en
Display fullscreen
Ticket lost ?
Click here
|
English
Francais
English
Español
Italiano
Deutsch
Português
Dutch
Outils
Dernière commande
Step
Choice of date
Basket
Options
Details
Checkout
Confirmation
Check if there is an order in your name
Last name
First name
Order date
Check
Modify email order
Last name
First name
New email
Submit
Ship the order again
Type the email address used for your order
Cancel
Submit
Download my tickets
Download complete
Email
Last 4 digits of the bank card
Cancel
Download
Conference - 13th & 14th of Octobrer 2023
Palais Brongniart, Place de la Bourse, Paris, France
Early Bird
Read more
650.00
€
In 1 day
A choice will be proposed to you in the next step
Standard Price
Read more
900.00
€
In 1 day
A choice will be proposed to you in the next step
Late Bird
Read more
1100.00
€
In 1 day
A choice will be proposed to you in the next step
Trainings - 9th to 12th of October 2023
Espace Vinci, Rue des Jeuneurs, Paris, France
Offensive Azure AD and hybrid AD security — Dirk-jan Mollema
In the past few years, many companies have adopted Azure AD as an identity platform for their cloud services, often using their existing on-prem AD in a hybrid setup. Azure AD is vastly different from on-premises AD and requires a different security approach to either attack or defend.
This training explains how organizations use Azure AD to manage modern cloud-based or hybrid environments and what security challenges this brings. It is the result of many years of research into the protocols and internals of Azure AD. The training will give you the knowledge to analyze, attack, and secure Azure AD and hybrid setups from modern attacks.
The training is technical and deep-dives into core protocols such as OAuth2 and application concepts. It includes many hands-on exercises and labs, set up as challenges, to gain access to accounts and elevate privileges.
Read more
4200.00
€
Included
0
1
2
A choice will be proposed to you in the next step
Windows Internals for Security Engineers — Yarden Shafir
Join an esteemed senior security researcher and endpoint security engineer for a deep dive into the internals of the Windows 11 Operating System.
Read more
4200.00
€
Included
0
1
2
A choice will be proposed to you in the next step
Practical Baseband Exploitation — Pedro Ribeiro & Seamus Burke
Baseband exploitation is often considered the cream of the offensive security field. Many researchers view the ability to silently achieve code execution on a victim's device by emulating a GSM or LTE base station as a difficult objective. In reality, baseband exploitation is much easier than expected. In this course, students will learn our systematic approach to baseband research - from setting up a fake base station using SDR and open-source BTS software, to achieving initial debugging abilities using our embedded hooking framework, and finally reverse engineering the relevant protocols, hunting for bugs and exploiting them. By the end of this heavily hands-on course, students will become familiar with two extremely common baseband platforms, Shannon and Mediatek, gain the skills to debug these and other baseband platforms, and learn about previously discovered bugs in basebands, and how they have been exploited.
Read more
4200.00
€
Included
0
1
2
A choice will be proposed to you in the next step
Attacking Instant Messaging Applications — Nitay Artenstein & Iddo Eldor
Few publicly-known hacks have inspired the imagination of security researchers as much as exploits against IM (instant messaging) applications. 0-click attacks aimed against applications such as WhatsApp, iMessage, and Telegram have raised unprecedented interest and have often caused political turmoil. Yet, in sharp contrast with the curiosity that IM exploitation generates, public information about this surface remains scant. This training is our bid to bridge the gap.
This course will provide students with the knowledge and hands-on experience in reverse engineering, vulnerability research, and exploitation of real-world IM applications. The target audience is advanced security professionals.
Read more
4200.00
€
Included
0
1
2
A choice will be proposed to you in the next step
Binary Ninja for Reverse Engineers — Jordan Wiens & Kyle Martin
This course is for experienced reverse engineers, researchers, and analysts looking to migrate from other tools and workflows. This course provides a comprehensive tour of Binary Ninja's powerful core analysis features, emphasizing the additional capabilities and specific differences between it and other popular tools. We'll also explore performing actions through Binary Ninja's extremely ergonomic Python API, and how to use or extend its analysis results to accelerate your reverse engineering process. All-in-all, this class will cover everything you need to get the most out of your new best friend!
Read more
4200.00
€
Included
0
1
2
A choice will be proposed to you in the next step
Software Deobfuscation Techniques — Tim Blazytko
Code obfuscation has become a vital tool to protect, for example, intellectual property against competitors. In general, it attempts to impede program understanding by making the to-be-protected program more complex. As a consequence, a human analyst reasoning about the obfuscated code has to overcome this barrier by transforming it into a representation that is easier to understand.
In this training, we get to know state-of-the-art code obfuscation techniques and look at how these complicate reverse engineering. Afterwards, we gradually familiarize ourselves with different deobfuscation techniques and use them to break obfuscation schemes in hands-on sessions. Thereby, participants will deepen their knowledge of program analysis and learn when and how (not) to use different techniques.
Read more
4200.00
€
Included
0
1
2
A choice will be proposed to you in the next step
Attacking the Linux Kernel — Andrey Konovalov
This training guides researchers through the field of Linux kernel security. In a series of exercise-driven labs, the training explores the process of finding, assessing, and exploiting kernel bugs in a modern Linux distribution on the x86-64 architecture.
Besides providing a foundation for writing Linux kernel exploits, the training covers the no-less important areas of finding kernel bugs and evaluating their security impact. This includes chapters on using and extending dynamic bug-finding tools, writing custom fuzzers, and analyzing crashes.
The training starts with the beginner topics but proceeds into a few advanced areas as well.
Read more
4200.00
€
Included
0
1
2
A choice will be proposed to you in the next step
Binary Literacy 2: Static Analysis of C++ with Hex-Rays — Rolf Rolles
C++ is a huge, complex, and rapidly-evolving language with unique features. Former C++ programmers who return after a hiatus struggle to reacclimate themselves to major features introduced in the meantime. Owing to its complexity and its limitations, hobbyists tend to choose languages other than C++. Owing to its niche specialization to high-performance applications, and its rapid evolution, few programmers who are not employed professionally as C++ developers can justify the time investment of keeping up to date with the language.
Read more
4200.00
€
Included
0
1
2
A choice will be proposed to you in the next step
iOS for Security Engineers — Victor Cutillas & Etienne Helluy-Lafont
During this training, participants will discover the ecosystem and the fundamental bricks of the iOS operating system. They will discover the macOS toolchain used to deploy applications, and the debugging and diagnostic tools. Participants will be teached fundamentals to reverse-engineer applications and system services: Objective-C internals, IPC mechanisms (XPC, NSXPC) and kernel APIs. Practical examples and exercices will guide them all along the training. Hardware and software security measures unique to iOS will be covered, from both userland and kernel perspectives.
Read more
4200.00
€
Included
0
1
2
A choice will be proposed to you in the next step
Secure payment - Billetweb
Secure payment - Billetweb
None
The number of elements to select is
Please choose at least one of the following
If you do not complete all of the choices now, you can do so from the link at the bottom of your purchase confirmation email.
The minimum number of selectable elements is
The maximum number of selectable elements is
Maximum amount for card payment is
You must select at least one product
Minimum amount is not reached
Your browser blocks cookies. Please enable cookies from billetweb.fr in order to use the box office.
Your browser blocks cookies from third parties. Please allow these cookies in order to use the box office.
Your browser blocks cookies. Allow cookies or
Click here
A choice will be proposed to you in the next step
These products cannot be purchased alone
Next
You can enter your code just before payment