To see our schedule with full functionality, like timezone conversion and personal scheduling, please enable JavaScript and go here.
15:00
15:00
120min
CTF: Tackling Hybrid Threats in Network, Cloud, Identity, and SaaS
Ronald Kingma, Rudi Jager

This workshop showcases Vectra's threat detection across a hybrid attack landscape. You will participate in a Capture the Flag challenge to see how Vectra handles complex threats spanning network, cloud, identity, and SaaS environments. The focus will be on Vectra's capability to identify and mitigate a range of cyber threats rapidly, providing you with an in-depth understanding of Vectra's role in safeguarding diverse digital ecosystems.

Alfred Nobel
15:00
60min
Intro Demoscene and workshop TIC80
Dave Borghuis aka zeno4ever

In this workshop, participants will receive a brief introduction to the demoscene and competitions like 'byte jams.' The demoscene, originating in the '80s and '90s with affordable home computers like the Commodore 64 and Amiga, persists today, using these machines at demoparties to create 'retro' demos. Modern hardware allows running fantasy consoles like TIC-80, providing a retro feel but programmed with contemporary languages such as Lua, Python, and JavaScript. The hands-on session will focus on programming the TIC-80 with Lua.

Upon completing the workshop, attendees should be capable of crafting their first simple TIC-80 demo or participating in events like the 'byte jam.' To fully engage, bring a laptop and install TIC-80 beforehand.

Workshops
Boardroom
15:00
60min
Lockpicking workshop by Toool
Jan-Willem Markus

Altijd al willen leren lockpicken? The Open Organisation of Lockpickers kan je hierbij helpen in deze workshop!

Workshops
Willem van Oranje
15:00
2940min
Off The Record (OTR)

Off the record room and this needs more characters but there is not much more to say.

Marco Polo
15:00
200min
Workshop OpenKAT
Brenno de Winter

OpenKAT aims to monitor, record and analyze the status of information systems. This workshop learns you the basics of OpenKAT: how to set it up, how to create your own reports and setup data. The focus is on getting hands-on practice and get it running yourself.

Workshops
Rembrandt
16:00
16:00
45min
A black hat in our white hat collective... a lesson in (incident response|human trust|pr|.*)
Chris van 't Hof, Frank Breedijk

We always knew it coulde happen, and thus that it, accoording to Murphey's law, would happen. A member of DIVD got arrested in relation to computer crime. And about a year ago it did, Pepijn van der S. got arrested.
In this (no press) talk we will walk you through the events that happened, the impact they had on our organisation and the lessons we learned.

Talks
Leonardo Da Vinci
16:30
16:30
60min
Cyberpunk Notebooks
Moem

Making a cool circuitboard cover for an old skool paper notebook

Workshops
Boardroom
16:30
50min
EOS/Thuisbatterij techtalk
[M]ichiel

Lets talk about battery's!

Li-ion, salt, H2 or LFP, veel systemen zijn er op dit moment beschikbaar of komen beschikbaar. Alleen zijn er nieuwe regelgevingen op de loer en wordt de positie van de netbeheerder belangrijker. Welke ontwikkelingen zijn er en hoe vormt het zich?

Ik neem jullie mee in mijn reis waarin ik een thuisbatterij heb gebouwd. Tijdens mijn presentatie deel ik basale informatie welke ik ook deel met mijn klanten.

Kleine discussie is leuk, maar houd de temperatuur in de gaten, geen thermal runaway ;-)

Talks
Willem van Oranje
17:00
17:00
25min
Basisbeveiliging / Internet Cleanup Foundation - State of the map
Elger "Stitch" Jonker

An overview of the new maps and new metrics added in 2023, and what it did.

Talks
Leonardo Da Vinci
17:30
17:30
90min
Early Dinner
Leonardo Da Vinci
17:30
90min
Early Dinner
Rembrandt
17:30
90min
Early Dinner
Willem van Oranje
17:30
90min
Early Dinner
Boardroom
17:30
90min
Early Dinner
Alfred Nobel
17:30
90min
Early Dinner
Pub
17:30
90min
Early Dinner
Albert Einstein
17:30
90min
Early Dinner
Marco Polo
17:30
90min
Early Dinner
Darwin
17:30
90min
Early Dinner
Outside
17:30
1650min
NGI Fediversity - hands on using the Fediverse on your phone, tablet and computer
Koen de Jonge (SynQ

This workshop will give you a hands on introduction to the Fediverse, we will show you how to use Matrix, Mastodon, Peertube and Pixelfed on your own Phone, Tablet or Computer.

