Skip to content
BLACKOUT

SIGINT made easy with RF Swift

By lehackadmin

Date: 06/07/2024
Time: 17:00 > 19:00
Location: ZONE 2 - WORKSHOP ZONE - level -3 - Salle 3C
Field type not supported.
Field type not supported.
Join us for an engaging and interactive workshop where we introduce RF Swift, a cutting-edge toolbox for Signal Intelligence (SIGINT) and Communications Intelligence (COMINT) applications. This session will provide a hands-on experience with RF Swift, demonstrating its powerful capabilities for signal identification and for decoding various signals. Participants will delve into the fascinating world of […]

Capture The Flag d’un drone miniature (session 2)

By lehackadmin

Date: 06/07/2024
Time: 10:30 > 12:30
Location: ZONE 2 - WORKSHOP ZONE - level -3 - Salle 2B
Field type not supported.
Field type not supported.
Venez l'espace de quelques heures vous mettre dans la peau d'un hacker et laissez vous guider vers l'exploitation des vulnérabilités d'un drone grand public. Attaques hardware, attaques radio, reverse engineering, buffer overflow, vous pourrez expérimenter de multiples facettes de la cybersécurité des systèmes embarqués et appliquer ces concepts sur une cible concrète. A l'issu de […]

Capture The Flag d’un drone miniature (session 1)

By lehackadmin

Date: 05/07/2024
Time: 10:30 > 12:30
Location: ZONE 2 - WORKSHOP ZONE - level -3 - Salle 2B
Field type not supported.
Field type not supported.
Venez l'espace de quelques heures vous mettre dans la peau d'un hacker et laissez vous guider vers l'exploitation des vulnérabilités d'un drone grand public. Attaques hardware, attaques radio, reverse engineering, buffer overflow, vous pourrez expérimenter de multiples facettes de la cybersécurité des systèmes embarqués et appliquer ces concepts sur une cible concrète. A l'issu de […]

Rétro-ingénierie d’un logiciel de drone avec Ghidra (architecture ARM) (session 2)

By lehackadmin

Date: 06/07/2024
Time: 14:30 > 16:30
Location: ZONE 2 - WORKSHOP ZONE - level -3 - Salle 3C
Field type not supported.
Field type not supported.
Vous rêvez d’accéder au code source d’une application pour mieux la comprendre, pour découvrir ses secrets, pour vous assurer qu’elle ne présente pas de vulnérabilité ou pour modifier son comportement ? La rétro-ingénierie logicielle est le moyen de réaliser ces rêves par vous-même. Cet atelier vous présentera les principes de la rétro-ingénierie logicielle et vous […]

Rétro-ingénierie d’un logiciel de drone avec Ghidra (architecture ARM) (session 1)

By lehackadmin

Date: 05/07/2024
Time: 14:30 > 16:30
Location: ZONE 2 - WORKSHOP ZONE - level -3 - Salle 2B
Field type not supported.
Field type not supported.
Vous rêvez d’accéder au code source d’une application pour mieux la comprendre, pour découvrir ses secrets, pour vous assurer qu’elle ne présente pas de vulnérabilité ou pour modifier son comportement ? La rétro-ingénierie logicielle est le moyen de réaliser ces rêves par vous-même. Cet atelier vous présentera les principes de la rétro-ingénierie logicielle et vous […]

Active Directory pwnage with NetExec

By lehackadmin

Start date: 06/07/2024
End date: 07/07/2024
Time: 21:30 > 00:00
Location: ZONE 2 - WORKSHOP ZONE - level -2 - Salle C/D
Field type not supported.
Field type not supported.
In this workshop I will present the tool NetExec and how to take advantage of the tool to compromise efficiently a domain Active Directory during an internal pentest. Which feature should I use regarding the attack I need to perform, which command I should try to run first, what should I do when I crab […]

Analyse d’un dump de disque dur suite à une attaque via rubber ducky (session 1)

