Last presentation of today, Joffrey Czarny presented how to go outside a Citrix context. As a pen-tester and maintainer of the Elsenet project, he explained how a pen-test was performed against a Citrix environment. First, it looked very easy to get a list of published applications! Amazing! Then ICA files
Back from a coffee break, let’s start the next part! Adam Laurie presented its Python library used to explore RFID devices. RFID devices becomes part of our daily life. Adam focused on ePassports. He made a demo with a passport grabbed from the audience (he had to ask several times,
hack.lu just started! The first talk was Malware of the future – When mathematics work for the dark side. To be honest, it was very hard in the morning! The speaker, Eric Filiol, flooded the audience with mathematical formulas. I didn’t practice maths for a while! But, and maybe the
Yesterday, I attended a very interesting session about the SANS “Internet Storm Center” (ISC). This event was organized by the Belgian ISSA Chapter in Brussels. As I’m a daily ISC users for a long time, it was very interesting to have a “back stage” overview of this organization. The Internet
The Global Security Week announced by L-SEC starts today! Check out the press release for more details (fr or nl). It’s a good opportunity for all of us to promote security in our environments and ‘stick the knife in deeper’ with key facts: Use a strong password management (strong passwords,
Happy Sysadmin Day to all system administrators around!