Workshops
Darwin
18:30
18:30
120min
DJ Introduction workshop
Ze Foxx

YOU can be a DJ too ! The 1234 2234 3234 4234 of mixing music.

Workshops
Pub
19:30
19:30
90min
Late Dinner
Leonardo Da Vinci
19:30
90min
Late Dinner
Rembrandt
19:30
90min
Late Dinner
Willem van Oranje
19:30
90min
Late Dinner
Boardroom
19:30
90min
Late Dinner
Alfred Nobel
19:30
90min
Late Dinner
Pub
19:30
90min
Late Dinner
Albert Einstein
19:30
90min
Late Dinner
Marco Polo
19:30
90min
Late Dinner
Darwin
19:30
90min
Late Dinner
Outside
21:00
21:00
2580min
NFIR CTF
David van Elburg

NFIR is delighted to announce we are organizing the Hacker Hotel Capture The Flag competition again! We are pleased to bring the CTF competition to such a great event for the second year in a row, offering participants a great experience, the chance to showcase their skills, and win fabulous prizes. Don't miss out on this exciting opportunity to learn from industry experts, connect with your fellow hackers, and make lasting memories. Visit https://haho2024.ctfd.io/register now to sign up and secure your spot for the competition.

Albert Einstein
21:00
60min
Opening Hackerhotel 2024
Dimitri

Opening and welcome by Dimitri Modderman

Talks
Leonardo Da Vinci
22:00
22:00
30min
Top secret surprise
Nancy Beers

More information will be added soon, or not...

Talks
Leonardo Da Vinci
22:30
22:30
45min
WOOt does the government do?
Lord BugBlue, Maja, Lisette Meij

WOOt do we want? Freedom for our software! When do we WOOnt it? Now! This talk is about the journey into opensourcing software used and made by our governement. We will introduce you to the Wet Open Overheid (WOO) and explain how this law allows you to request the source of certain software. Then we’ll provide you with a step-by-step guide how you can woo (yes, that’s a new verb we made up) software of your interest and in which cases you may want or not want to do so. This may all sound nice in theory but Mendel will of course also tell you about his personal journey of requesting the DigiD code base and how this eventually lead to opensourcing the complete code base.

In contrast to this lovely abstract, the talk will be in Dutch.

Talks
Leonardo Da Vinci
23:30
23:30
60min
Cyberonderzoeksraad: Computer says no, the law says yes
Brenno de Winter, jos

More and more decisions are made or prepared automatically, with "computer says no" making it really harmful at crucial moments. For many people, it is then unclear whether you have rights and what those rights are. Yet there are steps you can take to successfully fend for yourself. This talk lays out some hacks and will be the presentation of the report 'Computer says no, but the law says yes'.

Talks
Leonardo Da Vinci
00:30
00:30
150min
DJ Ze Foxx
Ze Foxx

Party-time ! Party-time ! Party-time !

Pub
08:00
08:00
90min
Early Breakfast
Leonardo Da Vinci
08:00
90min
Early Breakfast
Rembrandt
08:00
90min
Early Breakfast
Willem van Oranje
08:00
90min
Early Breakfast
Boardroom
08:00
90min
Early Breakfast
Alfred Nobel
08:00
90min
Early Breakfast
Pub
08:00
90min
Early Breakfast
Albert Einstein
08:00
90min
Early Breakfast
Marco Polo
08:00
90min
Early Breakfast
Darwin
08:00
90min
Early Breakfast
Outside
09:00
09:00
60min
AV workshop
PsychiC

Join us for the evolution of the AV team and provide your fellow hackers with awesome content of HackerHotel.

