Workshops

There will be one session of workshops at GreHack. All workshops will be scheduled at the same time: you can only attend to one.

Workshop descriptions

Client-Side JavaScript Hooking with DOMLogger++ - by Kévin GERVOT (@Mizu)

Summary

DOMLogger++ is a browser extension that allows deep interaction with the JavaScript execution of a website. By providing a custom JSON configuration, you can hook into almost any aspect of the site's JavaScript, making it a powerful tool for discovering client-side vulnerabilities.

This workshop will cover the following topics:

Requirements:

High ROI Hacking Techniques with Caido - by Justin GARDNER (@Rhynorater)

Summary

There is a new player in the HTTP Proxy space: Caido.

This new tool is designed for scalable project files, speed, improved manual hacking, and both quick-and-dirty and thorough automation.

In this workshop, we'll show off some of the features and how you can use them to stay organized, efficient, and reduce friction in your hacking workflow.

Requirements:

Reversing Flutter Applications with Blutter and Radare2 - by Axelle APVRILLE (@Cryptax)

Summary

Flutter is an open-source UI software development kit (SDK) that allows developers to create applications for Android, iOS, and various non-mobile platforms using a single codebase. Its performance is optimized through ahead-of-time (AOT) native compilation in release builds.

From a reverse engineering perspective, Flutter presents unique challenges due to its custom binary format, specific registers, and unique representation of integers, which are not readily supported by standard disassemblers.

In this workshop, we will:

Requirements:

Lockpicking 101 - by Root-Me PRO (@Sud0ck3rs, @Babbou)

Summary

Dive into the fascinating world of lockpicking, where you'll learn the basics of different types of padlocks, key boxes and locks, right through to the art of opening a vault!

Whether you're a beginner, curious or an enthusiast, this exploration will guide you through the mechanics of different locking mechanisms, giving you hands-on experience in unlocking challenges at every level.

Discover the secrets behind these devices and master the skills needed to unlock them, step by step, until you conquer the most secure safes.

Requirements:

Tracking the World's Most Wanted Criminals in 120 Minutes - by @Palenath

Summary

This workshop will focus on tracking criminals wanted by Interpol and Europol, as well as locating missing persons.

Participants will learn how to use OSINT (Open Source Intelligence) techniques to search for these individuals, utilizing publicly available information and digital tools to uncover clues and leads.

Requirements:

Enter The Donjon: A practical laser attack on the go - by @Ledger

Summary

The Ledger Donjon will bring to you its mid-cost transportable laser bench in order to present how an fault injection attack on a secure memory as performed in their Hardware Lab.

After a presentation of the principles of hardware fault injections and a practical example of attack performed last year, you will be able to see this attack live!

The target is an ATECC 608A configured to have a protected slot that can be unlocked thanks to perturbations induced by Laser. We will present the methodology to perform the attack, and will let attendees to manipulate the bench.

As key takeways, you will get an awareness of existing hardware fault injection attacks, get the principles and the methodology to perform it, and actually see a bench performing this attack.

Dump all the (ARM) things! - by @Azox, @Balda

Summary

This workshop presents the debug interface and protocol used in the majority of ARM-based embedded systems: Serial Wire Debug (SWD).

ARM architecture powers a vast array of devices, from IoT gadgets to mobile phones, making it critical for hardware and security professionals to understand how to extract and reverse engineer firmware effectively.

During this workshop, the following topics will be covered:

By the end of this workshop, participants will have hands-on experience dumping and analyzing firmware from ARM targets and will be equipped with the knowledge to apply these skills to various embedded devices in real-world scenarios.

Requirements:

Cryptattacks 101: Learn to Solve Cryptography CTF Challenges Using Python - by Paul LAJOIE-MAZENC

Summary

Have you always wanted to solve cryptography CTF challenges but didn't know where to start? Then this workshop is for you!

During this workshop, you will learn:

This workshop will feature exercises ranging from base64 decoding strings to breaking AES-CTR with nonce reuse.

By the end of the workshop, you should be able to tackle more complex challenges, such as padding oracle attacks, nonce reuse in ECDSA, and dive deeper into the world of cryptography challenges!

Requirements:

Summary

Originally developed by MIT, Kerberos is widely used in Microsoft Active Directory environments. Therefore, this protocol is a prime target for exploitation, allowing privilege escalation as well as establishing persistence.

This workshop is designed for cybersecurity professionals who seek to deepen their understanding of Kerberos vulnerabilities and the sophisticated techniques used to exploit them. Participants will embark on a comprehensive journey on Kerberos exploitation, starting with the fundamentals of the protocol and moving swiftly into advanced attack strategies. The workshop will primarily cover:

Throughout the workshop, participants will engage in hands-on labs to reinforce their learning. By the end of the session, attendees will possess a deep understanding of Kerberos exploitation techniques and practical knowledge to effectively conduct these attacks.

Join us to master the art of Kerberos exploitation and fortify your skills to always be Domain Admin on the first day of your pentest engagement 😉

Requirements:

Introduction to SIGINT and COMINT with RF Swift - by @PentHertz

Summary

RF signals are widely used across many technologies, but because they are invisible, specialized tools are needed to detect and analyze them.

Setting up these tools can be time-consuming and complex, especially for beginners, who often rely on special distributions that require changing the operating system.

These solutions tend to lack flexibility and may result in repeated OS reinstalls when adding new tools. To overcome these challenges, we introduce RF Swift, the ideal RF companion for all types of RF and hardware assessments.

In this session, we will use tools from the RF Swift toolbox to identify and reverse engineer signals over the air.

Requirements:

The Hard'Way" : Starter kit for harware & embedded exploitation - by Thales Cyber Solutions(Reda Benmoulay, Mathis Lejosne)

Summary

This workshop is designed for enthusiasts or security professionals who want to deepen their skills in offensive operations targeting IoT and embedded devices.

Whether you're diving into hardware hacking for research purposes or aiming to expand your pentesting toolkit, this session will provide a clear and practical introduction to the world of embedded device exploitation.


Participants will learn the key steps to approach hardware vulnerabilities :

A hands-on test bench will be available, allowing you to practice these concepts in real time, with opportunities to ask questions and solve common hardware manipulation challenges.

By the end of the session, you'll have a clearer understanding of needed tools, offensive embedded security techniques and what can be expected in your futur projects.

Requirements:

Scapy hands-on - by Guillaume Valadon @guedou

Summary

Scapy is a powerful Python-based interactive packet manipulation program and library.

It can be used to forge or decode packets for a wide number of protocols, send them on the wire, capture them, match requests and replies, and much more.


This workshop will describe its main features step by step, and will let you explore the following topics:

Requirements:

Low tech music for high tech people : How to write 8 bit music on a gameboy - by @confipop

Summary

In this workshop, we will see the story of 8 bit music until it becomes for some people Micromusic.
Micromusic is an 8 bit music made for dance floor.
After this introduction, you will learn how to write 8 bit music on a gameboy.
You will see the LSDJ tracker I use on a big screen and you will learn some secret tips !
Bring your gameboy, we will bring the cartridge and our joy to share this with you ! Low tech music for high tech people !!

Requirements: