Lightning Talks

Everybody attending the conference will have the possibility to sign up for the lightning talks. Lightning talks are short talks of 5 or 10 minutes sessions and will be about everything that attendees want to show briefly to the audience. Talks can be fun too ;-)

(pre)Register for Lightning Talks

You can send an email to info(AT) or DM us on the @hack_lu twitter account.

Lightning Talks on Tuesday 21th October 2014

Philippe Teuwen, Electronic Coloring Book

ElectronicColoringBook is a small Python script available at to extract ECB encrypted images in a much more satisfactory way than what we're used to with the infamous ECB pinguin.

The technique is described for small kids in an article to be published soon in PoC||GTFO 0x05

I will also show its usage under some circumstances against CBC mode!

Claus Cramon Houmann, Call to arms! No one is coming to help us - we are the cavalry. Mount up

Axelle Apvrille and Ange Albertini, hide apk in images

Hide Android Applications in Images

Ludovic Apvrille, If I secure my car, will it still brake?

I will first present the architecture of car platforms. This is a strongly distributed systems, with up to 100 "computers" called ECUs (Electronic Control Units). The authorized latency between ECUs depends on the criticality of functions they handle, e.g., messages exchanged between the braking pedal manager and the ECU handling the braking actuators have a very constrained latency. Yet, if security almost totally ignored by previous car architectures, the interconnection of cars with other outside systems (other cars, Internet, etc.) raises security issues. We'll thus explained the approach used by car manufacturers to secure their car, in particular relying on Hardware security modules (HSM). Nonetheless, introducing security features may have a strong impact on message delays, and thus on car safety. We'll finally show how the impact of security over safety can be evaluated.

Basically, the presentation will be as follows:

  • Slide 1: Fast presentation of car architectures
  • Slide 2: A few known attacks on cars
  • Slide 3: Towards secure car architectures (HSM)
  • Slide 4: How to handle the impact of security over safety, with a 1-min live demo.

Lightning Talks on Wednesday 22th October 2014

Philippe Teuwen, 25/05/2014 Belgian elections: a nice electronic voting bug and its port under Linux

Short story of the Belgian electronic voting bug and the porting of JITES (a 20 years old source base running on MS-DOS) to Linux to be able to emulate and understand better the bug and its consequences and to produce the animated GIF visible here:

You can see the animated gif in the attached PDF under Acrobat, was quite challenging too ;-)

Source code is available here:;a=blob;f=README

Thierry Degeling, Mobile applications giving access to information

Data mining has become easier since the era of mobile applications which need APIs to run on the server side. Web 2.0 with its ajax requests also give access to information which companies try to hide from their users. I’ll show examples of what I did using this information.

Sébastien Larinier, Fast Responder

FastResponder is a tool to collect artefact windows on live computer to detect compromised systems.

Serge Guelton, Epona, an LLVM bytecode obfuscator

Lightning Talks on Thursday 23th October 2014

intelMQ - dataflow oriented incident processing

IntelMQ is a solution for CERTs for collecting and processing security feeds, pastebins, tweets using a message queue protocol. It’s a community driven initiative also sometimes called IHAP (Incident Handling Automation Project) which was conceptually designed by some European CERTs during several InfoSec events. Its main goal is to give to incident responders an easy way to collect & process threat intelligence thus improving the incident handling processes of CERTs.

IntelMQ's design was influenced by AbuseHelper, however it was re-written from scratch and aims at:

  • Reduce the complexity of system administration
  • Reduce the complexity of writing new bots for new data feeds
  • Reduce the probability of events lost in all process with persistence functionality (even system crash)
  • Use and improve the existing Data Harmonization Ontology
  • Use JSON format for all messages
  • Integration of the existing tools (AbuseHelper, CIF)
  • Provide easy way to store data into Log Collectors like ElasticSearch, Splunk
  • Provide easy way to create your own black-lists
  • Provide easy communication with other systems via HTTP RESTFUL API

And of course it's open source (AGPL)

Eric Leblond, let's talk about SELKS

Didier Stevens, Using thermal imaging for security

Do you work in counter surveillance or physical penetration testing? The physical security field in general? If yes, have you considered using a thermal imaging camera to help you in your work?

A thermal imaging camera is a camera that operates in the infrared spectrum, and shows you the temperature of objects in its field of view.

A picture is worth a thousand words, they say, so let me show you a series of illustrative thermal images.

Radare2 a fast overview

Something else