Workshops
Leonardo Da Vinci
10:00
10:00
90min
Late Breakfast
Leonardo Da Vinci
10:00
90min
Late Breakfast
Rembrandt
10:00
90min
Late Breakfast
Willem van Oranje
10:00
90min
Late Breakfast
Boardroom
10:00
90min
Late Breakfast
Alfred Nobel
10:00
90min
Late Breakfast
Pub
10:00
90min
Late Breakfast
Albert Einstein
10:00
90min
Late Breakfast
Marco Polo
10:00
90min
Late Breakfast
Darwin
10:00
90min
Late Breakfast
Outside
10:00
60min
To become an osint "Charlatan" (workshop)
O.J Doppelkorn

How to data hording and anti counter measure for beginners

Online or not online that is the Question ?

A way to opt out and how to from long forgotten vendors
Different ways to get out data leaks searches

Workshops
Boardroom
11:00
11:00
60min
Build your own hackersguild!
Sp0Q

This talk explores the concept of hackersguilds, groups of engineers collaborating to enhance internal information security. Through various activities such as answering inquiries, conducting internal pentesting exercises, and participating in CTF competitions, hackersguilds empower engineers to actively contribute to an organization's security efforts. The talk provides practical insights into initiating and nurturing hackersguilds, fostering a collaborative environment that taps into collective expertise. By leveraging hackersguilds, organizations can enhance resilience against cyber threats and foster a culture of continuous learning. Attendees will gain a comprehensive understanding of hackersguilds' potential for a more secure future.

Talks
Willem van Oranje
11:00
60min
Hacking your Dreams
Walter Belgers

You can hack all sorts of things. Software, hardware. But being a hacker, what makes more sense than to hack oneself? Hackers have been turning themselves into bionic man, but we can also just hack our brain, using just out brain. I am talking about lucid dreaming: dreaming while you are aware of doing so and able to shape your dream. This talk will discuss what we know so far about lucid dreams and how they relate to other special states of the mind. The main focus will be on how to hack your own mind to start experiencing lucid dreams, what you can do in them, and how they differ from real life.

TLP:RED
Rembrandt
11:00
60min
Het nieuwste computervirus heet burn-out en alleen gemotiveerde mensen kunnen het krijgen
Jeroen Baten

Tegenwoordig heeft 1 op de 7 mensen die werken beginnende of gevorderde burn-out klachten. In 2017 werd het bij mij geconstateerd en de weg naar (bijna volledig) herstel was behoorlijk lang. Toch had ik het kunnen voorkomen, mits ik had geweten waar ik op moest letten.

TLP:RED
Leonardo Da Vinci
11:00
60min
Magic Gemstone Jewelry
Moem

Back by popular demand: LED jewelry made from epoxy resin! We will be making necklaces and also brooches this time.

Workshops
Alfred Nobel
11:00
50min
Mastering Red Teaming in Critical Infrastructure
Ben Brücker

Red Teaming in operational technology (OT) networks is crucial for the cybersecurity of our critical infrastructure. This approach goes beyond identifying vulnerabilities, aiming to understand networks deeply and learn from actual attacks, thereby enhancing overall cybersecurity resilience.

Talks
Boardroom
12:00
12:00
60min
Early Lunch
Leonardo Da Vinci
12:00
60min
Early Lunch
Rembrandt
12:00
60min
Early Lunch
Willem van Oranje
12:00
60min
Early Lunch
Boardroom
12:00
60min
Early Lunch
Alfred Nobel
12:00
60min
Early Lunch
Pub
12:00
60min
Early Lunch
Albert Einstein
12:00
60min
Early Lunch
Marco Polo
12:00
60min
Early Lunch
Darwin
12:00
60min
Early Lunch
Outside
13:20
13:20
60min
Late Lunch
Rembrandt
13:20
60min
Late Lunch
Willem van Oranje
13:20
60min
Late Lunch
Boardroom
13:20
60min
Late Lunch
Alfred Nobel
13:20
60min
Late Lunch
Pub
13:20
60min
Late Lunch
Albert Einstein
13:20
60min
Late Lunch
Marco Polo
13:20
60min
Late Lunch
Darwin
13:20
60min
Late Lunch
Outside
13:30
13:30
60min
Late Lunch
Leonardo Da Vinci
14:00
14:00
60min
Hacking influence
IJskimo

Social Engineering 102: Hacking influence.
How to get people to trust your judgement.

Talks
Leonardo Da Vinci
14:00
180min
Malware analysis 101
melvin boers, Erik Heskes, Stan, Latoya

Een introductie tot malware analyse voornamelijk WannaCry.

