When the digital hair stands up in your neck

$_: random hacker from Germany
/me hosting BerlinSides && ʌʇ˙ɔnlɐ//:sdʇʇɥ. Hacker as profession , around since a long time.

Contact E-Mail: aluc@berlinsides.org Links podcast.aluc.tv

Ivan Yushkievich

SCADA and mobile in the IoT times

Ivan is the information security auditor at Embedi. His main area of interests - analysis of source code. He likes to search bugs, vulnerabilities in source code of different applications: from simple web sites to enterprise software. Also, he has vast experience in banking systems and web application penetration testing.

Alexander Bolshev

SCADA and mobile in the IoT times

Alexander Bolshev is a Security Consultant for IOActive. He holds a Ph.D. in computer security and his research interests lie in distributed systems, mobile, hardware and industrial protocols security. He is the author of several whitepapers in topics of SSRF attacks, OLAP systems, hardware and ICS security. He has presented at conferences including Black Hat USA/EU/UK/Asia, ZeroNights, t2.fi, CONFIdence, and S4. Madrid, Spain

Adam Burt

Hiding in Plain Sight

Adam Burt is a Senior Systems Engineer, Incident Response in EMEA at Fidelis Cybersecurity. He has 15+ years’ experience in Incident Response & Digital Forensics, Reverse Engineering, Malware Analysis, Security Architecture and Advanced Threat Detection. In his current role, Adam helps organisations to detect, contain and mitigate increasingly sophisticated threat actors, as part of the Fidelis’ Endpoint team

Karol Celiński

Hacker Inside Dude - all-in-one HID related platform

IT Security Architect and co-owner at Immunity Systems (www.immunity-systems.com). For more than a decade he has worked in the IT security industry, specializing in penetration testing, APT attacks, source code analysis, reverse engineering, enterprise-specific defense mechanisms, advanced security incidents, hardware hacking, industrial automation testing. Privately he is passionate about honeypots, malware, rootkits, hardware. Speaker at many conferences, has OSCP, OSCE, GXPN, CSSA, CEH certificates.

Jakub Goral

Splunk – SIEM czy BI do logów?

Jest absolwentem Politechniki Warszawskiej, Wydział Fizyki kierunek: fizyka techniczna, specjalność: fizyka komputerowa. W EMCA SA zajmuje się systemami analizy i zarządzania logami, realizuje wdrożenia z zakresu centralnego serwera logów. Uczestniczył w szkoleniach z zakresu Splunka, Logrhythm (SIEM) i Flowmon dotyczącego języka zapytań, budowania wiedzy, administracji, wdrożeń oraz rozwijania systemu.
Posiada certyfikaty
Splunk Certified Admin, LogRhythm Certified Solutions Architect Flowmon Networks Consultant, Flowmon Networks Technical Specialist. W EMCA jest odpowiedzialny za wdrożenia systemów klasy SIEM i Log Management oraz systemów analizy ruchu sieciowego u klientów branży finansowej, telekomunikacyjnej i energetycznej.

Julie Gommes

Cryptography used for jihadism, from Internet to software

Julie Gommes is information security compliance auditor at Devoteam , Iso/CEI27001 Lead Auditor. Also, for several years she’s been studying the „jihadist“ movement and the rise of anonymisation and encryption techniques in the Middle East and is the author of a book about the revolutions in several of these countries _“Il était une fois les révolutions”_ (Ed. La Mouette, 2012).

Adam Haertle

Amateur Persistent Threat

Fan of security and privacy, who does not always follow puts his advice into practice. He works as an IT Security Officer at UPC, where he is responsible for ensuring an adequate level of protection of information, in particular personal data of subscribers and business secrets, detecting, and eliminating abuses both corporate and subscriber, the functioning of the control mechanisms in the area of IT, and their compliance with applicable regulations. When he breaks away from the Internet, he does all the types of tourism, both vertical and horizontal.


