<?xml version='1.0' encoding='utf-8' ?>
<iCalendar xmlns:pentabarf='http://pentabarf.org' xmlns:xCal='urn:ietf:params:xml:ns:xcal'>
    <vcalendar>
        <version>2.0</version>
        <prodid>-//Pentabarf//Schedule//EN</prodid>
        <x-wr-caldesc></x-wr-caldesc>
        <x-wr-calname></x-wr-calname>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>RWCWKL@@cfp.pass-the-salt.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-RWCWKL</pentabarf:event-slug>
            <pentabarf:title>RF Swift: A Swifty Toolbox for All Wireless Assessments</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250701T141000</dtstart>
            <dtend>20250701T144500</dtend>
            <duration>0.03500</duration>
            <summary>RF Swift: A Swifty Toolbox for All Wireless Assessments</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://cfp.pass-the-salt.org/pts2025/talk/RWCWKL/</url>
            <location>Amphitheater 122</location>
            
            <attendee>Sébastien Dudek</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>8WLTNS@@cfp.pass-the-salt.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-8WLTNS</pentabarf:event-slug>
            <pentabarf:title>The Last Resort: Debugging Embedded Systems with Unconventional Methods</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250701T144500</dtstart>
            <dtend>20250701T152000</dtend>
            <duration>0.03500</duration>
            <summary>The Last Resort: Debugging Embedded Systems with Unconventional Methods</summary>
            <description>This talk offers an overview of low-level concepts related to interrupts, followed by a detailed guide on building an on-chip debugger, addressing the various choices and challenges that may arise during the process.

To begin with, a communication channel is required, preferably one that remains operational even during a debug interrupt. An initial breakpoint must be set on the target to trigger the debugger. A debug handler, ideally written in assembly, needs to be implemented and configured to listen for commands responsible for reading and writing memory and register contents. An intermediate server between GDB and the target must also be created. Several open-source skeletons are available to assist in this task.

In addition, the talk places special emphasis on designing a lightweight debugger, as it is intended for embedded targets. It will therefore present techniques to keep the code as minimal and efficient as possible.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://cfp.pass-the-salt.org/pts2025/talk/8WLTNS/</url>
            <location>Amphitheater 122</location>
            
            <attendee>Vincent Lopes (Security Engineer, Quarkslab)</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>CWYMPY@@cfp.pass-the-salt.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-CWYMPY</pentabarf:event-slug>
            <pentabarf:title>LabCyber - a FabLab dedicated to cybersecurity</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250701T152000</dtstart>
            <dtend>20250701T154000</dtend>
            <duration>0.02000</duration>
            <summary>LabCyber - a FabLab dedicated to cybersecurity</summary>
            <description>During this talk we will succintly present pilot projects of varied nature:

- entrepreneurial prototyping
- multipartner academic projects
- production of commons with work groups 

as well as our range of equipement and the eligibility criteria for new projects.

As a Fablab we are willing to promote an open science approach by :

- Listing and advocating for open tools
- Sharing the results or the methodologies with communities as wide as possible 
- Initiating open hardware projets related to security</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Short Talk</category>
            <url>https://cfp.pass-the-salt.org/pts2025/talk/CWYMPY/</url>
            <location>Amphitheater 122</location>
            
            <attendee>Aline Becq</attendee>
            
            <attendee>Fabien Caura</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>HL8QKR@@cfp.pass-the-salt.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-HL8QKR</pentabarf:event-slug>
            <pentabarf:title>OpenRelik: a containerized incident response processing pipeline</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250701T155500</dtstart>
            <dtend>20250701T163000</dtend>
            <duration>0.03500</duration>
            <summary>OpenRelik: a containerized incident response processing pipeline</summary>
            <description>This talk will cover:

* OpenRelik: what is it, who is it for, how do we use it?

* lessons learnt from the past: Turbinia, its architecture, and why that wasn’t cutting it anymore

* Architecture: decentralized workers via containers, redis pub sub channel, shared file system, mediator server

* life of a workflow: how we go from uploading evidence to retrieving results.

