Hacking with Computest


Details
***ATTENTION: If you have any dietary requirements please let us know by using the form.***
Dietary requirements form: https://forms.gle/rEZ6GUyyAQa7NMfJ9
Computest invited us to do some hacking and have a BBQ with them. That sounds fun, right? So let's go!
Schedule (subject to change, except the walk in time)
18:00 - 18:30 walk in
18:30 - 19:30 Hacking the pandemic’s most popular software - Daan Keuper & Thijs Alkemade
19:30 - 20:00 BBQ
20:00 - 21:00 Ransomware incident handling - Lisa de Wilde
21:00 Networking
Hacking the pandemic’s most popular software
When the pandemic required everyone to work from home we saw a huge growth on the video conference market. It was this movement that made the organisation behind the world famous Pwn2Own competition decide to add an 'Enterprise Communication' category to last year’s competition. Everyone who was able to successfully demonstrate a zero-day attack chain against was rewarded with $200.000. We decided to take them up on this challenge, and started researching. This resulted in a working exploit against the then latest version of Zoom, that would give the attacker full control over your system. With this research we where able to win last year’s Pwn2Own competition. Now Zoom has fixed all vulnerabilities we found; we can share the details of our research.
Daan Keuper is the head of security research at Computest. This division is responsible for advanced security research on commonly used systems and environments.
Daan participated twice in the internationally known Pwn2Own competition. By demonstrating zero-day attacks against the iPhone and Zoom. In addition Daan did research on internet connected cars. In which they found several vulnerabilities in cars from the Volkswagen Group.
Thijs Alkemade works at the security research division of at Computest. This division is responsible for advanced security research on commonly used systems and environments.
Thijs is a Pwn2Own winner by demonstrating a zero-day attack against Zoom. In previous research he demonstrated several attacks against the macOS and iOS operating systems. He has a background in both mathematics and computer science, which gives him a lot of experience with cryptography and programming language theory.
Ransomware incident handling
Lisa de Wilde, business unit director Incident Response at Computest, explains what happens when a company is hit by ransomware and which disciplines you need to overcome such an incident.
All women of WICCA are invited to attend. Seats are limited, so if you can no longer attend, don't forget to sign off so someone else can take your place <3

Hacking with Computest