{"id":768,"date":"2023-08-31T12:10:17","date_gmt":"2023-08-31T12:10:17","guid":{"rendered":"http:\/\/bsidestirana.al\/?page_id=768"},"modified":"2025-08-15T16:53:52","modified_gmt":"2025-08-15T16:53:52","slug":"schedule","status":"publish","type":"page","link":"https:\/\/bsidestirana.al\/?page_id=768","title":{"rendered":"Schedule"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"768\" class=\"elementor elementor-768\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-541eb62 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"541eb62\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2b6a459\" data-id=\"2b6a459\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-265f25e elementor-widget elementor-widget-heading\" data-id=\"265f25e\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">BSides Tirana 2025<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d229abc elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d229abc\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b092f2d\" data-id=\"b092f2d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4113ac0 elementor-widget elementor-widget-exhibz-schedule\" data-id=\"4113ac0\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"exhibz-schedule.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<section class=\"ts-schedule\">\n    <div class=\"container\">\n        <div class=\"row\">\n            <div class=\"col-lg-6 align-self-center wow fadeInUp\" data-wow-duration=\"1.5s\" data-wow-delay=\"400ms\">\n                <div class=\"ts-schedule-content\">\n                    <h2 class=\"column-title\">\n                        <span><\/span>\n                                            <\/h2>\n                    <p>\n                                            <\/p>\n                <\/div>\n            <\/div>\n            <!-- col end-->\n            <div class=\"col-lg-6 wow fadeInUp\" data-wow-duration=\"1.5s\" data-wow-delay=\"500ms\">\n                <div class=\"ts-schedule-info mb-70\">\n                    <ul class=\"nav nav-tabs\" role=\"tablist\">\n                                                                                    <li class=\"nav-item\" role=\"presentation\">\n                                    <a class=\"active\" title=\"Talks\"\n                                       href=\"#date4113ac01\" role=\"tab\" data-toggle=\"tab\">\n                                        <h3>Talks<\/h3>\n                                        <span>19 September 2025<\/span>\n                                    <\/a>\n                                <\/li>\n                                                                                                                    <li class=\"nav-item\" role=\"presentation\">\n                                    <a title=\"Workshops\" href=\"#date4113ac02\" role=\"tab\" data-toggle=\"tab\">\n                                        <h3>Workshops<\/h3>\n                                                                                    <span>19 September 2025<\/span>\n                                                                            <\/a>\n                                <\/li>\n                                                                                                                    <li class=\"nav-item\" role=\"presentation\">\n                                    <a title=\"Workshop\" href=\"#date4113ac03\" role=\"tab\" data-toggle=\"tab\">\n                                        <h3>Workshop<\/h3>\n                                                                                    <span>18 September 2025<\/span>\n                                                                            <\/a>\n                                <\/li>\n                                                                            <\/ul>\n                    <!-- Tab panes -->\n                <\/div>\n            <\/div>\n            <!-- col end-->\n        <\/div>\n        <!-- row end-->\n        <div class=\"row\">\n            <div class=\"col-lg-12\">\n                <div class=\"tab-content schedule-tabs\">\n                                                                        <div role=\"tabpanel\" class=\"tab-pane active\"\n                                 id=\"date4113ac01\">\n                                                                                                        <div class=\"schedule-listing\">\n                                        <div class=\"schedule-slot-time\">\n                                            <span> 8:30 - 9:00 <\/span>\n\n                                        <\/div>\n                                        <div class=\"schedule-slot-info\">\n                                                                                        <div class=\"schedule-slot-info-content\">\n                                                <p class=\"schedule-speaker speaker-1\">\n                                                                                                    <\/p>\n\n                                                <h3 class=\"schedule-slot-title\">\n                                                    Registration and Networking                                                    <!-- <strong>@ Fredric Martinsson<\/strong> -->\n                                                <\/h3>\n                                                <p>\n                                                    <p>Registration and networking over fresh coffee and pastries.<\/p>                                                <\/p>\n                                            <\/div>\n                                            <!--Info content end -->\n                                        <\/div>\n                                        <!