<?xml version='1.0' encoding='utf-8' ?>
<!-- Made with love by pretalx v2024.2.1. -->
<schedule>
    <generator name="pretalx" version="2024.2.1" />
    <version>1.0.2</version>
    <conference>
        <title>DCTF25</title>
        <acronym>dctf25</acronym>
        <start>2025-03-29</start>
        <end>2025-03-30</end>
        <days>2</days>
        <timeslot_duration>00:05</timeslot_duration>
        <base_url>https://cfp.dragonsec.si</base_url>
        <logo>https://cfp.dragonsec.si/media/dctf25/img/dctf25_hr_qPfbgel.png</logo>
        <time_zone_name>Europe/Ljubljana</time_zone_name>
        
        
    </conference>
    <day index='1' date='2025-03-29' start='2025-03-29T04:00:00+01:00' end='2025-03-30T03:59:00+02:00'>
        <room name='P1' guid='ca724072-2060-5540-84a1-125dff4a9299'>
            <event guid='16b6e7f9-4a8f-5d60-858f-d7e2cad95476' id='18'>
                <room>P1</room>
                <title>Rethinking Human Vulnerabilities in Cybersecurity</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2025-03-29T10:30:00+01:00</date>
                <start>10:30</start>
                <duration>00:30</duration>
                <abstract>While human attack vectors are now generally acknowledged to &#8220;be a thing&#8221; in INFOSEC, there are two immediate points we should make:

(a) Human attack vectors have been seen to be important in abstract for at least forty years &#8211; with overused phrases of humans being the weakest link of security. However, it is becoming clearer and clearer that understanding human attack vectors concretely is still elusive to the general (managerial) population.

(b) There is a substantial amount of gatekeeping in our field, where only spending weeks on obscure code and finding a 0-day or the ability to script Metasploit is considered &#8220;true&#8221; hacking, while exploiting human inability to premeditate is not. We are expected to bow to the technological supremacy of techno nerds and not point out that the threat model in both cases often remains the same.

In the talk, I will explore this curious divide in INFOSEC through examples and we will further look empirically at how lack of familiarity with concepts we pay lip service to, but in some cases do not understand fully, leads to potentially disastrous (or at least tragically amusing) fails in security.</abstract>
                <slug>dctf25-18-rethinking-human-vulnerabilities-in-cybersecurity</slug>
                <track></track>
                <logo>/media/dctf25/submissions/CTWTSF/PAtch.19.CRQ.MD.overprint.230x230px72dpi_wpgUyWE.png</logo>
                <persons>
                    <person id='11'>David  Modic</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.dragonsec.si/dctf25/talk/CTWTSF/</url>
                <feedback_url>https://cfp.dragonsec.si/dctf25/talk/CTWTSF/feedback/</feedback_url>
            </event>
            <event guid='2548369e-1c6c-5098-8a7f-be0598be5346' id='11'>
                <room>P1</room>
                <title>Breaking the Box: A Practical Guide to Container Security</title>
                <subtitle></subtitle>
                <type>Lecture</type>
                <date>2025-03-29T11:10:00+01:00</date>
                <start>11:10</start>
                <duration>01:00</duration>
                <abstract>Containers have revolutionized software deployment, but with great convenience come new security risks. 
In this session, we&apos;ll explore how containers work under the hood, common security pitfalls, and best practices for building and running secure containerized applications. We&apos;ll also demonstrate real-world container breakouts and discuss how attackers can exploit misconfigurations</abstract>
                <slug>dctf25-11-breaking-the-box-a-practical-guide-to-container-security</slug>
                <track></track>
                
                <persons>
                    <person id='12'>Ale&#353; Brelih</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.dragonsec.si/dctf25/talk/SUXXTA/</url>
                <feedback_url>https://cfp.dragonsec.si/dctf25/talk/SUXXTA/feedback/</feedback_url>
            </event>
            <event guid='21ce37cb-2092-5555-ae38-33844c713194' id='15'>
                <room>P1</room>
                <title>Dissecting HijackLoader: From Fake CAPTCHA to NTFS Transacted Hollowing</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2025-03-29T12:40:00+01:00</date>
                <start>12:40</start>
                <duration>00:30</duration>
                <abstract>A recent rise in fake CAPTCHA scams has led to a spike in user-triggered infostealer infections resulting in significant cryptocurrency losses among Slovenian victims. The HijackLoader malware abuses steganography to hide its encrypted payload within the PE resource, bypasses user-mode hooks, and executes direct syscalls within its shellcode. It combines NTFS transactions and process hollowing to deliver the final crypto-stealing payload.</abstract>
                <slug>dctf25-15-dissecting-hijackloader-from-fake-captcha-to-ntfs-transacted-hollowing</slug>
                <track></track>
                
