Trending

#hacklu2025

Latest posts tagged with #hacklu2025 on Bluesky

Latest Top
Trending

Posts tagged #hacklu2025

Kaitai Struct: A Tool For Dealing With Binary Formats - Petr Pucil & Mikhail Yakshin


www.youtube.com ->

#hacklu2025


Original->

0 0 0 0

I think @Ange will like @wr’s file format tricks from #hacklu2025 !

ASCII art in a valid certificate??
Video in a certificate? And it’s valid?

Nice work Wil!

0 0 0 0
Original post on mastodon.social

As #hacklu2025 draws slowly towards a happy ending and many many presentations and conversations later, by and with so many fantastic people, I’d like to propose to you to meet up again in the spring, instead of waiting all until #hacklu2026.

If you’re interested you can continue the […]

0 1 0 0
Post image Post image Post image

Last before lunch is @Cocomelonc with a talk on covert C2 -> “Exploiting legit APIs for covert C2: A new perspective on cloud-based malware operations”

At #hacklu2025

0 0 0 0
Post image Post image

Next up is Fluxfingers’ Paul Gerste with a lethal sounding talk “Lethal language models: From Bit Flip to RCE in Ollama”

#hacklu2025

0 0 0 0

The Russian underground has ads for “arson” “surveillance” and more types of #hybridwarfare capabilities.

It seems there’s some (not unexpected, not the first time) connection between Russians Gov and the underground…

#hacklu #hacklu2025

0 0 0 0
Post image Post image

Next up is another #hacklu “frequent flyer” Vladimir Kropotov with “Russian speaking underground- changes in the risks, attack surface and modus operandi”

At #hacklu2025

0 0 1 0

The Van Helsing RAS groups have entire affiliate marketing campaigns including promo videos!

And the Van Helsing group had some internal strife/beef and everything they had was leaked online.

#hacklu2025

0 0 0 0
Post image Post image Post image

Now its time for something that looks like an Intel-ops type of talk: “Persōna theory: Infiltration & Deception of emerging threats groups” and its @tammyharper on stage presenting at #hacklu2025

The recruitment phase is a really good point to infiltrate […]

[Original post on mastodon.social]

0 0 1 0
Post image

#hacklu2025

0 0 0 0
Post image Post image

Last talk before the morning break is a cloud! related talk by Hugo: “From YAML to Root: CI/CD pipeline attacks and countermeasures”

At #hacklu2025 !

@spirit is apparently his handle, but maybe not on here…?

0 0 1 0
Preview
ossbase.org Empowering Open Source Security Software Through Support, Autonomy, and Collaboration.

For those at #hacklu2025 :

Please vote for the best talk at
http://discourse.ossbase.org

0 0 0 0
Post image Post image Post image

Next up are Etienne Charon and Khadim with an actual #carsecurity talk at #hacklu2025 ! One of the first carsec talks I remember ever at #hacklu.

“Audit and retrospective of an automotive application: Carplay”

#iamthecavalry

0 0 0 0
Post image Post image

Second up today is Maxine Escourbiac breaking into Palo Alto GlobalProtect clients in “Palo Alto GlobalProtect: Remote full compromise exploit chain” at #hacklu2025

1 1 1 0
Post image Post image Post image

Opening the final (day 4) of #hacklu2025 are Rajanash Pathak and Hardik Kamlesh Mehta who’re going deep into android IPC with their talk: “Breaking android IPC: A deep dive into AIDL fuzzing”

0 0 0 0

And now? Who’s slide is it anyway?

🔥🔥🔥

#hacklu2025

0 0 0 0

@Regit Suricata is now available as a library!!

#hacklu2025

0 0 0 0
Post image Post image Post image

Its now @Regit and Peter Manev presenting the detection and performance improvements released with the recent #Suricata8 release

#hacklu2025

0 0 1 0
Post image

Guess which of these 5 vulnerabilities/CVEs is the RCE

#hacklu2025

0 0 0 0
Post image

And from the remote server, any device connected to it can be compromised! #hacklu2025

0 0 1 0

There’s an application used to connect remote repositories. Using a path traversal vulnerability, it’s possible to remotely take control of any such (also internet exposed of which there’s quite a few).

#hacklu2025

0 0 1 0
Post image Post image

First up at #hacklu2025 after an Epoch and the afternoon break (get your devices and applications made 2038 safe) we have Alain Mowat on stage digging into the Dell thin client called “Wyse Management Suite” which can manage Wyse devices but also a ton of other devices!

0 0 1 0
Post image

#hacklu2025 #2038epoch

0 0 0 0
Post image

2042 in iOS calendar #hacklu2025 #2038epoch

0 0 1 0
Post image

Ask why! #hacklu2025 #2038epoch

0 1 1 0
Post image Post image Post image Post image

The next talk is about time itself, visualized by a Rube-Goldberg machine. Its Pedro Umbelino and Trey Darley on stage presenting “2038 is gonna be epoch!”

This is an entire class of vulnerabilities. Even if kernels are patched now/by then, what about […]

[Original post on mastodon.social]

0 0 1 0

#hacklu2025 Remi and Pierre managed to build first a working RCE, and then a stealthy version of the same. They then demoed using the exploit on an OSS project that uses Livewire -> the Snipe-IT cmdb. Funnily I always followed Snipe on Twitter back before the exodus. @snipe ah maybe she IS here.

0 0 0 0
Post image Post image

Next up is Rémi Matasse and Pierre Martin with “Livewire: remote command execution through unmarshalling”

#hacklu2025

0 0 1 0
Post image Post image

Next up is @criskittner with her talk “The human factor: Psychological safety in cybersecurity frontlines”. The first time she gave this talk she was laid off during the talk and lost access to the presentation!

#hacklu2025

0 0 1 0
Post image Post image

First up after the LTs: Revisiting Widewine L3: DRM as a playground for hackers with Felipe Custodio Romero!

#hacklu2025

0 0 0 0