-- Slot info end -->\n                                    <\/div>\n                                                                                                        <div class=\"schedule-listing\">\n                                        <div class=\"schedule-slot-time\">\n                                            <span> 9:00 - 9:15 <\/span>\n\n                                        <\/div>\n                                        <div class=\"schedule-slot-info\">\n                                                                                        <div class=\"schedule-slot-info-content\">\n                                                <p class=\"schedule-speaker speaker-1\">\n                                                                                                    <\/p>\n\n                                                <h3 class=\"schedule-slot-title\">\n                                                    Opening Speech                                                    <!-- <strong>@ Fredric Martinsson<\/strong> -->\n                                                <\/h3>\n                                                <p>\n                                                                                                    <\/p>\n                                            <\/div>\n                                            <!--Info content end -->\n                                        <\/div>\n                                        <!-- Slot info end -->\n                                    <\/div>\n                                                                                                        <div class=\"schedule-listing\">\n                                        <div class=\"schedule-slot-time\">\n                                            <span> 9:15 - 9:55 <\/span>\n\n                                        <\/div>\n                                        <div class=\"schedule-slot-info\">\n                                                                                            <a target=\"_blank\"\n                                                   href=\"https:\/\/bsidestirana.al\/?ts-speaker=1072\">\n                                                    <img decoding=\"async\" width=\"80\" height=\"80\" src=\"https:\/\/bsidestirana.al\/wp-content\/uploads\/2025\/08\/WhatsApp-Image-2025-05-15-at-17.25.56-150x150.jpg\" class=\"schedule-slot-speakers\" alt=\"\" srcset=\"https:\/\/bsidestirana.al\/wp-content\/uploads\/2025\/08\/WhatsApp-Image-2025-05-15-at-17.25.56-150x150.jpg 150w, https:\/\/bsidestirana.al\/wp-content\/uploads\/2025\/08\/WhatsApp-Image-2025-05-15-at-17.25.56-300x300.jpg 300w, https:\/\/bsidestirana.al\/wp-content\/uploads\/2025\/08\/WhatsApp-Image-2025-05-15-at-17.25.56-768x768.jpg 768w, https:\/\/bsidestirana.al\/wp-content\/uploads\/2025\/08\/WhatsApp-Image-2025-05-15-at-17.25.56.jpg 807w\" sizes=\"(max-width: 80px) 100vw, 80px\" \/>                                                <\/a>\n                                                                                        <div class=\"schedule-slot-info-content\">\n                                                <p class=\"schedule-speaker speaker-1\">\n                                                                                                            Valentina Palmiotti                                                                                                    <\/p>\n\n                                                <h3 class=\"schedule-slot-title\">\n                                                    Keynote Speaker                                                    <!-- <strong>@ Fredric Martinsson<\/strong> -->\n                                                <\/h3>\n                                                <p>\n                                                    <p>BSides Tirana 2025 Keynote<\/p>                                                <\/p>\n                                            <\/div>\n                                            <!--Info content end -->\n                                        <\/div>\n                                        <!-- Slot info end -->\n                                    <\/div>\n                                                                                                        <div class=\"schedule-listing\">\n                                        <div class=\"schedule-slot-time\">\n                                            <span> 9:55 - 10:15 <\/span>\n\n                                        <\/div>\n                                        <div class=\"schedule-slot-info\">\n                                                                                            <a target=\"_blank\"\n                                                   href=\"https:\/\/bsidestirana.al\/?ts-speaker=andrey-parshin\">\n                                                    <img decoding=\"async\" width=\"80\" height=\"80\" src=\"https:\/\/bsidestirana.al\/wp-content\/uploads\/2025\/08\/andrey-parshin-150x150.png\" class=\"schedule-slot-speakers\" alt=\"\" srcset=\"https:\/\/bsidestirana.al\/wp-content\/uploads\/2025\/08\/andrey-parshin-150x150.png 150w, https:\/\/bsidestirana.al\/wp-content\/uploads\/2025\/08\/andrey-parshin-300x300.png 300w, https:\/\/bsidestirana.al\/wp-content\/uploads\/2025\/08\/andrey-parshin-1024x1024.png 1024w, https:\/\/bsidestirana.al\/wp-content\/uploads\/2025\/08\/andrey-parshin-768x768.png 768w, https:\/\/bsidestirana.al\/wp-content\/uploads\/2025\/08\/andrey-parshin-1536x1536.png 1536w, https:\/\/bsidestirana.al\/wp-content\/uploads\/2025\/08\/andrey-parshin.png 2000w\" sizes=\"(max-width: 80px) 100vw, 80px\" \/>                                                <\/a>\n                                                                                        <div class=\"schedule-slot-info-content\">\n                                                <p class=\"schedule-speaker speaker-1\">\n                                                                                                            Andrey Parshin                                                                                                    <\/p>\n\n                                                <h3 class=\"schedule-slot-title\">\n                                                    You, But Not You? How Your Digital Identity Becomes a Fraudster\u2019s Mask                                                    <!