- I spy with my little WiFi
- Freedom Update
- CI all the things
- IKEA & Pallet hacks!
- PubQuiz
- Kittenbased Security
.
- RFC 1925 Festival Editie
- Network Hacking 301
Cedric loves solving offensive computer security puzzles, researching new attack vectors, and finding vulnerabilities in obscure technologies. At Outflank, he performs Red Teaming projects and works on the Outflank Security Tooling (OST).
- The Registry Rundown for Red Teams
Director DIVD
- How (not) to Professionalise Hacker Creativity. Help us design DIVD 3.0
- Ready or not?
- Shoot ALL the hackers
- Shoot ALL the hackers
- Closing talk Hackerhotel 2023
- Opening Hackerhotel 2023
Edwin van Andel started hacking at the age of 13. Although he is now CTO of hacker company Zerocopter, his relationship with the hacker community is still the main driving force in his life. His dream to bring the brilliant minds of all hackers he knows together in one room and to hack everything that is brought in is something that he is getting closer to. In addition, together with the “Guild of Grumpy Old Hackers”, he is actively guiding and leading young hackers in the right direction in order to create his ultimate goal - a safe society through a safer internet.
- PoPoPizza - How to break the Dutch police body cams for fun and pizza
- Hackerhotel Mastodon Server
- Naming and shaming security, Basisbeveiliging updates, State of the Map 2023
- The MCH2022 Aftermath Talk
- Firebreathing
- Goede cyber, slechte cyber - the musical (DUTCH!)
- Yarn, Needles, "Reverse Engineering" & Osint
.
- Nothing but the truth
- Plot4ai: AI Privacy Threat Modelling
.Jan-Willem Markus (@jwrm22) is an security analyst and trainer focused on defeating chips security with fault injection and sharing the knowledge. In his spare time he is the secretary of the The Open Organisation of Lockpickers (Toool.nl) where he organizes bi-weekly lockpicking meetups in Amsterdam. When time allows, he spends time on researching, collecting, and defeating mechanical security systems (i.e. locks, safes, and more).
- Impressioning workshop 1
- Impressioning workshop 2
- Experiment driven lockpicking
- Impressioning workshop 3
- PubQuiz
- Deadbolt Ransomware
Jos Weyers is a world-record holder in the field of lock impressioning and a mainstay participant at LockSport events around the world. President of TOOOL in the Netherlands and a key figure at the Hack42 hackerspace in Arnhem. Jos is the mastermind behind the beehive42.org initiative. Some people know him as the Dutch Kilt guy. Featured in the New York Times. Voted #2 in the category "Hackers and Security" of the Nerd101-list of VrijNederland June 2015.
- Impressioning workshop 1
- Impressioning workshop 2
- Impressioning workshop 3
- Doomsday scenarios the Dutch institute for Vulnerability disclosure hopes it prevents.
- HijackDotNet – We Don’t Know What Is Yet* ¯\_(ツ)_/¯
- Trust me, it's secure
- Plot4ai: AI Privacy Threat Modelling
Max knows a thing or two about software engineering, cloud environments and DevOps practices. He has a background in security testing and Red Teaming and has a keen interest in designing and hacking (embedded) hardware devices. He applies that knowledge building the Outflank Security Tooling (OST).
- The Registry Rundown for Red Teams
- The Tales from the Night Owls aka 10 candle HackerHotel edition
- Project Fenix - (NL)
.
- Making resin jewellery
- Happy with Bleach & finish the resin jewellery
- Perfect Timing in teams
- CTF (Capture the Flag)
- NFIR CTF (Capture the Flag)
Nico “Dutch_Osintguy” Dekens is an All Source Analyst specializing in Open Source Intelligence (OSINT), online Human Intelligence (HUMINT) and Online investigations.
Nico Eats, Sleeps, and lives everything which has to do with OSINT, online investigations, Intelligence gathering and Analysis.
Nico is an international lecturer at Fortune 500 companies and governments. He has over 20 years experience as an (all source) Intelligence Analyst at Dutch Law Enforcement. He analyzed murder cases, international narcotics cases, stolen art cases, gang violence cases, political disturbance cases, online jihadist groups & conducted several online, covert, virtual HUMINT investigations.
Nico has worked as Senior Project Manager at Bellingcat, an international independent investigative research collective.
Online Nico is known as Dutch_OsintGuy and very active within the OSINT community. He is a Co-founder of the OSINTcurious project. Also he is a Sans Institute instructor for the SEC497: Practical Open-Source Intelligence (OSINT) course. Nico is the lead-author & instructor of the SANS SEC587 Advanced Open-Source Intelligence Gathering & Analysis course
Currently Nico is working as Director of Intelligence & Collection Innovation at ShadowDragon.
- OSINT: The past, present & future
- OSINT: scaling up video analysis with AI &ML
- Badgetalk
- Badgetalk
- Doomsday scenarios the Dutch institute for Vulnerability disclosure hopes it prevents.
bio
- Whisky Tasting
- Deadbolt Ransomware
- Badge Brainstorm
- Vectra AI automated threat hunting
- Vectra AI BlueTeam CTF Hands-on lab
- Badgetalk
Tom Tervoort is a Principal Security Specialist for Secura, a security company based in the Netherlands. Tom regularly performs network pentests, web/mobile application assessments, as well as code, configuration and design reviews for large Dutch companies and institutions. Tom’s primary areas of interest include cryptographic protocols and cryptography engineering, advanced web attacks and Windows AD pentesting. Besides doing security assessments, Tom also develops and gives cryptography and secure programming courses to software developers. In December 2020, Tom won a Pwnie award for Best Cryptographic Attack, due to work on the Zerologon vulnerability. Tom also spoke about Zerologon at Black Hat USA 2021 and about Kerberos at Black Hat Europe 2022.
- Breaking IBM WebSphere authentication: exploiting crypto bugs to impersonate anyone