• If you are citizen of an European Union member nation, you may not use this service unless you are at least 16 years old.

  • Buried in cloud files? We can help with Spring cleaning!

    Whether you use Dropbox, Drive, G-Suite, OneDrive, Gmail, Slack, Notion, or all of the above, Dokkio will organize your files for you. Try Dokkio (from the makers of PBworks) for free today.

  • Dokkio (from the makers of PBworks) was #2 on Product Hunt! Check out what people are saying by clicking here.


BSidesLuxembourg2017 (redirected from BSidesLuxembourg)


What is BSides?


Each BSides is a community-driven framework for building events for and by information security community members. The goal is to expand the spectrum of conversation beyond the traditional confines of space and time. It creates opportunities for individuals to both present and participate in an intimate atmosphere that encourages collaboration. It is an intense event with discussions, demos, and interaction from participants. It is where conversations for the next-big-thing are happening. 


About BSides Luxembourg


Defending any decent-sized organization is extremely difficult; you have to keep the business up and running while also making sure that attackers will not be able to reach the crown-jewels and you have to do it in a way that makes your C-level executives, managers, and users happy.


BSides Luxembourg is a conference that is 100% dedicated to defense, inspiring discussions and knowledge exchange among the participants, whether they are from red or blue team side.


Event details



20th October 2017


See "Schedule" for the details!


Alvisse Parc Hotel


120, Route d'Echternach




Web: http://www.parc-hotel.lu/en/

Phone: +352 43 56 43

Fax: +352 43 69 03

Email: [email protected]


10 EUR


You can buy single tickets or combined tickets with the hack.lu conference at https://2017.hack.lu/info/



Social Media

Twitter: @BSidesLux

LinkedIn: BSides Luxembourg

XING: BSides Luxembourg

Facebook: BSides Luxembourg


Invite your friends by posting this on Twitter: "#BSidesLuxembourg Oct 20th, 2017: don't miss the very first edition! @BSidesLux"




BSides Luxembourg is looking for sponsors. We would like to provide participants with a great experience and at the same time not to potentially exclude great people by setting the entrance fee at a level which covers the real costs of the event.


If you can sponsor our community building initiative, please contact any of the organizers, @BSidesLux or [email protected] !


Call for Sponsors is closed!


Please find the Sponsor Kit document with the details here.


Gold Sponsors

Silver Sponsors








Bronze Sponsors




Capture the Flag Sponsor and Organizer


Call for Papers


Call for Papers is closed!


Please find the CFP form with the details here.


CFP deadline is extended! New deadline:  17th September 2017, 23:59 UTC!


Discussion Talks


The discussion talks are divided into two parts; the first part is 20 minutes of presentation on the given topic, while the second 20 minutes are for discussions. The presentations should not be necessarily about groundbreaking defense techniques or the latest and greatest innovative research, but they are much more about problems and solutions that affect most of us in our daily work.


"Bring your own ..." Workshop


The idea is to have a more interactive workshop style, where the participants are actively involved and bring their own... "thing" and show what tools and techniques they use to tackle a problem. So for example on a "Bring your own malware sample" (careful with those!) participants are encouraged to bring interesting samples and show them to others, discuss how to analyze such sample, what are the possible pitfalls and how to avoid them.


Capture the Flag


BSides Luxembourg 2017 Capture the Flag is organized by Avatao.


The CTF starts on 20th October at 09:00 CEST, ends at 15:00 CEST and you can play it here (the URL comes live at that time).


You can already register your user account at Avatao platform and start practicing with other challenges!


Registration will stay open for another two weeks after the conference.





Talks are online! Watch them on YouTube!



Building minimum viable security in SMBs


I published a framework for how to build a minimum viable security program in a small company of ~10 to maybe 100 employees. It was not an easy thing to do, nor did it happen overnight. This talk will describe the journey.

I would like to walk the audience through a 4 year journey of going from absolutely clueless about cyber security to a state where I can proudly proclaim that I know a little about a few specific areas. The journey was long and hard, but I had to do it. Most SMBs do not have someone to do this and do not know that they should be doing it at all. How do they defend themselves and how do we help them do it better on a large scale?


Keywords: SMB, Security


Bio: Claus Cramon Houmann


Peerlyst Community Manager - trying to help defenders everywhere get better faster. Former bank CISO and CIO. Active in I am the Cavalry.


Malware analysis with a chatbot


Who prefer past his time on tchat application than his debugger? I guess everyone. This is the first idea of this project, hunting and automate reversing malware with a chatbot.


Keywords: malware, bot, reverse, automation


Bio: Rémi Chipaux


Working at Itrust.lu in Luxembourg as a malware reverser, pentester, forensic, incident handling. Passionate by all hacking stuff and CTF challenge. Member of the HackGyver Hackerspace.