By lehackadmin

Date: 06/07/2024
Time: 21:00 > 22:45
Location: ZONE 2 - WORKSHOP ZONE - level -3 - Salle 3C
Field type not supported.
Field type not supported.
Ce workshop propose d'analyser le disque dur d'une machine victime d'une attaque par une Rubber Ducky. Le workshop aborde notamment : Recherche de la connexion de la clé Recherche des journaux PowerShell (scripts passés) Analyse des scripts PowerShell Analyse des preftech Analyse des evtx Afin de gagner du temps lors du lancement du workshop, vous […]

Analyse d’un dump de disque dur suite à une attaque via rubber ducky (session 2)

By lehackadmin

Start date: 06/07/2024
End date: 07/07/2024
Time: 22:45 > 00:30
Location: ZONE 2 - WORKSHOP ZONE - level -3 - Salle 3C
Field type not supported.
Field type not supported.
Ce workshop propose d'analyser le disque dur d'une machine victime d'une attaque par une Rubber Ducky. Le workshop aborde notamment : Recherche de la connexion de la clé Recherche des journaux PowerShell (scripts passés) Analyse des scripts PowerShell Analyse des preftech Analyse des evtx Afin de gagner du temps lors du lancement du workshop, vous […]

Network protocol abuse: driving ICS equipment mad

By lehackadmin

Date: 06/07/2024
Time: 20:00 > 21:30
Location: ZONE 2 - WORKSHOP ZONE - level -3 - Salle 2B
Field type not supported.
Field type not supported.
Ce Workshop s'articulera sur les explications et l'utilisations de plusieurs librairies qui permette de s'interfacez avec de PLC (microcontrôleur programmable destiné au contrôle industriel). Une 1ʳᵉ partie sera dédiée aux explications techniques du fonctionnement des PLC et des différents protocoles réseaux associé. La deuxième partie sera sur "l'exploitation" et l'explication des libraires qui permette de […]

No Metadata No Problem, Predicting photo locations from pixels using AI

By lehackadmin

Date: 06/07/2024
Time: 11:00 > 12:00
Location: Zone 3 - OSINT Village - Louis Armand conference stage
Field type not supported.
Field type not supported.
Field type not supported.
Have you ever wanted to find out where a photo posted online was taken? In this talk I will demonstrate the abilities of modern photo location AI systems, how they function and how you can build these AI systems for yourself. I will also give an overview of where the field of photo geolocation is […]

Cracking the Code: Decoding Anti-Bot Systems!

By lehackadmin

Date: 06/07/2024
Time: 10:00 > 11:00
Location: Zone 3 - OSINT Village - Louis Armand conference stage
Field type not supported.
Field type not supported.
Field type not supported.
Web scraping is gaining momentum, particularly with the advent of Large Language Models (LLMs). Access to data is being thwarted more and more by companies implementing anti-bot protections. This talk aims to shine a spotlight on a uniquely rare subject, focusing on strategies to circumvent these mechanisms.

The XE-Files: Trust No Router

By lehackadmin

Date: 05/07/2024
Time: 15:30 > 16:30
Location: Zone 3 - OSINT Village - Louis Armand conference stage
Field type not supported.
Field type not supported.
Field type not supported.
Exploring the world of compromised IOS XE devices. On the 16th October 2023 Cisco Talos shared intelligence about a handful of compromised routers discovered while resolving customer support requests. As the full story unfolded, a few backdoored devices turned into tens of thousands, and the massive mobilisation of incident response teams as patches were applied […]

Telling the big stories with a bit of help from AI

By lehackadmin

Date: 05/07/2024
Time: 14:30 > 15:30
Location: Zone 3 - OSINT Village - Louis Armand conference stage
Field type not supported.
Field type not supported.
Field type not supported.
In an era where technology is reshaping the way we engage with information, the relationship between Artificial Intelligence and Journalism has become a focal point of exploration. This track will uncover the multifaceted landscape of AI’s role in journalism, offering a comprehensive examination of its potential, risks, challenges, and real-world applications through the lens of […]

Where do the guns go? Mapping Arms Flows with OSINT: Opportunities and Challenges

By lehackadmin

Date: 05/07/2024
Time: 13:30 > 14:30
Location: Zone 3 - OSINT Village - Louis Armand conference stage
Field type not supported.
Field type not supported.
Field type not supported.
In light of recent political developments, the topic of tracing arms flows has gained significant interest from both researchers and the media. This talk will explore the opportunities and limitations of using Open Source Intelligence (OSINT) to track the movement of arms, both legal and illicit. The speaker will showcase projects undertaken by the Small […]

RE-TOUR DE CLEFS – L’EXPO

By lehackadmin

Date: 05/07/2024
All-day event
Location: Zone 2 - Workshop Rooms
Field type not supported.

