Kraków
speakers
partners
The conference took place on May 23-24, 2012 in Krakow!
During the tenth edition, there were workshops, discussion panels, a stay at Hackers 'Squad, Hackers' contests, Hackers for Charity Roulette, and many more.
| Abraham Aranguren | Legal and efficient Web app testing without permission |
| Alan Kakareka | Insight into Russian black market |
| Alexander Minozhenko | How to hack VMware vCenter server in 60 seconds |
| Andreas Bogk | Herding RATs / How to pentest without blowing yourself up |
| Andrew Petukhov | You won’t believe that blind can see: benchmarking SQL injection scanners |
| Artur Sidorko | Architektura Bezpieczeństwa systemów kontroli przemysłowej |
| Babak Javadi | Alarmed About Your Alarm System Yet? |
| Bernhard “Bruhns” Brehm | Deniability in messaging protocols |
| Brad “RenderMan” Haines | Hacker + Airplanes = No good can come of this |
| Dmitriy “D1g1″ Evdokimov | Light and Dark side of Code Instrumentation |
| Filip Palian | Simplest Ownage Human Observed… Routers |
| Gareth Hayes | Non-alphanumeric JavaScript/PHP and Shared Fuzzing |
| Gaweł Mikołajczyk | IPv6 insecurities at First Hop |
| Gregor Kopf | Deniability in messaging protocols |
| Juraj Somorovsky | All your clouds are belongs to us – security analysis of cloud management interfaces |
| John Draper | History of hacking |
| Karim Valiev | You won’t believe that blind can see: benchmarking SQL injection scanners |
| Keith Howell | Alarmed About Your Alarm System Yet? |
| Krzysztof Kotowicz | Something wicked this way comes |
| Luiz Eduardo | Introduction to Mobile Snitch |
| Magdalena Kurnik | Hackers: Beyond the Edge |
| Mario Heiderich | Got your Nose! How to Steal Your Precious Data Without Using Scripts |
| Mateusz Kocielski | Simplest Ownage Human Observed… Routers |
| Nicolas Grégoire | Attacks on the XML data processing |
| Pavol Luptak | Cryptoanarchy – decentralization begin |
| Piotr Ciepiela | Architektura Bezpieczeństwa systemów kontroli przemysłowej |
| Raoul Chiesa | Ladies and Gentlemen, here’s *Your* Cyber Army! (from a Hacker’s perspective, of course) |
| Sandy “Mouse” Clark | Practical Insecurity in Encrypted Radio |
| Tomasz Sawiak | Security monitoring use cases |
| Zane Lackey | Security at scale: Web application security in a continuous deployment environment |