Wicked malware persistence methods

Master in Computer Science. From the teenage years passionate in programming and reverse engineering. Activly taking part in the life of the InfoSec community by publishing open source applications and blogging about malware analysis. Currently works as a malware intelligence analyst at Malwarebytes and runs her own small business.

Sławomir Jasek

Hacking Card Emulation - how to clone any Android HCE contactless card

IT security consultant with over 10 years of experience. He participated in many assessments of systems' and applications' security for leading financial companies and public institutions, including a few dozen e-banking systems. Also he developed secure embedded systems certified for use by national agencies. Beside current research (BLE, HCE), he focuses on consulting and the designing of secure solutions for various software and hardware projects, protection during all phases - starting from a scratch. Speaker at BlackHat USA, Appsec EU, HackInTheBox, Confidence, Deepsec, Devoxx, Mobilization and others.

mł. insp. Jan Klima

Cyberprzestępczość – wyzwaniem w pracy Policji

26 in the Police, he specializes in detection and combating cybercrime. Currently Head of the Cybercrime Department of Voivodeship Police Headquarters in Kraków. Particularly interested in the latest achievements in the computer industry used to commit crimes using social engineering attacks on operators of IT infrastructure and cryptocurrency as a mean to laundering money from illegal sources.

Koby Kilimnik

Beyond Mirai: The new age of MDDoS attacks

Open source evangelist , programmer and a naturally curious human being. Jack of all trades master of none, waste too many hours awake at night and too little during the day, contributed to the nodejs, ruby core and archlinux. Koby is an application security researcher in the elite research group @ Imperva Incapsula. code: www.github.com/solebox keybase: keybase.io/solebox

Adam Lange

Wykorzystanie technologii webowych do wykrywania złośliwego oprogramowania u klientów bankowości internetowej

Information security professional with strong experience in malware detection, analysis and prevention. Keeping an eye on clients assets in one of the largest Polish financial institution, architecting, developing and maintaining security systems and software.

Borys Łącki

Red teaming in Poland - test cases

For more than 15 years associated with IT security. Author of dozens of lectures at professional conferences (Confidence, SECURE, Attack and Defense, Internet Security Banking, SecureCON, SEConference). Specialist in penetration testing in LogicalTrust (www.logicaltrust.net) - a company providing complex information security services. For over 7 years he has been tracking cybercriminals targeting unaware users and he has been publishing his observations and warnings on his blog www.bothunters.pl.

Krzysztof Liedel

Człowiek w systemie bezpieczeństwa: strategie bezpieczeństwa uwzględniajace rolę obywatela

Doctor with a specialization in security management, a lawyer, a specialist in the field of international terrorism and combating it, an expert in the analysis of information, particularly in the area of decision analysis. Intern at the National Counterterrorism Center in the United States. Former head of the Anti-terrorist threats Division of Department of Public Safety at Ministry of the Interior and Administration. Director of the Security Department of the non-military National Security Bureau. Director of Institute of Information Analysis at Collegium Civitas,, Director of the Center for the Study of Terrorism CC. Lecturer at Collegium Civitas and the University of Warsaw. Author and co-author of numerous publications on international terrorism and combating it, as well as on information analysis.

Pavol Luptak

How governments push forward the security of cryptomarkets

Certified IT Security Professional. He gained his BSc. at the FEI-STU in Bratislava and MSc in Computer Science at the Czech Technical University with master thesis focused on ultra-secure systems. He holds many prestigious security certifications including CISSP and CEH, he is Slovak OWASP chapter leader, co-founder of Progressbar and SOIT organizations where he is responsible for IT security. Pavol uses to have regular presentations at various worldwide security conferences (in Netherlands, Luxembourg, Berlin, Warsaw, Krakow, Prague). In the past, he demonstrated vulnerabilities in the public transport SMS tickets in all major cities in Europe, together with his colleague Norbert Szetei he practically demonstratedvulnerabilities in Mifare Classic RFID cards. He has 14 years experience in IT security, penetration testing and security auditing including social engineering and digital forensic analysis. He is co-author of the OWASP Testing Guide v3, has a deep knowledge of the OSSTMM, ISO17799/27001 and many years experience in seeking vulnerabilities. He has a knowledge of many programming languages (ASM, C, C++, XSLT, Perl, Java, PLSQL, Lisp, Prolog, scripting languages) and operating systems. He is also focused on VoIP and interesting IT security research.