Mitigating Java Deserialization attacks from within the JVM


It is known that Deserialization in Java is highly insecure and can be easily abused resulting in RCE and DoS attacks. The publication of these attacks exposed critical vulnerabilities in numerous Java applications and products, in all layers of the Java software stack. Because deserialization exploits are complex in nature, developers and code reviewers often fail to detect deserialization abuse cases. In this talk we will discuss the problem of Java deserialization. Developers and security code reviewers will learn how to identify dangerous code that can lead to new gadgets and how to avoid them. We will also discuss how the new Java Serialization Filtering (JEP 290) can help developers and security teams mitigate such attacks.

A live demo will also show how to bypass an existing popular solution.

Finally, we will present the root cause of these attacks from a different point of view and propose a new approach for protecting the JVM.


Keywords: Java, JVM, Deserialization, Gadget Chains, AppSec


Bio: Apostolos Giannakidis


Apostolos Giannakidis is the Security Architect at Waratek, driving the research of vulnerabilities and attacks in Java and designing innovative self-protection features inside the JVM using runtime virtualization. His research interests include web application security, mitigating attacks with zero false positives and pushing the limits of the JVM capabilities. In the past, Apostolos worked in Oracle for 2 years focusing on Destructive Testing on the whole technology stack of Oracle and on Security Testing of the Solaris operating system. He regularly writes and comments on application security issues at DZone, Infosecurity Magazine and other security magazines. Apostolos has more than a decade of professional experience in the Software and Cybersecurity industry and holds an MSc in Computer Science from the University of Birmingham.


To click or not to click, or how to build awareness about behavior online


One of the largest problem we face in and about cyber security is human error. By many investigations it came out that internal data breach goes even till 81,6 % (investigation by Verzion). This shows how important it is to make employees at hospitals/companies aware of the importance of both good cyber security and their good and sensible behavior online at the workplace. I will explain how we can reach the employee to be open and want to learn more about good behavior online. The basic training with few rules from and for IT department will bring the awareness on higher level, so we can eliminate the ability of the bad and average criminal hackers to harm the company and everyone in there. 


Keywords: awareness, training, communication, password, human error, data breach


Bio: Jelena Milosevic


Jelena Milosevic is a paediatrician and ICU nurse with a lot of experience, having worked at many different hospitals in the Netherlands since 1995, and before that having spent 10 years working in the ICU at the University Children's Hospital in Belgrade.


Over the past three years Jelena has been active in the infosec community and has been applying her infosec knowledge to the healthcare world in order to help improve security for both patients and medical staff. Jelena is a member of the I Am The Cavalry group and a part of the Women in Cyber network.


Automated Mail Server Testing - "Like SSL Labs, but for email"


What is the first thing you do when bringing a web server online? You check its score using SSL Labs to see if it is configured correctly or if there are any security-critical things you might have missed along the way. It's an invaluable tool for monitoring and analyzing the TLS setup of any public web server.  But what do you do after you brought your email servers online? Your SMTP, POP, and IMAP servers?  Wouldn't it be great to have a convenient tool, too, in these situations?


Keywords: Email infrastructure security, Vulnerability detection, Security monitoring, Automated analysis, DNS record analysis, TLS configuration analysis


Bio: Martin Boßlet


Martin Boßlet has been working with cryptography, security and PKI for over a decade. He served as principal consultant for Electronic Signature Service Infrastructure (ESSI), a platform provided by the European Commission for creating, extending and validating electronic document signatures.  Apart from his interest in email security, he helps start-up and enterprise clients alike to realize their vision. 

He likes to share his passion at local and international conferences or at one of his regular workshops with topics such as cryptography, git, Ruby, Rails, JavaScript or web development in general. 

Martin is interested in all programming languages, but his passion is the Ruby language.  He is a member of the Ruby core team, a maintainer for Ruby's cryptography library and received one of the first two Ruby Association Grants for his project krypt.

He received his M.S. in Mathematics and Computer Science from TU Kaiserslautern, Germany.


Immunizing vulnerable web applications with AppArmor in practice


Linux Security Modules like AppArmor can be a great tool for immunizing applications against their known and unknown vulnerabilities. It can be used for preventing successful exploitation of 0day vulnerabilities, understanding application activity and isolating affected processes as part of incident response without causing service downtime. There are more and more use cases and possibilities, but adoption of these technologies is far from trivial. This talk gives a comprehensive walk-through of using AppArmor for immunizing a web service written in Python, attack vectors and their mitigations via AppArmor, the basic steps of profile development and a simple example of implementing privilege separation.


Keywords: AppArmor, LSM, MAC, Privilege Separation, Immunization, Python, Gunicorn


Bio: György Demarcsek


György Demarcsek joined the Security Team at Prezi more than a year ago, coming from CERN’s Technical Student program with an infra engineering background. He enjoys working in the intersection of software engineering and IT security and he likes fiddling with OS level hacks. These days he helps improve and maintain the security infrastructure of Prezi and handle potential incidents.