Serrurier et collectionneur ,chercheur et grand découvreur de ces petits détails qui font la différence, Jean-christophe vous enjoint à observer en taille réelle les quelques trouvailles, réalisations et improbables Mécaniques sorties du cerveau humain aux seules fins de "hacker" les serrures du quotidien censées nous isoler en une révolution de clef.

Disinformation as Infrastructure

By lehackadmin

Date: 05/07/2024
Time: 10:00 > 11:00
Location: Zone 3 - OSINT Village - Louis Armand conference stage
Field type not supported.
Field type not supported.
Field type not supported.
Disinformation has flooded social networks. Once posted, it is sometimes too late to react. Investigating open sources infrastructure can help anticipate the threat. This presentation will present a return of experience on the interest of such investigations.

How to OSINT in any language

By lehackadmin

Date: 07/07/2024
Time: 02:00 > 04:00
Location: Zone 3 - OSINT Village - Louis Armand conference stage
Field type not supported.
Field type not supported.
Field type not supported.
Searching online in a foreign language can seem daunting to most. Others will pivot to the duo "Google Lens" and "Google Translate" which are arguably not bad. The devil, however, is always in the details which are often missed by online translation tools as well as AI. This workshop will present the fundamental steps to […]

OSINT Uncovered: Enhancing Public Investigations with the ObSINT Guidelines

By lehackadmin

Date: 07/07/2024
Time: 00:30 > 02:00
Location: Zone 3 - OSINT Village - Louis Armand conference stage
Field type not supported.
Field type not supported.
Field type not supported.
An insightful workshop that delves into the world of open-source intelligence (OSINT) through the lens of the newly established "OSINT Guidelines." Developed by a consortium of experts (EU DisinfoLab, The Atlantic Council’s Digital Forensic Research Lab (DFRLab), OSINT Curious, CheckFirst, Centre for Information Resilience, OpenFacto, and Logically), these guidelines offer a comprehensive framework to elevate […]

Mastering Web Scraping with Scrapoxy

By lehackadmin

Date: 06/07/2024
Time: 21:00 > 23:00
Location: Zone 3 - OSINT Village - Louis Armand conference stage
Field type not supported.
Field type not supported.
Field type not supported.
Join me for an incredible tutorial to unlock the full potential of Web Scraping! From novice to virtuoso, you’ll learn advanced techniques for collecting crucial datasets to train AI models. Protection Disclosed 🔒 - Overcome fingerprint challenges and anti-bot measures. - Reverse engineering protection to understand tracking signals Proxy and Browser Farms Adventure 🌐 - […]

OSINT field stories and future considerations

By lehackadmin

Date: 06/07/2024
Time: 15:30 > 16:30
Location: Zone 3 - OSINT Village - Louis Armand conference stage
Field type not supported.
Field type not supported.
Field type not supported.
As we navigate through the rapidly altering landscape of Open-Source Intelligence, Nico will try to sharpen your focus on the contemporary and upcoming trends, making a deep dive into the potential that OSINT harbors. But, it's not just about the sunny side. With every stride forward, there come challenges waiting to be addressed. Through a […]

Intelligence Agencies Hosting: When Threat Intelligence and OSINT lead to delightful discoveries

By lehackadmin

Date: 06/07/2024
Time: 14:30 > 15:30
Location: Zone 3 - OSINT Village - Louis Armand conference stage
Field type not supported.
Field type not supported.
Field type not supported.
This presentation will introduce the world of bulletproof hosting and Intelligence Agencies Hosting (IAH) and how it has been used by the majority of cybercriminals for decades, by both small groups and state actors. Then, we will highlight various examples where OSINT has enabled the discovery of invaluable details to attribute actions to groups, companies, […]

