The Brain's Last Stand
Hacking Smart Contracts
A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages!
Starting the Avalanche: Application DoS In Microservice Architectures
Breaking the x86 Instruction Set
Dark Data
An ACE Up the Sleeve: Designing Active Directory DACL Backdoors
MEATPISTOL, A Modular Malware Implant Framework
Get-$pwnd: Attacking Battle-Hardened Windows Server
WSUSpendu: How to hang WSUS clients
If You Give a Mouse a Microchip... It will execute a payload and cheat at your high-stakes video game tournament
DNS - Devious Name Services - Destroying Privacy & Anonymity Without Your Consent
Twenty Years of MMORPG Hacking: Better Graphics, Same Exploits
Linux-Stack Based V2X Framework: All You Need to Hack Connected Vehicles
DOOMed Point of Sale Systems
CableTap: Wirelessly Tapping Your Home Network
Introducing HUNT: Data Driven Web Hacking & Manual Testing
Breaking Bitcoin Hardware Wallets
BITSInject
Exploiting Continuous Integration (CI) and Automated Build systems
The call is coming from inside the house! Are you ready for the next evolution in DDoS attacks?
Malicious CDNs: Identifying Zbot Domains en Masse via SSL Certificates and Bipartite Graphs
Man in the NFC
Closing Ceremony