We pay special attention in the choice of talks, especially valuing their originality and contribution to the community.
From EuskalHack we are doing our best to make - one more year - a memorable congress for the attendees.
Since our constitution, we have opted for a reduced congress in order to maximise the best experience for the attendees.
We encourage collective activities such as hackathons, workshops and cybersecurity challenges.
Aware of your privacy, this congress does not give the data of its attendees to third parties.
Under our partnership philosophy, this congress is possible thanks to the countless hours of partners and sponsors.
Remember that if you are unemployed or under 25 years of age you must reliably accredit it along with your entrance.
FRIDAY, 21 JUNE
HOUR | TALK | LANG | SPEAKER | |
---|---|---|---|---|
09:15h - 09:30h | Presentation and opening of the Congress | [ES][EN] | ||
09:30h - 10:15h | Insert coin: Hacking arcades for fun | [ES] | ||
10:15h - 11:00h | ¡Desafío en el Ring! Combatiendo IA con IA: El Camino de la Innovación hacia la Ciberseguridad | [ES] | ||
11:00h - 11:30h | BREAK | |||
11:30h - 12:15h | Offensive VBA: developing macros for Red Team operations | [ES] | ||
12:15h - 13:00h | Bypassing Intel CET with Counterfeit Objects (COOP) | [EN] | ||
13:00h - 13:20h | SIP-SIEM - Seguridad VoIP/ToIP a través de IA | [ES] | ||
13:20h - 14:00h | Call Stack Spoofing para ocultar la ejecución de implantes desde memoria | [ES] | ||
14:00h - 15:30h | LUNCH | |||
15:30h - 16:15h | Controlando el malware con SCEMU | [ES] | ||
16:15h - 17:00h | Filtros sin postureo: Wavelets aplicado a Side Channel | [ES] | ||
17:00h - 17:45h | CyberChess: Reinforcement Learning en la automatización de estrategias de defensa | [ES] | ||
18:00h - 20:00h | FREE TIME | |||
20:00h - 06:00h | Hackatón Gau-Hack | [ES][EN] |
SATURDAY, 22 JUNE
HOUR | WORKSHOP | LANG | SPEAKER | |
---|---|---|---|---|
09:00h - 11:00h | Vishing: Todo empieza con un SÍ | [ES] | ||
09:00h - 11:00h | Kubernetes Security Fundamentals: Misconfigurations, Flaws and Hardening | [ES] | ||
09:00h - 11:00h | T^3 = {Threat Hunting, Threat Detection, Threat Intelligence} | [ES] | ||
09:00h - 11:00h | Hands-on binary (de)obfuscation | [ES][EN] | ||
11:00h - 11:30h | BREAK | |||
HOUR | TALK | LANG | SPEAKER | |
11:30h - 12:15h | Impacto de las Apps móviles en la Privacidad de los Usuarios | [ES] | ||
12:15h - 13:00h | Now youre (not) thinking with portals | [EN] | ||
13:00h - 13:20h | Long live all magic we wake: Ciberseguridad desde los laboratorios | [ES] | ||
13:20h - 14:00h | Ataques de manipulación de EDR | [ES] | ||
14:00h - 15:15h | LUNCH | |||
15:15h - 16:00h | CPU vulns: There and back again | [ES] | ||
16:00h - 16:45h | Como crear tu startup de ciberseguridad y venderla a Google | [ES] | ||
16:45h - 17:15h | Cybersecurity Award and closing | [ES][EN] |
Speaker: Ignacio Brihuega
Workshop focused on demonstrating a work methodology for carrying out vishing campaigns. Tools will be detailed for spoofering calls, creating pre-texts and scenarios, as well as setting milestones for obtaining information. Likewise, PoC or demos will be carried out using real cases so that participants can get an idea of how to proceed if in their work they have to develop a vishing campaign.
Speaker: Ángel Luis Veloy
Workshop on Threat Hunting based on Threat Intelligence-based. In its theoretical part, it will be explained and contextualized what TH is, how Hunters work, what their objective is, or what methodologies exist... and in its practical phase based on threat modeling, a ransomware will be analyzed and detection rules will be created (Hunting life cycle) and other outputs of the process will be shown and how they influence and interact with the rest of the organization.
Speaker: Luis Toro
In this workshop we will reveal the nature of containers, we will give a brief introduction to Kubernetes, which makes this orchestration solution so popular, and we will learn about its main components. This will allow us to introduce the main attack vectors to this platform, we will learn about tools to carry out audits and we will explain how to reduce the attack surface both with its built-in and third-party solutions.
Speaker: Arnau Gámez
In this workshop, we will provide an introduction to state-of-the-art approaches for modern binary (de)obfuscation. After a brief lecture on the fundamental ideas, we will walk through practical examples. We will use symbolic execution to retrieve the obfuscated expression from the compiled binary and attempt to simplify it, and finally, we will leverage program synthesis to reason about and successfully recover the semantics of the obfuscated code.
In this seventh edition we want to continue to recognise one of the people whose contribution to cybersecurity has been meritorious in the last year. At EuskalHack we would like to be able to distinguish all those individuals, often anonymous, whose efforts have been more than beneficial to the cybersecurity community, professional environment, and citizens.
The deadline for nominations is open until 15 March. by sending a private message, a post on our social networks, or a simple email. We will draw two tickets to the congress from among all the applications received.
At the end of the congress, we will award a prize to the person whose contribution we consider to be the most significant.
We look forward to your proposals!
In this seventh edition we would like to once again offer ESC attendees a relaxed space to share experiences, knowledge and, of course, a good time.
Throughout the afternoon-evening of Friday June 21 you can join "Gau-Hack", a space set up with tables, power strips and everything you need to come and meet people and have fun with any topic related to hacking.
01/06/2024 | Creation of the Telegram group to start warming up the engines. |
21/06/2024 | Day of the event |
20:00 | * OLARAIN (Rooms UNUS & DUO) | Opening of accesses. |
06:00 | * OLARAIN (Rooms UNUS & DUO) | Eviction. |
* Capacity limited to 50 participants, with priority given on a first-come, first-served basis.
Being part of EuskalHack as a sponsoring company means obtaining presence and repercussion in a unique and singular environment, allowing you to address a message to a specific public oriented to computer security, making it easier to consolidate your brand and credibility in an event of relevance for the community.
If you would like to take part in this congress, please contact us as soon as possible.
OLARAIN RESIDENCE HALL
Paseo de Ondarreta 24
Donostia - San Sebastián | Gipuzkoa
We have agreed a 10% discount with the Olarain Residence,
place where the congress itself will take place:
This ticket gives you access to the congress for both days, Welcome Pack, Hackathon, and other congress initiatives.
* REDUCED TICKET:
Unemployed and under 25 years of age (They must certify it reliably in the access control).
[SECTION 1] > 01 of March to 31 of March : 75€ [SECTION 2] > 01 of April to 31 of May: 90€ [SECTION 3] > 01 of June to 15 of June: 125€
EuskalHack Security Congress is an initiative of the first Ethical Hacking Association of Euskadi, a non-profit organisation constituted in Donostia and made up of various professionals linked to computer security research and computer forensics
Our goal is to promote the community and culture of digital security to any type of interested public (experts or beginners who want to enter the world of security), through the promotion and dissemination of mainly technical knowledge.
This exclusive congress is shaping up to be the most important in the Basque Country, with an estimated capacity of 200 people in this seventh edition.