FEATURED

FULL TIMELINE

+

Opening Keynote

talk
  • 24/06/17
    10:00 > 10:30
  • CONFERENCE AREA
  • FreeMan

15 years ! HZV will never die !

+

Bug Bounty Opening

talk
  • 24/06/17
    10:30 > 10:45
  • CONFERENCE AREA

Qwant.com is funding our Bug Bounty, we'll give you the rules.

+

(EN) Where Cypherpunk Meets Organized Crime:
The Shifting Landscape of Underground Economies and Crypto-driven Privacy

talk

It has been six years since the first Tor market opened shop. The period between then and now has been one marked by violent growth, innovation, and adaptation.
With more than thirty active darkweb markets and countless individual shops in operation...

+

(FR) Build your own low-cost FPGA password cracker on the blockchain for fun and profit!
with Renaud LIFCHITZ

talk

This innovative talk will mix DIY, emerging technologies and computer security. First part of the talk will explain how to build your own low-cost, powerful, totally silent and ecological password cracker using a cheap and publicly available FPGA boa...

+

(FR) Le combat numérique au cœur des opérations par Arnaud COUSTILLIERE

talk
  • 24/06/17
    12:15 > 13:00
  • CONFERENCE AREA
  • Arnaud COUSTILLIERE

Vice Admiral Arnaud Coustilliere was born in Toulon on the 3rd of November 1960. He has led a distinguished career as a surface warfare officer, commanding officer, and other appointments in the Navy and Joint Defence staff.

Specialised in the fiel...

+

LUNCH TIME

break
  • 24/06/17
    13:00 > 14:00
+

(FR) Android Permission Assignation, from Packages to processus with Julien THOMAS

talk


Permission management control is becoming a primary concern due to the always growing privacy and data concerns, and even more specifically on mobile devices. With Marshmallow, and based on the AppOp project under KitKat, Android users now have (par...

+

(EN) When encryption is not enough: Attacking Wearable - Mobile communication over BLE with Eliza Chelleng & Sumanth Naropanth

talk

Communication protocols have evolved from the traditional Serial and LAN ports to complex and lightweight protocols of today, such as Bluetooth Low Energy (BLE), ANT+ and ZigBee. Bluetooth Low Energy (BLE) is a popular protocol of choice for wearable...

+

(FR) Make hardware great again ! with Virtualabs

talk

The hardware has changed, it has been closed, connected, unusable when the companies get bankrupted. This is a problem because those
connected objects such as watches, locks, alarms, drones... A real invasion.
It is time for us to take back the con...

+

BREAK / LA PAUSE

break
  • 24/06/17
    16:15 > 17:15
+

(EN) THE NEW SHERIFF IN TOWN IS A MACHINE: THE PROBLEMS WITH USING AI, PREDICTIVE ANALYTICS, AND BIG DATA TO FIGHT CRIME AND FIND “TERRORISTS" WITH JENNIFER LYNCH

talk

In the last few years, law enforcement technologies have become “smarter” and cheaper. Now even small agencies can buy their own drones or collect face recognition images or DNA from anyone right out on the street. But as police technologies have...

+

(FR) NTFS, forensics, malwares and vulnerabilities with Stéfan LE BERRE (HEURS)

talk

Along this talk, we will talk about a well-known filesystem used by millions of people, the NTFS, which is used in every Windows machine.
In fact, only a few people know what you can really find in a NTFS filesystem, we will see how it works and how...

+

(EN) How to fool antivirus software?

talk
  • 24/06/17
    18:45 > 19:30
  • CONFERENCE AREA
  • Baptiste David

Remedial courses for CIA and other state agencies…

From recent times, more and more leaks inform us how national agencies work to bypass antivirus securities for surveillance activities. Press write about sophistication of attacks, tricks used,...

+

(FR) Windows 10 Pool Party

talk

For many years, Windows drivers have been a great attack vector in order to elevate privileges and acquire kernel execution.
And for many years, Microsoft has been working to mitigate those attacks, increasing the security for each version of Window...

+

Say hello to Android malware reverse engineering par Cryptax

workshop

Cet atelier vous permettra de vous initier au reverse engineering de malware Android.
Cet atelier s'adresse aux débutants, sans connaissances particulières sur Android, l'assembleur ou le reverse engineering.

