Windows Kernel Security: A Deep Dive into Two Exploits Demonstrated at Pwn2Own

Windows kernel exploitation is a fascinating and challenging field of research that draws the attention of security researchers and attackers alike. The Windows kernel and its drivers are a vast and complex code base that offers many opportunities for discovering and exploiting vulnerabilities that can lead to system compromise and security mechanisms bypasses. This talk […]

From Unknown Parameter to Root: A Story of Unexpected Intrusion Testing Results

In the past thirteen years, SAP still has an endless stream of vulnerabilities patched, some of which are not known to the world, however, they are hidden threats that could lead to disasters. This time we would like to tell a story. A story where everything starts from a classical pentest against a SAP System […]

CLOSING KEYNOTE: Systems Alchemy: The Transmutation of Hacking

Everywhere we look we find complex systems creating, enabling, controlling and shaping the fabric of modern life. The critical infrastructure of society is dependent on systems, mostly privately owned, that have same the inherent problems of all complex systems. In this keynote we examine the properties of systems and how understanding them creates new opportunities […]