{"id":228085,"date":"2016-10-26T18:31:24","date_gmt":"2016-10-26T16:31:24","guid":{"rendered":"http:\/\/securite.intrinsec.com\/?p=2324"},"modified":"2016-10-26T18:31:24","modified_gmt":"2016-10-26T16:31:24","slug":"hack-lu-2016-premiere-journee","status":"publish","type":"post","link":"https:\/\/www.intrinsec.com\/en\/hack-lu-2016-premiere-journee\/","title":{"rendered":"Hack.lu 2016 \u2013 first day"},"content":{"rendered":"<p style=\"text-align: justify;\">The 12th edition of the Luxembourg conference Hack.lu has just ended and has once again fulfilled its objectives in terms of technical content with regard to the presentations and workshops offered.<\/p>\n<p style=\"text-align: justify;\">As every year, this conference welcomed nearly 400 people over 3 consecutive days (from October 18 to 20, 2016) and was held at the Parc Hotel Alvisse.<\/p>\n<p style=\"text-align: justify;\">As the presentations and workshops took place simultaneously, we weren&#039;t able to attend all of them. We&#039;ve therefore made a small selection, and we hope you enjoy it!<\/p>\n<p style=\"text-align: justify;\"><em>Note: all presentations were filmed and put online (see <a href=\"\/en\/#annexes\">annex<\/a>).<\/em><\/p>\n<p style=\"text-align: justify;\">Links to reports from other days:<\/p>\n<ul>\n<li style=\"text-align: justify;\">Hack.lu 2016 \u2013 first day<\/li>\n<li style=\"text-align: justify;\"><a href=\"https:\/\/www.intrinsec.com\/en\/2016\/10\/26\/hack-lu-2016-deuxieme-journee\/\">Hack.lu 2016 \u2013 Day Two<\/a><\/li>\n<li style=\"text-align: justify;\"><a href=\"https:\/\/www.intrinsec.com\/en\/2016\/10\/26\/hack-lu-2016-troisieme-journee\/\">Hack.lu 2016 \u2013 Day Three<\/a><\/li>\n<\/ul>\n<h1 style=\"text-align: justify;\">Day 1<\/h1>\n<h2 style=\"text-align: justify;\">Keynote: Stressed out? Denial of service attacks from the providers&#039; perspective<\/h2>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2016\/10\/2016-10-21_15-03-15.jpg\"><img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter size-medium wp-image-2326\" src=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2016\/10\/2016-10-21_15-03-15-265x300.jpg\" alt=\"Alice Hutchings\" width=\"265\" height=\"300\" \/><\/a><\/p>\n<p style=\"text-align: justify;\">Alice Hutchings, from the University of Cambridge, opened this 12th edition by presenting the results of her thesis on criminology and more particularly on the &quot;booter&quot; or &quot;stresser&quot; services used to conduct distributed denial-of-service (DDoS) campaigns on websites.<\/p>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2016\/10\/Lizard-squad.jpg\"><img decoding=\"async\" class=\"aligncenter size-medium wp-image-2355\" src=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2016\/10\/Lizard-squad-300x300.jpg\" alt=\"lizard-squad\" width=\"300\" height=\"300\" \/><\/a><\/p>\n<p style=\"text-align: justify;\">One of the best-known pirate groups offering this kind of service is the &quot;Lizard squad,&quot; all of whose members have now been arrested after the UK&#039;s National Crime Agency paid them a visit.<\/p>\n<p style=\"text-align: justify;\">The website &quot;vdos-s[.]com&quot;, with over 10,000 active users and which made headlines following its <a href=\"https:\/\/krebsonsecurity.com\/2016\/09\/israeli-online-attack-service-vdos-earned-600000-in-two-years\/\">compromise <\/a>and to <a href=\"https:\/\/krebsonsecurity.com\/2016\/09\/alleged-vdos-proprietors-arrested-in-israel\/\">the arrest<\/a> The site, owned by two young people in September 2016, also falls into this category of platform. Following these revelations, KrebsOnSecurity.com suffered a denial-of-service attack that was thwarted thanks to Akamai&#039;s security service, which, incidentally, stopped protecting the site after the attack.<\/p>\n<p style=\"text-align: justify;\">A month later, the source code of &quot;Mirai,&quot; the botnet that massively used compromised connected devices and was used against the KrebsOnSecurity website and the hosting provider OVH, was released. <a href=\"https:\/\/krebsonsecurity.com\/2016\/10\/source-code-for-iot-botnet-mirai-released\/\">audience<\/a>.<\/p>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2016\/10\/mirai-hf-580x232.png\"><img decoding=\"async\" class=\"aligncenter wp-image-2356 size-full\" src=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2016\/10\/mirai-hf-580x232.png\" alt=\"Mirai botnet\" width=\"580\" height=\"232\" \/><\/a><\/p>\n<p style=\"text-align: justify;\">According to Alice, the life cycle of online criminal activities follows several phases: initiation, maintenance, and withdrawal.