{"id":12,"date":"2016-03-28T14:42:31","date_gmt":"2016-03-28T14:42:31","guid":{"rendered":"http:\/\/demo.olevmedia.net\/eventerra\/?page_id=12"},"modified":"2022-10-11T15:29:42","modified_gmt":"2022-10-11T13:29:42","slug":"home","status":"publish","type":"page","link":"https:\/\/2022.hacktivity.com\/","title":{"rendered":"Home"},"content":{"rendered":"

[vc_row disable_element=”yes” margin_top=”-1em”][vc_column width=”1\/3″ delimiter=”vline”][vc_empty_space height=”2em”][vc_column_text]<\/p>\n

#HACKTIVITY2021<\/h2>\n

We are thrilled to organize #Hacktivity2021<\/strong> as a traditional on-site event<\/strong> again! However, we will still provide the opportunity for our ticket buyers to enjoy the presentations via online stream. Stay tuned for more information coming soon![\/vc_column_text][vc_btn title=”Read more” style=”flat” i_icon_fontawesome=”fa fa-angle-right” add_icon=”true” link=”url:https%3A%2F%2Fhacktivity.com%2Findex.php%2Fsave-the-date-for-hacktivity2021%2F|title:Badge||”][vc_empty_space height=”2.5em” mobile_hide=”yes”][\/vc_column][vc_column width=”1\/3″ delimiter=”vline”][vc_empty_space height=”2em”][vc_column_text]<\/p>\n

PROGRAM ANNOUNCED<\/h2>\n

The official Program has been announced for #Hacktivity2021. <\/strong>We\u2019ll have 43\u00a0speakers from 14 countries<\/strong> so the international atmosphere and the professional content is guaranteed as always. Make sure to check out the schedule<\/a>![\/vc_column_text][vc_btn title=”Read more” style=”flat” i_icon_fontawesome=”fa fa-angle-right” add_icon=”true” link=”url:https%3A%2F%2Fhacktivity.com%2Findex.php%2Fofficial-program-has-been-announced-for-hacktivity2021%2F|title:Training%20Sessions||”][vc_empty_space height=”2.5em” mobile_hide=”yes”][\/vc_column][vc_column width=”1\/3″][vc_empty_space height=”2em”][vc_column_text]<\/p>\n

CALL FOR IDEAS<\/h2>\n

If you have a piece of specific knowledge, technique, or tool that is exciting and you are willing to share it with the IT security community, CALL FOR IDEAS is for you! Become one of our instructors and enjoy #Hacktivity2021 for free!<\/strong>[\/vc_column_text][vc_btn title=”Read more” style=”flat” i_icon_fontawesome=”fa fa-angle-right” add_icon=”true” link=”url:http%3A%2F%2Fhacktivity.com%2Findex.php%2Fcall-for-ideas%2F|title:Call%20For%20Ideas||”][vc_empty_space height=”2.5em”][\/vc_column][\/vc_row][vc_row bg_color=”#f3f3f3″][vc_column width=”1\/4″][om_click_icon_box icon_fontawesome=”fa fa-users” title=”1000+ VISITORS”]REPRESENT THEMSELVES FROM THE FIELD OF IT SECURITY[\/om_click_icon_box][\/vc_column][vc_column width=”1\/4″][om_click_icon_box icon_fontawesome=”fa fa-bullhorn” title=”36 SPEAKERS”]PRESENTING FROM ALL AROUND THE WORLD[\/om_click_icon_box][\/vc_column][vc_column width=”1\/4″][om_click_icon_box icon_fontawesome=”fa fa-thumbs-o-up” title=”19 YEARS”]HISTORY AS THE BIGGEST EVENT OF ITS KIND IN THE REGION[\/om_click_icon_box][\/vc_column][vc_column width=”1\/4″][om_click_icon_box icon_fontawesome=”fa fa-calendar” title=”2 DAYS”]HIGH QUALITY PRESENTATIONS AND WORKSHOP SESSIONS[\/om_click_icon_box][\/vc_column][\/vc_row][vc_row equal_height=”yes” content_placement=”middle” bg_color=”#ffffff”][vc_column width=”1\/2″ css=”.vc_custom_1557494685291{margin-top: 0px !important;margin-bottom: 0px !important;margin-left: 70px !important;border-top-width: 0px !important;border-bottom-width: 0px !important;padding-bottom: 0px !important;}”][vc_column_text]#HACKTIVITY<\/strong> is the biggest event of its kind in Central & Eastern Europe. About 1000 visitors are coming from all around the globe every year to learn more about the latest trends of cybersecurity, get inspired by people with similar interest and develop themselves via comprehensive workshops and training sessions.[\/vc_column_text][vc_btn title=”More info about Hacktivity” style=”flat” i_icon_fontawesome=”fa fa-info” add_icon=”true” link=”url:http%3A%2F%2Fhacktivity.com%2Findex.php%2Fwhat-is-hacktivity%2F|title:What%20is%20Hacktivity%3F||”][\/vc_column][vc_column width=”1\/2″ css=”.vc_custom_1557494367114{margin-top: 0px !important;margin-bottom: 0px !important;border-top-width: 0px !important;border-bottom-width: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”][vc_custom_heading text=”The Most Anticipated
\n(color1)IT Security(\/color1) Event
\nin the region” uppercase=”yes” font_container=”tag:h1|font_size:42px|text_align:right|line_height:50px” css=”.vc_custom_1570729243307{margin-right: 70px !important;}”][\/vc_column][\/vc_row][vc_row disable_element=”yes”][vc_column][om_reduce_space height=”0px”][vc_custom_heading text=”Our (color1)Keynote(\/color1) Speakers” uppercase=”yes” add_shadow_text=”yes” font_container=”tag:h1|text_align:center” css_animation=”custom” shadow_text=”KEYNOTE”][om_reduce_space height=”1em”][om_speakers filter=”category” description=”next” order=”alphabetical” margin_top=”0″ margin_bottom=”0″ categories=”53″][\/vc_column][\/vc_row][vc_row equal_height=”yes” content_placement=”middle” disable_element=”yes” bg_type=”gradient” gradient_type=”diagonal2″ bg_color=”#00e5d2″ bg_color2=”#00c4b3″ font_color=”#ffffff”][vc_column][om_testimonials timeout=”8000″ pause=”yes” randomize=”yes”][\/vc_column][\/vc_row][vc_row][vc_column][vc_custom_heading text=”(color1)OFFICIAL(\/color1) PROGRAM” uppercase=”yes” add_shadow_text=”yes” font_container=”tag:h1|text_align:center” css_animation=”custom” shadow_text=”PROGRAM”][om_reduce_space height=”2em”][om_agenda description_expand=”yes”][om_agenda_day title=”HACKTIVITY NOW – SECURITY THEATER” date=”6 OCTOBER 2022″][om_agenda_item time=”09:00 – 09:05″ title=”Opening Ceremony – Attila Marosi-Bauer”][\/om_agenda_item][om_agenda_item time=”09:05 – 09:45″ title=”DDoS Testing Your Infrastructure, including IPv6 SYN floods – Henrik Kramselund”]When connecting to the Internet we immediately receive traffic from unknown sources. We should consider testing our infrastructure using active pentest methods, to verify robustness. This talk will be about doing port scans for discovery of infrastructures and detailed advice how to perform active DDoS simulation to find bottlenecks in the network. The attack tools will be already known tools like Nmap and Hping3 with IPv6 patches. The focus is on the process and experiences doing this over many years.<\/p>\n

Networks are insecure, and often not as robust as we wish. There is a high risk that networks are vulnerable to one or more DDoS attack vectors, if not tested and verified. When setting up networks we often ignore the built-in features available, and we often have to select which features to enable on specific devices. The vendors tell us they can do everything in every box, but the truth is that attackers can often use more resources than we have available.<\/p>\n