Bring Your Own EVTX Workshop


In this workshop, the participants are expected to bring their own interesting EVTX files (especially Security events) and analyze them with different tools and techniques.


As an example analysis exercise, we will cover the triage and analysis phases of an incident response process on MS Windows environments, and see how UserLine (https://github.com/THIBER-ORG/userline) helps to improve your DFIR capabilities to focus the investigation. This tool automates the process of creating logon relations from MS Windows Security Events by showing a graphical relation among users domains, source and destination logons, session duration, who was logged on the systems in a given datetime, etc. It is able to integrate and provides different output modes such as CSV output, Neo4j, SQLite, Gephi and Graphviz.


Keywords: DFIR, Python, Graph, Events, EVTx


Bio: Chema García


Chema García is Co-Founder and member of THIBER, the Spanish Cybersecurity Think Tank. With more than ten years of experience as independent security researcher and contributor in many cybersecurity awareness events. He's also the author and contributor of many open source projects focused in digital forensics, pentesting and incident response.


Automating SAP Security patches


Many large organisations in the world rely on SAP systems for running their business critical processes. These systems are complex and often not properly protected as we have seen during many security assessments. One of the difficulties SAP customers struggle with is to apply SAP Security patches. These so called SAP Security notes are delivered monthly (aligned with MS patch Tuesday) and result in a large workload each and every month because they need to be reviewed, applied and tested. 

In this talk we will present a way to apply up to 75% of these SAP Security patches automatically. This reduces patching time and makes the life of the technical stuff less annoying.


Keywords: SAP, Security, Patching


Bio: Joris van de Vis


Joris has got extensive experience in the technical and security field of SAP.  Next to his interest in SAP Coding and SAP Technology, his main interest lies in the field of SAP platform security. He loves helping business secure their SAP systems and perform SAP security research in his spare time. He reported over 70 vulnerabilities in SAP applications. Joris has got 15+ years of experience working for large SAP running companies and government departments. Joris is co-founder of ERP-SEC, a SAP security focused company based in the Netherlands.


How mature is your HTTPS implementation?


Will be published, if accepted. Max. 1000 characters = ~200 words.

Although nowadays most of the websites are running in HTTPS, several parameters can improve the robustness and mitigate risks, especially for highly critical information. It aims to be didactic and point out the weaknesses on basis setup and improvements brought by HSTS, OCSP stapling, HPKP, Certificate Transparency, Forward Secrecy, DNS CAA,.. Different demos will be performed to explain the attacks, their risk and mitigations. The best practices and return of experience of their configuration on popular websites will be detailed to help sysadmin who wants to implement them. At the end, two pictures of the implementation of these parameters usage will be dress-up on most popular websites in Luxembourg (TLD .lu) in July 2017 and October 2017.




Bio: Renaud Dubois


Renaud Dubois, CISSP is a specialist is cyber-security and information security. He is working in the private, public and military sectors. Renaud is experimented in multiple domains including ICT architecture, risk assessments, security engineering, security operations frameworks & standards, network security, applications security to protect sensitive information. 

He is giving a security course as Guest Teacher for bachelors students in Brussels and security trainings for professionals on regular basis. He holds multiple vendor certifications.

Renaud has a strong interest in the innovations in Information Security, Network Security, open source, Linux and 'real' cloud computing.


Bring Your Own Malicious Office Documents Workshop


In this workshop, the participants are expected to bring interesting Malicious Office Documents and analyze them.


During the workshop (1.5 hours), I explain how to use the tools (oledump, emldump, YARA rules, ...) I developed to analyze (malicious) Microsoft Office documents.

I have around 30 exercises that explain step by step how to analyze malicious office documents with my Python tools. Microsoft Office is not required for the analysis."


Please read this ISC Diary about taking precautions when handling malware samples before you attend the workshop:



Keywords: maldoc, office, oledump


Bio: Didier Stevens


Didier Stevens (Microsoft MVP, SANS ISC Handler, Wireshark Certified Network Analyst, CISSP, GSSP-C, GCIA, GREM, MCSD .NET, MCSE/Security, MCITP Windows Server 2008, RHCT, CCNP Security, OSWP) is a Senior Security Analyst (NVISO https://www.nviso.be). You can find his open source security tools on his IT security related blog at https://blog.DidierStevens.com.


BSides Luxembourg Organizers





We are still looking for volunteers to help with the tasks at the event (October 20th, 2017), which include, but are not limited to:

  • Registration / Information

  • Audio / Visual

  • Room moderator / Security

  • Speaker wrangling

  • etc. 


In order to become a volunteer, please contact any of the organizers, @BSidesLux or [email protected] !


Tags for flickr, twitter, blog, etc.


Please use the tag #BSidesLuxembourg, #BSidesLux or @BSidesLux for content related to this event!


Comments (0)

You don't have permission to comment on this page.