-- <strong>@ Fredric Martinsson<\/strong> -->\n                                                <\/h3>\n                                                <p>\n                                                    <p class=\"m-b-md\">Cybercriminals are turning to browser fingerprinting as a powerful tool for online fraud. These unique digital signatures, made up of your device, browser, and behavior data, can be stolen and reused to impersonate real users, bypass security systems, and carry out attacks undetected.<br \/>In this session, we will explore how browser fingerprints are collected, how threat actors use them to automate attacks such as credential stuffing, fake account creation, and data scraping, and why traditional defenses often fall short. Most importantly, you will gain actionable strategies to protect your digital identity from these stealthy and rapidly evolving threats.<\/p>                                                <\/p>\n                                            <\/div>\n                                            <!--Info content end -->\n                                        <\/div>\n                                        <!-- Slot info end -->\n                                    <\/div>\n                                                                                                        <div class=\"schedule-listing\">\n                                        <div class=\"schedule-slot-time\">\n                                            <span> 10:15 - 10:35 <\/span>\n\n                                        <\/div>\n                                        <div class=\"schedule-slot-info\">\n                                                                                        <div class=\"schedule-slot-info-content\">\n                                                <p class=\"schedule-speaker speaker-1\">\n                                                                                                            Robert Shala, Armend Gashi                                                                                                    <\/p>\n\n                                                <h3 class=\"schedule-slot-title\">\n                                                    Hijacking AI Agents with ChatML Role Injection                                                    <!-- <strong>@ Fredric Martinsson<\/strong> -->\n                                                <\/h3>\n                                                <p>\n                                                    <p class=\"m-b-md\">Large-language-model wrappers increasingly rely on the \u201cChatML\u201d format to segregate system, assistant, and user roles, yet those delimiters introduce a critical design flaw: there is a role hierarchy but no ChatML\/server-side RBAC or parameter-level trust boundary built in to ChatML or its chat-completions JSON wrapper. Any client that can speak ChatML can also impersonate privilege, similar to the logical flaws of early-2000s web apps. To make it worse: everybody and their mother forked this thing with roles\/privileges but no built-in RBAC pioneered by leading model providers.<\/p><p>In twenty minutes we will walk through the anatomy of that oversight and unveil three vendor-agnostic role-injection techniques that bypass guardrails, trigger unbounded consumption, and hijack function calls in under 50 tokens. We then pivot to parameter pollution, showing how JSON key overrides (temperature, system, tools) can be further used to abuse agents.<\/p>                                                <\/p>\n                                            <\/div>\n                                            <!--Info content end -->\n                                        <\/div>\n                                        <!-- Slot info end -->\n                                    <\/div>\n                                                                                                        <div class=\"schedule-listing\">\n                                        <div class=\"schedule-slot-time\">\n                                            <span> 10:35 - 11:05 <\/span>\n\n                                        <\/div>\n                                        <div class=\"schedule-slot-info\">\n                                                                                            <a target=\"_blank\"\n                                                   href=\"https:\/\/bsidestirana.al\/?ts-speaker=adi-dibra\">\n                                                    <img decoding=\"async\" width=\"80\" height=\"80\" src=\"https:\/\/bsidestirana.al\/wp-content\/uploads\/2023\/08\/adi-dibra-1-e1755255000338-150x150.jpg\" class=\"schedule-slot-speakers\" alt=\"\" \/>                                                <\/a>\n                                                                                        <div class=\"schedule-slot-info-content\">\n                                                <p class=\"schedule-speaker speaker-1\">\n                                                                                                            Adi Dibra                                                                                                    <\/p>\n\n                                                <h3 class=\"schedule-slot-title\">\n                                                    Using Predictive Insights and Red Team Tactics to Fortify Defenses                                                    <!