This presentation will take a holistic view on networking infrastructure, but due to time limits focus on hosting web services and providing services to the Internet. The process and advice would transfer to other services and can thus be applied by a practitioner afterwards on their own.<\/p>\n

The main content in this presentation is about performing structured DDoS testing, what to attack, what to expect, how to reduce the number of vulnerable scenarios \u2013 with existing infrastucture devices. The presentation will provide some specific configurations and recommendations using example devices found in normal networks.[\/om_agenda_item][om_agenda_item time=”09:50 – 10:10″ title=”No Parking, No Problem! – Ignacio Navarro”]What happens if one day you have control of all the parking meters in your city? In this talk we will talk about a problem that I encountered in a parking system in my city, and then you discover many cities with the same system! That talk includes nfc, sql, reverse engineering, and other herbs.[\/om_agenda_item][om_agenda_item time=”10:15 – 10:55″ title=”DeepSea Phishing – The Next Step of Phishing – Tobias Schr\u00f6del”]Phishing e-Mails are very important for hackers to gain access to networks and information. But employees are trained to identify such mails. So … the next step of phishing techniques needs to show up. In his talk, Tobias will demonstrate some of them LIVE. How easy is it to fake the voice of your boss and send a voice message? And how easy is it to set up a deep fake video system to fool \u201cyour\u201d employees in a video conference? Tobias will talk about this LIVE in a video call with Elon Musk – but … can we be sure, that it is the REAL Elon Musk and not a deep fake?[\/om_agenda_item][om_agenda_item time=”11:15 – 11:55″ title=”Applying ATT&CK to Analyze Ransomware Campaigns – Marc Rivero L\u00f3pez”]State of the art related to ransomware is one of the principal concerns for either private & public organizations. Since the ransomware transitioned to a RaaS model, we could spot how the different groups adapted their TTPs to that evolution.
\nBe aware of the TTPs of these ransomware groups; it will be the glue that can bind together multiple diverse teams operating at different
\nlevels with different priorities. The Global Research and Analysis team, also known as the GReAT team from Kaspersky, analyzed thousands of operations made by the other RaaS groups and drew conclusions regarding how these operations are conducted and on which TTPs should the industry focus to either track them or defend the different organizations.
\nWe drew on our statistics to select the most popular groups, analyzed the attacks they perpetrated in detail, and employed techniques and tactics described in MITRE ATT&CK to identify a large number of shared TTPs. By tracking all the groups and detecting attacks, we see that the core techniques remain the same throughout the cyber kill chain. The attack patterns thus revealed are not accidental because this class of attack requires the hackers to go through certain stages, such as penetrating the corporate network or the victim’s computer, delivering malware, further discovery, account hijacking, deleting shadow copies, removing backups, and finally, achieving their objective.[\/om_agenda_item][om_agenda_item time=”12:00 – 12:20″ title=”Everyday Numbers to Break Not So Everyday Software – M\u00e1rk M\u00f3dly”]The IT development world has become so spoiled by the “it just works” mentality that old problems start to resurface and if you are quick to test those, you could have a niche in bug bounties. Join us a quick talk on numbers and how we could abuse them in today’s world.[\/om_agenda_item][om_agenda_item time=”12:25 – 13:05″ title=”How an Android Application can Drain Your Wallet? – Dimitrios Valsamaras”]The Wireless Application Protocol billing (WAP Billing) is a payment mechanism that enables consumers to subscribe to paid services and get charged directly to their mobile phone bill. To initiate a subscription process the user has to navigate to a website that offers the service, while the device is registered to a cellular network, and click on a designated subscription button. As a verification step, a one-time password is sent to the user which has to be submitted back to the service provider in order to confirm the subscription.<\/p>\n

Billing fraud is one of the most prevalent types of Android malware that leverages weaknesses in the aforementioned process in order to automatically subscribe the users to paid services. With revenue reaching up to $10 billion dollars annually, it monopolizes the media spotlight since it found its way to a wider audience through the Google Play Store back in 2017. Up to this day it is still among the Potential Harmful Applications (PHA) with the highest install rate according to Google Play\u2019s transparency report.<\/p>\n

This paper focuses on Toll Fraud, a Billing Fraud subcategory and tries to shed some light on its behavioral model from a solid technical perspective. More specifically, we are investigating the evasion techniques used and the actions taken from the malware\u2019s side in order to imitate the user and perform a fraudulent subscription. Finally, we propose improvements with regard to Antivirus detection as well as improvements to the operating system level in order to mitigate the issue.[\/om_agenda_item][om_agenda_item time=”14:00 – 14:40″ title=”How Attackers Abused DNS in 2021\/2022 – Piotr G\u0142aska”]DNS saga continues. This time we will review most interesting cases of DNS protocol usage by threat actors in 2021 and beyond. Attack targeting Ukraine, first malware for AWS Lambda, bots switching to C2 over DNS over HTTPS, malicious payload in software packages exfiltrating data over DNS and who knows what more\u2026.[\/om_agenda_item][om_agenda_item time=”14:45 – 15:25″ title=”The Past of Internet Banking – Zolt\u00e1n Bal\u00e1zs”]Bank security is a fascinating and less researched field of it.
\nNormally you don’t get visibility into the internal applications or you don’t have access to the services mandatory for a real bug hunt or research.
\nAre you interested in a chain of bugs that could have been used to empty a bank account?
\nThe presentation focuses on some old and hopefully long-fixed issues and interesting facts.
\n[\/om_agenda_item][om_agenda_item time=”15:45 – 16:25″ title=”Sisyphus and the CVE Feed: Vulnerability Management at Scale – Keziah Plattner & Kadia Mashal”]Vulnerability Management can be a tedious and time consuming job of trying to sift through a never ending stream of new, old or undefined CVEs. It can be challenging to prioritize severity-based SLAs when default assessments are inaccurate: they don\u2019t factor in the criticality of the affected asset, or understand custom infrastructure and existing mitigations and\/or gaps. Ultimately, having low confidence in scanning results and reported vulnerabilities leads to alert fatigue and diminishes trust in the security team.<\/p>\n

In our talk, we will lay out our team\u2019s approach towards automating vulnerability management for our infrastructure and why standard industry approaches were lacking. We will discuss our work of centralizing all vulnerabilities and automating detection, risk assessment, vulnerability reporting, and vulnerability fix verification in a scalable manner. We want to share how we developed internal tooling that allows us to be vendor agnostic, not rely on default risk severities, and reduce operational work as much as possible.[\/om_agenda_item][om_agenda_item time=”16:30 – 17:10″ title=”Hacking AppLocker Cache – Grzegorz Tworek”]Built-in application whitelisting solution greatly improves the security of the Windows operating system. But are you aware it relies on the cached data to make its operations faster? Manipulation of the cache content may lead to the protection bypass. The session focuses on the mechanism, its bypasses and mitigations.[\/om_agenda_item][\/om_agenda_day][om_agenda_day title=”HACKTIVITY NOW – SECURITY DOME” date=”6 OCTOBER 2022″][om_agenda_item time=”09:05 – 09:45″ title=”Automating Binary Analysis with Ghidra’s P-Code – Gergely R\u00e9vay”]Ghidra is a software reverse engineering (SRE) framework created and maintained by the National Security Agency Research Directorate. It provides a great free and capable alternative to IDA Pro and Binary Ninja for manual static binary analysis. A lesser-known fact is, that Ghidra also provides a great API and an even better SDK for writing Ghidra scripts. It also has an intermediate language called P-Code. P-Code lies between the assembly code and the decompiled code that the Ghidra UI shows.<\/p>\n

