General Informations
There will be one session of workshops at GreHack. All workshops will be scheduled at the same time: you can only attend to one.
- Client-Side JavaScript Hooking with DOMLogger++ - by Kévin GERVOT (@Mizu)
- High ROI Hacking Techniques with Caido - by Justin Gardner (@Rhynorater)
- Reversing Flutter Applications with Blutter and Radare2 - by Axelle APVRILLE (@Cryptax)
- Lockpicking 101 - by Root-Me PRO (@Sud0ck3rs, @Babbou)
- Tracking the World's Most Wanted Criminals in 120 Minutes - by @Palenath
- Enter The Donjon: A practical laser attack on the go - by @Ledger
- Dump all the (ARM) things! - by @Azox, @Balda
- Cryptattacks 101: Learn to Solve Cryptography CTF Challenges Using Python - by Paul LAJOIE-MAZENC
- Breaking into Hades' realm: an advanced Kerberos exploitation - by Rayan BOUYAICHE (@Rayanlecat), @Volker Carstein
- Introduction to SIGINT and COMINT with RF Swift - by @PentHertz
- The Hard'Way : Started Kit for Hardware Hacking and Embedded Exploitation - by @ThalesCyberSolutions (Reda BENMOULAY, Mathis LEJOSNE)
- Scapy hands-on - by Guillaume Valadon @guedou
- Low tech music for high tech people : How to write 8 bit music on a gameboy - by @confipop
- Music for Gameboy: The Basics of the LSDJ Tracker - by @Cyanyde
01
Client-Side JavaScript Hooking with DOMLogger++ - by Kévin GERVOT (@Mizu)
DOMLogger++ is a browser extension that allows deep
interaction with the JavaScript execution of a website. By providing a custom
JSON configuration, you can hook into almost any aspect of the site's
JavaScript, making it a powerful tool for discovering client-side
vulnerabilities.
This workshop will cover the following topics:
Requirements:
02
High ROI Hacking Techniques with Caido - by Justin Gardner ( @Rhynorater)
There is a new player in the HTTP Proxy space: Caido.
This new tool is designed for scalable project files, speed, improved manual hacking, and both quick-and-dirty and thorough automation.
In this workshop, we'll show off some of the features and how you can use them to stay organized, efficient, and reduce friction in your hacking workflow.
- A laptop with Caido installed.
03
Reversing Flutter Applications with Blutter and Radare2 - by Axelle APVRILLE ( @Cryptax)
Flutter is an open-source UI software development kit (SDK) that allows
developers to create applications for Android, iOS, and various non-mobile
platforms using a single codebase. Its performance is optimized through
ahead-of-time (AOT) native compilation in release builds.
From a reverse engineering perspective, Flutter presents unique challenges due
to its custom binary format, specific registers, and unique representation of
integers, which are not readily supported by standard disassemblers.
In this workshop, we will:
Requirements:
04
Lockpicking 101 - by Root-Me PRO (@Sud0ck3rs, @Babbou)
Dive into the fascinating world of lockpicking, where you'll learn the basics of
different types of padlocks, key boxes and locks, right through to the art of
opening a vault!
Whether you're a beginner, curious or an enthusiast, this
exploration will guide you through the mechanics of different locking
mechanisms, giving you hands-on experience in unlocking challenges at every
level.
Discover the secrets behind these devices and master the skills needed
to unlock them, step by step, until you conquer the most secure safes.
Requirements :
05
Tracking the World's Most Wanted Criminals in 120 Minutes - by @Palenath ( @Palenath)
This workshop will focus on tracking criminals wanted by Interpol and Europol,
as well as locating missing persons.
Participants will learn how to use OSINT (Open Source Intelligence) techniques to search for these individuals, utilizing
publicly available information and digital tools to uncover clues and leads.
Requirements:
06
Enter The Donjon: A practical laser attack on the go - by @Ledger
The Ledger Donjon will bring to you its mid-cost transportable laser bench in
order to present how an fault injection attack on a secure memory as performed
in their Hardware Lab.
After a presentation of the principles of hardware fault injections and
a practical example of attack performed last year, you will be able to see this
attack live!
The target is an ATECC 608A configured to have a protected slot that can
be unlocked thanks to perturbations induced by Laser. We will present the
methodology to perform the attack, and will let attendees to manipulate the
bench.
As key takeways, you will get an awareness of existing hardware fault
injection attacks, get the principles and the methodology to perform it, and
actually see a bench performing this attack.
07
Dump all the (ARM) things! - by @Azox, @Balda
This workshop presents the debug interface and protocol used in the majority of
ARM-based embedded systems: Serial Wire Debug (SWD).