Workshops
Boardroom
14:00
45min
Message from Kharkiv, Ukraine
Lord BugBlue, nino

Get the latest news from Kharkiv, Ukraine and from our volunteer project

TLP:RED
Rembrandt
14:00
60min
Opening electronic safe locks with ketchup and lasers
Jan-Willem Markus

Mechanical safe locks are quickly replaced with their electronic counterparts. While there are many benefits, the security implications are far less understood than the mechanical systems. Jan-Willem collects and researches electronic safe locks and will share his thoughts. From dumping chips with lasers to locks which can be opened with ketchup.

Talks
Willem van Oranje
14:00
60min
UV Tape art
Bart

Moved to the Hacker Room, Erasmus.
In this workshop we'll learn the basics of tape art.

Feel free to bring an images of line art (straight lines work better than curves) or pixel art. (Think more space invaders, not full HD)

Workshops
Alfred Nobel
15:00
15:00
60min
AMA "Locksport; A Hacker’s Guide to Lockpicking, Impressioning, and Safe Cracking"
Walter Belgers, jos

There are people among our community that decide to write a book and some of those decide to write a book about locksport. What is that you say? Well ask them all about it in this session! And you can buy one too because the book gets released days before HackerHotel!

Talks
Pub
15:00
60min
Everything you always wanted to know about cryptography but were afraid to ask
Lord egeltje

What is this DES and why is it bad? Should I always use AES-256, bigger is better right? Who are these RSA-dudes in the first place and why do I need 25519 elliptic curves in my life? Is quantum really that bad for encryption and what can I do about it?
If these are questions keeping you up at 05:00, then this talk might be for you!

Talks
Rembrandt
15:00
60min
Ham Radio for hackers
Ward De Ridder

Ham radio is a nice hobby, with a bit of overlap with the hacker community.
It's a very technical hobby, with a lot of variation. Much more than an Old Man talking on the radio all day.

Talks
Willem van Oranje
15:00
60min
OSINT - How AI fuels disinformation
Nico Dekens

Nico Dekens a.k.a Dutch_OSINTguy, a renowned open source intelligence professional, has noticed recurring patterns in
content created using artificial intelligence. He demonstrates how he has used OSINT tools and even
basic search engines to locate and identify online accounts that appear to be using autogenerated
website content, social media posts, reviews, and hate speech.

Talks
Leonardo Da Vinci
15:00
90min
Sketchnoting for absolute n00bs
Nancy Beers

Anyone can draw! If you disagree with this statement, you might ALSO want to join this workshop.
Sketchnoting, also commonly referred to as visual notetaking, is the creative and graphic process through which an individual can record their thoughts with the use of illustrations, symbols, structures, and texts.
I have been sketch noting for quite some time now (maybe you have seen me doing in at earlier Hacker Hotels :) ) and this workshop will provide you with the basic skills to start sketch noting yourself!

Workshops
Alfred Nobel
16:00
16:00
50min
A feline approach to NIS2
Brenno de Winter

In security one of the biggest changes will be the fact that on Oct 17th a lot of organisations need to have implemented. A big challenge for many organisations who haven't got a clue. But what do you need to do? And what does that mean?

One of the solutions maybe to take a feline approach to NIS2 and fulfill parts of the compliance needs with OpenKAT. Not just for organisations, but also for software solutions that are used with in the chain.

In this talk the main points of NIS2 will be explained as well as the parts where automation with OpenKAT can make a change.

Talks
Willem van Oranje
16:00
45min
Empowering Cybersecurity Excellence: Unveiling the DIVD Academy Journey
Astrid Oosenbrug

Dive into the World of Cybersecurity Excellence with DIVD Academy: A Journey of Skill Enhancement and Threat Mitigation. This talk explores the pivotal role of DIVD Academy in shaping cybersecurity professionals, fostering skill development, and equipping individuals to combat evolving digital threats. Discover the cutting-edge training methodologies, industry insights, and real-world scenarios that make DIVD Academy a cornerstone in the pursuit of cybersecurity mastery. Join us as we unravel the transformative experience awaiting those who embark on the DIVD Academy adventure.

