Difference between revisions of "Topics"

From
Jump to: navigation, search
 
Line 6: Line 6:
 
! Description
 
! Description
 
! By
 
! By
 +
! Date
 
|-
 
|-
 
|1
 
|1
Line 11: Line 12:
 
|First meeting regarding Defcon & concepts
 
|First meeting regarding Defcon & concepts
 
|Umit
 
|Umit
 +
|2018-10-12
 
|-
 
|-
 
|2
 
|2
Line 16: Line 18:
 
|Advanced web hacking techniques
 
|Advanced web hacking techniques
 
|Praveen
 
|Praveen
 +
|2018-10-12
 
|-
 
|-
 
|3
 
|3
 +
|Linux kernel exploitation
 +
|Workshop about kernel exploitation
 +
|Jordy
 +
|2019-06-15
 +
|-
 +
|4
 +
|Fuzzing
 +
|Workshop fuzzing for fun and profit
 +
|Melvin
 +
|2019-07-06
 +
|-
 +
|5
 
|Network Infrastructure Hacking techniques
 
|Network Infrastructure Hacking techniques
 
|Meeting about hacking infrastructure (breaking hardening)
 
|Meeting about hacking infrastructure (breaking hardening)
 
|Sameer
 
|Sameer
 
|-
 
|-
|4
+
|6
 
|Privilege escalations
 
|Privilege escalations
 
|Examples of privilege escalations post exploitation
 
|Examples of privilege escalations post exploitation
 
|Arno
 
|Arno
 
|-
 
|-
|5
+
|7
 
|Assembly language / ShellCode basics
 
|Assembly language / ShellCode basics
 
|Dive deep into assembly code x86/x64
 
|Dive deep into assembly code x86/x64
 
|Hidde
 
|Hidde
 
|-
 
|-
|6
+
|8
 
|Exploit Development Basics
 
|Exploit Development Basics
 
|How to develop your own exploit
 
|How to develop your own exploit
 
|Umit
 
|Umit
 
|-
 
|-
|7
+
|9
 
|FUD
 
|FUD
 
|Fully undetectable malware
 
|Fully undetectable malware
 
|Melvin
 
|Melvin
 
|-
 
|-
|8
+
|10
 
|Exploit chaining attacks
 
|Exploit chaining attacks
 
|Advanced web hacking techniques
 
|Advanced web hacking techniques
 
|tbd
 
|tbd
 
|-
 
|-
|9
+
|11
 
|Binary Injections
 
|Binary Injections
 
|DLL injections and hooking
 
|DLL injections and hooking
 
|tbd
 
|tbd
 
|-
 
|-
|10
+
|12
|Vulnerability Analysis
 
|Fuzzing, binary instrumentation and debugging tricks
 
|tbd
 
|-
 
|-
 
|11
 
 
|Reversing
 
|Reversing
 
|With IDA Pro / 010 editor
 
|With IDA Pro / 010 editor
Line 64: Line 73:
 
|-
 
|-
 
|-
 
|-
|12
+
|13
 
|SSRF
 
|SSRF
 
|Advanced SSRF (Server-Side Request Forgery) techniques
 
|Advanced SSRF (Server-Side Request Forgery) techniques
 
|Jordy
 
|Jordy
 
|-
 
|-

Latest revision as of 08:18, 7 July 2019

Proposed topics for the next DC3158 meetings

# Topic Description By Date
1 Kick-off First meeting regarding Defcon & concepts Umit 2018-10-12
2 Esoteric Web Hacking Advanced web hacking techniques Praveen 2018-10-12
3 Linux kernel exploitation Workshop about kernel exploitation Jordy 2019-06-15
4 Fuzzing Workshop fuzzing for fun and profit Melvin 2019-07-06
5 Network Infrastructure Hacking techniques Meeting about hacking infrastructure (breaking hardening) Sameer
6 Privilege escalations Examples of privilege escalations post exploitation Arno
7 Assembly language / ShellCode basics Dive deep into assembly code x86/x64 Hidde
8 Exploit Development Basics How to develop your own exploit Umit
9 FUD Fully undetectable malware Melvin
10 Exploit chaining attacks Advanced web hacking techniques tbd
11 Binary Injections DLL injections and hooking tbd
12 Reversing With IDA Pro / 010 editor Melvin
13 SSRF Advanced SSRF (Server-Side Request Forgery) techniques Jordy