                <persons>
                    <person id='22'>Urban Vidergar</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.dragonsec.si/dctf25/talk/NVREUD/</url>
                <feedback_url>https://cfp.dragonsec.si/dctf25/talk/NVREUD/feedback/</feedback_url>
            </event>
            <event guid='d59d4445-2948-5cab-a69e-b839cdcbb0a5' id='21'>
                <room>P1</room>
                <title>Reproducible builds and why they matter</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2025-03-29T13:20:00+01:00</date>
                <start>13:20</start>
                <duration>00:30</duration>
                <abstract>What is reproducibility, why it matters and common issues in achieving it accompanied by short demos
and discussion about counterpoints against reproducible builds.</abstract>
                <slug>dctf25-21-reproducible-builds-and-why-they-matter</slug>
                <track></track>
                <logo>/media/dctf25/submissions/YJHKTC/repro_pCEtCaz.png</logo>
                <persons>
                    <person id='27'>Foobar</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.dragonsec.si/dctf25/talk/YJHKTC/</url>
                <feedback_url>https://cfp.dragonsec.si/dctf25/talk/YJHKTC/feedback/</feedback_url>
            </event>
            <event guid='20844b05-b973-5dc7-99b2-cb228046b140' id='17'>
                <room>P1</room>
                <title>Rootkits - how deep the rabbit hole is</title>
                <subtitle></subtitle>
                <type>Lecture</type>
                <date>2025-03-29T14:00:00+01:00</date>
                <start>14:00</start>
                <duration>01:00</duration>
                <abstract>Rootkits are malicious software that is designed to gain unauthorized access to a computer system and is able to hide its presence in the system. Rootkits are not only used by cybercriminals, but are also used for espionage and state-organized cyber attacks.

In this lecture, we will explore where malware can hide within a computer - even in the motherboard&apos;s chipset and deep inside the CPU - and how you can protect against such threats. We will presentseveral  real-world examples of rootkits and discuss various research on hiding malware deep down within information systems.</abstract>
                <slug>dctf25-17-rootkits-how-deep-the-rabbit-hole-is</slug>
                <track></track>
                <logo>/media/dctf25/submissions/DTSCJJ/rootkits_Wm6zhUa.png</logo>
                <persons>
                    <person id='24'>Matej Kova&#269;i&#269;</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.dragonsec.si/dctf25/talk/DTSCJJ/</url>
                <feedback_url>https://cfp.dragonsec.si/dctf25/talk/DTSCJJ/feedback/</feedback_url>
            </event>
            <event guid='8782d2d3-a04e-51d7-841a-f262e40e93d6' id='9'>
                <room>P1</room>
                <title>PXE Hacking 101: From Network Boot to Credential Extraction</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2025-03-29T17:00:00+01:00</date>
                <start>17:00</start>
                <duration>00:30</duration>
                <abstract>Preboot Execution Environment (PXE) is a widely used network boot technology that allows machines to boot over a network without local storage. However, this convenience comes with security risks. In this session, we will explore how PXE works and how attackers can exploit misconfigurations to extract passwords and gain unauthorized access. Through practical demonstrations, we will analyze real-world attack scenarios, discuss potential countermeasures, and provide security best practices to defend against PXE-based attacks.</abstract>
                <slug>dctf25-9-pxe-hacking-101-from-network-boot-to-credential-extraction</slug>
                <track></track>
                
                <persons>
                    <person id='17'>&#381;an Urban&#269;i&#269;</person><person id='19'>Danijela &#352;antak</person>
                </persons>
                <language>en</language>
                <description>PXE booting is a powerful tool used in enterprise environments for system deployment and recovery, but it is often overlooked as a security risk. In this 30-minute seminar, we will cover:

- Understanding PXE: How network booting works and why it is commonly used.
- How PXE Can Be Exploited: Common vulnerabilities, including unauthenticated booting and insecure TFTP transfers.
- Extracting Passwords: Demonstrating how attackers can intercept PXE boot files, retrieve hashed passwords, and escalate privileges.
- Live Demo: A step-by-step exploitation of a misconfigured PXE server.
- Mitigation Strategies: How to secure PXE environments against unauthorized access.</description>
                <recording>
                    <license></license>
                    <optout>true</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.dragonsec.si/dctf25/talk/FLCGTB/</url>
                <feedback_url>https://cfp.dragonsec.si/dctf25/talk/FLCGTB/feedback/</feedback_url>
            </event>
            <event guid='a91d4426-9368-558b-ba45-67f4845bdf1b' id='16'>
                <room>P1</room>
                <title>Recon OSINT</title>
                <subtitle></subtitle>
                <type>Lecture</type>
                <date>2025-03-29T17:40:00+01:00</date>
                <start>17:40</start>
                <duration>01:00</duration>
                <abstract>Lecture: Introduction to OSINT and Passive Reconnaissance Techniques</abstract>
                <slug>dctf25-16-recon-osint</slug>
                <track></track>
                
                <persons>
                    <person id='23'>Marko Li&#269;ina</person>
                </persons>
                <language>en</language>
                <description>Lecture Content:
&#9989; What is OSINT and OPSEC? &#8211; Introduction to OSINT methodology and the importance of Operational Security (OPSEC) for Protecting the Investigator in OSINT Research.
&#9989; Fundamentals: Where and How to Start? &#8211; First steps in OSINT, covering both technical and procedural aspects (NDA, scope definition, legal considerations, double checking information).
&#9989; Passive vs. Active OSINT &#8211; Understanding the differences and when to apply each approach.

