Wireless Network attacks |
Ioannis Arakas |
22/2 |
Rubber Ducky |
Skerdi Basha |
01/3 |
Sensitive Inference from End-to-end Encrypted Traffic |
Andrei Kazlouski |
30/3 |
Securing Your Networks with PANDORA |
Ilias Balampanis, SPACE Hellas |
04/4 |
AI in Security: Attacks and Defenses |
Andrei Kazlouski |
06/4 |
Pentesting a Linux Machine (HTB) |
Ioannis Arakas |
26/4 |
ALPS: Android Lock Picking System, An Encrypted Artifacts Analysis Tool |
Skerdi Basha |
08/5 |
Penetration testing: Case studies |
Nikos Tsagkarakis, CENSUS |
18/5 |
SQL injection & XXS attacks |
Nikos Boumakis |
18/5 |