* How OpenRelik integrates with other tools such as Timesketch and Yeti. How to write a worker that integrates with your tools.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://cfp.pass-the-salt.org/pts2025/talk/HL8QKR/</url>
            <location>Amphitheater 122</location>
            
            <attendee>Thomas Chopitea (Digital Forensics, Google)</attendee>
            
            <attendee>Johan Berggren (Digital Forensics, Google)</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>SB7BEZ@@cfp.pass-the-salt.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-SB7BEZ</pentabarf:event-slug>
            <pentabarf:title>End-to-end processing of malware samples using open source technologies</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250701T163000</dtstart>
            <dtend>20250701T170500</dtend>
            <duration>0.03500</duration>
            <summary>End-to-end processing of malware samples using open source technologies</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://cfp.pass-the-salt.org/pts2025/talk/SB7BEZ/</url>
            <location>Amphitheater 122</location>
            
            <attendee>Frederic Baguelin</attendee>
            
            <attendee>Matt Muir</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>WAKGHJ@@cfp.pass-the-salt.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-WAKGHJ</pentabarf:event-slug>
            <pentabarf:title>Practical intro to deeplearning: chihuahuas vs muffins</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250701T141000</dtstart>
            <dtend>20250701T171000</dtend>
            <duration>3.00000</duration>
            <summary>Practical intro to deeplearning: chihuahuas vs muffins</summary>
            <description>Agenda:

• Short introduction to deep learning

• Setting up the environment

• Hands-on session: we’ll experiment with image classification

• Hands-on session: we build a web app with Gradio

We’ll also be discussing applications to cybersecurity you can prototype, deep learning and training methods, cool the hype and discuss realistic LLM capacities.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Workshop</category>
            <url>https://cfp.pass-the-salt.org/pts2025/talk/WAKGHJ/</url>
            <location>Room LW109</location>
            
            <attendee>Pauline Bourmeau, Cubessa</attendee>
            
            <attendee>William Robinet (Conostix S.A.)</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>WLKAH9@@cfp.pass-the-salt.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-WLKAH9</pentabarf:event-slug>
            <pentabarf:title>Building Efficient Verifiable Logs: Introducing Trillian Tessera and TesseraCT</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250702T091500</dtstart>
            <dtend>20250702T095000</dtend>
            <duration>0.03500</duration>
            <summary>Building Efficient Verifiable Logs: Introducing Trillian Tessera and TesseraCT</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://cfp.pass-the-salt.org/pts2025/talk/WLKAH9/</url>
            <location>Amphitheater 122</location>
            
            <attendee>Philippe Boneff (Certificate Transparency Tech Lead, Google)</attendee>
            
            <attendee>Roger Ng</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>DCMUBQ@@cfp.pass-the-salt.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-DCMUBQ</pentabarf:event-slug>
            <pentabarf:title>Working towards digital archive transparency</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250702T095000</dtstart>
            <dtend>20250702T101000</dtend>
            <duration>0.02000</duration>
            <summary>Working towards digital archive transparency</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Short Talk</category>
            <url>https://cfp.pass-the-salt.org/pts2025/talk/DCMUBQ/</url>
            <location>Amphitheater 122</location>
            
            <attendee>The Terrible Archivist</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>YKXAKR@@cfp.pass-the-salt.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-YKXAKR</pentabarf:event-slug>
            <pentabarf:title>My friends have phone numbers, not public keys</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250702T101000</dtstart>
            <dtend>20250702T104500</dtend>
            <duration>0.03500</duration>
            <summary>My friends have phone numbers, not public keys</summary>
            <description>In 2023, in an effort to secure the distribution of its users public keys, WhatsApp announced [Key Transparency](https://engineering.fb.com/2023/04/13/security/whatsapp-key-transparency/). This aims to automatically verify a secure connection, without user interaction, such as scanning a QRCode. Similar effort have been shared by [iMessage](https://security.apple.com/blog/imessage-contact-key-verification), and [Proton Mail](https://proton.me/support/key-transparency).

This talk goes over how key transparency works, how it is implemented today, and the challenges and improvements. It builds on deployed systems such as [WhatsApp](https://engineering.fb.com/2023/04/13/security/whatsapp-key-transparency/) or [Cloudflare](https://blog.cloudflare.com/key-transparency/), and on on-going standardisation efforts at [IETF](https://datatracker.ietf.org/wg/keytrans/about/) and [C2SP](https://github.com/C2SP/C2SP).</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://cfp.pass-the-salt.org/pts2025/talk/YKXAKR/</url>
            <location>Amphitheater 122</location>
            
