fbpx Skip to main content

Encryption & Cyphers

The bread and butter of CypherCon! Cyphers or more commonly, Ciphers, also called encryption algorithms, are systems for encrypting and decrypting data. A cipher converts the original message, called plaintext, into ciphertext using a key to determine how it is done. We are actually a Cryptography conference disguised as a hacker conference, we strive for 20% of our talks to be related to Cryptography.

2023

KEYNOTE: Cameras.ICU

Jonathan Tomek & Cory Kujawski

Needle in the Hay: A Guide to Discovering Plaintext Credentials in Enterprise Environments

Ben Burkhart

ATT&CKing Unicorns

Matthew Lange & Gary Lobermier

Creativity 3.0: How Web3 Will Shape The Future of The Creator Economy.

Ian McCullough (Cullah)

A Hole In The Boat – How APIs Threaten Everything

Richard Bird

A World Without Passwords

Andy Jaw

A “Brazillian” Different Kinds of Malware and Why Your Organization Should Care

Jared Peck

GUR RIBYHGVBA BS PELCGBTENCUL

Mr. Jeff Man

The Call’s Coming from Inside the House: Authentication Proxy Attacks: Detection, Response and Hunting

Chris Merkel

The importance of team-based cybersecurity tournaments

Andrew Paullin

Offensive Security & The Evolution of Attack Path Management

Joe Mondloch

World War II versus Modern Day Cryptography

Randy Lee

Hacking and Defending APIs

Robert Wagner

Achieving a Threat-Informed Defense with MITRE ATT&CK

Ben Opel

No Longer a No-Go: How to Safely Scan OT Devices in Critical Environments

Chris Kirsch

Learning to Manipulate Safe Dials

Dustin Heywood (Evil_Mog)

Are they human or scripts? The level of human involvement behind RDP brute-force attacks

Andréanne Bergeron, Ph.D

Exposing the Threat: Uncovering the Hidden Risks to Your Cable Modem Security

Daniel Walters

Voiding your warranty, a wireless journey.

Eric Escobar

Command & Control: Malware Deobfuscation via Phishing

Robert Lerner

How The Sausage is REALLY Made: CloudOps for Red Teamers

John Ventura

Hot or Not: Offensive Attacks!

Travis Kaun

SQL Injection: A history’ OR 1=1; —

Will McCardell

Patch? We can’t patch! An Introduction to OT/ICS Systems

Luciano Moretti

Secret Handshake: A Mutual TLS Based C2 Communication Channel

John Conwell

AI for Red Team and Malware Development

Kirk Trychel

Evading EDR by DLL sideloading with C#

Gary Lobermier

You’ve Got Mail (and Misdirected Funds): A Demo of Business Email Compromise

Drew Hjelm

PCI DSS v4.0 Is Here – Now What?

Kyle Hinterberg

Now anyone can become a cellular provider! How anyone can build their own cellular network and how I built one for Milwaukee

Russell From

What’s Right in Cybersecurity

Matteo Rebeschini

Extra description