<\/p>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2016\/10\/2016-10-21_15-48-33.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2327 size-full\" src=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2016\/10\/2016-10-21_15-48-33.jpg\" alt=\" cycle de vie des activit\u00e9s criminelles\" width=\"415\" height=\"573\" \/><\/a><\/p>\n<p style=\"text-align: justify;\">In order to learn more about the motivations that might lead people to engage in this type of activity, Alice became interested in the social aspect of a cybercriminal&#039;s life.<\/p>\n<p style=\"text-align: justify;\">She therefore invited 51 &quot;booter&quot; service providers out of the 63 initially identified (12 being offline during the 3-month period of her investigation) by offering them the opportunity to respond to an anonymous online survey or to participate in an interactive interview.<\/p>\n<p style=\"text-align: justify;\">Of all the invitations sent, only 25% responded, with a preference for the online form.<\/p>\n<p style=\"text-align: justify;\">The conclusions of his research paint the following portrait of cybercriminals:<\/p>\n<ul style=\"text-align: justify;\">\n<li>They are mostly men aged 16-24, living primarily in the United States.<\/li>\n<li>In most cases, the initiation phase is due to the influence of their social circle or the people they associate with.<\/li>\n<li>Most of the attacks were orchestrated against online gambling sites<\/li>\n<li>Financial gain has often been one of the main motivations<\/li>\n<li>These actors often deny responsibility, feeling unaffected by existing laws and potential legal action against them.<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">Alice concluded her presentation by indicating that she would continue her research, but this time on the defensive side in order to understand why some people choose to fight crime on the internet.<\/p>\n<h2 style=\"text-align: justify;\">Advanced exploitation: ROP and bypass protections under Linux<\/h2>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2016\/10\/2016-10-21_17-00-56.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2358 size-full\" src=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2016\/10\/2016-10-21_17-00-56.jpg\" alt=\"Julien Bachmann\" width=\"252\" height=\"367\" \/><\/a><\/p>\n<p style=\"text-align: justify;\">This workshop was presented by Julien Bachmann aka <a href=\"https:\/\/twitter.com\/milkmix_\">@milkmix_<\/a>, working at Kudelski Security, on the topic of advanced vulnerability exploitation and more specifically on the ROP (Return-Oriented Programming) exploitation technique.<\/p>\n<p style=\"text-align: justify;\">After a brief review of simple buffer overflow techniques, the various concepts of ret2libc (allowing bypassing the non-executable stack) and the gadget search methodology for building the ROP chain were presented. The workshop concluded with techniques for bypassing ASLR (Address Space Layout Randomization), which is used to randomly distribute data in memory.<\/p>\n<p style=\"text-align: justify;\">For those wishing to complete the various exercises in this workshop, all the binaries can be retrieved from the following Github repository:<\/p>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/github.com\/0xmilkmix\/training\">https:\/\/github.com\/0xmilkmix\/training<\/a><\/p>\n<p style=\"text-align: justify;\">The materials for this workshop are also available at the following address:<\/p>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/speakerdeck.com\/milkmix\/advanced-exploitation-on-linux-rop-and-infoleaks\">https:\/\/speakerdeck.com\/milkmix\/advanced-exploitation-on-linux-rop-and-infoleaks<\/a><\/p>\n<h2 style=\"text-align: justify;\">Cyber Grand Shellphish: Shellphish and the DARPA Cyber Grand Challenge<\/h2>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2016\/10\/CGC_LogoAnimation.gif\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-2354\" src=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2016\/10\/CGC_LogoAnimation-300x212.gif\" alt=\"cgc_logoanimation\" width=\"300\" height=\"212\" \/><\/a><\/p>\n<p style=\"text-align: justify;\">Kevin Borgolte, one of the members of the ShellPhish team, presented the defense research project to us.\u00ab\u00a0<a href=\"https:\/\/cgc.darpa.mil\/\">Cyber Grand Challenge<\/a>\u00a0\u00bb organized by the Defense Advanced Research Projects Agency (DARPA).<\/p>\n<p style=\"text-align: justify;\">As a reminder, ShellPhish is a team that participates in many CTF (Capture The Flag) and is ranked 8th on CTFtime, at the time of writing this article.