Hacktivity - IT Security Festival

Hacktivity - IT Security Festival

The IT Security Festival

- Free late night party
- Wargame, hardware hacking, lockpicking, surprises
- Presentations, workshops
- 1000+ attendants


#HACKTIVITY is the biggest event of its kind in Central & Eastern Europe. About 1000 visitors are coming from all around the globe every year to learn more about the latest trends of cybersecurity, get inspired by people with similar interest and develop themselves via comprehensive workshops and training sessions.

www.hacktivity.com

Пікірлер

  • @ahmedbenalal191
    @ahmedbenalal1916 күн бұрын

    Cheers to you akhi, well done!

  • @mohamedboublenza8207
    @mohamedboublenza82076 күн бұрын

    I'm proud of you brother

  • @logan0x
    @logan0x27 күн бұрын

    how to download the slides ?

  • @user-md2jb4nu3g
    @user-md2jb4nu3gАй бұрын

    where can I get this slide?

  • @hacktivityconf
    @hacktivityconfАй бұрын

    Hi. We have contacted the presenter for the slides.

  • @user-md2jb4nu3g
    @user-md2jb4nu3gАй бұрын

    @@hacktivityconf Thanks! looking forward to it!

  • @tamassari7529
    @tamassari7529Ай бұрын

    Szuper előadás volt! Köszönöm Péter!

  • @hacktivityconf
    @hacktivityconfАй бұрын

    Nekünk is nagyon tetszett :)

  • @imca_b_5517
    @imca_b_5517Ай бұрын

    Thanks for information ❤

  • @user-wh8qe7wf7n
    @user-wh8qe7wf7n2 ай бұрын

    Wow 500,000 devices that's insane I'm just now hearing about this

  • @Photoemulator
    @Photoemulator2 ай бұрын

    The close captioning needs work mostly because the speaker has a significant accent, which makes the captioning process difficult. But it should have been checked.

  • @hacktivityconf
    @hacktivityconfАй бұрын

    Thank you for the feedback. We forwarded this issue to the online media team for review.

  • @telecatsermaster
    @telecatsermaster2 ай бұрын

    Excellent demonstration. Well done.

  • @JNET_Reloaded
    @JNET_Reloaded2 ай бұрын

    voice is boring asf an cant even see screen that well pointless

  • @faucetcryptos8148
    @faucetcryptos81482 ай бұрын

    Muito bom! Uma tecnica bastante volatil, o poder dos socks proxys.

  • @g.s.3389
    @g.s.33893 ай бұрын

    that's why companies should have their own github or gitlab repository.

  • @d8rh8r35
    @d8rh8r353 ай бұрын

    Great talk man.. awesome

  • @TheCyberWarriorGuy
    @TheCyberWarriorGuy4 ай бұрын

    :)

  • @ilovetensor
    @ilovetensor4 ай бұрын

    There are bad guys every where, I dont know why they do this but this is really cruel to get over someone's open source. Really a great topic and a great video which requires more and more popularity so that it creates awareness.

  • @lancemarchetti8673
    @lancemarchetti86734 ай бұрын

    Brilliant

  • @TurkVladimir
    @TurkVladimir4 ай бұрын

    Thanks Great Video

  • @AnilYadav-ce3gf
    @AnilYadav-ce3gf4 ай бұрын

    Nice work. Is it ported on an actual ARM chipset?

  • @NAWAF-SUDO
    @NAWAF-SUDO4 ай бұрын

    Pretty good video, We want more videos about AD.

  • @hacktivityconf
    @hacktivityconf3 ай бұрын

    Thank you. We recommend the following one for you kzread.info/dash/bejne/gYWT2Lmwo5Ose5M.html

  • @user-nc1hg8uk1o
    @user-nc1hg8uk1o4 ай бұрын

    Really like the content, Yossi! One small question - you showed that after stealing the security token of a domain admin's WinRM process (initiated after logon type = network), you can not only impersonate the user on the local machine, but also over the network. Can you explain how is it possible? I thought that the TGT / NTLM hash is not stored on the remote machine when doing network logon, so what kind of information was relayed to the remote services which made them 'trust' they are indeed talking to the domain admin, after the impersonation?