            <attendee>Thibault Meunier (Research, Cloudflare)</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>LEMGYM@@cfp.pass-the-salt.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-LEMGYM</pentabarf:event-slug>
            <pentabarf:title>Always more secure? Analyzing user migrations to federated e2ee messaging apps</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250702T110000</dtstart>
            <dtend>20250702T113500</dtend>
            <duration>0.03500</duration>
            <summary>Always more secure? Analyzing user migrations to federated e2ee messaging apps</summary>
            <description>With the current massive user migration from X and Meta to decentralized social media such as Mastodon, the interest in federated communication infrastructures is gaining traction. We have been documenting similar tendencies since 2018 already, analyzing how users in various contexts shift their preferences in terms of secure messaging applications. In the context of a longitudinal study of secure messaging apps users and developers this presentation proposes to analyze several waves of user migrations and suggests an analytical framework to understand the changes in the perception of what’s a “good secure messaging app” with a particular attention to federated architectures and their potential. The “Signal gate” has shown that cryptographic properties of a messaging app per se do not offer a guarantee of security, and many other (sometimes even non-technical) qualities enter the game. We propose to understand digital security as an evolving sociotechnical process of adjusting tools and behaviors and to question the race for an “always more secure” messaging app. We argue that infrastructural choices (centralized vs decentralized vs distributed) and social practices (such as contact discovery) matter.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://cfp.pass-the-salt.org/pts2025/talk/LEMGYM/</url>
            <location>Amphitheater 122</location>
            
            <attendee>Ksenia Ermoshina</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>SYFQXB@@cfp.pass-the-salt.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-SYFQXB</pentabarf:event-slug>
            <pentabarf:title>Messaging Layer Security (MLS) – towards more end-to-end encryption</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250702T113500</dtstart>
            <dtend>20250702T121000</dtend>
            <duration>0.03500</duration>
            <summary>Messaging Layer Security (MLS) – towards more end-to-end encryption</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://cfp.pass-the-salt.org/pts2025/talk/SYFQXB/</url>
            <location>Amphitheater 122</location>
            
            <attendee>Raphael Robert (MLS co-author, CEO of Phoenix R&amp;D)</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>P3DZRZ@@cfp.pass-the-salt.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-P3DZRZ</pentabarf:event-slug>
            <pentabarf:title>Usable end-to-end security with Delta Chat and Chatmail</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250702T140000</dtstart>
            <dtend>20250702T143500</dtend>
            <duration>0.03500</duration>
            <summary>Usable end-to-end security with Delta Chat and Chatmail</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://cfp.pass-the-salt.org/pts2025/talk/P3DZRZ/</url>
            <location>Amphitheater 122</location>
            
            <attendee>Holger Krekel</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>AN9QJ8@@cfp.pass-the-salt.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-AN9QJ8</pentabarf:event-slug>
            <pentabarf:title>Matrix French gov deployment: opening a private federation securely</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250702T143500</dtstart>
            <dtend>20250702T151000</dtend>
            <duration>0.03500</duration>
            <summary>Matrix French gov deployment: opening a private federation securely</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://cfp.pass-the-salt.org/pts2025/talk/AN9QJ8/</url>
            <location>Amphitheater 122</location>
            
            <attendee>Mathieu Velten</attendee>
            
            <attendee>Yoan Pintas</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>UATTRT@@cfp.pass-the-salt.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-UATTRT</pentabarf:event-slug>
            <pentabarf:title>When Priority Isn’t Enough: Exploiting the VRRP Tie-Breaking IP Mechanism</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250702T154000</dtstart>
            <dtend>20250702T160000</dtend>
            <duration>0.02000</duration>
            <summary>When Priority Isn’t Enough: Exploiting the VRRP Tie-Breaking IP Mechanism</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Short Talk</category>
            <url>https://cfp.pass-the-salt.org/pts2025/talk/UATTRT/</url>
            <location>Amphitheater 122</location>
            
            <attendee>Geoffrey Sauvageot-Berland</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>EN3WB8@@cfp.pass-the-salt.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-EN3WB8</pentabarf:event-slug>
            <pentabarf:title>Wirego, a Wireshark plugin development framework</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250702T160000</dtstart>
            <dtend>20250702T162000</dtend>
            <duration>0.02000</duration>
            <summary>Wirego, a Wireshark plugin development framework</summary>
            <description>Developing plugins for Wireshark is quite complex. The API in written in C, dates from 1998 and is quite poorly documented.  When working on a protocol, the reverser wants to stay focus on its main task and really doesn&#x27;t want to go deep inside the Wireshark source code.

Wirego is a based on a Wireshark plugin which is ready to use and re-emits the Wireshark calls to a ZMQ (Zero-MQ) endpoint.
A package/class/framework for a given language receives these calls and converts them back to simple API calls. The end-user only needs to inherit a class (or implement an interface in Go) with just a few methods in order to develop his plugin.