<\/p>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2016\/10\/2016-10-21_17-50-15.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2329 size-full\" src=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2016\/10\/2016-10-21_17-50-15.jpg\" alt=\"Classement CTFtime\" width=\"461\" height=\"635\" \/><\/a><\/p>\n<p style=\"text-align: justify;\">The goal of this challenge was to build a fully automated system to analyze, exploit and develop patches for the different binaries offered throughout the competition, with a prize of $2 million for the winning team.<\/p>\n<p style=\"text-align: justify;\">As Kevin mentioned, the start of the competition was very challenging and required many hours of work and effort. Despite an apparent delay in the competition due to late registration, they still managed to qualify for the finals.<\/p>\n<p style=\"text-align: justify;\">For these, ShellPhish built the &quot;Mechanical Phish,&quot; whose architecture is as follows:<\/p>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2016\/10\/2016-10-24_15-11-39.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2359 size-full\" src=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2016\/10\/2016-10-24_15-11-39.jpg\" alt=\"Mechanical Phish\" width=\"942\" height=\"529\" \/><\/a><\/p>\n<p style=\"text-align: justify;\">The biggest challenge was anticipating the behaviors and decisions of the different opponents, and avoiding penalty points awarded to the different teams in case of service unavailability or performance degradation.<\/p>\n<p style=\"text-align: justify;\">One of the techniques employed by ShellPhish was to insert a backdoor into the deployed patches. This technique allowed them to gain a significant number of points, as some teams preferred to use patches obtained from the network, thus potentially exposing themselves to a specific team rather than remaining generally vulnerable.<\/p>\n<p style=\"text-align: justify;\">96 rounds comprised this final, which took place on August 4, 2016 in Las Vegas, and during which more than 2400 exploits were generated by ShellPhish&#039;s machine, which finished in 3rd position behind Xandra and Mayhem:<\/p>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2016\/10\/2016-10-24_16-28-28.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-2360\" src=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2016\/10\/2016-10-24_16-28-28-300x131.jpg\" alt=\"Grand_Challenge top 3\" width=\"300\" height=\"131\" \/><\/a><\/p>\n<p style=\"text-align: justify;\">The entire final can be viewed via the following link:<\/p>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/www.youtube.com\/watch?v=n0kn4mDXY6I\">https:\/\/www.youtube.com\/watch?v=n0kn4mDXY6I<\/a><\/p>\n<h1 id=\"annexes\" style=\"text-align: justify;\">Appendices<\/h1>\n<p style=\"text-align: justify;\">The various presentation materials will soon be available at the following address:<\/p>\n<p style=\"text-align: justify;\"><a href=\"http:\/\/archive.hack.lu\/2016\/\">http:\/\/archive.hack.lu\/2016\/<\/a><\/p>\n<p style=\"text-align: justify;\">In the meantime, here are some links to watch the different conferences:<\/p>\n<ul style=\"text-align: justify;\">\n<li>Day 1\n<ul>\n<li>Stressed out? Denial of service attacks from the providers&#039; perspective\n<ul>\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=Z0UaZNxdioc\">https:\/\/www.youtube.com\/watch?v=Z0UaZNxdioc<\/a><\/li>\n<\/ul>\n<\/li>\n<li>Lightning Talk \u2013 Metabrik Meets CVE-Search by GomoR\n<ul>\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=4YZUVIun4YI\">https:\/\/www.youtube.com\/watch?v=4YZUVIun4YI<\/a><\/li>\n<\/ul>\n<\/li>\n<li>Lightning Talk \u2013 When Your Firewall Turns Against You by Rene Freingruber\n<ul>\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=rEZmADCuO1g\">https:\/\/www.youtube.com\/watch?v=rEZmADCuO1g<\/a><\/li>\n<\/ul>\n<\/li>\n<li>Lightning Talk \u2013 Cracking An Egg And Cooking The Chicken by Jacob Torrey\n<ul>\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=6E65xNHFsZk\">https:\/\/www.youtube.com\/watch?v=6E65xNHFsZk<\/a><\/li>\n<\/ul>\n<\/li>\n<li>Exploiting and attacking seismological networks\u2026 remotely by James Jara\n<ul>\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=BHBnVV5eyr8\">https:\/\/www.youtube.com\/watch?v=BHBnVV5eyr8<\/a><\/li>\n<\/ul>\n<\/li>\n<li>Secrets in Soft Token: A security study of HID Global Soft Token by Mouad Abouhali\n<ul>\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=waiWcoFlkb0\">https:\/\/www.youtube.com\/watch?v=waiWcoFlkb0<\/a><\/li>\n<\/ul>\n<\/li>\n<li>KillTheHashes 