In this talk, we are going to focus on the combination of these two features and start building binary analysis tools using Ghidra P-Code. This setup has some significant benefits. Just to mention one, if you are only working with P-Code and never look at the assembly, then your script will be architecture-independent and will support all architecture that is supported by the Ghidra decompiler.[\/om_agenda_item][om_agenda_item time=”09:50 – 10:10″ title=”How a New Default Value of OpenSSL could Multiply a DoS Potential – Szil\u00e1rd Pfeiffer”]OpenSSL has supported the Diffie-Hellman (DHE) key exchange in TLS 1.3 since its latest major version, 3.0. The DHE key exchange is an old but good algorithm, apart from the fact that it has a know performance issue (CVE-2002-20001 aka. DHEat), which attackers can use in a DoS attack very effectively. With larger key sizes, only a few requests per second throughput is enough to overload a CPU core. In the case of OpenSSL 1.1, system administrators had to explicitly enable DHE key exchange by adding DHE cipher suites to the configuration and generating DH parameters. In TLS 1.3, the parameters are negotiated, and DHE ciphers (even with the largest 8192-bit key size) are enabled by default, causing a significant DoS potential due to the upgrade to OpenSSL 3.0. On top of that, there is significant performance degradation in DHE key exchange compared to OpenSSL 1.1. This causes a few ten times lower throughputs, which have been relatively low so far, and can cause the same CPU load.[\/om_agenda_item][om_agenda_item time=”10:15 – 10:55″ title=”DiceyF Deploys the GamePlayerFramework – a New Complex Threat Targeting Gambling Companies – Kurt Baumgartner & Georgy Kucherin”]While investigating deployments of the infamous PlugX backdoor, we identified the beginnings of another, more surprising deployment: a previously unknown malicious .NET framework that we dubbed GamePlayerFramework. In our talk, we will discuss all the nuts and bolts of this complex malware. We will tell about how this framework is deployed to victims and describe how attackers use installed on-premises administration software to spread the malicious implants across the network.<\/p>\n

The related PlugX implants were signed with a valid digital signature from a company that develops secure messaging applications. This specific variant also contains a few interesting functions and unique characteristics.<\/p>\n

We will also reveal a curious case when adversaries obtained information about the floor plans of one of the victim\u2019s offices and then used the gathered data to perform framework installations in a stealthier way. Apart from that, we will provide details about unique sandbox evasion techniques that we encountered in GamePlayerFramework, look into its architecture and functionalities, and discuss attribution challenges.[\/om_agenda_item][om_agenda_item time=”11:15 – 11:55″ title=”From Red to Black and Beyond – Evolution of a Ransomware Strain – Albert Zsigovits & Robert Neumann”]A new ransomware family called EpsilonRed made its debut just before last summer. It relied on a set of different PowerShell scripts for distribution, which, at the time, was becoming a more common way for ransomware affiliates to deploy ransomware into corporate environments. Apart from being written in the Go programming language, EpsilonRed showcased some unique attributes and seemed to disappear just as quickly as it came; no one reportedly seen it after the first confirmed attack.<\/p>\n

In this talk we will present how different ransomware families \u2013 such as EpsilonRed, BlackCocaine and more – share the very same roots on the binary level, we\u2019ll discuss which current obfuscation technics they utilize, and show how they’ve started to develop a method of combining C and Golang together to make analysis even more challenging.<\/p>\n

New ransomware strains appearing on the scene, doing their fair share of infection rounds, then quickly fading away was nothing new last year. The renewed interest shown by law enforcement agencies and some fruitful efforts resulting in raids, often made affiliates and creators of ransomware reconsider their actions. Officially, they seized operations, except often they really did not.[\/om_agenda_item][om_agenda_item time=”12:00 – 12:20″ title=”Developer in a Digital Crosshair, 2022 Edition – Mateusz Olejarka”]We can observe huge increase in the number of attacks on third party libraries and tools used in software development in the last few years.
\nTyposquatting attacks, dependency confusion, malicious changes in popular dependencies (UAParser.js, coa, node-ipc…), protestware, issues in popular dev tools (Codecov, Homebrew, npm, Ruby Gems…) or incidents (PHP, GitHub…).<\/p>\n

During my talk I will show a lot of interesting, recent examples of such attacks, discuss causes and effects and explain how to stay secure when developing software.[\/om_agenda_item][om_agenda_item time=”12:25 – 13:05″ title=”Practical EDR Bypass Methods in 2022 – Istv\u00e1n T\u00f3th”]AV\/EDR bypass is always a pain point but a must have of Red Team operations.<\/p>\n

In this presentation we’ll try to understand how modern EDRs try to detect malicious activities, what are their common methodologies, and we’ll see how Red Teams (and Threat Actors) could bypass these.<\/p>\n

I’ll show a couple of practical techniques working against current EDR softwares, and present how these techniques could be integrated into Red Teams’ favorite C2 framework (Cobalt Strike) for making operators\u2019 life easier.<\/p>\n

I’ll also present an attack chain from initial compromise (partly stolen from ongoing attacks in the wild) using a stealthy staging technique, this time with the new hotness: the open source C2 Sliver.
\n[\/om_agenda_item][om_agenda_item time=”14:00 – 14:40″ title=”How to Kickstart a Security Program? – Ottucs\u00e1k J\u00f3zsef”]Security is a daunting task for all organisations, no matter the size, maturity, industry or the budget. When you are hired as a security decision maker, you are expected to learn the ropes quickly. People expect you to hit the ground running, make impactful changes and bring in quick wins to prove your worth.<\/p>\n

In his talk, Jozsef will share some insight on how one could approach their first 90 days as a security decision maker. How to build relationships with key stakeholders, find security gaps quickly, understand priorities, and make new friends (or enemies) along the way.<\/p>\n

By the end of the talk you should have an understanding of different resources, tools and processes that can help you make impact early. You will be able to assess the maturity of your organisation and build a plan that can grow your cybersecurity program.[\/om_agenda_item][om_agenda_item time=”14:45 – 15:25″ title=”How Instantly Upgrade Your Legay Code in Minutes? – Tomas Votruba”]Legacy code is side effect of any successful company. The longer your grow, the older your code is.<\/p>\n

How can we deal with it? Rewrite? Gradual refactoring? Hire external developer team with legacy skills?<\/p>\n

In 2022 there are tools that can handle like composer updates your dependencies. Any company or developer can refactor their huge legacy code in a couple of weeks. Switch framework? Bump PHP 5.3 to PHP 8.1? From PHPUnit 4 to 10?<\/p>\n

You don’t have to know a thing about the BC breaks and how-to-chagen it. I will show you, how you can become master of change with simple command line.[\/om_agenda_item][om_agenda_item time=”15:45 – 16:25″ title=”What are We Missing in Web Applications? – Mirza Burhan Baig”]In today’s world, we have a modern and stable web application framework to develop on. That is already so much secured from the attacks, regardless of the OS. If you design the system properly, attacker cannot injection the system. Or attacker cannot attack the website with common attacks like XSS, CSRF, SSRF, SSTI, etc. On the other hand, we have sophisticated scanners which scan the website dynamically with the interactive logins as well, it scans the website along with the internal pages. And we have secure coding practices as well along with the scanners which can scan the source code regardless of the programming language. They are necessary tools while developing a secure application.<\/p>\n

But what all these are missing is “Business Logic Flaws”, which are the reason for the highest-paid bounties on Hackerone, bugcrowd, etc. Business Logic Flaws are the attacks, which neither the source-code analysis tool nor dynamic web application scanner can detect.[\/om_agenda_item][\/om_agenda_day][om_agenda_day title=”HACKTIVITY NEXT – SECURITY THEATER” date=”7 OCTOBER 2022″][om_agenda_item time=”09:00 – 09:40″ title=”Broad View to Automotive Security & Penetration Testing – Andr\u00e1s Kabai & L\u00e1szl\u00f3 T\u00f3th”]Over the last few years, the media were full of various \u201ccar hacking\u201d related news. Keyless entry systems can be bypassed, components can be rooted, firmware can be manipulated, hidden features can be activated, car functionalities can be triggered or manipulated remotely, owners can be tracked, just to name some trivial examples.
\nWhile the public has increasing attention on automotive security, this has been already in focus of key industry players for several years.<\/p>\n