Typically, one will simply implement seven methods in order to define the plugin name, the plugin filter (used to filter packets matching with the protocol), the list of fields eventually returned by the dissector (the parser), three methods for the protocol detection and the dissector itself.

A simple Wireshark plugin can be developed using only 100 lines of Python or less.
Wirego has been designed to easily allows the integration of additional languages.

Wirego is available on github: https://github.com/quarkslab/wirego/</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Short Talk</category>
            <url>https://cfp.pass-the-salt.org/pts2025/talk/EN3WB8/</url>
            <location>Amphitheater 122</location>
            
            <attendee>Benoit Girard</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>RTTHMW@@cfp.pass-the-salt.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-RTTHMW</pentabarf:event-slug>
            <pentabarf:title>ROPemporium party</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250702T091500</dtstart>
            <dtend>20250702T121500</dtend>
            <duration>3.00000</duration>
            <summary>ROPemporium party</summary>
            <description>During this workshop, we&#x27;ll work together to solve some of the exercises on the site.

The aim is to give you enough theoretical and practical knowledge to be able to extend the experience by doing all the exercises proposed afterwards.
The site offers exercises on intel x86-64, x86-32, ARM and MISP executables.

After a presentation of the platform, and the main concepts involved in ROP, you&#x27;ll be able to learn from the exercises :

- Get to grips with the tools to discover an initial function calling technique.
- Call a function with a parameter already present in the executable.
- Master the convention of passing parameters for more complex calls.
- Learn how to place some data in the memory and pass it as a parameter
- Search for usable gadgets when the most obvious are not available.
- Finally, we&#x27;ll create a slightly more complex ROP chain using a pivot technique.

As an epilogue, if time permits, we&#x27;ll take a look at ARM binary exploitation with qemu, to encourage you to extend the experience.

The workshop is ideally aimed at people familiar with x86 assembler and the basics of binary exploitation with buffer overflow.

To carry out the exercises you will need a Linux machine with the following open-sources tools :
- gdb
- a gdb extension such as GEF or pwndbg
- python3
- pwntools
- radare2
- ropper ou ROPGadget
and optionally
- 32-bit libraries (libc6-i386)
- qemu

A docker image containing the required tools will be made available and its use encouraged.
&lt;b&gt;Docker is therefore the main requisite.&lt;/b&gt;

By the way, to avoid clogging up the network and save time at the beginning of the workshop, please,
try to anticipate to download the materials : 

&lt;code&gt;
git clone https://github.com/cdpointpoint/ropemporium_party.git

cd ropemporium_party

./run_ptsrew.sh
&lt;/code&gt;.

The run script will pull the 2 Go docker image the fist time.

It is also possible to follow the workshop without carrying out (all) the manipulations during the session and keep focus on explanations or exchanges.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Workshop</category>
            <url>https://cfp.pass-the-salt.org/pts2025/talk/RTTHMW/</url>
            <location>Room LW109</location>
            
            <attendee>Jean-Côme Estienney (CNAM)</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>K3MKZQ@@cfp.pass-the-salt.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-K3MKZQ</pentabarf:event-slug>
            <pentabarf:title>MISP for analysts</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250702T140000</dtstart>
            <dtend>20250702T163000</dtend>
            <duration>2.03000</duration>
            <summary>MISP for analysts</summary>
            <description>Outline

Introduction to MISP
  - Overview of MISP and its features
  - Presentation of the example case

Getting Started
  - Create and populate a MISP event
  - Generate a report
  - Publish the event

General Usage
  - Working with data: enrich, collaborate, export
  - Best practices

Recap and resources</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Workshop 2h30</category>
            <url>https://cfp.pass-the-salt.org/pts2025/talk/K3MKZQ/</url>
            <location>Room LW109</location>
            
            <attendee>Pauline Bourmeau, Cubessa</attendee>
            
            <attendee>William Robinet (Conostix S.A.)</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>CSHGVJ@@cfp.pass-the-salt.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-CSHGVJ</pentabarf:event-slug>
            <pentabarf:title>Bluetooth Low Energy hacking with WHAD</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250702T091500</dtstart>
            <dtend>20250702T121500</dtend>
            <duration>3.00000</duration>
            <summary>Bluetooth Low Energy hacking with WHAD</summary>
            <description>### Workshop objectives

* Discover WHAD, a flexible wireless hacking Python framework and some of its key features
* Learn how to easily scan, connect and interact with a BLE device using WHAD tools
* Learn how to spoof any BLE device using WHAD
* Learn how to create Python scripts using WHAD to automate BLE analysis and vulnerability exploitation 
* Hack a BLE smartband for fun and profit !