Talks
Leonardo Da Vinci
16:00
45min
Threat Modeling for Privacy and against Stalkers
Dany

When we talk about tech stacks we usually think about big organizations running systems, but in the current day and age we too have a large digital footprint. In this talk we will go over mapping out our personal tech stack and start identifying any threats that could be useful to help prevent stalking and harassment, or at least be aware of the risks you encounter so you can make informed choices about data that you share.

Talks
Rembrandt
16:30
16:30
60min
Balloon folding (for kids and adults)
Frank Breedijk

You know those people that take a balloon, inflate it and after some twisting, turning, and some squicky noises they end up with a balloon creature that makes kids really happy?

You could be one!

Because, baloon folding isn't that hard, actually.

I have the balloons, instructions and will actually try to teach during this workshop as well.

Are you an adult and know how to do this, I could sure use some help to survive the chaos ;)

Laguages spoke: Dutch, English
Spoken poorly: German
Barely spoken: French

Workshops
Pub
16:30
60min
Lockpicking workshop by Toool
Jan-Willem Markus

Altijd al willen leren lockpicken? The Open Organisation of Lockpickers kan je hierbij helpen in deze workshop!

Workshops
Alfred Nobel
16:45
16:45
45min
Counting the votes, a quest to create new software for the Dutch elections
nino

The Dutch Electoral Council has asked a bunch of nerds to help them with new software for the elections. What is needed and how can you help?

Talks
Rembrandt
16:45
42min
Crytocalypse Now! And why the Dutch government is investing so much in Post Quantum Crypto already.
Oscar Koeroo

In this talk i will share the plans of the Dutch government on building a quantum computer resistive infrastructure. The government actually started last year with its program. Whats the plan of the central government now and in the next years, nation wide and internationally.

Talks
Leonardo Da Vinci
17:30
17:30
90min
Early Dinner
Leonardo Da Vinci
17:30
90min
Early Dinner
Rembrandt
17:30
90min
Early Dinner
Willem van Oranje
17:30
90min
Early Dinner
Boardroom
17:30
90min
Early Dinner
Alfred Nobel
17:30
90min
Early Dinner
Pub
17:30
90min
Early Dinner
Albert Einstein
17:30
90min
Early Dinner
Marco Polo
17:30
90min
Early Dinner
Darwin
17:30
90min
Early Dinner
Outside
18:30
18:30
120min
DJ Introduction workshop
Ze Foxx

YOU can be a DJ too ! The 1234 2234 3234 4234 of mixing music.

Workshops
Pub
19:30
19:30
90min
Late Dinner
Leonardo Da Vinci
19:30
90min
Late Dinner
Rembrandt
19:30
90min
Late Dinner
Willem van Oranje
19:30
90min
Late Dinner
Boardroom
19:30
90min
Late Dinner
Alfred Nobel
19:30
90min
Late Dinner
Pub
19:30
90min
Late Dinner
Albert Einstein
19:30
90min
Late Dinner
Marco Polo
19:30
90min
Late Dinner
Darwin
19:30
90min
Late Dinner
Outside
20:30
20:30
120min
MCH2025 badgeteam meetup
BADGE.TEAM

Only for people part of or interested in becoming part of the MCH2025 badge team. Interested in joining? Please contact us by joining our Telegram group, then ask about the 2025 team: https://t.me/+StQpEWyhnb96Y88p

TLP:RED
Alfred Nobel
21:00
21:00
60min
Ally talk
Nancy Beers, Chantal Stekelenburg

Nancy and Chantal want to talk about being an ally in the community.

Talks
Leonardo Da Vinci
21:00
60min
Workshop firebreathing
Chris van 't Hof, Frank Breedijk

Learn how to breathe fire with Frank. Frank will explain the techniques. Ofcourse this will be outside the hotel , around the back/side of hotel on the grass.

Workshops
Outside
22:00
22:00
55min
Unmasking the Bullshit in Cybersecurity
Ronald Kingma, Jasper Dijkgraaf

How organisations adopt buzzwords from the market and incorporate them into tenders, RFPs etc.

Talks
Leonardo Da Vinci
23:00
23:00
150min
Pubquiz!
Christel

The infamous hackerhotel pubquiz! With a wide variety of topics!

Pub
00:00
00:00
180min
Whisky Tasting

Whisky Tasting by RedTeam Cyber Security B.V.

Boardroom
01:30
01:30
90min
DJ Ze Foxx
Ze Foxx

Party-time ! Party-time ! Party-time !