Nowadays, vehicles are very complex systems, moreover they are part of an even more complex ecosystem. Therefore, answering questions like what car hacking really means, why it is important, how it is regulated, what the way of targeting a complete vehicle or an individual ECU (electronic control unit) is, what kind of technologies need to be addressed and what really should be tested in case of a car hacking project is not straightforward.<\/p>\n

It is no longer a \u201ccapture and replay on CAN bus\u201d or \u201ccontrol the vehicle through OBD-II port\u201d game.<\/p>\n

This presentation will provide you answers to the questions above and will also provide you insights into the typical automotive security testing project.
\n[\/om_agenda_item][om_agenda_item time=”09:45 – 10:05″ title=”A GREAT Sewing Workshop – Pierre Delcher”]In February 2022, Internet accesses that are provided by the ViaSat-owned “KA-SAT” constellation suddenly started to massively fail in Europe, notably resulting in wind turbines operation disruption for an energy provider in Germany, or government communications disturbance in Ukraine. ViaSat dubbed the breakdown a “cyber-event”.
\nWhile more or less realistic theories were publicly discussed to explain such failure, before any official statement on its cause, it became clear for some users that ViaSat modems merely and abruptly stopped functioning.
\nIn this talk, Pierre will humbly expose results of GREAT investigations that were conducted in March on one of the most substantial cyber-attack that affected Ukraine since the Russian invasion to date, uncovering possible motivations, firmware vulnerabilities, and a wiper for embedded devices. Oh, and the talk will also be an opportunity to learn a things or two about sewing…[\/om_agenda_item][om_agenda_item time=”10:10 – 10:50″ title=”Spin That Steering Wheel – Domokos Nagy”]There is no question about that safety is more than important in a modern vehicle.
\nIn our presentation we have only one question: What about cybersecurity on a safety-critical system?
\nThinking as bad-guys we will try to find ways of how to hack into a steering wheel system.
\nWe will use a prepared steering unit for demonstration purposes for all steps.
\nThere will be some challenges on the road: to identify, connect and communicate with a non-usual hacking target.
\nThe next step will be to gain privileges and bypassing the security measures: finding vulnerabilities of the diagnostics services by some typical seed\/key challenge issues on the keysize and bruteforcing possibilities.
\nOur final goal will be to show how hard to find exploitable vulnerabilities in a wrong implementation – in our case: spin that steering wheel.
\n[\/om_agenda_item][om_agenda_item time=”11:15 – 11:55″ title=”Popopizza – How to break the Dutch Police Bodycams for Fun and Pizza? – Edwin van Andel”]The Dutch police has been trying to collaborate with \u2018private partners\u2019, including the Dutch hacker community in the Netherlands, for years now (the great Public Private Partnership or PPP), with mild succes. So when they asked us what they could organise to get to know us, we replied with \u201cinvite us to hack police shit and eat pizza\u2019s\u201d. We thought we would never hear of them again. Surprise surprise, they eventually invited us in. So we created a team consisting of brilliant hard- and software hackers from the Dutch hacking community and went to the Amsterdam police station to try and hack some of their obsolete bodycams. Did we succeed? Come and find out and prepare to laugh your ass off!<\/p>\n

[\/om_agenda_item][om_agenda_item time=”12:00 – 12:20″ title=”Security Assesment of Embedded Firewalls – a Case Study – Csongor Ferenczi”]With the digitalization of factories, a new attack surface emerged: industrial control equipment is usually not designed to be secure against attackers. This use case is about the examination of an industrial firewall (both hardware and the software) where we found a critical vulnerability, which allowed us to inject arbitrary commands into the device, dump its file system, and bypass it altogether. [\/om_agenda_item][om_agenda_item time=”12:25 – 13:05″ title=”Pwned in Space – Paul Coggin”]In this presentation we will discuss both theoretical and real-world examples of cybersecurity issues concerning space systems. There are many components and systems that may be targeted in a space system by adversaries including ground station systems, satellites and space vehicles. This presentation will step through attack trees for targeting space systems. Examples of real-world cybersecurity events involving space assets will be covered. Recommendations for improving the security of space systems will also be presented.[\/om_agenda_item][om_agenda_item time=”14:00 – 14:40″ title=”Web3 + Scams = It’s a Match! – Zolt\u00e1n Bal\u00e1zs”]Most cryptocurrency-related scams are not sophisticated, yet they are paramount due to the damage they can cause. While researching the magical world of crypto scams, I have identified at least 25 different types of these scams. These can be cheap replicas from the “pre-Web3″ world. Others are novel and specific to Web3 and smart contracts. Pump and dump or rug pull are not novel, but proof of weak hands or NFT airdrop scams are the products of the new Web3 world order. After categorizing the different scam types, I will close the presentation with tips and tricks on surviving the wild-wild west of the Web3 world and how simple, traditional ML-based phishing protection can protect against some Web3 scam sites. In 2022, there is rarely a week without a stolen JPEG worth 100K USD, yet most consumer-grade endpoint protection does not even know what a dApp looks like. Even ITSEC people do not understand or agree on what a dApp looks like or even what web3 is. Warning: this research includes blockchain mumbo jumbo, but I will turn down the hype factor.[\/om_agenda_item][om_agenda_item time=”14:45 – 15:25″ title=”Fault Injection (FI) Attacks Against Embedded Systems – Andr\u00e1s Kabai”]Product security relies on several factors including firmware and hardware security, hence there are many ways to improve the overall security level, such as secure coding, hardware config hardening or security testing over the exposed communication interfaces. These steps can help identifying and eliminating issues that are likely to be targeted by the attackers.<\/p>\n

But what if, the underlying hardware is prone to fault injection attacks? Will the hardened hardware configuration and the secure firmware provide enough protection against a malicious attacker?<\/p>\n

This presentation will provide insight into the fault injection attacks, tools and techniques with practical demonstration on how FI attack can be used against real targets, like Trezor hardware wallets to extract sensitive data, or a CAN-bus connected embedded system to bypass a security feature implemented on the CAN interface. [\/om_agenda_item][om_agenda_item time=”15:45 – 16:25″ title=”Bug Bounty \u00e9s Responsible Disclosure a V\u00e1ltoz\u00f3 Kibert\u00e9r \u00c1rny\u00e9k\u00e1ban – Kerekasztal Besz\u00e9lget\u00e9s – Dr. Csaba Krasznay, Bal\u00e1zs P\u00f3zner, Norbert Kov\u00e1cs, B\u00e1lint Varga”]Ma a vil\u00e1g sajt\u00f3ja k\u00e9mszoftverekt\u0151l \u00e9s kiberfegyverekt\u0151l hangos, a laikusok azonban ritk\u00e1n vannak tiszt\u00e1ban azzal, hogy ezek nem l\u00e9tezn\u00e9nek a szoftverek \u00e9s a hardverek sebezhet\u0151s\u00e9gei n\u00e9lk\u00fcl. Nagyon sok esetben ezeket a s\u00e9r\u00fcl\u00e9kenys\u00e9geket korm\u00e1nyokt\u00f3l f\u00fcggetlen hackerek fedezik fel \u00e9s \u00e9rt\u00e9kes\u00edtik azokat sz\u00fcrkez\u00f3n\u00e1s k\u00f6zvet\u00edt\u0151c\u00e9geken kereszt\u00fcl, kiker\u00fclve m\u00e9g a lehet\u0151s\u00e9g\u00e9t is annak, hogy a fejleszt\u0151 \u00e9rtes\u00fclj\u00f6n term\u00e9k\u00e9nek hib\u00e1j\u00e1r\u00f3l. B\u00e1r egyre t\u00f6bb nagy fejleszt\u0151 ind\u00edt bug bounty programot, ezek nem minden esetben \u00e9rik el a c\u00e9ljukat, a hib\u00e1kat megtal\u00e1l\u00f3knak pedig sokszor lehet\u0151s\u00e9g\u00fck sincsen felel\u0151ss\u00e9gteljesen bejelenteni tal\u00e1lataikat a gy\u00e1rt\u00f3knak. A kerekasztal-besz\u00e9lget\u00e9sben azt j\u00e1rjuk k\u00f6rbe, milyen tapasztalatok vannak a bug bounty programok \u00e9s a responsible disclosure ter\u00fcleteken haz\u00e1nkban \u00e9s nemzetk\u00f6zi szinten.[\/om_agenda_item][om_agenda_item time=”16:25 – 16:30″ title=”Closing Notes – Attila Marosi-Bauer”][\/om_agenda_item][\/om_agenda_day][om_agenda_day title=”HACKTIVITY NEXT – SECURITY DOME” date=”7 OCTOBER 2022″][om_agenda_item time=”09:00 – 09:40″ title=”Making Sense of Firmware Images – The Journey to Efficient Extraction – M\u00e1rton Ill\u00e9s”]One of the major challenges of embedded security analysis is the accurate extraction of arbitrary firmware images.<\/p>\n

