627T143000 LOCATION:Zone 3 - Louis Armand Conference Room DESCRIPTION:Robert Sell has been a certified human tracker in his capacity as a Team Leader... SUMMARY:What can we learn about OSINT from Border Services trackers ATTACH;FMTTYPE=image/jpeg: URL;VALUE=URI:https://lehack.org/track/tracelabs-to-be-defined/ END:VEVENT BEGIN:VEVENT UID:1332 DTSTAMP:20250521T182635 DTSTART:20250627T120000 DTEND:20250627T140000 LOCATION:Zone 1 - Gaston Berger conference stage DESCRIPTION:MUNCHIES! SUMMARY:leLUNCH ATTACH;FMTTYPE=image/jpeg:https://lehack.org/app/uploads/lunch.jpg URL;VALUE=URI:https://lehack.org/track/lelunch-2/ END:VEVENT BEGIN:VEVENT UID:1889 DTSTAMP:20250521T182635 DTSTART:20250628T123000 DTEND:20250627T140000 LOCATION:Zone 1 - Gaston Berger conference stage DESCRIPTION:MUNCHIES! SUMMARY:leLUNCH ATTACH;FMTTYPE=image/jpeg:https://lehack.org/app/uploads/lunch.jpg URL;VALUE=URI:https://lehack.org/track/lelunch-copy/ END:VEVENT BEGIN:VEVENT UID:2008 DTSTAMP:20250619T161257 DTSTART:20250627T110000 DTEND:20250627T120000 LOCATION:Zone 3 - Louis Armand Conference Room DESCRIPTION:The Baybridge study uses OSINT to build on previous research about a large-scale Chinese online... SUMMARY:BAYBRIDGE - Anatomy of a Chinese Information Influence Ecosystem ATTACH;FMTTYPE=image/jpeg: URL;VALUE=URI:https://lehack.org/track/baybridge-anatomy-of-a-chinese-information-influence-ecosystem/ END:VEVENT BEGIN:VEVENT UID:2072 DTSTAMP:20250626T122203 DTSTART:20250627T100000 DTEND:20250627T103000 LOCATION: DESCRIPTION: SUMMARY:the Singularity keynote ATTACH;FMTTYPE=image/jpeg: URL;VALUE=URI:https://lehack.org/track/the-singularity-keynote/ END:VEVENT BEGIN:VEVENT UID:1843 DTSTAMP:20250609T110745 DTSTART:20250628T144500 DTEND:20250627T000000 LOCATION:Zone 1 - Gaston Berger conference stage DESCRIPTION:In the past few years, we've tried our hand at Vulnerability Reward Programs of all... SUMMARY:Eastern Promises: Mobile VRP Lessons For Bug Hunters ATTACH;FMTTYPE=image/jpeg: URL;VALUE=URI:https://lehack.org/track/eastern-promises-mobile-vrp-lessons-for-bug-hunters/ END:VEVENT BEGIN:VEVENT UID:1842 DTSTAMP:20250609T110738 DTSTART:20250628T163000 DTEND:20250627T000000 LOCATION:Zone 1 - Gaston Berger conference stage DESCRIPTION:**What if a backdoor didn't need malware, a shell, or even a running process?** This... SUMMARY:The Art of Staying In: Unconventional Backdoors on Windows and Linux ATTACH;FMTTYPE=image/jpeg: URL;VALUE=URI:https://lehack.org/track/the-art-of-staying-in-unconventional-backdoors-on-windows-and-linux/ END:VEVENT BEGIN:VEVENT UID:1841 DTSTAMP:20250609T110708 DTSTART:20250628T194500 DTEND:20250627T000000 LOCATION:Zone 1 - Gaston Berger conference stage DESCRIPTION:Comme pour le Pentest Cyber, une grande part de l'intrusion physique nécessaire à un RedTeam... SUMMARY:Physical Security : What you don't see... ATTACH;FMTTYPE=image/jpeg: URL;VALUE=URI:https://lehack.org/track/physical-security-what-you-dont-see/ END:VEVENT BEGIN:VEVENT UID:1840 DTSTAMP:20250609T110656 DTSTART:20250628T104500 DTEND:20250627T000000 LOCATION:Zone 1 - Gaston Berger conference stage DESCRIPTION:Part of Windows operating system for over 20 years, DCOM (Distributed Component Object Model) has... SUMMARY:DCOM Turns 20: Revisiting a Legacy Interface in the Modern Threatscape ATTACH;FMTTYPE=image/jpeg:https://lehack.org/app/uploads/fig-8-CMsiServerProxy-vftable.png URL;VALUE=URI:https://lehack.org/track/dcom-turns-20-revisiting-a-legacy-interface-in-the-modern-threatscape/ END:VEVENT BEGIN:VEVENT UID:1844 DTSTAMP:20250609T110753 DTSTART:20250628T180000 DTEND:20250627T000000 LOCATION:Zone 1 - Gaston Berger conference stage DESCRIPTION:Let’s face it: The apocalypse is being debugged by idiots. Picture this: A state-sponsored