These were the speakers at Security Fest 2022.Thanks for helping us make this conference awesome!
Jayson E. Street was announced to deliver a keynote at Security Fest 2020, and he's really happy to be able to finally deliver it in 2022!
What is common for Slack, Discord and Skype? Electron! Learn to hack JavaScript Desktop apps in less than one hour. Quick Practical Intro about what you need to know to get started pentesting Electron apps, lifetime access, vulnerable apps to practice...
This talk is a "Best of" my "Beyond the good ol' LaunchAgents" blogpost series. In this 40 minute long talk I will present my favorite 10 persistence methods I learned about or found myself in the past year. I will show some very unique, less known...
Ever wanted to dive deeper in to how devices communicate? We will discuss cross-platform desktop apps, computer network protocols, and embedded IoT malware. With 2 live network-related demos, this presentation moves fast, is light on slides, and heavy...
Watching Putin invade Ukraine, live streaming on YouTube was incredibly wild. Watching those same cameras fall offline, or be turned into misinformation tools was frustrating (ruptly and rt rebroadcasting day-old footage, calling it live, etc). Amit...
So you did some awesome research, wrote a pretty epic write-up and now you want to share the results with the world! Time to hack the Google algorithm! In this session Hacker/Creative STÖK will guide you though the do's and don'ts of search engine...
Cloud infrastructure security is an oft-neglected topic when businesses invest in securing their web apps. Ensuring that a once-secured environment remains secure is even more challenging. In our presentation, we’ll demonstrate common types of...
I’ll show you the tools and tactics used to get root on a Helium crypto miner. These miners generate up to 1,000 USD per month. Supposedly, they are locked down very limited user access) with a rigorous approval process. The same tools and tactics can...
In this presentation we will discuss both theoretical and real-world examples of space systems cybersecurity issues. There are many components and systems that may be targeted in a space system by adversaries including ground station systems,...
This lecture summarizes the research we have done in this past crazy year - where we learned how important it is to track down our dependencies, and why the package managers that we rely on to assist us may not be as trustworthy as we think. All of...
Active Directory still runs at the majority the world's organizations' identity and access control. AD Security has come a long way in three decades, with new attacks and creative attack paths found constantly. We'll take a dive into lessons learned...
See all speakers at Security Fest