### Prerequisites

* A laptop with Virtualbox or VMWare virtualization software installed (host OS does not really matter)
  * We will provide a pre-configured VM a few days before the workshop
  * Administrative rights may be required for the VM to access the host&#x27;s USB interfaces and HCI adapters
  * At least 2 free USB ports required on the host machine to plug some hardware devices, bring a USB hub if needed
* A good knowledge of the Python programming language (Python 3.x)
* A smartphone with Nordic Semiconductor&#x27;s *nRF Connect* application installed (not mandatory but could be useful)
* You can also bring any Bluetooth Low Energy device you think may be fun to fiddle with ;)

### Workshop agenda

* I. What is WHAD ?
  * I.1. Introducing WHAD (purpose and global design)
    * I.1.1. Supported protocols/modulations
    * I.1.2. Combining simple tools to create complex tools
    * I.1.3. Python API
    * I.1.4. Examples of tools/research based on WHAD (quick demos)
    * I.1.5. Pros and cons
  * I.2. Core concepts
    * I.2.1. Getting protocol processing out of firmware
    * I.2.2. WHAD host/interface protocol
    * I.2.3. Interfaces and connectors
    * I.2.4. Tool chaining
    * I.2.5. Scripting
  * I.3. Installing WHAD
    * I.3.1. Installing and running WHAD in a VM (we provide a VM image)
    * I.3.2. Installing and running WHAD on your host computer (for the braves)
    * I.3.3. First contact with WHAD

* II. Discovering BLE devices
  * II.1. Using wsniff to scan for BLE devices
  * II.2. Using wble-central to discover devices
  * II.3. Exporting a device profile to a file (for later user or reporting)
  
* III. Interacting with a BLE device (hands-on)
  * III.1. Interactive mode using wble-central
    * III.1.a. Services and characteristics discovery
    * III.1.b. Reading and writing to characteristics
    * III.1.c. Subscribing for notifications or indications
    * III.1.e. Real-time monitoring with Wireshark
  * III.2. Scripting with WHAD and wble-central
    * III.2.a. Creating a script to avoid getting disconnected
    * III.2.b. Running a script with wble-central
    * III.2.c. Exporting and importing a BLE device&#x27;s GATT profile for better speed

* IV. Creating fake BLE devices (hands-on)
  * IV.1. Interactive mode using wble-periph
    * IV.1.a. Creating a device from scratch in interactive mode
    * IV.1.b. Scripting wble-periph to quickly setup a device
    * IV.1.c. Monitoring live with wireshark
    * IV.1.d. Dumping traffic to PCAP file
    * IV.1.e. Populating services and characteristics from exported GATT profile
  * IV.2. Scripting with WHAD and wble-periph
    * IV.2.a. Creating a script to advertise a specific peripheral
    * IV.2.b. Combining saved GATT profile and scripting for efficiency

* V. Python scripting (hands-on)
  * V.1. WHAD Python API 101
    * V.1.a. Connecting to a BLE device
    * V.1.b. Reading and writing to characteristics
    * V.1.c. Subscribing to notifications or indications
    * V.1.d. Sending handcrafted PDUs
    * V.1.e. Exporting traffic to PCAP
  * V.2. Final challenge
    * V.2.a. Discovering a vulnerable smart band
    * V.2.b. Writing an exploit with Python and WHAD
    * V.2.c. Hack all the smart bands !</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Workshop</category>
            <url>https://cfp.pass-the-salt.org/pts2025/talk/CSHGVJ/</url>
            <location>Room LW112</location>
            
            <attendee>Damien Cauquil (R&amp;D Engineer at Quarkslab)</attendee>
            
            <attendee>Romain Cayre</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>DEKPBL@@cfp.pass-the-salt.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-DEKPBL</pentabarf:event-slug>
            <pentabarf:title>Make better shells with rcat</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250703T093000</dtstart>
            <dtend>20250703T095000</dtend>
            <duration>0.02000</duration>
            <summary>Make better shells with rcat</summary>
            <description>Today, most reverse shells are done via an unencrypted TCP connection using `netcat` (looking at you https://revshells.com). We will see how to easily create __encrypted reverse shells__ (without installing tools on the targeted server).