ARM architecture powers a vast array of devices, from IoT gadgets to
mobile phones, making it critical for hardware and security professionals to
understand how to extract and reverse engineer firmware effectively.
During this workshop, the following topics will be covered:
Requirements:
08
Cryptattacks 101: Learn to Solve Cryptography CTF Challenges Using Python - by Paul LAJOIE-MAZENC
Have you always wanted to solve cryptography CTF challenges but didn't know
where to start? Then this workshop is for you!
During this workshop, you will learn:
This workshop will feature exercises ranging from base64 decoding strings to
breaking AES-CTR with nonce reuse.
By the end of the workshop, you should be able to tackle more complex
challenges, such as padding oracle attacks, nonce reuse in ECDSA, and dive
deeper into the world of cryptography challenges!
Requirements:
09
Breaking into Hades' realm: an advanced Kerberos exploitation - by Rayan BOUYAICHE ( @Rayanlecat), @Volker Carstein
Originally developed by MIT, Kerberos is widely used in Microsoft Active
Directory environments. Therefore, this protocol is a prime target for
exploitation, allowing privilege escalation as well as establishing persistence.
This workshop is designed for cybersecurity professionals who seek to
deepen their understanding of Kerberos vulnerabilities and the sophisticated
techniques used to exploit them. Participants will embark on a comprehensive
journey on Kerberos exploitation, starting with the fundamentals of the protocol
and moving swiftly into advanced attack strategies. The workshop will primarily
cover:
Throughout the workshop, participants will engage in hands-on labs to reinforce
their learning. By the end of the session, attendees will possess a deep
understanding of Kerberos exploitation techniques and practical knowledge to
effectively conduct these attacks.
Join us to master the art of Kerberos exploitation and fortify your
skills to always be Domain Admin on the first day of your pentest engagement
😉
Requirements:
10
Introduction to SIGINT and COMINT with RF Swift - by @PentHertz
RF signals are widely used across many technologies, but because they are
invisible, specialized tools are needed to detect and analyze them.
Setting up these tools can be time-consuming and complex, especially for
beginners, who often rely on special distributions that require changing the
operating system.
These solutions tend to lack flexibility and may result in repeated OS
reinstalls when adding new tools. To overcome these challenges, we introduce RF
Swift, the ideal RF companion for all types of RF and hardware assessments.
In this session, we will use tools from the RF Swift toolbox to identify
and reverse engineer signals over the air.
Requirements:
11
The Hard'Way : Started Kit for Hardware Hacking and Embedded Exploitation - by @ThalesCyberSolutions (Reda BENMOULAY, Mathis LEJOSNE)
This workshop is designed for enthusiasts or security professionals who want to
deepen their skills in offensive operations targeting IoT and embedded devices.
Whether you're diving into hardware hacking for research purposes or
aiming to expand your pentesting toolkit, this session will provide a clear and
practical introduction to the world of embedded device exploitation.
Participants will learn the key steps to approach hardware vulnerabilities, including:
A hands-on test bench will be available, allowing you to practice these concepts
in real time, with opportunities to ask questions and solve common hardware
manipulation challenges.
By the end of the session, you'll have a clearer understanding of needed
tools, offensive embedded security techniques and what can be expected in your
futur projects.
Requirements:
12
Scapy hands-on - by Guillaume Valadon ( @guedou)
Scapy is a
powerful Python-based interactive packet manipulation program and library.
It can be used to forge or decode packets for a wide number of
protocols, send them on the wire, capture them, match requests and replies, and
much more.
This workshop will describe its main features step by step, and will let you
explore the following topics:
Requirements:
13
Low tech music for high tech people : How to write 8 bit music on a gameboy - by @confipop
In this workshop, we will see the story of 8 bit music until it becomes for some
people Micromusic.
Micromusic is an 8 bit music made for dance floor.
After this introduction, you will learn how to write 8 bit music on a
gameboy.
You will see the LSDJ tracker I use on a big screen and you will learn some
secret tips !
Bring your gameboy, we will bring the cartridge and our joy to share this
with you !
Low tech music for high tech people !!
Requirements:
14
Music for Gameboy: The Basics of the LSDJ Tracker - by @Cyanyde
If there's a sound chip, we can make sound! Come discover the basics of Little
Sound DJ, a tracker-style music creation software designed for the Gameboy and
its four sound channels. We'll talk a little about chiptune, launch the ROM on a
Gameboy emulator, and discuss how to write a simple track. I'll be available to
chat and assist you with your own track throughout the rest of the time.
Ten people, so no one feels rushed.
Requirements:
Special request: Please wear a mask or ensure good ventilation (windows wide open).