Hack.lu 2018 Logo

Hack.lu 2018

0
Free
Visit Website

Come To The Dark Side! We Have Radical Insurance Groups And Ransomware - Eireann Leverett and Ankit Gangwal Hypervisor-Level Debugger: Benefits And Challenges - Mathieu Tarral Risk Assessment Optimisation With MONARC - Fabien Mathey Real World: Threat Intelligence - Elle Armageddon Let Me Yara That For You! - Dan Demeter The (Not So Profitable) Path Towards Automated Heap Exploitation - Thaís Moreira Hamasaki Neuro-Hacking: The Science Behind Social Engineering And An Effective Security Culture - Emmanuel Nicaise The Snake Keeps Reinventing Itself - Jean-Ian Boutin and Matthieu Faou What The Fax?! - Eyal Itkin and Yaniv Balmas Trojans In SS7: How They Bypass All Security Measures - Sergey Puzankov So You Think IoT DDoS Botnets Are Dangerous: Bypassing ISP And Enterprise Anti-DDoS With 90's Technology - Dennis Rand IPC - The Broken Dream Of Inherent Security - Thanh Bui and Siddharth "Sid" Rao Operating Large-Scale Honeypot Sensor Networks - Piotr Kijewski Abusing Bash For Windows - Antoine Cervoise Cl4ndestina: Privacy By Default With A Feminist Perspective From The Global South - Steffania Paola and Narrira Lemos Encrypt! Organize! Resist!: Digital Safety For Politically Vulnerable Organizations & Civil Society - Matt "Mateo" Mitchell

FEATURES

ALTERNATIVES

Protect against Prototype Pollution vulnerabilities in your application by freezing JavaScript objects.

Utility that exposes TLS certificate expiry as Prometheus metrics.

A CTF platform inspired by motherfuckingwebsite.com, emphasizing simplicity and lightweight features.

A simple security capture the flag framework for running contests

A sample security dataset and CTF platform for information security professionals, researchers, students, and enthusiasts.

A project with Terraform and Ansible scripts to create an orchestrated BlueTeam Lab for testing attacks and forensic artifacts on Windows environment.

Interactive computational environment for code execution, text, and media combination.

A lab designed for defenders to quickly build a Windows domain pre-loaded with security tooling and best practices in system logging configurations.