Fingerprinting at the Frontier: How Edge Cases and Ambiguities can help Attribute Digital Attacks

By lehackadmin

Date: 06/07/2024
Time: 13:30 > 14:30
Location: Zone 3 - OSINT Village - Louis Armand conference stage
Field type not supported.
Field type not supported.
Field type not supported.
Can an ambiguity in a popular file format be used to geolocate customers of a spyware platform? Can an improperly handled edge case in the IP protocol illuminate exports of network attack tools? Yes, and yes! In this talk, we will present several concrete examples of what we call "fingerprinting at the frontier": building fingerprints […]

Open source analysis in plane crashs

By lehackadmin

Date: 05/07/2024
Time: 11:00 > 12:00
Location: Zone 3 - OSINT Village - Louis Armand conference stage
Field type not supported.
Field type not supported.
Field type not supported.
For 15 years, investigation on plane crashs has accelerated thanks to collective intelligence and open source data. Xavier Tytelman, former crew member in the naval aviation and open source investigator in the fields of aeronautical and military, will describe the techniques he uses with his community, to identify the crash causes as fast as possible.

Attack Surface Discovery with OSINT

By lehackadmin

Start date: 06/07/2024
End date: 07/07/2024
Time: 23:00 > 00:30
Location: Zone 3 - OSINT Village - Louis Armand conference stage
Field type not supported.
Field type not supported.
Field type not supported.
Understanding an attack surface is a necessary first-step to for cyber-defenders looking to protect an organization. With this hands-on workshop you’ll be able to use open-source tools and data and a repeatable process to build an exhaustive list list of an organization’s assets exposed on the Internet - whether your own organization or someone else's.

Exploration of Cellular Based IoT Technology

By lehackadmin

Date: 06/07/2024
Time: 15:30 > 16:15
Location: Zone 1 - Gaston Berger conference stage
Field type not supported.
Field type not supported.
Field type not supported.
As cellular technologies continue to become more integrated into IoT devices, there has been a noticeable lag in comprehending potential security implications associated with cellular hardware technologies. Furthermore, the development of effective hardware testing methodologies has also fallen behind. Given the highly regulated nature of cellular communication and the prevalent use of encryption, it is […]

A praise to laziness (or why hackers are awesome people) !

By lehackadmin

Date: 06/07/2024
Time: 16:30 > 17:15
Location: Zone 1 - Gaston Berger conference stage
Field type not supported.
Field type not supported.
Nous sommes tous plus ou moins paresseux. On utilise désormais des IA pour générer des textes relativement longs à partir de courts prompts, car rédiger est juste ennuyeux. On demande à ChatGPT de simplifier un long texte car on n'a pas envie de tout lire. On copie/colle du code de StackOverflow au lieu de comprendre […]

Take your revenge on this fucking EDR

By lehackadmin

Date: 06/07/2024
Time: 17:15 > 18:00
Location: Zone 1 - Gaston Berger conference stage
Field type not supported.
Field type not supported.
Après avoir un talk l'année dernière sur quelques techniques de contournement d'EDR (unhooking, direct syscalls), cette fois-ci nous nous focaliserons sur l'obfuscation et la post-exploitation, et nous verrons comment extraire les hash du domaine sans déclencher d'alertes au niveau de l'EDR et du SIEM !

OSINT et journalisme

By lehackadmin

Date: 06/07/2024
Time: 18:00 > 18:45
Location: Zone 1 - Gaston Berger conference stage
Field type not supported.
Field type not supported.
Reflets.info est un journal qui a été co-fondé par un expert en sécurité informatique et un journaliste. Aujourd'hui les actionnaires sont des journalistes et des "informaticiens talentueux". Nous mettons donc en place des outils numériques d'aide à l'investigation novateurs. Dans cette conférence, Reflets présentera deux d'entre eux. L'un sert à indexer de très gros lots […]

Insert coin: Hacking arcades for fun

By lehackadmin

Date: 06/07/2024
Time: 19:00 > 19:45
Location: Zone 1 - Gaston Berger conference stage
Field type not supported.
Field type not supported.
Field type not supported.
Since we were children we wanted to go to the arcade and play for hours and hours for free. How about we do it now? In this talk I’m gonna show you some vulnerabilities that I discovered in the cashless system of one of the biggest companies in the world, with over 2,300 installations across […]