-- <strong>@ Fredric Martinsson<\/strong> -->\n                                                <\/h3>\n                                                <p>\n                                                    <p class=\"m-b-md\">Cyber threats are changing fast, and just reacting to attacks is not enough anymore. In this talk I will explore why thinking like a Red Teamer helps us understand their methods, Tactics, Techniques, and Procedures (TTPs). A representation of how Red Teamers scour the internet, and not only to be one step ahead of Blue Teamers. It is the Blue Teamers job to step up their game in order to make it much harder, more expensive, and less rewarding for the Red Teamers to succeed. Blue Teamers should use the data, not to understand the past but to predict the future.<\/p>                                                <\/p>\n                                            <\/div>\n                                            <!--Info content end -->\n                                        <\/div>\n                                        <!-- Slot info end -->\n                                    <\/div>\n                                                                                                        <div class=\"schedule-listing\">\n                                        <div class=\"schedule-slot-time\">\n                                            <span> 11:05 - 11:25 <\/span>\n\n                                        <\/div>\n                                        <div class=\"schedule-slot-info\">\n                                                                                            <a target=\"_blank\"\n                                                   href=\"https:\/\/bsidestirana.al\/?ts-speaker=erblind-morina\">\n                                                    <img loading=\"lazy\" decoding=\"async\" width=\"80\" height=\"80\" src=\"https:\/\/bsidestirana.al\/wp-content\/uploads\/2025\/08\/erblind-morina-150x150.jpg\" class=\"schedule-slot-speakers\" alt=\"\" srcset=\"https:\/\/bsidestirana.al\/wp-content\/uploads\/2025\/08\/erblind-morina-150x150.jpg 150w, https:\/\/bsidestirana.al\/wp-content\/uploads\/2025\/08\/erblind-morina-300x300.jpg 300w, https:\/\/bsidestirana.al\/wp-content\/uploads\/2025\/08\/erblind-morina.jpg 400w\" sizes=\"(max-width: 80px) 100vw, 80px\" \/>                                                <\/a>\n                                                                                        <div class=\"schedule-slot-info-content\">\n                                                <p class=\"schedule-speaker speaker-1\">\n                                                                                                            Erblind Morina                                                                                                    <\/p>\n\n                                                <h3 class=\"schedule-slot-title\">\n                                                    Cloud IR: A Rapid Guide for AWS, Azure &amp; GCP                                                    <!-- <strong>@ Fredric Martinsson<\/strong> -->\n                                                <\/h3>\n                                                <p>\n                                                    <p class=\"m-b-md\">This presentation walks through how to respond to common cloud attacks, like compromised credentials or lateral movement, across the biggest cloud providers, including AWS, Azure, and GCP. It includes a downloadable cheatsheet to help incident responders quickly identify key log sources, collect forensic artifacts, and take immediate action in case of IR. Real-world tips, scripts, and IBM X-Force Incident Response best practices will help teams boost readiness and real-time response for cloud-related cases.<\/p>                                                <\/p>\n                                            <\/div>\n                                            <!--Info content end -->\n                                        <\/div>\n                                        <!-- Slot info end -->\n                                    <\/div>\n                                                                                                        <div class=\"schedule-listing\">\n                                        <div class=\"schedule-slot-time\">\n                                            <span> 11:25 - 11:45 <\/span>\n\n                                        <\/div>\n                                        <div class=\"schedule-slot-info\">\n                                                                                            <a target=\"_blank\"\n                                                   href=\"https:\/\/bsidestirana.al\/?ts-speaker=phil-keeble\">\n                                                    <img loading=\"lazy\" decoding=\"async\" width=\"80\" height=\"80\" src=\"https:\/\/bsidestirana.al\/wp-content\/uploads\/2025\/08\/phil-keeble-150x150.png\" class=\"schedule-slot-speakers\" alt=\"\" \/>                                                <\/a>\n                                                                                        <div class=\"schedule-slot-info-content\">\n                                                <p class=\"schedule-speaker speaker-1\">\n                                                                                                            Phil Keeble                                                                                                    <\/p>\n\n                                                <h3 class=\"schedule-slot-title\">\n                                                    Compromising backups for fun and profit                                                    <!