30 million Malware DNA profiling exercise by Luciano Martins\n<ul>\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=MdulbF0bQQ8\">https:\/\/www.youtube.com\/watch?v=MdulbF0bQQ8<\/a><\/li>\n<\/ul>\n<\/li>\n<li>Unveiling the attack chain of Russian-speaking cybercriminals\n<ul>\n<li>Video - <a href=\"https:\/\/www.youtube.com\/watch?v=apOKU7j2XAY\">https:\/\/www.youtube.com\/watch?v=apOKU7j2XAY<\/a><\/li>\n<\/ul>\n<\/li>\n<li>Of Mice and Keyboards: On the Security of Modern Wireless Desktop Sets\n<ul>\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=Ja_VgUMz43Q\">https:\/\/www.youtube.com\/watch?v=Ja_VgUMz43Q<\/a><\/li>\n<\/ul>\n<\/li>\n<li>Windows systems &amp; code protection signing by Paul Rascagn\u00e8res\n<ul>\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=ByO-skBILQ4\">https:\/\/www.youtube.com\/watch?v=ByO-skBILQ4<\/a><\/li>\n<\/ul>\n<\/li>\n<li>Cyber Grand Shellphish: Shellphish and the DARPA Cyber Grand Challenge\n<ul>\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=nK9L4m0P7Wc\">https:\/\/www.youtube.com\/watch?v=nK9L4m0P7Wc<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>The 12th edition of the Luxembourg Hack.lu conference has just ended and has yet to [\u2026]<\/p>","protected":false},"author":22,"featured_media":2451,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13,19,22],"tags":[146],"class_list":["post-228085","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-evaluation-securite","category-soc-securite-operationnelle","category-veille-securite","tag-hacklu"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.0 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Hack.lu 2016 - premi\u00e8re journ\u00e9e - INTRINSEC<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intrinsec.com\/en\/hack-lu-2016-premiere-journee\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hack.lu 2016 - premi\u00e8re journ\u00e9e\" \/>\n<meta property=\"og:description\" content=\"La 12\u00e8me \u00e9dition de la conf\u00e9rence Luxembourgeoise Hack.lu vient de se terminer et a encore [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intrinsec.com\/en\/hack-lu-2016-premiere-journee\/\" \/>\n<meta property=\"og:site_name\" content=\"INTRINSEC\" \/>\n<meta property=\"article:published_time\" content=\"2016-10-26T16:31:24+00:00\" \/>\n<meta name=\"author\" content=\"Walid ARNOULT\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Walid ARNOULT\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/hack-lu-2016-premiere-journee\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/hack-lu-2016-premiere-journee\\\/\"},\"author\":{\"name\":\"Walid ARNOULT\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#\\\/schema\\\/person\\\/9dd16d3e1ff8da71d0dc1b9573880ef0\"},\"headline\":\"Hack.lu 2016 &#8211; premi\u00e8re journ\u00e9e\",\"datePublished\":\"2016-10-26T16:31:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/hack-lu-2016-premiere-journee\\\/\"},\"wordCount\":1443,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/hack-lu-2016-premiere-journee\\\/#primaryimage\"},\"thumbnailUrl\":\"\",\"keywords\":[\"Hacklu\"],\"articleSection\":[\"Evaluation S\u00e9curit\u00e9\",\"SOC S\u00e9curit\u00e9 Op\u00e9rationnelle\",\"Veille S\u00e9curit\u00e9\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.intrinsec.com\\\/hack-lu-2016-premiere-journee\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/hack-lu-2016-premiere-journee\\\/\",\"url\":\"https:\\\/\\\/www.intrinsec.com\\\/hack-lu-2016-premiere-journee\\\/\",\"name\":\"Hack.lu 2016 - premi\u00e8re journ\u00e9e - INTRINSEC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/hack-lu-2016-premiere-journee\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/hack-lu-2016-premiere-journee\\\/#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2016-10-26T16:31:24+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#\\\/schema\\\/person\\\/9dd16d3e1ff8da71d0dc1b9573880ef0\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/hack-lu-2016-premiere-journee\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.intrinsec.com\\\/hack-lu-2016-premiere-journee\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/hack-lu-2016-premiere-journee\\\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/hack-lu-2016-premiere-journee\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.intrinsec.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hack.lu 2016 &#8211; premi\u00e8re journ\u00e9e\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#website\",\"url\":\"https:\\\/\\\/www.intrinsec.com\\\/\",\"name\":\"INTRINSEC\",\"description\":\"Notre m\u00e9tier , Prot\u00e9ger le v\u00f4tre\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.intrinsec.