We will also discuss what is are _pseudo-TTY_, and how `rcat` makes it easier to transfer files over a TCP connection.

https://github.com/0xfalafel/rcat</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Short Talk</category>
            <url>https://cfp.pass-the-salt.org/pts2025/talk/DEKPBL/</url>
            <location>Amphitheater 122</location>
            
            <attendee>Olivier Lasne</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>XE9K9T@@cfp.pass-the-salt.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-XE9K9T</pentabarf:event-slug>
            <pentabarf:title>Hooking Windows Named Pipes with thats_no_pipe</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250703T095000</dtstart>
            <dtend>20250703T101000</dtend>
            <duration>0.02000</duration>
            <summary>Hooking Windows Named Pipes with thats_no_pipe</summary>
            <description>- A quick introduction of the speaker.
- A quick introduction of Windows Named Pipes APIs.
- An overview of common attacks against Named Pipes.
- Common mitigations against MitM attacks, and how to bypass them.
- Live demonstration of the tool.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Short Talk</category>
            <url>https://cfp.pass-the-salt.org/pts2025/talk/XE9K9T/</url>
            <location>Amphitheater 122</location>
            
            <attendee>Thomas Borot (Pentester @Synacktiv)</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>XZGSN8@@cfp.pass-the-salt.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-XZGSN8</pentabarf:event-slug>
            <pentabarf:title>Vesta Admin Takeover - Exploiting reduced seed entropy in $RANDOM</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250703T101000</dtstart>
            <dtend>20250703T103000</dtend>
            <duration>0.02000</duration>
            <summary>Vesta Admin Takeover - Exploiting reduced seed entropy in $RANDOM</summary>
            <description>Vesta is a lightweight, web-based control panel that simplifies Linux server management, appealing to users seeking an intuitive alternative to traditional platforms like cPanel and Plesk. This presentation will examine a critical flaw in Vesta: an admin takeover exploit resulting from reduced seed entropy in the Bash $RANDOM variable. By transforming what was once a theoretical attack into a practical one, we successfully reduced the brute force domain of the seed by over 98%. This allows attackers to generate predictable random values, compromising the security of passwords and tokens. We will discuss the implications of this vulnerability and highlight best practices for enhancing server security in real-world applications.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Short Talk</category>
            <url>https://cfp.pass-the-salt.org/pts2025/talk/XZGSN8/</url>
            <location>Amphitheater 122</location>
            
            <attendee>Adrian Tiron</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>9ZCTRE@@cfp.pass-the-salt.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-9ZCTRE</pentabarf:event-slug>
            <pentabarf:title>Auditing Keycloak Configurations with Neo4j</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250703T104500</dtstart>
            <dtend>20250703T110500</dtend>
            <duration>0.02000</duration>
            <summary>Auditing Keycloak Configurations with Neo4j</summary>
            <description>Key points covered:

* Simple export of Keycloak objects (realms, roles, users, groups, etc.) into Neo4j
* Using Cypher queries to detect or visualize security gaps
* Practical examples of identifying overlooked or excessive privileges
* Maintaining a clearer overview of complex IAM configurations
* Details on the upcoming open-source release for easy replication</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Short Talk</category>
            <url>https://cfp.pass-the-salt.org/pts2025/talk/9ZCTRE/</url>
            <location>Amphitheater 122</location>
            
            <attendee>Kévin Schouteeten (pentester @Synacktiv)</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>FUL7LS@@cfp.pass-the-salt.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-FUL7LS</pentabarf:event-slug>
            <pentabarf:title>Putting pacman in jail: a sandboxing story</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250703T110500</dtstart>
            <dtend>20250703T114000</dtend>
            <duration>0.03500</duration>
            <summary>Putting pacman in jail: a sandboxing story</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://cfp.pass-the-salt.org/pts2025/talk/FUL7LS/</url>
            <location>Amphitheater 122</location>
            