Key OSINT Research Areas:
&#9989; Business &amp; Technical OSINT &#8211; Passive analysis of publicly available business data:
&#160;&#160;&#160;&#160;-  Investigation of IP addresses, domains, and company infrastructure.
&#160;&#160;&#160;&#160;-  Searching for email addresses, job postings, and business intelligence.
&#9989; Human OSINT (HUMINT) &amp; Social Media OSINT (SOCMINT) &#8211; Gathering information on individuals:
&#160;&#160;&#160;-  Analyzing publicly available social media profiles and user activity.
&#9989; Geo OSINT (GEOINT) &#8211; Geolocation data analysis and its applications in investigations.

OSINT Tools Covered (depends on time):
&#9989; OSINT Framework, DNSDumpster, Shodan, Censys, Domain Dossier, Hunter.io, Dehashed, Wappalyzer, BuiltWith, Google Dorking, Google Maps, Google Reverse Image Search, Yandex Images, PimEyes, Maltego, theHarvester,.

Practical Demonstration:
- Geo OSINT &#8211; How to determine the geolocation of a picture using Image OSINT with help of google maps.
-  Social Media OSINT &#8211; Basic search methods for gathering publicly available information.

Who Should Attend?
The lecture is suitable for anyone interested in this field, as well as those who want to improve the protection of their publicly accessible data.

Time Considerations:
Given that the lecture is limited to one hour, the focus will be on key concepts, practical examples, and essential tools, providing a solid foundation for further exploration.</description>
                <recording>
                    <license></license>
                    <optout>true</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.dragonsec.si/dctf25/talk/EKBRRD/</url>
                <feedback_url>https://cfp.dragonsec.si/dctf25/talk/EKBRRD/feedback/</feedback_url>
            </event>
            <event guid='50981352-c874-5cd8-9af7-dfb490e3cdcc' id='13'>
                <room>P1</room>
                <title>How to (mostly) fail at making money with security</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2025-03-29T19:10:00+01:00</date>
                <start>19:10</start>
                <duration>00:30</duration>
                <abstract>Back in 2007 I was enthusiastically entering the security startup World. Almost two decades later, I still (mostly) fail at making money with security. Learn from my mistakes!</abstract>
                <slug>dctf25-13-how-to-mostly-fail-at-making-money-with-security</slug>
                <track></track>
                
                <persons>
                    <person id='20'>Neyts Zupan</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.dragonsec.si/dctf25/talk/UATVVB/</url>
                <feedback_url>https://cfp.dragonsec.si/dctf25/talk/UATVVB/feedback/</feedback_url>
            </event>
            <event guid='316e4a6c-e90e-5722-9ca8-19fe27a8f061' id='14'>
                <room>P1</room>
                <title>Automating HTTPS for Tor Onion Sites</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2025-03-29T19:50:00+01:00</date>
                <start>19:50</start>
                <duration>00:30</duration>
                <abstract>Historically, managing TLS certificates was a pain, and letting a certificate expire on your website due to forgetting to renew it wasn&apos;t uncommon. Then, Let&apos;s Encrypt came along and made this much easier with everyone&apos;s favourite tool: automation! 

Unfortunately, Let&apos;s Encrypt&apos;s automation doesn&apos;t work for everything. One of these cases is getting a TLS certificate for Tor Onion Services (those with a .onion domain). This talk covers the technical work required to get ACME (the protocol used by Let&apos;s Encrypt) to work for this scenario, and the political work to get it through the IETF as a formal standard.</abstract>
                <slug>dctf25-14-automating-https-for-tor-onion-sites</slug>
                <track></track>
                
                <persons>
                    <person id='21'>Q Misell</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.dragonsec.si/dctf25/talk/3J33ZA/</url>
                <feedback_url>https://cfp.dragonsec.si/dctf25/talk/3J33ZA/feedback/</feedback_url>
            </event>
            <event guid='48c48546-86e5-5642-85db-64df61355bb2' id='20'>
                <room>P1</room>
                <title>Intro to CTF</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2025-03-29T20:30:00+01:00</date>
                <start>20:30</start>
                <duration>00:30</duration>
                <abstract>A short introduction to Capture the Flag competitions.</abstract>
                <slug>dctf25-20-intro-to-ctf</slug>
                <track></track>
                
                <persons>
                    
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.dragonsec.si/dctf25/talk/CT88QF/</url>
                <feedback_url>https://cfp.dragonsec.si/dctf25/talk/CT88QF/feedback/</feedback_url>
            </event>
            
        </room>
        
    </day>
    <day index='2' date='2025-03-30' start='2025-03-30T04:00:00+02:00' end='2025-03-31T03:59:00+02:00'>
        
    </day>
    
</schedule>
