Abhinav Pandagale
  • Badge challenge
Alethe Denis

Alethe Denis is a world-renowned security expert. A Senior Security Consultant, Alethe is on the Red Team at Bishop Fox, an offensive cybersecurity company. She co-founded both an IT MSP and VoIP phone service company while working in global market and competitive intelligence. She made the leap into cybersecurity after revisiting her childhood love of hacking through the DEF CON Social Engineering Capture the Flag competition, which she won in 2019, receiving the top honor of a DEF CON Black Badge, free entry to the conference for life. Alethe is now an industry leading social engineering expert and cybersecurity ally for companies around the globe. Follow her online at: alethedenis.com.

  • Keynote by Alethe Denis
Dan Tentler

an Tentler is the Executive Founder and CTO of Phobos Group, a
boutique information security services and products company. Having
been on both red and blue teams, Dan brings a wealth of defensive and
adversarial knowledge to security landscape 2022 produces for us all.
Dan has spent time at Twitter, British Telecom, Websense, Anonymizer,
Intuit and Sempra Energy, to name a few and has a strong background in
systems, networking, architecture and wireless networks, translating
to strengths in lateral movement, data exfiltration, hiding from the
blue team, physical security and a variety of other redteam
techniques. Outside of work, Dan cooking, FPV drones and making hot
sauce.

  • Architecting for security: the old ways
Eduard Agavriloae

I'm a Senior Penetration Tester at KPMG Romania and in the last year I focused on hacking the cloud, especially AWS. I write articles, I do research and I love every minute of it.

  • The C2 tool no one talks about: AWS SSM - Run Command
Fredrik "STÖK" Alexandersson

STÖK is a hacker/creative passionate about learning new things and sharing his experience. For the last 3 decades, he has professionally hacked anything from computers/tech to marketing, fashion, communication and the human mind. HACKERS GONNA HACK. CREATORS GONNA CREATE. GOOD VIBES ONLY.

  • How to: Hack the company, before someone else does it for you.
Hasain Alshakarti

Hasain, also known as "The Wolf", is an industry-leading cyber security expert with more than 25 years of experience.

He has extensive and deep expertise from numerous design projects, security audits, advanced implementation projects, incident response, digital forensic, threat hunting and penetration testing. He helps customers understand and build solutions to protect, detect and respond to cyber threats for enterprises, government agencies, banks, military organizations among others.

Due to his expertise, he is a sought-after advisor, speaker and a popular instructor. For his many achievements over the years, Hasain has been awarded recognition as “Sweden’s leading IT security expert” and Microsoft MVP in Enterprise Security and Cloud & Datacenter.

  • When the Red Team Goes Passwordless
Ignacio Navarro

My name is Ignacio, I am 25 years old and I am from Río Cuarto, Argentina.
I am currently working as a Sr. Software Engineer.
I started to enter the world of infosec about 6 years ago.
My interests include code analysis, webapps security and cloud security
Speaker at Diana Initiative, Hacktivity Budapest, 8.8, Ekoparty
@Ignavarro1

  • SQLi to Root Access: Exploiting a ISP infrastructure
Jonas Vestberg

Jonas is a senior security consultant at Sentor since 2013, securing the world one reverse shell at a time. Enjoys coffee, coding, bypassing EDRs, Windows privilege escalation bugs and getting Domain Admin.

  • Tales from the %TEMP%
Or Yair

Or Yair (@oryair1999) is a security researcher with over 5 years of experience in cyber security. Currently a researcher in SafeBreach Labs, he started his professional career in the IDF. Most of his work focused on Platform Research, including Linux kernel components and some Android as well. For the last two years, Or has been drawn into the Windows world and currently focuses on innovative vulnerability research of the operating system's components. Or has already impacted threat mitigation by widely sharing his discoveries internationally at conferences he spoke at such as Black Hat Europe 2022, HackCon 2023 and RSAC 2023.

