| Wireless Network attacks |
Ioannis Arakas |
22/2 |
| Rubber Ducky |
Skerdi Basha |
01/3 |
| Sensitive Inference from End-to-end Encrypted Traffic |
Andrei Kazlouski |
30/3 |
| Securing Your Networks with PANDORA |
Ilias Balampanis, SPACE Hellas |
04/4 |
| AI in Security: Attacks and Defenses |
Andrei Kazlouski |
06/4 |
| Pentesting a Linux Machine (HTB) |
Ioannis Arakas |
26/4 |
| ALPS: Android Lock Picking System, An Encrypted Artifacts Analysis Tool |
Skerdi Basha |
08/5 |
| Penetration testing: Case studies |
Nikos Tsagkarakis, CENSUS |
18/5 |
| SQL injection & XXS attacks |
Nikos Boumakis |
18/5 |