In this talk we will share our struggles when reversing and unpacking enormous amounts of arbitrary firmware images of embedded devices and how we overcame them by building our own extraction framework. This definitely wasn\u2019t a straight-forward endeavor, scattered with interesting observations, tons of surprises, WTFs, and three 0-days.<\/p>\n

We are open-sourcing our tool unblob (https:\/\/github.com\/onekey-sec\/unblob) and encouraging fellow researcher to use it and extend.[\/om_agenda_item][om_agenda_item time=”09:45 – 10:05″ title=”Security in IoT \u2013 the Investigation of Bluetooth Low Energy – J\u00e1nos Kepics”]Consumer IoT devices manifest in a variety of forms today, including fitness trackers, rings, smart-watches, pacemakers, and so on. Most short range, low power consuming IoT devices use BLE (Bluetooth Low Energy) protocol to communicate with a master device. This communication link can contain very personal information about the user. Several vulnerabilities and security attacks exist for BLE (Eavesdropping, Man in the Middle Attacks, Denial of Service & Fuzzing Attack). However, most of them do not go down to the lower layers of the protocol (L2CAP, link layer, Physical layer). In my presentation I deep dive into the structure of BLE protocol, explore some of the open-source tools for BLE exploitation (gatttool, bettercap, Ubertooth etc.) and introduce you to the world of software defined radio – how you can use it to analyse and potentially malform packets in the lowest layers of the protocol.[\/om_agenda_item][om_agenda_item time=”10:10 – 10:50″ title=”Wild IoT Tales: from Hacking Power Grids to Oil Pipelines! – Barak Sternberg”]In this talk, we will analyze 3 of the wildest IoT attack stories happened last year – who was targeted? What Malware was used? What was the impact?
\nFirst, We will dive & explore the recent attack over Ukranian power grids and show how it (almost) caused blackout for over 2 million people in Ukraine!
\nWe will further technically analyze “Industroyer2″, the unique malware used in this attack, its unique ways of operation & cool techniques.
\nAfterwards, We will describe the Conti-ransomware attack over Public Health Systems in Ireland (HSE) & see for how long attackers stayed hidden in their IT networks!
\nFinally, we will shortly describe the Colonial Oil Pipelines Attack in US, the damage was done & how the FBI got involved in all that!?
\nWhenever known – we will explore some of the unique technical techniques, attack vectors and lateral movement involved! This systematic review conclude the wild IoT attacks of the year, and will be based on multiple both-technical & public-reports![\/om_agenda_item][om_agenda_item time=”11:15 – 11:55″ title=”Fuzzing Trusted Applications in OP-TEE via Shared Memory – Roland Nagy”]Our work has two main contributions: First, we developed a framework that can be used to emulate and fuzz TAs in OP-TEE, a popular, open and protable TEE implementation. Second, we developed a method to overcome difficulties of fuzzing applications that take their inputs from shared memory. Our work was inspired by a previous Hacktivity talk, where it was shown that emulators can be used to execute TAs and it is possible to connect such an emulator with a fuzzer. We extended this work to a degree that allows for emulating real-world TAs in OP-TEE that extensively use library functions and services provided by the trusted OS. We demonstarte the usage of our framework by fuzzing a security critical TA that we developed for the purpose of rootkit detection on embedded devices. This TA inspects the memory snapshot of the rich OS (which is Linux in our case), and tries to find anomalies in kernel data structures that could be caused by the presence of a rootkit. We fuzz this TA by providing input to it via its memory read function. However, in order to minimize the amount of irrelevant inputs, we developed a custom input mutation method that takes into account prior knowledge about the kernel data structures expected by tested TA.
\n[\/om_agenda_item][om_agenda_item time=”12:00 – 12:20″ title=”Cybersecurity Cannot Ignore Climate Change – Chlo\u00e9 Messdaghi”]Several industries have been implementing sustainability into their business strategies and taking actions; however, on average, the cybersecurity industry hasn\u2019t even discussed climate change and its role towards contributing to it.In this talk, I address where we stand in climate change, how our industry is contributing to the problem, why we should care, and what every single company in our industry can do to cut down on emissions to become part of the growing community to make sure that this planet has a future beyond our generations. [\/om_agenda_item][om_agenda_item time=”12:25 – 13:05″ title=”From Can-Bus Hacking to the Api. Next Gen Car Hacking – Thomas Fischer”]Cars are (slowly) Changing from completely randomly produced building Blocks connected via protocols from the 80s to Software Defined products. Car Manufacturers using production cycles that are completely incompatible wirh this approach. we as Hackers understand what connectivity really is.
\nSo we have a real ne playfield. Car-Hacking starts to get soo much better and easier now. We have access to Diagnosis Tools that are cheap The Car Hackers are already building the best AI-Driven Level 2 Autonomous Driving Aid.
\nIn my Presentation I will give you the entry
\npoints and show you what we can already do.
\nI will show Hard- and Software for Car-Hackers to start.[\/om_agenda_item][om_agenda_item time=”14:00 – 14:40″ title=”Automotive Threat Intelligence: Product vs. IT cybersecurity – P\u00e9ter Venesz & Giuseppe Serio”]Cybersecurity is an ever-transforming realm. As vehicles become significantly more connected, the threat landscape increases exponentially. In the race between threat actors and security teams, the key is to remain ahead of your adversaries.
\n\u201cProduct Cybersecurity\u201d focuses on protecting an organization\u2019s products, as opposed to its IT infrastructure. IT practices are not enough for automotive product cyber security and product cybersecurity is critical in the OT and IoT world. In the Automotive Industry, it can be a matter of life and death.
\nBlack-hat cyber attacks on connected vehicles are continuously on the rise. As described in detail in our 2022 Global Automotive Cyber Security Report, publicly reported Black-hat incidents accounted for more than 56% of all incidents in 2021. In comparison, in 2016 they accounted for only 22%. As proven time and again by security researchers, the required skills and corresponding vulnerabilities to enable widespread cyber crime are plentiful. The combination of the two does not signify good news for Automotive Stakeholders.[\/om_agenda_item][om_agenda_item time=”14:45 – 15:25″ title=”Metaverse (in)Security – Ali Abdollahi”]Since October of last year (2021) when Facebook changed the name of the parent company to Meta, we have heard the word Meta and Metavers a lot. For the first time, this talk wants to review all the vulnerabilities that threaten users and infrastructure owners at different layers.[\/om_agenda_item][om_agenda_item time=”15:45 – 16:25″ title=”The Great Hospital Hack !! – Mirza Burhan Baig”]In today’s world, by putting security boxes, we think that when we are secure but when we are hit by an attack, we put more security boxes. The truth is that we need human awareness as well to minimize these social engineering attacks. Social engineering is the weakest link in security as per some surveys. Humans are emotionally programmed.<\/p>\n