hacker... SUMMARY:Modbus, APTs, and Other Ways Humanity is F**ing Up the Climate ATTACH;FMTTYPE=image/jpeg: URL;VALUE=URI:https://lehack.org/track/modbus-apts-and-other-ways-humanity-is-fing-up-the-climate/ END:VEVENT BEGIN:VEVENT UID:1845 DTSTAMP:20250609T110801 DTSTART:20250627T144500 DTEND:20250627T000000 LOCATION:Zone 1 - Gaston Berger conference stage DESCRIPTION:This talk will give an understanding of basic quantum computing principles, the importance of PQC,... SUMMARY:Quantum computing demystified: A beginner's guide and cybersecurity implications ATTACH;FMTTYPE=image/jpeg:https://lehack.org/app/uploads/CBcmkyZ8v4tAc8PSDcEgvM-1024x576.jpg URL;VALUE=URI:https://lehack.org/track/quantum-computing-demystified-a-beginners-guide-and-cybersecurity-implications/ END:VEVENT BEGIN:VEVENT UID:1846 DTSTAMP:20250609T110807 DTSTART:20250628T190000 DTEND:20250627T000000 LOCATION:Zone 1 - Gaston Berger conference stage DESCRIPTION:“They told me I could be anything I wanted—so I became a Domain Controller,” he... SUMMARY:Ah, I see, you're a Domain Controller as well ATTACH;FMTTYPE=image/jpeg: URL;VALUE=URI:https://lehack.org/track/ah-i-see-youre-a-domain-controller-as-well/ END:VEVENT BEGIN:VEVENT UID:1847 DTSTAMP:20250610T111003 DTSTART:20250627T154500 DTEND:20250627T000000 LOCATION:Zone 1 - Gaston Berger conference stage DESCRIPTION:A debugger is always a valuable tool when searching for vulnerabilities, particularly in embedded systems... SUMMARY:The Last Resort: Debugging Embedded Systems with Unconventional Methods ATTACH;FMTTYPE=image/jpeg:https://lehack.org/app/uploads/360_F_763507185_Nua3IUd9D339k5q3PhvGJjGTUqaHa8Wv.jpg URL;VALUE=URI:https://lehack.org/track/the-last-resort-debugging-embedded-systems-with-unconventional-methods/ END:VEVENT BEGIN:VEVENT UID:1848 DTSTAMP:20250609T110816 DTSTART:20250628T140000 DTEND:20250627T000000 LOCATION:Zone 1 - Gaston Berger conference stage DESCRIPTION:Le pentest de client lourd, ça ne vous fait pas rêver? Et si au lieu... SUMMARY:Hacking de jeux vidéo: Casser des jeux et protéger le sien! ATTACH;FMTTYPE=image/jpeg:https://lehack.org/app/uploads/anselme-de-pertat-compo-v03-1024x576.jpg URL;VALUE=URI:https://lehack.org/track/hacking-de-jeux-video-casser-des-jeux-et-proteger-le-sien/ END:VEVENT BEGIN:VEVENT UID:1940 DTSTAMP:20250609T114953 DTSTART:20250627T000000 DTEND:20250627T000000 LOCATION:Zone 3 - Louis Armand conference stage DESCRIPTION:Les applications mobiles modernes reposent sur une grande diversité de technologies, du code Java/Kotlin aux... SUMMARY:Reverse & Inject: Intro to Mobile App Manipulation ATTACH;FMTTYPE=image/jpeg: URL;VALUE=URI:https://lehack.org/track/reverse-inject-intro-to-mobile-app-manipulation/ END:VEVENT BEGIN:VEVENT UID:1849 DTSTAMP:20250609T110824 DTSTART:20250627T111500 DTEND:20250627T000000 LOCATION:Zone 1 - Gaston Berger conference stage DESCRIPTION:Retrieval-Augmented Generation (RAG) systems have revolutionized how LLMs (Large Language Models) access "additional" knowledge, powering... SUMMARY:Up and Down Technique: Exposing Hidden Data from RAG Systems ATTACH;FMTTYPE=image/jpeg:https://lehack.org/app/uploads/klllaasss779kk1_generated-1024x639.jpg URL;VALUE=URI:https://lehack.org/track/up-and-down-technique-exposing-hidden-data-from-rag-systems/ END:VEVENT BEGIN:VEVENT UID:1850 DTSTAMP:20250609T110830 DTSTART:20250628T171500 DTEND:20250627T000000 LOCATION:Zone 1 - Gaston Berger conference stage DESCRIPTION:Group Policy Objects (GPOs) are a set of configurations applied to users and computers within... SUMMARY:GPOParser: Automating Group Policies extraction to reveal security gaps ATTACH;FMTTYPE=image/jpeg: URL;VALUE=URI:https://lehack.org/track/gpoparser-automating-group-policies-extraction-to-reveal-security-gaps/ END:VEVENT BEGIN:VEVENT UID:1859 DTSTAMP:20250609T111239 DTSTART:20250627T103000 DTEND:20250627T000000 LOCATION:Zone 1 - Gaston Berger conference stage DESCRIPTION:Modern web applications often provide features like PDF generation to enhance user experience, but these... SUMMARY:From HTML Injection to Full AWS Account Takeover: Discovering Critical Risks in PDF Generation ATTACH;FMTTYPE=image/jpeg:https://lehack.org/app/uploads/Create-a-600x600-pixel-PNG-thumbnail-with-a-solid-black-background.