-- <strong>@ Fredric Martinsson<\/strong> -->\n                                                <\/h3>\n                                                <p>\n                                                    <p class=\"m-b-md\">In this talk the attack surface of Veeam and Rubrik will be explored. Veeam and Rubrik are two very common domain backup solutions with various components and they are a guaranteed critical objective for red teamers. Some ways of compromising them will be explored and a new BOF will be discussed for the decryption of credentials which allowed for our red team to pivot through a tightly secured red forest recently by owning Veeam. Rubrik will also be explored as an alternate option to see how it is structured and explore possibilities.<\/p>                                                <\/p>\n                                            <\/div>\n                                            <!--Info content end -->\n                                        <\/div>\n                                        <!-- Slot info end -->\n                                    <\/div>\n                                                                                                        <div class=\"schedule-listing\">\n                                        <div class=\"schedule-slot-time\">\n                                            <span> 11:45 - 12:45 <\/span>\n\n                                        <\/div>\n                                        <div class=\"schedule-slot-info\">\n                                                                                        <div class=\"schedule-slot-info-content\">\n                                                <p class=\"schedule-speaker speaker-1\">\n                                                                                                    <\/p>\n\n                                                <h3 class=\"schedule-slot-title\">\n                                                    Panel Discussion                                                    <!-- <strong>@ Fredric Martinsson<\/strong> -->\n                                                <\/h3>\n                                                <p>\n                                                    <p>TBD<\/p>                                                <\/p>\n                                            <\/div>\n                                            <!--Info content end -->\n                                        <\/div>\n                                        <!-- Slot info end -->\n                                    <\/div>\n                                                                                                        <div class=\"schedule-listing\">\n                                        <div class=\"schedule-slot-time\">\n                                            <span> 12:45 - 13:45 <\/span>\n\n                                        <\/div>\n                                        <div class=\"schedule-slot-info\">\n                                                                                        <div class=\"schedule-slot-info-content\">\n                                                <p class=\"schedule-speaker speaker-1\">\n                                                                                                    <\/p>\n\n                                                <h3 class=\"schedule-slot-title\">\n                                                    Lunch Break                                                    <!-- <strong>@ Fredric Martinsson<\/strong> -->\n                                                <\/h3>\n                                                <p>\n                                                                                                    <\/p>\n                                            <\/div>\n                                            <!--Info content end -->\n                                        <\/div>\n                                        <!-- Slot info end -->\n                                    <\/div>\n                                                                                                        <div class=\"schedule-listing\">\n                                        <div class=\"schedule-slot-time\">\n                                            <span> 13:50 - 14:20 <\/span>\n\n                                        <\/div>\n                                        <div class=\"schedule-slot-info\">\n                                                                                            <a target=\"_blank\"\n                                                   href=\"https:\/\/bsidestirana.al\/?ts-speaker=berk-imran\">\n                                                    <img loading=\"lazy\" decoding=\"async\" width=\"80\" height=\"80\" src=\"https:\/\/bsidestirana.al\/wp-content\/uploads\/2025\/08\/berk-imran-150x150.jpg\" class=\"schedule-slot-speakers\" alt=\"\" srcset=\"https:\/\/bsidestirana.al\/wp-content\/uploads\/2025\/08\/berk-imran-150x150.jpg 150w, https:\/\/bsidestirana.al\/wp-content\/uploads\/2025\/08\/berk-imran-300x300.jpg 300w, https:\/\/bsidestirana.al\/wp-content\/uploads\/2025\/08\/berk-imran-1020x1024.jpg 1020w, https:\/\/bsidestirana.al\/wp-content\/uploads\/2025\/08\/berk-imran-768x771.jpg 768w, https:\/\/bsidestirana.al\/wp-content\/uploads\/2025\/08\/berk-imran.jpg 1218w\" sizes=\"(max-width: 80px) 100vw, 80px\" \/>                                                <\/a>\n                                                                                        <div class=\"schedule-slot-info-content\">\n                                                <p class=\"schedule-speaker speaker-1\">\n                                                                                                            Berk Imran                                                                                                    <\/p>\n\n                                                <h3 class=\"schedule-slot-title\">\n                                                    Red Team Activities in Civil Aviation                                                    <!