Après quelques brèves explications,...

+

Make Your Own Arduino par la DTRE

workshop
  • 24/06/17
    20:00 > 06:00
  • WORKSHOPS
  • DTRE

Make Your Own Arduino est un atelier durant lequel les personnes volontaires pourront apprendre à monter une carte compatible Arduino à partir d'un kit de pièces d'électronique. Une fois ceci terminé ils pourront programmer la carte dans le but...

+

Montez votre propre réseau Internet par l'Electrolab

workshop

Apprenez à monter votre propre réseau Internet sans fil et sans opérateur en utilisant du open hardware open source !

À propos de l'Electrolab @Electrolab_Fr

+

Atelier Lockpicking

workshop

Initiation au crochetage des serrures et présentation de l’Association des Crocheteurs de France + vente d’outils de crochetage

À propos de Alexandre Triffault : Coming Soon

+

Playing with Software Defined Radio par l'Electrolab

workshop

Suivez ce workshop pour apprendre tout à propos des SDR ! Quel SDR utiliser pour quel type de hacking, comment ils fonctionnent et démonstration de plusieurs SDR en live.

À propos de l'Electrolab @Electrolab_Fr

+

ShiFuMi en portes logiques par la DTRE

workshop
  • 24/06/17
    20:00 > 06:00
  • WORKSHOPS
  • DTRE

A l'aide d'une carte Arduino et de portes logiques, le but est de réaliser un chifoumi entre un joueur et l'IA (ou Pierre Feuille Ciseau) puis de hacker le système pour favoriser un joueur.

À propos de la DTRE : Coming soon

+

Le tank de la DTRE

workshop
  • 24/06/17
    20:00 > 06:00
  • WORKSHOPS
  • DTRE

Prenez le contrôle du tank de la DTRE en utilisant un ordinateur et une manette XBox.

À propos de la DTRE : Coming soon

+

Getting the Most Out of Windows Event Logs par David SZILI

workshop
  • 24/06/17
    20:00 > 23:00
  • WORKSHOPS
  • David SZILI

Une erreur faite par beaucoup d'équipes de sécurité informatique est qu'il collectent une grande quantité d'événements, tellement que leur solution de Security Information and Event Management (SIEM) croule sous les données, rendant cette solu...

+

Drones & No Fly Zones with XavDrone

workshop

Pour les drones ce ne sera pas 1 mais plusieurs worshop et on modulera selon
vos envies ! Bien sur on présentera quelques drones…

1/ Législation drones : non le drone n’est pas illégal mais la frontière est
parfois proche, donc un petit rappel de...

+

(EN) How my SV Machine nailed your Malware with Nikhil KURKANI

talk

As we know the Android Application Industry from a security perspective, it is also quite well known that the Android platform is succeptible to malicious applications. And with the recent trend where all the vendors and customers going completely mo...

+

BREAK / LA PAUSE

break
  • 24/06/17
    21:15 > 22:15
+

Hardware hacking for dummies par Gyver Ferrand (Yggdrasil)

workshop

Appréhender, de manière pratique, les bases du Pentest hardware/IoT et les bases méthodologiques pour exploiter des systèmes embarquant la technologie bluetooth, omniprésente dans le milieu de l'IOT. Au terme du temps imparti, les participants a...

+

Privacy on steroids V2 par Bruno KEROUANTON

workshop

Amenez vos laptop Windows 10 et nous les renforceront pour protéger votre vie privée.
Nous verrons également les messageries (instantanées ou non) sécurisées, la configuration avancée de pare-feu et autres règles proxy, des VPN sécurisés, To...

+

(FR) Hack your car or your helicopter !

talk workshop

The connected car is a subject often discussed in the media. The digital takeover of the vehicle is a nightmare for builders. Instead of opening and sharing common standards, we are able to reproduce the errors made in the past on the mechanical side...

+

Retromeetup par Arnaud VELTEN

workshop

Atelier Maker Solidaire en utilisant la distribution Recalbox.

À propos de Arnaud VELTEN @bizcom

GENERAL MAP