atlas des actus
    
Hackfest : youtube
04  juillet     14h51
We are Hackfest - Nous sommes Hackfest
   We are Hackfest Nous sommes Hackfest
16  juin     00h05
iHack Montréal 2024
   Présentations de cybersécurité et hacking juin
29  mai     16h47
Agir AVANT (Jacques Sauve)
   La cybersécurité, ce n’est pas important ; jusqu’à ce que ça le devienne. Nous allons voir le cas d’une PME qui a décider d’agir AVANT que quelque chose arrive en implantant les contrôles CyberSécuritaire Canada À la base, la cybersécurité repose sur une bonne hygiène TI : s’occuper de ses syst...
    16h46
Dans le monde de Git - De Zéro à Héros (Félix Lehoux)
   Nous avons tous des parcours différents, cela fait que nous n’avons pas le même niveau de connaissances de Git. Certains ont fait un parcours réseau, administratif, sécurité offensive défensive ou encore en programmation. Cela explique la différence de niveau et c’est normal. La chose que j’ai d...
    16h39
Android Application and APIs hacking (Gabrielle Botbol)
   As mobile devices have become increasingly prevalent, the security of Android applications has become a critical concern. Pentesting is an essential process for identifying and mitigating potential vulnerabilities in these applications, but Android app hacking is a specialized area that is less...
    16h38
Exploring RAM Forensic Analysis for Effective Digital Investigations (Sneha Banerjee)
   In the field of digital forensics, the analysis of volatile memory, commonly known as RAM, has emerged as a powerful technique for uncovering critical digital evidence. As cybercriminals become increasingly sophisticated in their methods, traditional disk based forensic approaches may miss crucial...
    16h37
War from home: la technologie au service de la mobilisation ukrainienne (Luc L & Gabrielle J V)
   Découvrez l’impressionannte mobilisation technologique ukrainienne: combat dans le cyberespace et sur les réseaux sociaux, drones modifiés, IT Army et OSINT. La présentation mettra en lumière les aspects uniques de la manière dont les Ukrainiens mobilisent la technologie pour amener le combat dans...
    16h36
Rubber DuckHunt - Détection d’un classique (Eric M. Gagnon)
   quot;Rubber DuckHunt quot;, un outil innovant pour détecter et contrer les attaques de keystroke injection, une menace souvent négligée depuis sa popularisation par le Rubber Ducky; je souhaite présenter et partager cet outil en exclusivité lors de la conférence.
    16h35
GamePwn 101 - Introduction to Game Hacking (James Li)
   In the rapidly evolving landscape of gaming, understanding the realm of game hacking is essential, especially in multiplayer games. While some people engage in game hacking for fun or as a hobby, others use it to cheat and gain an advantage in online multiplayer games, which can ruin the experience...
    16h34
Lessons from LastPass: Beyond Secure Password Management (Cheryl Biswas)
   LastPass is a popular password manager used from individuals through corporate levels. However, in it suffered two breaches, and only recently was the extent of the damage made known. An unknown attacker was able to take the literal keys to the kingdom, compromising everything stored in the...
    16h33
Hacking Reality: CounterCloud’s AI-Driven Disinformation Campaign (N & MJ Banias)
   Ever wondered if Skynet could run a fake news empire and win a Pulitzer This is CounterCloud, a two month online experiment that is part ’Terminator,’ part ’Black Mirror,’ and takes us deep into the wild frontier of totally autonomous AI generated disinformation. https: cfp.hackfest.ca hf ...
    16h32
Enchantment under the C (Patrick Mathieu & Kendra Cooley)
   How the placement of your security program may be impacting your organization. https: cfp.hackfest.ca hf talk MXJBJB https: hackfest.ca
    16h31
Artificial Intelligence Real Threats (Johnny Xmas & Chris Carlis)
   A buzzword for years, Artificial intelligence AI has evolved into a powerful, accessible tool and, like any tool, it can be used for evil. How can AI technology be harnessed by adversaries or you as part of sophisticated information security attacks What sort of attacks are we seeing in the...
    16h31
Cloud environments Red Team perspectives (Clément Cruchet)
   This presentation delves into the realm of cloud computing’s security challenges and the Red Team perspective. It sheds light on intrusion testing, shared security models, and vulnerabilities unique to cloud systems. The discussion covers cloud intrusion testing’s importance, methodologies, and...
24  mai     11h58
Automatisation et autodeploiement de homelab