Hack.lu 2024: A Can’t-Miss Cybersecurity Event in the Heart of Europe

The hack.lu 2024 security conference, taking place from October 22nd to 25th in Luxembourg, is shaping up to be an unforgettable event for the cybersecurity community. Whether you’re a seasoned professional, an enthusiast, or someone curious about the field, hack.lu offers an unparalleled opportunity to learn, network, and immerse yourself in the latest trends and challenges in cybersecurity. This year’s agenda is packed with groundbreaking talks, hands-on workshops, and exciting activities like the Capture The Flag (CTF) competition. Here’s a sneak peek at what you can expect.

Main Track Overview

The main track at hack.lu is always a crowd-pleaser, and this year’s lineup promises to be no different. Here is the complete list of talks:

  • APT28: Following bear tracks back to the cave by Golo
  • Artemis: how CERT PL improves the security of the Polish internet by Krzysztof Zając
  • Automating Dark Web CTI Reports with RAG Insight for MISP Sharing by Shing-Li Hung
  • Back to the failure - Did your physical security really evolved in the last 40 years? by Simon Geusebroek
  • Blowing up Gas Stations for fun and profit by Pedro Umbelino
  • CSIRT and the Chocolate Factory by Didier Stevens
  • Cyber Threats to Advanced Intelligent Connected Vehicle Systems by Shihao Xue, Yuqiao Ning
  • DFIQ - Codifying digital forensic intelligence by Thomas Chopitea
  • Decoding Galah: an LLM powered web honeypot by Adel Karimi
  • Detection And Response for Linux without EDR by Hilko Bengen
  • Disconnecting games with a single packet: an Unreal untold story by Hugo Bertin
  • Dredge: An Open Source Framework for Cloud Incident Response by Santi Abastante
  • Empowering Cybersecurity Outreach and Learning through Collaborative Challenge Building, Sharing, and Execution by Alexandre Dulaunoy, David Durvaux
  • From 0 to millions: Protecting against AitM phishing at scale by Jacob Torrey
  • Ghosts’n’gadgets: common buffer overflows that still haunt our networks by Stanislav Dashevskyi
  • I Need Access: Exploit Password Management Software To Obtain Credential From Memory by Efstratios Chatzoglou
  • In-Depth Study of Linux Rootkits: Evolution, Detection, and Defense by Stephan Berger
  • Insights from Modern Botnets by Miguel
  • Internal Domain Name Collision 2.0 by Philippe Caturegli
  • IoT hacks humans - unexpected angles of Human Process Compromise by Vladimir Kropotov
  • Keys to the City: The Dark Trade-Off Between Revenue and Privacy in Monetizing SDKs by Dimitrios Valsamaras
  • KubeHound: Identifying attack paths in Kubernetes clusters at scale with no hustle by Julien
  • Lessons Learned from (almost) 8 Years of Sigma Development by Thomas Patzke
  • Making IOT great again by David Durvaux, Marc Durvaux
  • Malware and Hunting for Persistence: How Adversaries Exploit Your Windows? by cocomelonc
  • Mercator - Mapping the information system by Didier Barzin
  • NeuroCTI - a custom LLM for CTI - benchmarking, successes, failures and lessons learned (updates) by Aaron Kaplan
  • New features in the Zeek Network Monitor by Christian Kreibich
  • Nothing to see here! On the awareness of and preparedness and defenses against cloaking malicious web content delivery by Jeroen Pinoy
  • Predictive Analytics for Adversary Techniques in the MITRE ATT&CK Framework using Rule Mining by Tristan MADANI
  • Quantum Cybersecurity - Pioneering a Secure Future by Samira Chaychi, Sharif Shahini
  • Reverse engineering Android apps with ACVTool by Aleksandr Pilgun
  • Revolutionizing IoC Sharing: MISP, ZMQ and the Power of Smart Workflows & Taxonomies by Mike
  • SQL Injection Isn’t Dead: Smuggling Queries at the Protocol Level by Paul Gerste
  • Scam as a Service powered by Telegram by Aurimas Rudinskis
  • Securing the Stars: Comprehensive Analysis of Modern Satellite Vulnerabilities and Emerging Attack Surfaces by Vic Huang
  • Sigma Unleashed: A Realistic Implementation by Mathieu LE CLEACH
  • Spicy — Generating Robust Parsers for Protocols & File Formats by Benjamin Bannier
  • TODDLERSHARK: Kimsuky’s Hastily Built Variant of BABYSHARK Deployed Using an 1-Day Exploit by George Glass
  • Tales of the Future Past by Saâd Kadhi
  • The Gist of Hundreds of Incident Response Cases by Stephan Berger
  • The Ouroboros of Cybercrime: Witnessing Threat Actors go from Pwn to Pwn’d by Estelle
  • The Web of cognitive warfare by Jindrich Karasek
  • The XE Files - Trust No Router by James Atack
  • The good, the bad, and the ugly: Microsoft Copilot by Michael Bargury, Inbar Raz
  • Trying Gateway Bugs: Breaking industrial protocol translation devices before the research begins by Claire Vacherot
  • Understanding file type identifiers & scanners by Ange Albertini
  • You just got a CTI program funded - now what? by Lukas Vytautas Dagilis