Clés incopiables : contournements, exceptions et paradoxes

By lehackadmin

Date: 06/07/2024
Time: 19:45 > 20:30
Location: Zone 1 - Gaston Berger conference stage
Field type not supported.
Field type not supported.
On nous parle souvent de clés brevetées, clés incopiables, à reproduction interdite ou encore de clés de sécurité. Mais qu'en est-il réellement ? Certaines clés on des billes, des aimants, des anneaux, ou encore des goupilles mobiles. Est-ce que cela complique le crochetage, l'impressionning, ou les autres techniques d'ouverture ? Et surtout, est-ce que l'utilisateur […]

Sending network boxes to the edge of the world for fun but mostly profit

By lehackadmin

Date: 05/07/2024
Time: 10:15 > 11:00
Location: Zone 1 - Gaston Berger conference stage
Field type not supported.
Field type not supported.
Have you ever wanted a network device that's small enough to fit in your pocket but just powerful enough for your most challenging pentests? In this talk, I'll showcase a versatile implant based on an industrial Glinet router that you can send to the edge of the world for internal network penetration tests, red team […]

REVOLUTION!!!

By lehackadmin

Date: 05/07/2024
Time: 10:00 > 10:15
Location: Zone 1 - Gaston Berger conference stage
Field type not supported.
Field type not supported.
leHACK is 20 years old. We made a full temporal loop: a full revolution. Future is bright, phear the next revolution. Maybe it's time for an evaluation and to take a moment to congratulate ourselves.

Phishing for Potential: The “RTFM” Guide to Hacking Your Brain-frame

By lehackadmin

Date: 05/07/2024
Time: 11:00 > 11:45
Location: Zone 1 - Gaston Berger conference stage
Field type not supported.
Field type not supported.
Field type not supported.
Openly neurodivergent and navigating a matrix of other personal challenges, K Melton's journey not only shatters conventional barriers but also embodies the realization of their mentor Winn Schwartau's long-standing hiring vision. Dismantling the "unhireable" notion, K reveals how unconventional talent can thrive if provided optimal operating conditions. This presentation goes beyond mere advocacy and memoir, […]

AI for Cybersecurity: Applying Machine Learning to Enhance Malware Analysis

By lehackadmin

Date: 05/07/2024
Time: 11:45 > 12:30
Location: Zone 1 - Gaston Berger conference stage
Field type not supported.
Field type not supported.
Field type not supported.
Malware continues to increase in prevalence and sophistication. VirusTotal reported a daily submission of 2M+ malware samples. Of those 2 million malware daily submissions, over 1 million were unique malware samples. Successfully exploiting networks and systems has become a highly profitable operation for malicious threat actors. Traditional detection mechanisms including antivirus software fail to adequately […]

Découverte du groupe APT-C36 sur les réseaux d’une profession libérale réglementée

By lehackadmin

Date: 05/07/2024
Time: 14:00 > 14:45
Location: Zone 1 - Gaston Berger conference stage
Field type not supported.
Field type not supported.
Depuis fin 2022, l'équipe forensics du CSIRT INQUEST analyse des attaques informatiques sur des entreprises de profession réglementée. Depuis cette date plus d'une quinzaine de cas ont été découverts. Après diverses corrélations et à l'aide de leur base CTI enrichie avec leurs recherches, il s'avère que les attaques seraient menées par le groupe APT-C-36. Cette […]

Lock designs and security vulnerabilities: What can go wrong

By lehackadmin

Date: 05/07/2024
Time: 14:45 > 15:30
Location: Zone 1 - Gaston Berger conference stage
Field type not supported.
Field type not supported.
Field type not supported.
Locks, whether mechanical, electro-mechanical, or electronic, are complicated and are designed to protect people, assets, and information. Manufacturers and designers continue to miss vulnerabilities in what they produce, which can lead to insecurity and compromise. Marc Tobias will discuss critical areas that are analyzed in his new book on the subject, and what security experts […]