Inicio

Contenido Inicio

Auditorio 2
90m
PLACE OF CELEBRATION
Auditorio 2
DURATION
90m
DESCRIPTION

Antonio José Juanilla Hernández. (Santander Global Tech)

It is intended to teach how to secure a private cloud environment, which uses containers for the deployment of its applications and services.

Technical requirements:

  • Attendees can bring their computer to follow the workshop guidelines although it is not necessary since the speaker will teach the workshop as a master class.

Auditorio 2
2h
PLACE OF CELEBRATION
Auditorio 2
DURATION
2h
DESCRIPTION

Carlos Seisdedos y Vicente Aguilera. Internet Security Auditors

Techniques and tools will be displayed with the aim of making our information known as our information, exposed on the Internet, either by us or third parties, with or without our consent, properly collected and analyzed, can be turned into an attack vector against States, organizations, companies, individuals and of the way not, also against criminals. The workshop will show how with the minimum information exposed in the Network, through the use of social engineering techniques, open sources and disciplines such as OSINT or SOCMINT data of great interest can be obtained in research processes, tasks that have been become the cornerstone of many professionals such as police, detectives, analysts or journalists, among others.

Technical requirements:

  • Attendees can bring their computer to follow the workshop guidelines although it is not necessary since the speaker will teach the workshop as a master class.

Auditorio 2
2h
PLACE OF CELEBRATION
Auditorio 2
DURATION
2h
DESCRIPTION

Auditorio 2
90m
PLACE OF CELEBRATION
Auditorio 2
DURATION
90m
DESCRIPTION

Raúl Siles and Mónica Salas. DinoSec

Technical workshop about hacking and the security of modern technologies, with the goal of promoting the culture of hacking and cybersecurity, by performing offensive and defensive activities throughout live demos.

Technical requirements:

  • Each assistant is recommended to go with a mobile device (smartphone or tablet).

 

Auditorio 2
90m
PLACE OF CELEBRATION
Auditorio 2
DURATION
90m
DESCRIPTION

Jesús Pacheco

In the initiation workshop “The call of death” we will see step by step how to mount a pocket device to execute commands and scripts on a Linux system and interact with home automation systems or sensors by means of a simple call made from an analog phone by capturing of DTMF tones and a menu of voice options.

Auditorio 1
1h
PLACE OF CELEBRATION
Auditorio 1
DURATION
1h
DESCRIPTION

José Ángel Berná Galiano. University of Alicante

Wi-Fi technology currently has a great adoption by homes and businesses. Its security has focused on the strength of its encryption and authentication mechanisms, but DoS deauthentication attacks are of special relevance, without mitigating in almost 100% of home Wi-Fi routers, smartphones and a large number of corporate Wi-Fi networks . These attacks allow the development of cybercrime activities with economic benefits or reputational damage in the services offered by corporations. In addition, a Wi-Fi communication system immune to these attacks and difficult to detect will be shown.

Technical Requirements:

  • Attendees can participate with their smartphones in demonstrations

Auditorio 1
30m
PLACE OF CELEBRATION
Auditorio 1
DURATION
30m

Auditorio 2
2h
PLACE OF CELEBRATION
Auditorio 2
DURATION
2h

Competiciones
2h
PLACE OF CELEBRATION
Competiciones
DURATION
2h

Auditorio 1
PLACE OF CELEBRATION
Auditorio 1