  • Aikido: Turning EDRs to malicious wipers using 0-day exploits
Pontus Hanssen

Pontus Hanssen in an experienced security researcher and penetration tester. He loves to hack everything that blinks or has an IP address.

Pontus performs security reviews and penetration tests as part of Omegapoint Cybersecurity Gothenburg, a group of experts in application security.

  • How to f*ck up at OAuth2 while following BCPs
Rohan Aggarwal

Rohan Aggarwal is a Founder at DefCore Security. He is also a part-time Bug Bounty hunter (Synack). He has found security vulnerabilities in big companies like Apple, Yahoo, Twitter, Goldman Sachs, Matomo, BrickFTP, and Pixiv. He has attended various live hacking events such as Intigriti 1337UP1121(2021), HackerOne h1-2004(2020) and BountyBash(2019). From past few years, he also has been reversing reputed Competetive Gaming AntiCheats like EasyAntiCheat, BattleEye & Vangaurd and was able to bypass them while staying undetected.
Rohan previously worked as an Offensive Security Analyst at TCS where he did Web/Mobile Pentesting, IOT and Automotive Security. He presented at SecTor 2020 (Recon - The Road Less Traveled), SecTor 2019 (Car Hacking on Simulation) and at Microsoft's Azure Bootcamp and has delivered training on IOT, Web Application and Cloud Hacking.

  • Bypassing Anti-Cheats & Hacking Competitive Games
Sriraam Natarajan

Sriraam Natarajan from India is an ardent information security practitioner with over 3+ years of specialized experience in red teaming, adversary simulation, penetration testing, and web application security. He enjoys doing Red Teaming exercises and researching new attack vectors, exploits, and evasion techniques. He also had a talk at Lehack Conference. He does coding to automate the boring stuff using Python and Rust. He is currently working as a Security Analyst in Cyber Security Works. He also holds the Certified Red Team Professional Certification.

  • Beyond On-Premises: Exploring the Post-Domain Admin Landscape in the Cloud
Tobias Ahnoff

Tobias Ahnoff is an experienced developer and architect with focus on application security. He specializes in implementing authentication flows and authorization for web applications and APIs that manage sensitive data.

Tobias performs security reviews and penetration tests as part of Omegapoint Cybersecurity Gothenburg, a group of experts in application security. He also gives courses in application security and is an appreciated speaker in OAuth2 and OpenID Connect areas.

  • How to f*ck up at OAuth2 while following BCPs
Tomer Bar

Tomer Bar is a hands-on security researcher with 20 years of unique experience in leading cyber security froups. In the past, he ran research groups for the Israeli government and then led the endpoint malware research for Palo Alto Networks. Currently, he leads SafeBreach Labs as the director of security research.
His main interests are Windows vulnerability research, reverse engineering, and nation state APT research.

Among his discoveries are the PrintDemon vulnerabilities in the Windows Spooler mechanism which were a candidate for the best privilege escalation of 2021 Pwnie awards and several research studies on Iranian APT campaigns.
He is a contributor to the MITRE ATT&CK® framework.
He presented his researches at BlackHat 2020, Defcon 2020, 2021, 2022 and Sector, Recon and HackCon conferences.

  • OopsSec - The bad, the worst and the ugly of APT’s operations security
Venkatraman Kumar

Venkatraman Kumar is a seasoned security researcher, red teamer, and conference speaker with over 5 years of industry experience in information security and programming. His main areas of expertise include network penetration testing, red teaming exercises, adversary simulation, and active directory attacks. He has presented at notable security conferences such as LeHack, BSides, and Diana Initiative. In addition to his professional pursuits, he is an avid problem solver, constantly engaged in solving CTFs, Hackthebox Labs, and conducting independent research. He is also the author of the popular resource https://www.thehackersprint.com/. Currently, he works as a security analyst at Cyber Security Works.

  • Beyond On-Premises: Exploring the Post-Domain Admin Landscape in the Cloud