Pub
08:00
08:00
90min
Early Breakfast
Leonardo Da Vinci
08:00
90min
Early Breakfast
Rembrandt
08:00
90min
Early Breakfast
Willem van Oranje
08:00
90min
Early Breakfast
Boardroom
08:00
90min
Early Breakfast
Alfred Nobel
08:00
90min
Early Breakfast
Pub
08:00
90min
Early Breakfast
Albert Einstein
08:00
90min
Early Breakfast
Marco Polo
08:00
90min
Early Breakfast
Darwin
08:00
90min
Early Breakfast
Outside
10:00
10:00
90min
Late Breakfast
Leonardo Da Vinci
10:00
90min
Late Breakfast
Rembrandt
10:00
90min
Late Breakfast
Willem van Oranje
10:00
90min
Late Breakfast
Boardroom
10:00
90min
Late Breakfast
Alfred Nobel
10:00
90min
Late Breakfast
Pub
10:00
90min
Late Breakfast
Albert Einstein
10:00
90min
Late Breakfast
Marco Polo
10:00
90min
Late Breakfast
Darwin
10:00
90min
Late Breakfast
Outside
11:00
11:00
60min
Een Gastric bypass meer als een maagverkleining
Wire (Erik Dekkers)

wat is een gastic bypass , de voor en na delen en de risico's op een rij

TLP:RED
Boardroom
11:00
45min
Ransomware never really left
Erik Heskes

Ransomware is still a serious threat to a lot of people and organisations and nowadays using more and more advanced techniques. And now also with new open AI technology, criminals are able to organise a sophisticated attack in minutes to target you and steal your data.

This talk will tell us what Ransomware actually is, who’s writing the code and making money out of it, it shows us a bit of the Ransomware history and what types are out there, to better understand what we’re dealing with. And explain all of the ransomware attack stages and what you can do in terms of detection and defence inside your security operations.

For the security analysts out there this talk will be beneficial when looking for traces Ransomware attacks are leaving behind. Including a demonstration of a Ransomware scenario making use of open AI technology in a sandboxed environment and show all of the attack stages to learn and recognise the IOCs in a Red and blue teaming scenario.

This ain’t everything. I’ll show what kind of information ransomware groups are sharing and what happened when a random organization was hit by a ransomware attack and their sensitive information was published on the dark web..

Talks
Rembrandt
11:00
45min
Where physical security meets cyber security.
Jasper Weijman

Critical infrastructure like data centers needs to be well protected. While there is lots of cyber security knowledge around at Hacker Hotel, in this talk we want to share knowledge on the physical security side of protection. Physical security measures are mostly controlled by PLC's. Thus physical security bears cyber risks as well.

Talks
Willem van Oranje
11:30
11:30
30min
Verdachte van cybercrime, stick to the basics (NL)
Alwin Warringa

[TLP:RED] In deze talk neemt Alwin je mee in een bizarre ervaring waarbij hij in 2022 ten onrechte door de politie is aangemerkt als een verdachte in een phishing onderzoek.

TLP:RED
Leonardo Da Vinci
12:00
12:00
60min
Early Lunch
Leonardo Da Vinci
12:00
60min
Early Lunch
Rembrandt
12:00
60min
Early Lunch
Willem van Oranje
12:00
60min
Early Lunch
Boardroom
12:00
60min
Early Lunch
Alfred Nobel
12:00
60min
Early Lunch
Pub
12:00
60min
Early Lunch
Albert Einstein
12:00
60min
Early Lunch
Marco Polo
12:00
60min
Early Lunch
Darwin
12:00
60min
Early Lunch
Outside
13:20
13:20
60min
Late Lunch
Leonardo Da Vinci
13:20
60min
Late Lunch
Rembrandt
13:20
60min
Late Lunch
Willem van Oranje
13:20
60min
Late Lunch
Boardroom
13:20
60min
Late Lunch
Alfred Nobel
13:20
60min
Late Lunch
Pub
13:20
60min
Late Lunch
Albert Einstein
13:20
60min
Late Lunch
Marco Polo
13:20
60min
Late Lunch
Darwin
13:20
60min
Late Lunch
Outside
14:00
14:00
30min
Crypterella Stories: Fortigate
axel

We all love bedtime stories, and these stories are even better when they turn into reality. This cinderella story is about how a big vendor rolled its own algorithm to "encrypt" its firmware images to deter poor hackers like us from fiddling around and potentially uncover flaws. But what if your motive is not to uncover potential flaws, but simply to agnostically fingerprint devices left vulnerable on the internet?