Attila Marosi

Where should I host my malware?

Attila Marosi has always worked in the information security field ever since he started in IT. As a lieutenant of active duty he worked for almost a decade on special information security tasks occurring within the Special Service for National Security. Later he was transferred to the newly established GovCERT-Hungary, which is an additional national level in the internationally known system of CERT offices. Now he works for the SophosLabs as a Senior Threat Researcher in the Emerging Threats Team to provide novel solutions for the newest threats.

Vladimir `vovcia’ Mitiouchev

Hacking embedded with OpenWrt

Experienced Linux and network administrator with strong security background, always willing to share knowledge. Speaker on first CONFidence 2005 and many other conferences, actively working with CLUG. Current interests include mesh networks and embedded systems, not afraid of tin and rosin. When not staring at screen he plays guitar, go to jazz concerts and reads belles-lettres.

Paweł Maziarz

Hacker Inside Dude - all-in-one HID related platform

Paweł has been an IT expert and security systems architect for the past 15 years. Co-owner at Immunity Systems (www.immunity-systems.com). He initially worked as a network and Unix / Linux administrator, then as a software developer and later as a pentester. During the past few years, he has performed advanced simulations of APT attacks, made public inaccessible software that simulates complex malware which is able to bypass anti-virus, IPS, IDS, and other next-generation firewall protection. He also specializes in sociotechnical attacks and physical security (proximity cards, access control systems etc).

Filip Nowak

Dlaczego strategia bezpieczeństwa to za mało?

Strateg, perfekcjonista, niezależny badacz bezpieczeństwa w ujęciu interdyscyplinarnym. Zajmuje się problematyką złożoności, koordynacji oraz spójności podejścia do rozwiązywania wyzwań strategicznych. Pasjonuje się nauką. Zawodowo prowadzi program budowy departamentu wykrywania włamań i obrony informatycznej ABB.

Paulina Piasecka

Człowiek w systemie bezpieczeństwa: strategie bezpieczeństwa uwzględniajace rolę obywatela

A graduate of International Relations at University of Warsaw, analyst, specialist in the field of cyberwarfare and cybersecurity. Scholar of US State Department "International Visitor Leadership Program" in the field of cybersecurity. Former chief specialist at the Anti-terrorist threats Division of Department of Public Safety at Ministry of the Interior and Administration, Head of the Department for Security and Public Order in the National Security Bureau. Today, Deputy Head of the Institute of Information Analysis at Collegium Civitas, Program Affairs Deputy Director at CBnT, lecturer at Collegium Civitas. Co-author and editor of publications on cyberwarfare, analysis of information, international terrorism and combating it.

Piotr Pietras

Gigamon: Narzędzie do eliminowania blind spotów w infrastrukturze sieciowej

System Engineer w firmie Veracomp SA. Odpowiedzialny za systemy bezpieczeństwa sieciowego, bezpieczeństwa danych oraz systemy bezpieczeństwa stacji końcowych. Prywatnie zwolennik narciarstwa i pasjonat lotnictwa.

Michał Purzyński

Keeping Foxes secure, warm and fuzzy. Threat Management in Mozilla.

Michal Purzynski is the head of the Threat Management at Mozilla. Focused on the defensive side, he hunts threat actors down and helps to protect hundreds of millions of Firefox users. He designed and deployed managed security services on a datacenter scale, and then continued to make bad guys life’s more difficult at Mozilla. He built the Network Security program from scratch, including the Network Security Monitoring system spanning three continents, eight countries, and a cloud. He publishes the code for the Bro IDS, spins Suricata above and beyond 20Gbit/sec and responds to incidents. He continued sharing his knowledge at various conferences, such as SuriCon and BroCon, to help everyone use those tools efficiently in the DFIR process. Michal is also a member of the Bro IDS Board of Directors. Michal is now responsible for the threat management at Mozilla and has been on the front line of the never ending the war for quite a while, leading the Incident Response and making sure we have means to detect attacks and that we can respond to them.