I will be discussing a targeted attack on a hospital in a Red Teaming assessment, I tried every possible thing to get inside starting from WIFI hacking, to the main core email server hacking, reading emails, reading logs, monitoring traffic, putting devices with white-listing labels, to the core server farms & the physical data center with a cloned RFID.<\/p>\n

The process starts from setting up a Rogue WIFI point for the students and the staff, connecting to that leads to some critical emails, where I found some critical configurations including a backup file of AD. In that, I found the golden ticket and some credentials that lead to the LOGs monitoring system. From there I tried the combinations of different attacks and monitored the logs & the email on which logs were sent altogether. Putting on a Doctors uniform, no one suspected that what I was doing in the lobby.[\/om_agenda_item][\/om_agenda_day][\/om_agenda][om_reduce_space height=”26px”][\/vc_column][\/vc_row][vc_section disable_element=”yes”][vc_row][vc_column][vc_custom_heading text=”(color1)TICKETS(\/color1)” uppercase=”yes” text_additional=”DON’T MISS THE BEST HACKTIVITY CONFERENCE SO FAR! GET YOURS NOW!” add_shadow_text=”yes” font_container=”tag:h1|text_align:center” shadow_text=”TICKETS”][\/vc_column][\/vc_row][vc_row content_placement=”middle” disable_element=”yes” bg_color=”#ffffff” margin_bottom=”0px”][vc_column width=”1\/3″ css=”.vc_custom_1557482199100{margin-top: 0px !important;margin-bottom: 0px !important;border-top-width: 0px !important;border-bottom-width: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;background-color: #f3f3f3 !important;}”][om_click_icon_box icon_fontawesome=”fa fa-user” title=”HACKTIVITY PASS FOR INDIVIDUALS”]This ticket type is valid only for individuals. Invoices will be issued only for them, companies cannot purchase it.[\/om_click_icon_box][vc_column_text]<\/p>\n

50 000 HUF<\/h5>\n

[\/vc_column_text][vc_btn title=”PURCHASE” align=”center” css=”.vc_custom_1624349551331{margin-top: 0px !important;margin-bottom: 0px !important;border-top-width: 0px !important;border-bottom-width: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}” link=”url:https%3A%2F%2Ftickets.hacktivity.com%2Fen%2Ftickets%2Frendeles%2Fhacktivity-pass-for-individuals%2F||target:%20_blank|”][\/vc_column][vc_column width=”1\/3″ css=”.vc_custom_1557482206645{margin-top: 0px !important;margin-bottom: 0px !important;border-top-width: 0px !important;border-bottom-width: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;background-color: #e8e8e8 !important;}”][om_click_icon_box icon_fontawesome=”fa fa-briefcase” title=”HACKTIVITY PASS FOR COMPANIES”]You will receive a VAT invoice for your ticket in your company\u2019s name and address after we have received the payment.[\/om_click_icon_box][vc_column_text]<\/p>\n

80 000 HUF<\/h5>\n

[\/vc_column_text][vc_btn title=”PURCHASE” align=”center” css=”.vc_custom_1624349571318{margin-top: 0px !important;margin-bottom: 0px !important;border-top-width: 0px !important;border-bottom-width: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}” link=”url:https%3A%2F%2Ftickets.hacktivity.com%2Fen%2Ftickets%2Frendeles%2Fhacktivity-pass-for-companies%2F||target:%20_blank|”][\/vc_column][vc_column width=”1\/3″ css=”.vc_custom_1632919935554{background-color: #d8d8d8 !important;}”][om_click_icon_box icon_fontawesome=”fa fa-star” title=”HACKTIVITY VIP PASS”]Hacktivity VIP Pass holders can enter the conference at a separate entrance, they can enjoy the VIP lunch during conference – along with the speakers\/other VIP guests & staff.[\/om_click_icon_box][vc_column_text]<\/p>\n

100 000 HUF<\/h5>\n

[\/vc_column_text][vc_btn title=”PURCHASE” align=”center” css=”.vc_custom_1632919728080{margin-top: 0px !important;margin-bottom: 0px !important;border-top-width: 0px !important;border-bottom-width: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}” link=”url:https%3A%2F%2Ftickets.hacktivity.com%2Fen%2Ftickets%2Frendeles%2Fhacktivity-vip-pass%2F||target:%20_blank|”][\/vc_column][\/vc_row][vc_row content_placement=”middle” bg_type=”image” bg_image_pos=”100w_center” margin_top=”0px” padding_top=”16px” bg_image=”912″ bg_color_fallback=”#02a699″ font_color=”#ffffff”][vc_column css=”.vc_custom_1557500625598{margin-top: 35px !important;margin-bottom: 0px !important;margin-left: 50px !important;border-top-width: 35px !important;border-bottom-width: 0px !important;border-left-width: 50px !important;padding-top: 35px !important;padding-bottom: 35px !important;padding-left: 50px !important;border-left-style: none !important;border-top-style: none !important;border-bottom-style: none !important;}”][vc_column_text css=”.vc_custom_1557501218118{margin-top: 0px !important;margin-bottom: 0px !important;border-top-width: 0px !important;border-bottom-width: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]<\/p>\n

HACKADEMY SCHOLARSHIP PROGRAMME<\/h2>\n

We provide 50 tickets for university\/high school students & teachers.[\/vc_column_text][vc_empty_space height=”26px”][vc_btn title=”More info” uppercase=”yes” align=”left” link=”url:http%3A%2F%2Fhacktivity.com%2Findex.php%2Fhackademy-programme%2F|title:Hackademy%20Programme||”][\/vc_column][\/vc_row][\/vc_section][vc_row disable_element=”yes”][vc_column][vc_empty_space height=”3em”][vc_custom_heading text=”(color1)Major(\/color1) Conference sections” uppercase=”yes” text_additional=”That’s not all, more sections on the schedule page” add_shadow_text=”yes” font_container=”tag:h1|text_align:center” css_animation=”custom” shadow_text=”Schedule”][om_reduce_space height=”2em”][om_agenda description_expand=”yes”][om_agenda_day title=”Day 1″ date=”18 Sep 2016″][om_agenda_item time=”10:00 – 11:00″ room=”Room A1″ speaker_ids=”117″ title=”Morning Committee Meetings”]Base extend alignments cutting-edge monetize uniquely brand web-readiness completely create other’s efficient clicks-and-mortar resource.[\/om_agenda_item][om_agenda_item time=”12:00 – 14:00″ room=”Room D” speaker_ids=”118″ title=”Modern marketing strategies and tactics”]Maximizing items mission-critical expedite convergence top-line vectors best methodologies top-line reliable productivate total. Incubate reconceptualize cross-unit envisioneer communicate client-centric worldwide objectively collaboratively compliant wireless prospective brand.[\/om_agenda_item][om_agenda_item time=”13:00 – 15:20″ room=”Video Room” speaker_ids=”116″ title=”Management Development Program”]Uniquely myocardinate incubate invested applications leadership “outside the box” plagiarize distinctive leading-edge. Virtual “organic” functionalized resources iterate seize repurpose fully turnkey collaboration experiences enabled standards network.[\/om_agenda_item][\/om_agenda_day][om_agenda_day title=”Day 2″ date=”19 Sep 2016″][om_agenda_item time=”10:00 – 12:00″ room=”Room D” speaker_ids=”113″ title=”Software Applications & Services”]Items future-proof an uniquely innovate monetize base empowerment users target via innovative markets for. Architect integrate promote based enhance supply e-enable evolve fashion bricks-and-clicks user dynamic drive.[\/om_agenda_item][om_agenda_item time=”11:30 – 13:00″ speaker_ids=”114″ title=”IT Infrastructure \/ Operations Management” room=”Room A1″]Sustainable interactive conveniently niche effective action intellectual utilize credibly synthesize alignments cost client-centered outsourcing. Functionalities areas interfaces progressive productize process-centric fabricate cross granular completely energistically promote scenarios backward-compatible.[\/om_agenda_item][om_agenda_item time=”13:00 – 15:00″ room=”Video Room” speaker_ids=”112″ title=”Build Better Teams That Achieve More”]Growth conceptualize state deliver communities researched architectures opportunities time enterprise-wide of B2B timely. Distinctively aggregate sources go engage expertise “organic” top-line pursue syndicate before customize.[\/om_agenda_item][\/om_agenda_day][\/om_agenda][om_reduce_space height=”26px”][\/vc_column][\/vc_row][vc_row][vc_column][vc_custom_heading text=”Our (color1)Sponsors(\/color1) and Partners” uppercase=”yes” text_additional=”SUPPORTING US IN MANY WAYS” add_shadow_text=”yes” font_container=”tag:h1|text_align:center” shadow_text=”SPONSORS”][vc_row_inner disable_element=”yes”][vc_column_inner][vc_column_text]<\/p>\n