Join us into a semi-deepdive of reverse engineering the Fortigate firmware "encryption" to satisfy our own curiosity, but also to make the web that little bit more secure by fingerprinting vulnerable devices in a non-obtrusive manner with the endgoal of notifying the related parties.

Talks
Willem van Oranje
14:00
60min
Ethical Mass-Exploitation 101: Theory and Practice
Max van der Horst

DIVD is known for notifying parties running vulnerable software on the IPv4-space. Members of DIVD have given many presentations on this process, but never on the practical approach to ethically confirming the vulnerability in hosts on this scale. During this workshop, the audience is taken along DIVD's fingerprinting process including the practical and ethical considerations of accurate identification. By leveraging Open-Source Intelligence (OSINT), the participants are guided through practical examples of fingerprinting and deweaponizing exploitation of vulnerable software with the goal of finding vulnerable instances at scale.

Workshops
Alfred Nobel
14:00
60min
How to (try to) rebuild your hackerspace after a disaster
Miep, Pixelbar, TeQ, Field of View

Hackerspace Pixelbar was once the hottest hackerspace in the Netherlands, things happened and awesome people gathered once again to fix things.

Talks
Leonardo Da Vinci
14:00
45min
Reinventing the Single 8 home movie format
Jenny List

An engineer buys a camera in a second hand store, and finds herself bringing back a defunct film format.

Talks
Rembrandt
14:30
14:30
120min
Safe cracking workshop
Jan-Willem Markus

We all have seen spy movies where mechanical safes are dialed open by listening to the 'clicks'.
This workshop teaches you step by step on how to manipulate a mechanical safe lock.

Workshops
Boardroom
15:00
15:00
60min
Energie-Hacken: Dynamische Zelfopslag en Power-Tech
Arjen Halma

Van een defecte UPS tot een autonome huisomgeving die zelf energie inkoopt en verkoopt op de meest gunstige en voordelige momenten.

Talks
Rembrandt
15:00
60min
OT Cyberchallenges
Elborro, Ad

Meet Acme, a wonderful company where nice people make beautiful things... and then management and sales want nice statistics.

Talks
Leonardo Da Vinci
15:00
60min
Personal wax seal stamp
Moem

This is a fun and easy way to make your own personal wax seal stamps. You will get to test them and take your results home!

Workshops
Alfred Nobel
15:00
45min
Plucking the low hanging fruit of data and security breaches. How to be rewarded even if there's no bug bounty program
SchizoDuckie

I call myself "The Lamest Hacker You Know". I don 't use Kali, 0days, Burp Suite or any tools besides Curl, A browser, and clients for existing software, combined with (semi) open data sources. Probably 90% of my findings are for companies that don't have a CISO an never even heard the term "Bug Bounty Program", In this talk I will give some tips on how to reach out to a company out-of-the-blue and not have them hate you.

Talks
Willem van Oranje
16:00
16:00
45min
Geschiedenis van Mediapiraterij in Nederland: onvoorstelbaar groot
Elger "Stitch" Jonker

Als je je eigen opsporingsteam krijgt, dan doe je het pas goed. Piraterij van muziek en films was midden jaren 90 zo groot dat 1 op de 4 verkochte cd's illegaal was. De piratenmerken waren bekend in ieder huishouden. De tientallen merken werden aangevoerd door MTV en Twilight. Hoe groot was het nou echt: dat zie je pas als je alles gaat verzamelen. "And so we did": duizenden cd's, tapes en DVD's later is het tijd om eens te duiken in verhalen achter het archief. De collectie is nu te zien in het Homecomputer Museum in Helmond.

Talks
Leonardo Da Vinci
16:45
16:45
45min
Badge Talk

Our workflow, challenges and other fun things

Talks
Leonardo Da Vinci
17:30
17:30
30min
Closing Hackerhotel 2024
Dimitri

Closing talk of Hackerhotel 2024 with NFIR CTF award ceremony.

Talks
Leonardo Da Vinci