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#\\\/schema\\\/person\\\/9dd16d3e1ff8da71d0dc1b9573880ef0\",\"name\":\"Walid ARNOULT\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/?s=96&d=retro&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/?s=96&d=retro&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/?s=96&d=retro&r=g\",\"caption\":\"Walid ARNOULT\"},\"url\":\"https:\\\/\\\/www.intrinsec.com\\\/en\\\/author\\\/walid-arnoult\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Hack.lu 2016 - Day 1 - INTRINSEC","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intrinsec.com\/en\/hack-lu-2016-premiere-journee\/","og_locale":"en_US","og_type":"article","og_title":"Hack.lu 2016 - premi\u00e8re journ\u00e9e","og_description":"La 12\u00e8me \u00e9dition de la conf\u00e9rence Luxembourgeoise Hack.lu vient de se terminer et a encore [&hellip;]","og_url":"https:\/\/www.intrinsec.com\/en\/hack-lu-2016-premiere-journee\/","og_site_name":"INTRINSEC","article_published_time":"2016-10-26T16:31:24+00:00","author":"Walid ARNOULT","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Walid ARNOULT","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.intrinsec.com\/hack-lu-2016-premiere-journee\/#article","isPartOf":{"@id":"https:\/\/www.intrinsec.com\/hack-lu-2016-premiere-journee\/"},"author":{"name":"Walid ARNOULT","@id":"https:\/\/www.intrinsec.com\/#\/schema\/person\/9dd16d3e1ff8da71d0dc1b9573880ef0"},"headline":"Hack.lu 2016 &#8211; premi\u00e8re journ\u00e9e","datePublished":"2016-10-26T16:31:24+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intrinsec.com\/hack-lu-2016-premiere-journee\/"},"wordCount":1443,"commentCount":0,"image":{"@id":"https:\/\/www.intrinsec.com\/hack-lu-2016-premiere-journee\/#primaryimage"},"thumbnailUrl":"","keywords":["Hacklu"],"articleSection":["Evaluation S\u00e9curit\u00e9","SOC S\u00e9curit\u00e9 Op\u00e9rationnelle","Veille S\u00e9curit\u00e9"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intrinsec.com\/hack-lu-2016-premiere-journee\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.intrinsec.com\/hack-lu-2016-premiere-journee\/","url":"https:\/\/www.intrinsec.com\/hack-lu-2016-premiere-journee\/","name":"Hack.lu 2016 - Day 1 - INTRINSEC","isPartOf":{"@id":"https:\/\/www.intrinsec.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intrinsec.com\/hack-lu-2016-premiere-journee\/#primaryimage"},"image":{"@id":"https:\/\/www.intrinsec.com\/hack-lu-2016-premiere-journee\/#primaryimage"},"thumbnailUrl":"","datePublished":"2016-10-26T16:31:24+00:00","author":{"@id":"https:\/\/www.intrinsec.com\/#\/schema\/person\/9dd16d3e1ff8da71d0dc1b9573880ef0"},"breadcrumb":{"@id":"https:\/\/www.intrinsec.com\/hack-lu-2016-premiere-journee\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intrinsec.com\/hack-lu-2016-premiere-journee\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.intrinsec.com\/hack-lu-2016-premiere-journee\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/www.intrinsec.com\/hack-lu-2016-premiere-journee\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.intrinsec.com\/"},{"@type":"ListItem","position":2,"name":"Hack.lu 2016 &#8211; premi\u00e8re journ\u00e9e"}]},{"@type":"WebSite","@id":"https:\/\/www.intrinsec.com\/#website","url":"https:\/\/www.intrinsec.com\/","name":"INTRINSEC","description":"Our job is to protect yours.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intrinsec.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.intrinsec.com\/#\/schema\/person\/9dd16d3e1ff8da71d0dc1b9573880ef0","name":"Walid ARNOULT","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=retro&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=retro&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=retro&r=g","caption":"Walid ARNOULT"},"url":"https:\/\/www.intrinsec.com\/en\/author\/walid-arnoult\/"}]}},"_links":{"self":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/posts\/228085","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/users\/22"}],"replies":[{"embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/comments?post=228085"}],"version-history":[{"count":0,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/posts\/228085\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/media?parent=228085"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/categories?post=228085"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/tags?post=228085"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}