-Feature-abstract-digital-element.jpeg URL;VALUE=URI:https://lehack.org/track/from-html-injection-to-full-aws-account-takeover-discovering-critical-risks-in-pdf-generation/ END:VEVENT BEGIN:VEVENT UID:1858 DTSTAMP:20250620T145949 DTSTART:20250627T180000 DTEND:20250627T000000 LOCATION:Zone 1 - Gaston Berger conference stage DESCRIPTION:It's one of those mornings. You just crushed your early workout, feeling all kinds of... SUMMARY:Confessions of a Linux drama queen: When hackers are totally ruining your life ATTACH;FMTTYPE=image/jpeg:https://lehack.org/app/uploads/DramaQueenBlackFrame_1024x946.webp URL;VALUE=URI:https://lehack.org/track/confessions-of-a-linux-drama-queen-when-hackers-are-totally-ruining-your-life/ END:VEVENT BEGIN:VEVENT UID:1857 DTSTAMP:20250610T112105 DTSTART:20250628T100000 DTEND:20250627T000000 LOCATION:Zone 1 - Gaston Berger conference stage DESCRIPTION:In this french-language talk, I’ll share how I uncovered a €1,000 vulnerability by combining a... SUMMARY:Beyond Scanners: How Hands-On Recon Led Me to My First €1K Bug ATTACH;FMTTYPE=image/jpeg:https://lehack.org/app/uploads/Hackers-manually-hack-Turin-Traffic-Control-system-Stack-Exchange-2015-This-hack.jpg URL;VALUE=URI:https://lehack.org/track/beyond-scanners-how-hands-on-recon-led-me-to-my-first-e1k-bug/ END:VEVENT BEGIN:VEVENT UID:1856 DTSTAMP:20250609T110917 DTSTART:20250627T163000 DTEND:20250627T000000 LOCATION:Zone 1 - Gaston Berger conference stage DESCRIPTION:Active Directory reste la cible numéro un des attaquants, et honnêtement... certaines configurations nous facilitent... SUMMARY:Active Directory: Hall of Shame & Physical Pwnage ATTACH;FMTTYPE=image/jpeg:https://lehack.org/app/uploads/IP_Sniffing.jpg URL;VALUE=URI:https://lehack.org/track/active-directory-hall-of-shame-physical-pwnage/ END:VEVENT BEGIN:VEVENT UID:1855 DTSTAMP:20250609T110909 DTSTART:20250627T140000 DTEND:20250627T000000 LOCATION:Zone 1 - Gaston Berger conference stage DESCRIPTION:Malware deployment is a critical stage during a red team exercise, as it allows redteam... SUMMARY:Cache me if you can, smuggling payloads via browsers caching systems ATTACH;FMTTYPE=image/jpeg:https://lehack.org/app/uploads/blbl-1024x576.jpg URL;VALUE=URI:https://lehack.org/track/cache-me-if-you-can-smuggling-payloads-via-browsers-caching-systems/ END:VEVENT BEGIN:VEVENT UID:1854 DTSTAMP:20250609T110859 DTSTART:20250627T171500 DTEND:20250627T000000 LOCATION:Zone 1 - Gaston Berger conference stage DESCRIPTION:VRRP (Virtual Router Redundancy Protocol) est un protocole open standard conçu pour garantir la haute... SUMMARY:Keep-it-alived : Étude de la sécurité du protocole VRRP ATTACH;FMTTYPE=image/jpeg:https://lehack.org/app/uploads/network_redundancy-1024x683.jpg URL;VALUE=URI:https://lehack.org/track/keep-it-alived-etude-de-la-securite-du-protocole-vrrp/ END:VEVENT BEGIN:VEVENT UID:1852 DTSTAMP:20250623T193543 DTSTART:20250628T114500 DTEND:20250627T000000 LOCATION:Zone 1 - Gaston Berger conference stage DESCRIPTION:When you hear the term **“botnet”** mentioned during a regular chat with your friends at... SUMMARY:Espilon [Unknown bot net] ATTACH;FMTTYPE=image/jpeg:https://lehack.org/app/uploads/maxres2-1024x576.jpg URL;VALUE=URI:https://lehack.org/track/espilon-unknown-bot-net/ END:VEVENT END:VCALENDAR