Skip to content
BLACKOUT

Physical intrusion: Defeating On-Site Security

By lehackadmin

Date: 05/07/2024
Time: 15:30 > 16:15
Location: Zone 1 - Gaston Berger conference stage
Field type not supported.
Field type not supported.
Aujourd'hui, l'intrusion physique est devenue un sujet de plus en plus abordé dans le domaine du Pentest/Red Team. Mais quelles sont les implications concrètes de cette pratique ? Comment se prépare-t-on pour une mission de ce type ? Souvent négligée, cette facette de la sécurité présente pourtant des risques majeurs pour les entreprises. Dans ce […]

The Metawar Thesis: How To Adapt to and Coexist with the Technologies We Have Created

By lehackadmin

Date: 05/07/2024
Time: 16:30 > 17:15
Location: Zone 1 - Gaston Berger conference stage
Field type not supported.
Field type not supported.
Field type not supported.
“There are two ways to be fooled. One is to believe what isn’t true; the other is to refuse to believe what is true.” (Kierkegaard) At Le Hack 2023, Winn Schwartau introduced us to The Art & Science of Metawar: Reality Distortion, Dis-information Warfare, Cognitive Infrastructure Manipulation, and Hacking Control of the Human Experience for […]

Prism, a light BEAM disassembler

By lehackadmin

Date: 05/07/2024
Time: 17:15 > 18:00
Location: Zone 1 - Gaston Berger conference stage
Field type not supported.
Field type not supported.
BEAM (Bogdan/Björn's Erlang Abstract Machine) is a virtual machine designed by Ericsson used to run Erlang applications. We ran into such an application during an assignment and had to disassemble it as well as many libraries, and discovered that the existing tools do not produce a correct and complete disassembly. A lot of valuable information […]

Supply Chain Attack : Le cas du Registre Privé Docker

By lehackadmin

Date: 05/07/2024
Time: 18:00 > 18:45
Location: Zone 1 - Gaston Berger conference stage
Field type not supported.
Field type not supported.
Docker est aujourd'hui un outil de conteneurisation incontournable, largement adopté dans le développement logiciel. Cette expansion a souligné l'importance de sécuriser tous les composants associés, comme le registre privé Docker. Alternative au Docker Hub public, c’est une plateforme open-source où les développeurs peuvent stocker, gérer et distribuer leurs applications localement. Hélas, la documentation officielle et […]

S.E. with A.I. & Defending against it with H.I.

By lehackadmin

Date: 05/07/2024
Time: 18:45 > 19:30
Location: Zone 1 - Gaston Berger conference stage
Field type not supported.
Field type not supported.
Field type not supported.
A.I. may be seen as a cost-effective way to replace workers. We will look closer however and discover the uncomfortable truth behind A.I. and what really powers it. We will also discover how to harness the hidden power propping up A.I. for ourselves & our company’s security. One of the biggest, most advanced, and adaptive […]

The Red and the Blue: a tale of stealth and detection

By lehackadmin

Date: 06/07/2024
Time: 10:00 > 10:45
Location: Zone 1 - Gaston Berger conference stage
Field type not supported.
Field type not supported.
With the evolution of attack surfaces, attacker skills, zero-day exploits and supply chain attacks, it is no longer possible to solely rely on prevention to ensure a company's security. Therefore, it is crucial to use detection mechanisms, as well as response and investigation capabilities. After an overview of Red Team operations and the ecosystem of […]

Be better than the hacktivist: Structure a campagne of Bruteforce on OT equipment in the internet

By lehackadmin

Date: 06/07/2024
Time: 10:45 > 11:30
Location: Zone 1 - Gaston Berger conference stage
Field type not supported.
Field type not supported.
This talk is an attempt to reconstruct the technical approach that hacktivists might take to industrial control equipment. The talk is divided into 4 main parts The importance of using an isolated environment to test this exploit, with the example of an OT lab setup. Explanations of the operating principles of a PLC, and the […]

Enhancing Training and Pentesting tasks with LLMs: what can and can’t be done

By lehackadmin

Date: 06/07/2024
Time: 11:45 > 12:30
Location: Zone 1 - Gaston Berger conference stage
Field type not supported.
Field type not supported.
Au cours de ce talk nous explorerons en détail l'usage de LLMs dans le cadre du pentest et de la formation en sécurité informatique ainsi que leurs limites. C'est un retour d'expérience sur la création d'agents conversationnels permettant de remplacer des quizz ou de faire des exercices de phishing, d'assistants IA connaissant les documentations d'outils […]

Trouver sa place dans l’infosec

By lehackadmin

Date: 06/07/2024
Time: 14:00 > 14:45
Location: Zone 1 - Gaston Berger conference stage
Field type not supported.
Field type not supported.
Aaaaah l'infosec... Ce milieu truffé de codes, d’histoire, de choses à savoir, d'opportunités et de risques. Ce talk, non technique, a pour objectif de partager tout ce que j'aurais aimé savoir à mes débuts, dans la limite de mes connaissances et de mon d’objectivité (ou manque de) : études, job, freelance, salaires, communauté(s), mindset, ressources, […]

Hacking Satellites: From SDR to RCE.

By lehackadmin

Date: 06/07/2024
Time: 14:45 > 15:30
Location: Zone 1 - Gaston Berger conference stage
Field type not supported.
Field type not supported.
Durant cette conférence, nous explorerons les faiblesses des systèmes de satellites et les méthodes pour les exploiter. Nous partirons des bases, en présentant les satellites et leurs vecteurs d'attaque, pour ensuite explorer le potentiel des attaques par radio, ainsi que la recherche de vulnerabilité et leur exploitation.