SecDevOps (DevSecOps) with docker
Antonio José Juanilla Hernández. (Santander Global Tech)
It is intended to teach how to secure a private cloud environment, which uses containers for the deployment of its applications and services.
Technical requirements:
- Attendees can bring their computer to follow the workshop guidelines although it is not necessary since the speaker will teach the workshop as a master class.
OSINT and Social Engineering: as vectors of attack on cybersecurity
Carlos Seisdedos y Vicente Aguilera. Internet Security Auditors
Techniques and tools will be displayed with the aim of making our information known as our information, exposed on the Internet, either by us or third parties, with or without our consent, properly collected and analyzed, can be turned into an attack vector against States, organizations, companies, individuals and of the way not, also against criminals. The workshop will show how with the minimum information exposed in the Network, through the use of social engineering techniques, open sources and disciplines such as OSINT or SOCMINT data of great interest can be obtained in research processes, tasks that have been become the cornerstone of many professionals such as police, detectives, analysts or journalists, among others.
Technical requirements:
- Attendees can bring their computer to follow the workshop guidelines although it is not necessary since the speaker will teach the workshop as a master class.
Osctrl: Fast and efficient osquery management
Javier Marcos de Prado. (BitMEX)
Hacker for a day
Raúl Siles and Mónica Salas. DinoSec
Technical workshop about hacking and the security of modern technologies, with the goal of promoting the culture of hacking and cybersecurity, by performing offensive and defensive activities throughout live demos.
Technical requirements:
- Each assistant is recommended to go with a mobile device (smartphone or tablet).
The call of death
In the initiation workshop “The call of death” we will see step by step how to mount a pocket device to execute commands and scripts on a Linux system and interact with home automation systems or sensors by means of a simple call made from an analog phone by capturing of DTMF tones and a menu of voice options.
Threats and obfuscation in Wi-Fi communications in urban environments
José Ángel Berná Galiano. University of Alicante
Wi-Fi technology currently has a great adoption by homes and businesses. Its security has focused on the strength of its encryption and authentication mechanisms, but DoS deauthentication attacks are of special relevance, without mitigating in almost 100% of home Wi-Fi routers, smartphones and a large number of corporate Wi-Fi networks . These attacks allow the development of cybercrime activities with economic benefits or reputational damage in the services offered by corporations. In addition, a Wi-Fi communication system immune to these attacks and difficult to detect will be shown.
Technical Requirements:
- Attendees can participate with their smartphones in demonstrations