BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//program.why2025.org//why2025//G77D9K
BEGIN:VTIMEZONE
TZID:CET
BEGIN:STANDARD
DTSTART:20001029T040000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10
TZNAME:CET
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000326T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3
TZNAME:CEST
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-why2025-LHC7QV@program.why2025.org
DTSTART;TZID=CET:20250809T140000
DTEND;TZID=CET:20250809T145000
DESCRIPTION:The SOHO Smashup is a famous category in the IoT focused editio
 n of Pwn2Own. Contestants are challenged to exploit a router from the WAN 
 side and then use that device to exploit a second device on the internal L
 AN. Last year\, we took them up on this challenge and successfully demonst
 rated a 0day exploit chain against a QNAP router and pivoting to a TrueNAS
  system. In this presentation\, we'll describe how we performed our resear
 ch and the vulnerabilities we found.
DTSTAMP:20250731T184745Z
LOCATION:Andromeda
SUMMARY:From WAN to NAS: A Pwn2Own Journey Through the SOHO Attack Surface 
 - Daan Keuper\, Thijs Alkemade
URL:https://program.why2025.org/why2025/talk/LHC7QV/
END:VEVENT
BEGIN:VEVENT
UID:pretalx-why2025-AGVUVM@program.why2025.org
DTSTART;TZID=CET:20250810T200000
DTEND;TZID=CET:20250810T205000
DESCRIPTION:During the first Pwn2Own Automotive\, organised by ZDI in Tokyo
  in January 2024\, Computest Sector 7 successfully demonstrated exploits f
 or vulnerabilities in three different EV-chargers. All three could be expl
 oited to execute arbitrary code on the charger\, with the only prerequisit
 e being close enough to connect to Bluetooth.
DTSTAMP:20250731T184745Z
LOCATION:Andromeda
SUMMARY:Low Energy to High Energy: Hacking nearby EV-chargers over Bluetoot
 h - Daan Keuper\, Thijs Alkemade
URL:https://program.why2025.org/why2025/talk/AGVUVM/
END:VEVENT
BEGIN:VEVENT
UID:pretalx-why2025-DJKYA7@program.why2025.org
DTSTART;TZID=CET:20250811T140000
DTEND;TZID=CET:20250811T145000
DESCRIPTION:Pwn2Own Ireland added a new target in the smarthome category: t
 he Aeotec Smart Hub. We assumed this target would be an easy win. However\
 , getting the firmware of this device turned out te be a lot harder than a
 nticipated. First\, we had to modify the board to dump the encrypted flash
 . Then\, we abused a secure boot flaw to get the decryption key. This proc
 ess took so long\, we had no time left to look for vulnerabilities\, but o
 ur approach may be interesting for others looking at similar targets.
DTSTAMP:20250731T184745Z
LOCATION:Delphinus
SUMMARY:Hacking the Aeotec Smart Hub: The little hub that could - Daan Keup
 er\, Thijs Alkemade
URL:https://program.why2025.org/why2025/talk/DJKYA7/
END:VEVENT
END:VCALENDAR