  • @hacktivityconf
    @hacktivityconf3 ай бұрын

    Your question has been relayed to the speaker.

  • @imca_b_5517
    @imca_b_55174 ай бұрын

    Thank you so much for providing valuable information ❤

  • @imca_b_5517
    @imca_b_55174 ай бұрын

    Great information ❤

  • @w3w3w3
    @w3w3w35 ай бұрын

    very interesting, thanks

  • @pwnonymous
    @pwnonymous5 ай бұрын

    what a bountiful lesson from a grade A professional!

  • @knoblauchhorst9405
    @knoblauchhorst94055 ай бұрын

    great talk!

  • @sotecluxan4221
    @sotecluxan42215 ай бұрын

  • @nathanfitzpatrick3152
    @nathanfitzpatrick31526 ай бұрын

    Would like hear his thoughts on the Pmkid attack!

  • @user-vg5rv5xf4u
    @user-vg5rv5xf4u7 ай бұрын

    Ahhhh ahmmmmmm

  • @davidtchanga6470
    @davidtchanga64707 ай бұрын

    what is PTK sir ?

  • @LockSpaz
    @LockSpaz7 ай бұрын

    Great presentation; but I had to chuckle @ 7:05 when the key pins defied gravity and floated back up after their driver pins were set.

  • @ankurverma1157
    @ankurverma11578 ай бұрын

    Nice

  • @AlexPund
    @AlexPund Жыл бұрын

    HAHAHAAHA POPUP WINDOW BYPASS CRACK 2022

  • @dzxxbj
    @dzxxbj Жыл бұрын

    code properties graph???

  • @marcuswilliams3455
    @marcuswilliams3455 Жыл бұрын

    Wow, this presentation has been very informative. From ages ago, I always felt mainframe should be accessed only from the within the network, with limited access to the real world via proxies, security tunnels, etc. Yeah, mainframe security reminds like when you are locked outside your house, but then you realize the loopholes as to get in.

  • @vaster1142
    @vaster1142 Жыл бұрын

    He's funny 😂

  • @TsukiCTF
    @TsukiCTF Жыл бұрын

    Great talk!

  • @an0n_r0
    @an0n_r0 Жыл бұрын

    Thank you! :)

  • @huzifaahmed1426
    @huzifaahmed1426 Жыл бұрын

    still worth 💗💗💗

  • @tdsrtfgrshdty
    @tdsrtfgrshdty Жыл бұрын

    dgrhtjykgh

  • @night_xdrive
    @night_xdrive Жыл бұрын

    Zbs 🎉

  • @douro20
    @douro20 Жыл бұрын

    Péter Szőr, bless his soul ..he died very young... anyone know how he died?

  • @MohamedAfzal
    @MohamedAfzal Жыл бұрын

    great tool and very informative presentation

  • @kushakush8776
    @kushakush8776 Жыл бұрын

    Website name

  • @britox.6216
    @britox.6216 Жыл бұрын

    this man’s a legend

  • @GreddyCZ91
    @GreddyCZ91 Жыл бұрын

    second!

  • @patriciaukem5738
    @patriciaukem5738 Жыл бұрын

    Joe i love ya video soooooooooooooooooooooooo much

  • @gtworek
    @gtworek Жыл бұрын

    Thank you again for inviting ma and for your hospitability :)

  • @takedownccp
    @takedownccp Жыл бұрын

    china boy: privacy?

  • @sotecluxan4221
    @sotecluxan4221 Жыл бұрын

  • @sotecluxan4221
    @sotecluxan4221 Жыл бұрын

    !

  • @nagi603
    @nagi603 Жыл бұрын

    5:59 link so you don't have to type: kzread.info/dash/bejne/oYxm28mRfruumbA.html