The use of a wall of sheep (or WoS) is nice to raise the security awareness of your audience.Â A WoS is aÂ tool used toÂ demonstrate what can happen when users connect to a wild network without a minimum level of security. The non-encrypted traffic is analyzed andÂ evidence ofÂ bad behaviour isÂ displayed publicly
Hack.lu 2018 Wrap-Up Day #3
Here we go with the last wrap-up of the 2018 edition! The first presentation was about worms: “Worms that turn: nematodes and neotodes” by Matt Wixey. The first slide contained the mention: “for educational purposes only”. What could we expect? The idea of the research performed by Matt was interesting.
Hack.lu 2018 Wrap-Up Day #2
The second day started early with an eye-opener talk: “IPC – the broken dream of inherent security” by Thanh Bui. IPC or “Inter-ProcessÂ Communications” are everywhere. You can compare them as a network connection between a client and a server but inside the operating system. The idea of Thanh’s research was
Hack.lu 2018 Wrap-Up Day #1
TheÂ 14th edition (!) of hack.lu is ongoing in Luxembourg. I arrived yesterday to attend the MISP summit which was a success. It’s great to see that more and more people are using this information sharing platform to fight bad guys! Today, the conference officially started with the regular talk. I
Wanna Come to BruCON? Solve This Challenge!
Wow, 10Â years already! In a few weeks, this is the 10th edition of BruCON or the “0x0A edition“. If you know me or follow me, you probably know that I’m part of this wonderful experience since the first edition. I’m also sponsoring the conference through my company with a
Hack.lu 2018 is ahead!
During this summer, I went to SANSFire, DefconÂ and BSidesLV. Usually, the month of September is lighterÂ without big events for me. This is to prepare for the next wave of conferences ahead! Of course, BruCON will be held on the first week of October but, especially,Â Hack.luÂ which remains one of my favourite
Pass-The-Salt 2018 Wrap-Up Day #3
The day three started quietly (let’s call this fact the post-social event effect) with a set of presentationsÂ around Blue Team activities. Alexandre Dulaunoy from CIRCL presented â€œFail frequently to avoid disasterâ€ or how to organically build an open threat intelligence sharing standard to keep the intelligence community free and sane!
Pass-The-Salt 2018 Wrap-Up Day #2
When you have a look at the schedule of infosec conferences, the number of events is already very high. There is one at least every week around the world. So, when a new one is born and is nice, it must be mentioned. “Pass-The-Salt” (SALT means “Security And Libre Talks“)
SSTIC 2018 Wrap-Up Day #3
And here we go with the wrap-up of the 3rd day of the SSTIC 2018 “Immodium” edition. Indeed, yesterday, a lot of people suffered from digestive problems (~40% of the 800 attendees were affected!). This will for sure remains a key story for this edition. Anyway, it was a good
SSTIC 2018 Wrap-Up Day #2
The second day started with a topic this had a lot of interest for me: Docker containers or “Audit de sÃ©curitÃ© d’un environnement Dockerâ€ by Julien Raeis and Matthieu Buffet. Docker is everywhere today and, like new technologies, is not always mature when deployed, sometimes in a corner by developers.