Diamond sponsor<\/strong><\/h4>\n

[\/vc_column_text][vc_single_image image=”3228″ img_size=”300×150″ alignment=”center”][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column][vc_empty_space height=”48px”][\/vc_column][\/vc_row][vc_row][vc_column][vc_single_image image=”4511″][\/vc_column][\/vc_row][vc_row disable_element=”yes”][vc_column width=”1\/2″][vc_column_text]<\/p>\n

VIP sponsor<\/strong><\/h4>\n

[\/vc_column_text][vc_single_image image=”1369″ img_size=”300×150″ alignment=”center”][\/vc_column][vc_column width=”1\/2″][vc_column_text]<\/p>\n

VIP sponsor<\/strong><\/h4>\n

[\/vc_column_text][vc_single_image image=”1370″ img_size=”300×150″ alignment=”center”][\/vc_column][\/vc_row][vc_row disable_element=”yes”][vc_column][vc_empty_space height=”48px”][\/vc_column][\/vc_row][vc_row disable_element=”yes”][vc_column width=”1\/4″][vc_column_text]<\/p>\n

Gold sponsor<\/strong><\/h4>\n

[\/vc_column_text][vc_single_image image=”3229″ img_size=”300×150″ alignment=”center”][\/vc_column][vc_column width=”1\/4″][vc_column_text]<\/p>\n

Gold sponsor<\/strong><\/h4>\n

[\/vc_column_text][vc_single_image image=”3226″ img_size=”300×150″ alignment=”center”][\/vc_column][vc_column width=”1\/4″][vc_column_text]<\/p>\n

Gold sponsor<\/strong><\/h4>\n

[\/vc_column_text][vc_single_image image=”3227″ img_size=”300×150″ alignment=”center”][\/vc_column][vc_column width=”1\/4″][vc_column_text]<\/p>\n

Gold sponsor<\/strong><\/h4>\n

[\/vc_column_text][vc_single_image image=”2904″ img_size=”300×150″ alignment=”center”][\/vc_column][vc_column][vc_empty_space height=”48px”][\/vc_column][\/vc_row][vc_row disable_element=”yes”][vc_column width=”1\/4″][vc_column_text]<\/p>\n

Gold sponsor<\/strong><\/h4>\n

[\/vc_column_text][vc_single_image image=”3235″ img_size=”300×150″ alignment=”center”][\/vc_column][vc_column width=”1\/4″][vc_column_text]<\/p>\n

Gold sponsor<\/strong><\/h4>\n

[\/vc_column_text][vc_single_image image=”3236″ img_size=”300×150″ alignment=”center”][\/vc_column][vc_column width=”1\/4″][vc_column_text]<\/p>\n

Gold sponsor<\/strong><\/h4>\n

[\/vc_column_text][vc_single_image image=”1616″ img_size=”300×150″ alignment=”center”][\/vc_column][vc_column width=”1\/4″][\/vc_column][vc_column][vc_empty_space height=”48px”][\/vc_column][\/vc_row][vc_row disable_element=”yes”][vc_column width=”1\/3″][vc_column_text]<\/p>\n

Silver sponsor<\/strong><\/h4>\n

[\/vc_column_text][vc_single_image image=”1620″ img_size=”200×100″ alignment=”center”][\/vc_column][vc_column width=”1\/3″][vc_column_text]<\/p>\n

Silver sponsor<\/strong><\/h4>\n

[\/vc_column_text][vc_single_image image=”2907″ img_size=”200×100″ alignment=”center”][\/vc_column][vc_column width=”1\/3″][vc_column_text]<\/p>\n

Silver sponsor<\/strong><\/h4>\n

[\/vc_column_text][vc_single_image image=”3240″ img_size=”200×100″ alignment=”center”][\/vc_column][\/vc_row][vc_row disable_element=”yes”][vc_column][vc_empty_space][vc_column_text]<\/p>\n

Professional partners<\/strong><\/h4>\n

[\/vc_column_text][\/vc_column][\/vc_row][vc_row disable_element=”yes”][vc_column width=”1\/5″][vc_single_image image=”3230″ img_size=”200×100″ alignment=”center”][\/vc_column][vc_column width=”1\/5″][vc_single_image image=”3238″ img_size=”200×100″ alignment=”center”][\/vc_column][vc_column width=”1\/5″][vc_single_image image=”3237″ img_size=”200×100″ alignment=”center”][\/vc_column][vc_column width=”1\/5″][vc_single_image image=”1621″ img_size=”200×100″ alignment=”center”][\/vc_column][vc_column width=”1\/5″][vc_single_image image=”2945″ img_size=”200×100″ alignment=”center”][\/vc_column][\/vc_row][vc_row disable_element=”yes”][vc_column width=”1\/5″][vc_single_image image=”3269″ img_size=”200×100″ alignment=”center”][\/vc_column][vc_column width=”1\/5″][vc_single_image image=”1628″ img_size=”200×100″ alignment=”center”][\/vc_column][vc_column width=”1\/5″][vc_single_image image=”1630″ img_size=”200×100″ alignment=”center”][\/vc_column][vc_column width=”1\/5″][vc_single_image image=”1627″ img_size=”200×100″ alignment=”center”][\/vc_column][vc_column width=”1\/5″][vc_single_image image=”1623″ img_size=”200×100″ alignment=”center”][\/vc_column][\/vc_row][vc_row disable_element=”yes”][vc_column width=”1\/5″][vc_single_image image=”1622″ img_size=”200×100″ alignment=”center”][\/vc_column][vc_column width=”1\/5″][vc_single_image image=”1629″ img_size=”200×100″ alignment=”center”][\/vc_column][vc_column width=”1\/5″][vc_single_image image=”1625″ img_size=”200×100″ alignment=”center”][\/vc_column][vc_column width=”1\/5″][vc_single_image image=”1626″ img_size=”200×100″ alignment=”center”][\/vc_column][vc_column width=”1\/5″][\/vc_column][vc_column][vc_empty_space][vc_column_text]<\/p>\n