            <attendee>Rémi Gacogne (Security Team, Arch Linux)</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>C9MMHN@@cfp.pass-the-salt.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-C9MMHN</pentabarf:event-slug>
            <pentabarf:title>RootAsRole: Simplifying Linux Privileges and Fortifying Ansible Deployments</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250703T114000</dtstart>
            <dtend>20250703T120000</dtend>
            <duration>0.02000</duration>
            <summary>RootAsRole: Simplifying Linux Privileges and Fortifying Ansible Deployments</summary>
            <description>RootAsRole is a Rust-based alternative to *sudo* for Linux systems. It allows the definitions of a co-administrated infrastructure with limited privilege sets through a structured role-based access control model and adhering to the principle of least privilege. In this presentation, we’ll explore how *sr* (the name of our tool, for **S**witch-**R**ole) is more secure or/and better than *sudo/doas/su* alternatives, and extends its utility for automation with Ansible and the valuable security insights it offers.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Short Talk</category>
            <url>https://cfp.pass-the-salt.org/pts2025/talk/C9MMHN/</url>
            <location>Amphitheater 122</location>
            
            <attendee>Yves Rütschlé (Security architect, Airbus Protect)</attendee>
            
            <attendee>Eddie Billoir</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>PKWQUD@@cfp.pass-the-salt.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-PKWQUD</pentabarf:event-slug>
            <pentabarf:title>Secrets at Sea: Hunting Exposed Code &amp; Container Registries</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250703T140000</dtstart>
            <dtend>20250703T142000</dtend>
            <duration>0.02000</duration>
            <summary>Secrets at Sea: Hunting Exposed Code &amp; Container Registries</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Short Talk</category>
            <url>https://cfp.pass-the-salt.org/pts2025/talk/PKWQUD/</url>
            <location>Amphitheater 122</location>
            
            <attendee>Guillaume Valadon</attendee>
            
            <attendee>Gaetan Ferry</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>RDEFF3@@cfp.pass-the-salt.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-RDEFF3</pentabarf:event-slug>
            <pentabarf:title>Fun with flags: How Compilers Break and Fix Constant-Time Code</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250703T142000</dtstart>
            <dtend>20250703T144000</dtend>
            <duration>0.02000</duration>
            <summary>Fun with flags: How Compilers Break and Fix Constant-Time Code</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Short Talk</category>
            <url>https://cfp.pass-the-salt.org/pts2025/talk/RDEFF3/</url>
            <location>Amphitheater 122</location>
            
            <attendee>Antoine Geimer</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>GBEYZP@@cfp.pass-the-salt.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-GBEYZP</pentabarf:event-slug>
            <pentabarf:title>Analyzing Microarchitectural Side-Channel Attacks Using Open-source gem5 simulator</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250703T144000</dtstart>
            <dtend>20250703T150000</dtend>
            <duration>0.02000</duration>
            <summary>Analyzing Microarchitectural Side-Channel Attacks Using Open-source gem5 simulator</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Short Talk</category>
            <url>https://cfp.pass-the-salt.org/pts2025/talk/GBEYZP/</url>
            <location>Amphitheater 122</location>
            
            <attendee>Mahreen Khan</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>MMAXWW@@cfp.pass-the-salt.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-MMAXWW</pentabarf:event-slug>
            <pentabarf:title>The Even Darker Web - Dirty tricks and questionable code choices on some of the world&#x27;s largest websites.</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250703T150000</dtstart>
            <dtend>20250703T152000</dtend>
            <duration>0.02000</duration>
            <summary>The Even Darker Web - Dirty tricks and questionable code choices on some of the world&#x27;s largest websites.</summary>
            <description>The talk will cover the three categories of websites we encounter:

1. Phishing and scams: make a quick crime buck.
1. Tracking on legitimate websites: build a user profile over time without getting sued to oblivion
3. WAT: probably AI generated and trying to sell you the memecoin of the day

We will go through a few remarkable examples captures on Lookyloo, explain what weird or crazy thing happened from the instant the URL starts to load all the way to when the page is rendered. We&#x27;ll also look at the data gathered along the way, and search in the existing dataset for similar captures.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Short Talk</category>
            <url>https://cfp.pass-the-salt.org/pts2025/talk/MMAXWW/</url>
            <location>Amphitheater 122</location>
            
            <attendee>Raphaël Vinot (Developer, Lookyloo)</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>7K9MEV@@cfp.pass-the-salt.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-7K9MEV</pentabarf:event-slug>
            <pentabarf:title>Metadata Protection in Instant Messaging Applications: a Review</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250703T153500</dtstart>
            <dtend>20250703T161000</dtend>
            <duration>0.03500</duration>
            <summary>Metadata Protection in Instant Messaging Applications: a Review</summary>
            <description>This talk covers the obvious issue of long-term identities and the
construction of the social graph and how some protections supposed to thwart the
social graph recovery are flawed. Some of these attacks are publicly documented
and still unmitigated by those affected by them.

