International Speakers - Simultaneous translation

SOCIAL

Twitter: @h2hconference
Facebook: /h2hconference
Instagram: h2hconference
Telegram: h2hconference
Youtube: /h2hconference

TRAININGS

IoT/Linux Malware Analysis Workshop

Instructor: Fernando Merces

Total seats: 32

Vacancies: 25

Minimum Required: 16

Duration: 8 horas

Date: 24 de Outubro de 2022

Bring your own Laptop: Sim

Language: Portugues

Investment: R$ 850,00

 

Ethical Hacking Post-Exploitation Bootcamp

Instructor: Laios Barbosa

Total seats: 32

Vacancies: 25

Minimum Required: 16

Duration: 24 horas

Date: 19 a 21 de Outubro de 2022

Bring your own Laptop: Sim

Language: Portugues

Investment: R$ 1.800,00

 

Ethical Hacking Modern Web Exploitation

Instructor: Manoel Abreu e Bruno Cortes

Total seats: 32

Vacancies: 25

Minimum Required: 16

Duration: 16 horas

Date: 24 e 25 de Outubro de 2022

Bring your own Laptop: Sim

Language: Portugues

Investment: R$ 2.000,00

 

CONFIRMED SPEAKERS

 

Data only Attacks Against UEFI BIOS
A researcher's take on Spectre exploits
Keynote: The Golden Age of Windows Exploits (for now)
An Insight into Railway Security
From PIX to Reverse Shell
Engenharia Reversa num jogo de Gameboy Advance
Exploitation tatics discovery using data analytics
The Joy of Exploiting the Kernel on 2022
Keynote: Ensaio sobre o Recrutamento
The ADCS domain administrator is right there
State of the Art in IPv6 Attack & Defense
Introspeccao de Maquinas Virtuais para Monitoramento de Ameacas em Sistemas ARM
Dont Blink! A deep dive into Cyclops Blink
Eleicoes Transparentes
Techniques for publishing statistical information without violating individual's privacy according to the LGPD and GPDR
Retbleed: Arbitrary Speculative Code Execution with Return Instructions
Browser Exploitation and JIT Compilers
Aprendizado de Maquina em Seguranca
GitHub Actions: Vulnerabilities, Attacks and Counter Measures
Breaking Firmware Trust from Pre EFI: Exploiting Early Boot Phases
To branch or not to branch: security implications of x86 frontend implementations
Desenvolvimento de um servico de email privativo
Brocando EDR na vida real, um estudo de caso
Cinema Time!

 

 


The use of "hacker" to mean "security breaker" is a confusion on the part of the mass media. We hackers refuse to recognize that meaning, and continue using the word to mean, "Someone who loves to program and enjoys being clever about it".

Richard Stallman

 

 

 ORGANIZATION

 

 

 PLATINUM SPONSORS

 

 

 GOLD SPONSORS

 

 

 

 

 SILVER SPONSORS

 

 

 HACKING

 

 

 SUPPORTING ORGANIZATIONS