Workshops to Boost Your Skills

In addition to the main track talks, hack.lu 2024 offers a series of hands-on workshops designed to deepen your technical skills or learning new techniques:

  • Chrome V8 exploitation training for beginners by hoseok Lee
  • Cryptography: from zero to dont-shoot-yourself-in-the-foot by Lorenzo Nicolodi
  • Defeating Encryption By Using Unicorn Engine by Balazs Bucsay
  • Dissecting the Threat: A Practical Approach to Reverse Engineering Malicious Code by Ankshita Maunthrooa
  • Exploring Firmwares: Tools and Techniques for (New) Cartographers by Eloïse Brocas
  • Exploring OpenSSH: Hands-On Workshop for Beginners by William Robinet
  • From protocol analysis to actionable algorithmic and signature detection with Suricata by Eric Leblond, Peter Manev
  • Hands-on Kubernetes security with KubeHound (purple teaming) by Julien
  • Lookyloo, Pandora, and all the bells and whistles to go with them. by Raphaël Vinot
  • MISP Kickstart by Shanna Daly, James Garratt
  • Malware Development and Persistence by cocomelonc
  • NLP deep-dive: Transformers for Text Mining and Text Generation in Cybersecurity by Pauline Bourmeau (Cookie), William Robinet
  • Open source Intelligence and Command line based BGP Hijacking Detection by Joon Kim
  • Operationalization of Sigma Rules with Processig Pipelines by Thomas Patzke
  • ROP on ARM64 - a hands-on tutorial by Saumil Shah
  • Reversing Flutter with Blutter and Radare2 by Axelle Apvrille
  • Scanning with the Artemis security scanner by Krzysztof Zając
  • The Heist: get your hands on the goods! by Stijn Tomme
  • Unleashing the power of purple teaming with OpenTIDE by Remi Seguy, Amine Besson
  • XOR Cryptanalysis by Didier Stevens
  • Zeek and Destroy with Python and Machine Learning Workshop by Eva Szilagyi, David Szili
  • iOS Compromise Detection using open source tools by David Durvaux, Christophe Vandeplas

Capture The Flag (CTF) Competition

No hack.lu is complete without the legendary Capture The Flag (CTF) competition. The hack.lu CTF is known for its challenging and creative puzzles that test participants’ problem-solving and hacking skills across a range of categories, including cryptography, web security, forensics, and more. This year, we are thrilled to have the famous FluxFingers team, known for their innovative and exciting challenges, organizing the CTF once again. With new puzzles designed to push even the most experienced players to their limits, this CTF promises to be an unforgettable experience. Whether you’re competing solo or as part of a team, the hack.lu CTF is an excellent opportunity to hone your skills and have some fun. Additional smaller challenges will take place during the hack.lu conference for the ones who don’t want to invest too much time into the CTF.

Sponsorship Opportunities

Hack.lu provides an opportunity for companies looking to showcase their products and services to a highly engaged audience of security professionals and enthusiasts. Sponsoring hack.lu is not just about brand visibility; it’s about becoming part of a community that values innovation, knowledge-sharing, and collaboration. Sponsors have the opportunity to engage directly with attendees through dedicated booths and active networking during the event.

By supporting hack.lu, sponsors help foster a cybersecurity community and contribute to the event’s unique family atmosphere of learning and exchange. Interested in becoming a sponsor? More details can be found https://hack.lu/sponsoring/.

Why You Should Attend

Hack.lu is more than just a conference; it’s a gathering of minds dedicated to pushing the boundaries of cybersecurity with a strong open source mindset. The sessions and workshops are tailored to provide deep insights and practical skills that you can apply in your work or research. The CTFs are a thrilling test of your abilities, and the networking opportunities are second to none. Plus, to keep your energy levels high, hack.lu offers lunch, beverages, refreshments, and pastries throughout the four days. There’s also a social event where all participants can relax, connect, and exchange ideas in a more informal setting.

Whether you’re there to present, participate, or just soak in the knowledge, hack.lu 2024 offers an unparalleled experience and a great opportunity to meet new friends. Don’t miss your chance to be a part of this exciting event. Tickets are still available, so be sure to grab yours https://hack.lu/info/.

Join us at hack.lu 2024 and become part of the conversation that contributes to the future of cybersecurity!

2024

Back to top ↑