Saluti ai Partecipanti e agli Sponsor
Fine prevista per le 10:45
Over the past few years, Joe Grand has been hacking cryptocurrency wallets to help people recover funds they thought were lost forever. What started as a one-off project has evolved into a dizzying array of personalities and challenges. In this keynote session, Joe will share stories and technical details of his wallet hacking adventures.
Fine prevista per le 11:30
Inizio competizione in Area Dedicata
Fine prevista per le 16:00
Il VoIP ha ormai soppiantato la telefonia tradizionale, ma questa migrazione porta con sé un prezzo: la voce diventa un servizio IP, e con essa eredita tutte le fragilità della rete. I protocolli di segnalazione e trasporto non sono nati con la security in mente: intercettazioni e spoofing sono minacce concrete e spesso sottovalutate. Analizziamo i protocolli alla base della telefonia IP, evidenziando le possibili vulnerabilità e quali strategie di hardening permettono di ridurre questi rischi.
Fine prevista per le 12:15
Testing the hardware security of microcontrollers, especially with fault injection and side-channel attacks, requires low-level access to configure targets and verify attack results. Infineon's TriCore Aurix microcontrollers, widely used in automotive applications, implement a proprietary “Debug Access Port” (DAP) protocol with no public documentation; existing tools are closed, expensive, and have limited functionality. This presentation shows the black-box reverse engineering process of the DAP protocol on a TC397 devkit, through analysis of the USB traffic of proprietary tools. These traces provide sufficient information to develop an open-source utility capable of performing simple operations such as flashing, debugging, and unlocking the debug interface (if the correct password is provided). The tools and information presented help security researchers by allowing them to generate triggers for hardware attacks, automate testing, and verify results without having to rely on the manufacturer tools.
Fine prevista per le 13:00
Ci rivediamo tra pochissimo...
Fine prevista per le 14:15
Tornano i LAB in una nuova veste! Cerca nel foyer l'area dedicata! VoIP: hands-on protocol & Low-level analysis of on-chip debug interfaces ti aspettano!
Fine prevista per le 17:00
Did you hear about the recent Shai-Hulud npm incident that led to silent exfiltration of secrets from thousands of machines? Or the XZ backdoor? Or the flood of AI-generated malware on PyPI? Let’s admit it: even if your company doesn’t build any commercial SW, you most likely use npm, pip, DockerHub, GitHub Actions, or AI code assistants. Yes, you're consuming open source every day. This talk is a practical, zero-fluff guide to both hacking and defending OSS - with real companies hacks that I witnessed first hand, free tools that actually work, and battle-tested advice from one of the world’s top open-source contributing companies. Whether you're a Pentester, AppSec engineer or working in Dev, Sec, or DevOps - you’ll leave with a concrete toolset, a checklist, and the ability to spot the attackers before they hit your build pipeline.
Fine prevista per le 15:15
L'architettura Apple Silicon ha introdotto nuove sfide per l'acquisizione forense di dispositivi macOS, poiché gli strumenti tradizionali di copia come dd o Disk Utility non possono essere usati, data la crittografia a livello hardware. Questo problema ha ispirato la creazione di Fuji, uno strumento gratuito e open source per l'acquisizione forense dei computer Mac. Fuji sfrutta le utility native di Apple come ASR e Rsync per eseguire un'acquisizione live completa del file system (FFS), funzionando anche su unità criptate. Genera file DMG compatibili con strumenti come FTK Imager e Autopsy. Vedremo cosa è in grado di fare Fuji, le differenze tra le modalità di acquisizione e come è stato sviluppato utilizzando Python.
Fine prevista per le 16:00
As phishing and common exploits become increasingly mitigated, adversaries are pivoting to non-traditional, low-visibility initial access vectors. This presentation examines three such techniques (validated through real-world incident response and threat intelligence reports) and analyzes them from both a detection and hardening perspective. First, Rogue RDP weaponises .rdp files to force outbound sessions where drive-redirection silently mounts the victim’s \tsclient share for exfiltration or payload staging (no local code execution required). Second, we expose ML-framework deserialization RCEs: PyTorch CVE-2025-32434 (torch.load, weights_only=True) and Keras CVE-2025-1550 (Model.load_model, safe_mode=True), both enabling attacker code during model loading in CI/CD or inference services. Third, FileFix (ClickFix variation) chains browser clipboard abuse with Explorer’s address-bar autostart to pop hidden PowerShell with a single paste. For each vector: an annotated PoC (offline/safe), high-fidelity telemetry, and ready-to-use Sigma/YARA patterns + SIEM queries (SPL/KQL). A hardening matrix maps mitigation controls across tactical measures (e.g., drive redirection policies, import allow-lists) and long-term strategies (e.g., model signing, userland segmentation). This session aims to equip blue teams with both actionable detections and a practical roadmap for reducing exposure to these evolving initial-access techniques.
Fine prevista per le 16:45
Report e Premiazione Squadre HackInBo® Forensic Games
Fine prevista per le 17:15
Saluti ai Partecipanti & agli Sponsor
Fine prevista per le 17:30