Critical Infrastructure Attack or How to Hack a Whole City
Olga Kochetova setting up the ATM for the contest Leave ATM Alone
The second day of PHDays IV CTF begins
PPP from the US, the winners in 2011
Hands-on Lab is in full swing
The round table “State and Cybersecurity”
Maria Garnaeva and Sergey Lozhkin speaking about botnets
Alisa Esage (Shevchenko)
Critical Infrastructure Attack
A beanbag chair is a hacker’s best friend
The more the merrier
Alexander Peslyak (Solar Designer) speaking about password hashing
Smart TV Insecurity
What are “compromise indicators” and what are they for?
Eric Filiol on contemporary history of cryptography
David Oswald speaking about side-channel attacks
What will happen if the signal lights and boom barrier stop working?
Impressioning attacks by Toool
Trying to hack the QIWI terminal
Dragon Sector, the winners of CTF
Sergey Gordeychik, the forum’s director
Vladimir Dubrovin from Mail.Ru going to smash the prize MacBook Air
The MacBook Air survives and goes to the winner of the contest Huck Me
John-users, the contestants of Hash Runner
The winners of Survive Hacking
The PHDays IV CTF award ceremony
The registration counter, the first day of the forum
Participants getting ready for the start of PHDays IV
The first presentation is about to start
Kirill Kertsenbaum discussing MDM, BYOD etc.
Robert Griffin about attack prevention
Fabricating keys
Critical Infrastructure Security
Tom Van Goethem telling about vulnerabilities in WordPress
Dave Chronister presenting his report “Give Me Your Data!”
Dave discovering very important data on devices and hard drives bought on eBay
Old School: trying to hack the soviet coin-operated telephone
SCADA Strangelove telling about new vulnerabilities in ICS
Ignacio Paredes presenting his report “Industrial Cybersecurity and Critical Infrastructure Protection in Europe”
Alexander Sverdlov’s four-hour workshop on incident investigation
Participants of the workshop “How to React to Security Incidents: Investigation of a Cyber-Attack”
The report “Big Data on Social Networks: No Need for NSA’s Special Surveillance to Keep Track of You”. The hall is packed
Igor Ashmanov’s report became the most quoted in social networks
The presentation is over, but the audience wants more
Beauties from Mail.Ru resting
Alexey Zhukov about cryptography in the Internet of Things
Karsten Nohl presenting “Mobile Network Attack Evolution”
Tin foil hats waiting for their owners (the Survive Hacking contest)
The laboratory of 3D printing. Drawing with a 3D pen
The second day of PHDays IV CTF
Another try at hacking the pay terminal
More than 2,500 people from 18 countries took part in the forum
The payphone holds the field
The Leave ATM Alone contest
Modern 3D printers are not much larger than common printers
William Hagestad II: comparing Iranian, Chinese and North Korean hacking worlds
Unlock the tablet to access the HMI of the “insane home”
Despite the toylike look of the model, the ICSs are used in real life
PHDays IV CTF: last hours, the suspense is terrific
Hacking again!
Andrey Masalovich presenting his report on competitive intelligence
Making themselves comfortable
Maxim Tsoy, one of the leading organizers of PHDays IV CTF (center)
Andrey Petukhov, Dmitry Sklyarov and Andrey Moskvitin (from left to right) at the section “Threats 3.0”
Two hats are better than one
2drunk2hack: kyprizel took first place, second place went to coolzor, and balda took third place
Maxim Kutylov, the permanent moderator of the PHDays forum
2drunk2hack: hackers should be able to overcome any difficulties