Media partners<\/strong><\/h4>\n

[\/vc_column_text][\/vc_column][\/vc_row][vc_row disable_element=”yes”][vc_column width=”1\/5″][vc_single_image image=”1636″ img_size=”200×100″ alignment=”center”][\/vc_column][vc_column width=”1\/5″][vc_single_image image=”1637″ img_size=”200×100″ alignment=”center”][\/vc_column][vc_column width=”1\/5″][vc_single_image image=”1634″ img_size=”200×100″ alignment=”center”][\/vc_column][vc_column width=”1\/5″][vc_single_image image=”1632″ img_size=”200×100″ alignment=”center”][\/vc_column][vc_column width=”1\/5″][vc_single_image image=”2949″ img_size=”200×100″ alignment=”center”][\/vc_column][\/vc_row][vc_row disable_element=”yes”][vc_column width=”1\/5″][vc_single_image image=”1638″ img_size=”200×100″ alignment=”center”][\/vc_column][vc_column width=”1\/5″][vc_single_image image=”1641″ img_size=”200×100″ alignment=”center”][\/vc_column][vc_column width=”1\/5″][vc_single_image image=”1635″ img_size=”200×100″ alignment=”center”][\/vc_column][vc_column width=”1\/5″][vc_single_image image=”1633″ img_size=”200×100″ alignment=”center”][\/vc_column][vc_column width=”1\/5″][vc_single_image image=”1639″ img_size=”200×100″ alignment=”center”][\/vc_column][vc_column][vc_empty_space][vc_column_text]<\/p>\n

Technical partners<\/strong><\/h4>\n

[\/vc_column_text][\/vc_column][\/vc_row][vc_row disable_element=”yes”][vc_column width=”1\/4″][vc_single_image image=”1646″ img_size=”200×100″ alignment=”center”][\/vc_column][vc_column width=”1\/4″][vc_single_image image=”1644″ img_size=”200×100″ alignment=”center”][\/vc_column][vc_column width=”1\/4″][vc_single_image image=”1643″ img_size=”200×100″ alignment=”center”][\/vc_column][vc_column width=”1\/4″][vc_single_image image=”1645″ img_size=”200×100″ alignment=”center”][\/vc_column][\/vc_row][vc_row disable_element=”yes”][vc_column][om_reduce_space height=”1em”][vc_cta h2=”SUPPORTING #HACKTIVITY2021″ h4=”Take part of the biggest IT security event in Central & Eastern Europe!” add_stripes=”” remove_margins=”yes” add_button=”right” custom_background=”#02a699″ btn_title=”SPONSORSHIP PACKAGES” custom_text=”#ffffff” btn_link=”url:https%3A%2F%2Fhacktivity.com%2Fwp-content%2Fuploads%2F2021%2F06%2FHacktivity2021_Sponsorship_Offer.pdf|title:Become%20a%20Sponsor||”][om_reduce_space height=”1em”][\/vc_column][\/vc_row][vc_row][vc_column][vc_custom_heading text=”(color1)Venue(\/color1)” uppercase=”yes” text_additional=”MOM CULTURAL CENTER \/\/ 1124 BUDAPEST, CS\u00d6RSZ U. 18.” add_shadow_text=”yes” font_container=”tag:h1|text_align:center” shadow_text=”VENUE”][vc_empty_space height=”4px”][vc_images_carousel images=”244,242,240,239,238,819″ img_size=”full” onclick=”link_no” speed=”3000″ slides_per_view=”2″ autoplay=”yes” hide_pagination_control=”yes” hide_prev_next_buttons=”yes” partial_view=”yes” wrap=”yes”][vc_column_text]<\/p>\n

<\/h4>\n

2 CONFERENCE HALLS \/\/ 2 WORKSHOP ROOMS \/\/ EXHIBITION AREA \/\/ LEISURE ZONE \/\/ HACKCENTER \/\/ BUFFET<\/strong><\/h4>\n

[\/vc_column_text][vc_empty_space height=”16px”][\/vc_column][\/vc_row][vc_row content_placement=”middle”][vc_column css=”.vc_custom_1557471441564{margin-top: 0px !important;margin-bottom: 0px !important;border-top-width: 0px !important;border-bottom-width: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;border-top-style: none !important;border-bottom-style: none !important;}”][vc_gmaps link=”#E-8_JTNDaWZyYW1lJTIwc3JjJTNEJTIyaHR0cHMlM0ElMkYlMkZ3d3cuZ29vZ2xlLmNvbSUyRm1hcHMlMkZlbWJlZCUzRnBiJTNEJTIxMW0xOCUyMTFtMTIlMjExbTMlMjExZDI2OTUuOTc0MjE4ODA1NzAzNSUyMTJkMTkuMDE2NDEzMzE1ODE3OTQlMjEzZDQ3LjQ5MDQxNTYwMzk4OTgxJTIxMm0zJTIxMWYwJTIxMmYwJTIxM2YwJTIxM20yJTIxMWkxMDI0JTIxMmk3NjglMjE0ZjEzLjElMjEzbTMlMjExbTIlMjExczB4NDc0MWRjMjk5NDQyMDNiZiUyNTNBMHhhMTUyOTY2NDhiNDVhZTIlMjEyc01PTSUyQkt1bHR1ciUyNUMzJTI1QTFsaXMlMkJLJTI1QzMlMjVCNnpwb250JTIxNWUwJTIxM20yJTIxMXNodSUyMTJzaHUlMjE0djE1NTc0NzEzNDc1ODUlMjE1bTIlMjExc2h1JTIxMnNodSUyMiUyMHdpZHRoJTNEJTIyNjAwJTIyJTIwaGVpZ2h0JTNEJTIyNDUwJTIyJTIwZnJhbWVib3JkZXIlM0QlMjIwJTIyJTIwc3R5bGUlM0QlMjJib3JkZXIlM0EwJTIyJTIwYWxsb3dmdWxsc2NyZWVuJTNFJTNDJTJGaWZyYW1lJTNF” remove_margins=”yes” css=”.vc_custom_1557471381747{margin-top: 0px !important;margin-bottom: 0px !important;border-top-width: 0px !important;border-bottom-width: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;border-top-style: none !important;border-bottom-style: none !important;}”][\/vc_column][\/vc_row][vc_row padding_top=”16″][vc_column width=”1\/2″][vc_column_text]<\/p>\n

PUBLIC TRANSPORT<\/h3>\n

We recommend you to arrive at #Hacktivity2022<\/em>\u00a0by public transport, not just because it is more environment-friendly, but sometimes parking is difficult in the neighbourhood. Use tram #59, #17, #61, or bus #212!<\/a><\/strong>[\/vc_column_text][\/vc_column][vc_column width=”1\/2″][vc_column_text]<\/p>\n

PARKING<\/h3>\n

If you insist on coming by car, you can park at the public parking places in the neighbourhood, but you also can use the garage of MOM Park<\/strong>, the garage of LARUS Restaurant or Budapest Congress Center<\/strong> (you need to pay for all parking options).<\/em>[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"

[vc_row disable_element=”yes” margin_top=”-1em”][vc_column width=”1\/3″ delimiter=”vline”][vc_empty_space height=”2em”][vc_column_text] #HACKTIVITY2021 We are thrilled to organize #Hacktivity2021 as a traditional on-site event again! However, we will still provide the…<\/p>\n

<\/span>Read more<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"parent":2,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/2022.hacktivity.com\/index.php\/wp-json\/wp\/v2\/pages\/12"}],"collection":[{"href":"https:\/\/2022.hacktivity.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/2022.hacktivity.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/2022.hacktivity.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/2022.hacktivity.com\/index.php\/wp-json\/wp\/v2\/comments?post=12"}],"version-history":[{"count":270,"href":"https:\/\/2022.hacktivity.com\/index.php\/wp-json\/wp\/v2\/pages\/12\/revisions"}],"predecessor-version":[{"id":3613,"href":"https:\/\/2022.hacktivity.com\/index.php\/wp-json\/wp\/v2\/pages\/12\/revisions\/3613"}],"up":[{"embeddable":true,"href":"https:\/\/2022.hacktivity.com\/index.php\/wp-json\/wp\/v2\/pages\/2"}],"wp:attachment":[{"href":"https:\/\/2022.hacktivity.com\/index.php\/wp-json\/wp\/v2\/media?parent=12"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}