This talk also dives into less obvious metadata leaks, such as traffic
correlation and ciphertext correlation. 

Finally it also points out that some of the studied instant messaging solutions
do not protect all messages and leak metadata to third parties via attachment
upload, push notifications, backups and voice/video calls. 

Sorting out which instant messaging application is the best is a non-goal for
this talk.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://cfp.pass-the-salt.org/pts2025/talk/7K9MEV/</url>
            <location>Amphitheater 122</location>
            
            <attendee>Florian Maury</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>BT3FTH@@cfp.pass-the-salt.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-BT3FTH</pentabarf:event-slug>
            <pentabarf:title>EXADPrinter: Exhaustive Permissionless Device Fingerprinting Within the Android Ecosystem</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250703T161000</dtstart>
            <dtend>20250703T163000</dtend>
            <duration>0.02000</duration>
            <summary>EXADPrinter: Exhaustive Permissionless Device Fingerprinting Within the Android Ecosystem</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Short Talk</category>
            <url>https://cfp.pass-the-salt.org/pts2025/talk/BT3FTH/</url>
            <location>Amphitheater 122</location>
            
            <attendee>Sihem Bouhenniche (University of Lille - Inria)</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>JFTTLJ@@cfp.pass-the-salt.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-JFTTLJ</pentabarf:event-slug>
            <pentabarf:title>Dive into Delta Chat, Chatmail, webxdc apps and P2P realtime</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250703T093000</dtstart>
            <dtend>20250703T123000</dtend>
            <duration>3.00000</duration>
            <summary>Dive into Delta Chat, Chatmail, webxdc apps and P2P realtime</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Workshop</category>
            <url>https://cfp.pass-the-salt.org/pts2025/talk/JFTTLJ/</url>
            <location>Room LW109</location>
            
            <attendee>Holger Krekel</attendee>
            
            <attendee>Ksenia Ermoshina</attendee>
            
            <attendee>missytake</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>7A7B8G@@cfp.pass-the-salt.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-7A7B8G</pentabarf:event-slug>
            <pentabarf:title>Apkpatcher: Reverse Engineering and Modifying Android Applications Without Rooting</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250703T140000</dtstart>
            <dtend>20250703T163000</dtend>
            <duration>2.03000</duration>
            <summary>Apkpatcher: Reverse Engineering and Modifying Android Applications Without Rooting</summary>
            <description># Objectives

Understand the fundamentals of reverse engineering Android applications.
Learn to use debugging tools to analyze Android app behavior.
Bypass security mechanisms using Frida scripts.
Sniff and replay Bluetooth Low Energy (BLE) communications.
Modify Smali code to alter app functionality.
Reverse engineer native libraries used in Android apps.
Perform Man-in-the-Middle (MITM) attacks on HTTPS services.

# Workshop Outline

1. Introduction to Android Reverse Engineering
- Overview of Android app architecture.
- Setting up the environment for reverse engineering.
2. Using a Debugger on Android Applications
- Introduction to Android debugging tools.
- Practical exercise: Debugging an Android app.
3. Bypassing Security with Frida
- Introduction to Frida and its capabilities.
- Writing Frida scripts to bypass security checks.
- Hands-on: Implementing a Frida script.
4. Sniffing and Replaying BLE Communications
- Overview of BLE technology.
- Tools for sniffing BLE traffic.
- Practical exercise: Capturing and replaying BLE data.
5. Modifying Smali Code
- Introduction to Smali and its role in Android apps.
- Techniques for modifying Smali code.
- Hands-on: Altering app functionality through Smali.
6. Reverse Engineering Native Libraries
- Understanding native libraries in Android.
- Tools and techniques for reverse engineering.
- Practical exercise: Analyzing a native library.
7. MITM on HTTPS Services
- Introduction to MITM attacks.
- Setting up a MITM proxy for HTTPS.
- Hands-on: Intercepting and modifying HTTPS traffic.

# Prerequisites
Familiarity with command-line tools.
Laptop and Android phone

# Expected Outcomes

By the end of the workshop, participants will have gained practical experience in reverse engineering and modifying Android applications. They will be equipped with the skills to analyze app security and implement modifications without requiring rooted devices.

Workshop Duration: 1.5 hours</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Workshop 2h30</category>
            <url>https://cfp.pass-the-salt.org/pts2025/talk/7A7B8G/</url>
            <location>Room LW109</location>
            
            <attendee>Benoit Forgette</attendee>
            
        </vevent>
        
    </vcalendar>
</iCalendar>