Dominik Rozdziałowski

Odpowiedź organów ścigania na przestępczość związaną z nowoczesnymi technologiami

Dyrektor Biura do Walki z Cyberprzestępczością Komendy Głównej Policji
Absolwent Wyższej Szkoły Ekonomii i Prawa na kierunku Informatyka w ekonomii oraz Wyższej Szkoły Handlowej w Kielcach na kierunku Elektronika i telekomunikacja. Specjalizuje się w teleinformatyce. Biegły Sądowy z pięciu dziedzin przy Sądzie Okręgowym w Kielcach. Funkcjonariusz pionu do walki z przestępczością gospodarczą, wcześniej Naczelnik Wydziału do Walki z Cyberprzestępczością Komendy Wojewódzkiej Policji w Kielcach.

Saher Sidhom



Robert Swiecki

Escaping the (sand)box. The promises and pitfalls of modern computational load isolation techniques for Linux OS.

Robert Swiecki is a security researcher concentrating on low-level aspects of operating systems, and on finding bugs in widely deployed software (incl. OpenSSL and the Linux kernel). He authored the feedback-driven evolutionary fuzzer honggfuzz and the software isolation package nsjail. In 2016 he was nominated to the Pwnie Award for discovering a bug in AMD CPU’s microcode, which allowed to gain host kernel-level execution privileges from inside guest VM systems. He currently works as an Information Security Engineer at Google, and recently co-authored the ‘Practical Reverse Engineering’ book (PWN, 2016).

Kacper Szurek

Windows privilege escalation using 3rd party services

Kacper is Detection Engineer at ESET. After work he finds bugs especially in open source software and participates in different bug bounty programs. He has his own technical blog - security.szurek.pl

Hanna Tułowiecka

3 istotne wyzwania bezpieczeństwa 5G

From the beginning of her career she's been dealing with the development of telecommunications software (WCDMA, LTE) for one of the leading suppliers of products and services on the telecommunications market. She currently works in the area of IDAM security on ENM platform used by operators to manage mobile network. Active participant and speaker at events and conferences (Security Bsides 2014, Secure 2015, Security Case Study 2016). The initiator and organizer of the popular meetings on IT security in Krakow - Krak White Hat.

Jos Weyers

Post-its, post-its, post-its everywhere (and how they relate to physical keys)

Jos Weyers (@josweyers) is a world-record holder in the field of lock impressioning and a mainstay participant at LockSport events around the world. A long-time member of TOOOL in the Netherlands and a key figure at the Hack42 hackerspace in Arnhem, Jos recently became the Vice-President of TOOOL.nl and now helps to oversee that organization and the LockCon conference. Jos is the mastermind behind the beehive42.org initiative. Some people know him as the Dutch Kilt guy. Featured in the New York Times. Voted #2 in the category "Hackers and Security" of the Nerd101-list of VrijNederland June 2015

Gabriel Wierzbieniec

Hackers vs SOC - 12 hours to break in, 250 days to detect

Worked as a Security Engineer for a managed security services provider Atos and the leading universal bank in Switzerland - UBS. Currently enjoys the role of an independent security consultant. Holder of such industry certifications as CISA and SSCP. Specialist in Security Monitoring area, familiar with multiple Security Information & Event Management (SIEM) tools. A big fan of Splunk and cloud technology.

Moritz Willers

Deploying Secure NFS in a Large Enterprise

Moritz Willers is the Head of Identity and Access Management Engineering at UBS. He has worked for over two decades in the financial industry covering Operating Systems, NAS Storage, and Identity & Access Management.

You'll Fall in Love With Krakow!