-- <strong>@ Fredric Martinsson<\/strong> -->\n                                                <\/h3>\n                                                <p>\n                                                    <p class=\"m-b-md\">This talk presents an in-depth red team analysis of civil aviation systems, focusing on critical vulnerabilities in protocols used by aircraft during flight and landing. The session explores how attackers can manipulate the Instrument Landing System (ILS) to divert aircraft during low-visibility landings, how the ACAS\/TCAS collision-avoidance system can be exploited to trigger mid-air collision risks, and how spoofing the ADS-B protocol can mislead air traffic controllers with false aircraft data. The presentation includes real-world simulations, attack vectors, and defense recommendations to enhance aviation cybersecurity awareness and resilience.<\/p>                                                <\/p>\n                                            <\/div>\n                                            <!--Info content end -->\n                                        <\/div>\n                                        <!-- Slot info end -->\n                                    <\/div>\n                                                                                                        <div class=\"schedule-listing\">\n                                        <div class=\"schedule-slot-time\">\n                                            <span> 14:20 - 14:50 <\/span>\n\n                                        <\/div>\n                                        <div class=\"schedule-slot-info\">\n                                                                                            <a target=\"_blank\"\n                                                   href=\"https:\/\/bsidestirana.al\/?ts-speaker=vangelis-stykas\">\n                                                    <img loading=\"lazy\" decoding=\"async\" width=\"80\" height=\"80\" src=\"https:\/\/bsidestirana.al\/wp-content\/uploads\/2025\/08\/vangelis-stykas-150x150.png\" class=\"schedule-slot-speakers\" alt=\"\" srcset=\"https:\/\/bsidestirana.al\/wp-content\/uploads\/2025\/08\/vangelis-stykas-150x150.png 150w, https:\/\/bsidestirana.al\/wp-content\/uploads\/2025\/08\/vangelis-stykas-300x297.png 300w, https:\/\/bsidestirana.al\/wp-content\/uploads\/2025\/08\/vangelis-stykas-768x762.png 768w, https:\/\/bsidestirana.al\/wp-content\/uploads\/2025\/08\/vangelis-stykas.png 832w\" sizes=\"(max-width: 80px) 100vw, 80px\" \/>                                                <\/a>\n                                                                                        <div class=\"schedule-slot-info-content\">\n                                                <p class=\"schedule-speaker speaker-1\">\n                                                                                                            Vangelis Stykas                                                                                                    <\/p>\n\n                                                <h3 class=\"schedule-slot-title\">\n                                                    Behind Enemy Lines: Engaging and Disrupting Ransomware Web Panels                                                    <!-- <strong>@ Fredric Martinsson<\/strong> -->\n                                                <\/h3>\n                                                <p>\n                                                    <p class=\"m-b-md\">Ransomware groups have become notably proficient at wreaking havoc across various sectors, but we can turn the tables. However, a less explored avenue in the fight against these digital adversaries lies in the proactive offense against their web panels. In this presentation, I will delve into the strategies and methodologies for infiltrating and commandeering the web panels used by ransomware groups to manage their malicious operations or the APIs used during their initial exfiltration of data.<\/p><p>I will demonstrate how to leverage these vulnerabilities to gain unauthorized access to the ransomware groups' web panels. This access not only disrupts their operations but also opens a window to gather intelligence and potentially identify the operators behind those APTs. Let\u2019s explore the frontiers of cyber offense, targeting the very command and control (C2) centers that ransomware groups rely on, turning the tables in our ongoing battle against cyber threats. It\u2019s our turn to wreak havoc..<\/p>                                                <\/p>\n                                            <\/div>\n                                            <!--Info content end -->\n                                        <\/div>\n                                        <!-- Slot info end -->\n                                    <\/div>\n                                                                                                        <div class=\"schedule-listing\">\n                                        <div class=\"schedule-slot-time\">\n                                            <span> 14:50 - 15:20 <\/span>\n\n                                        <\/div>\n                                        <div class=\"schedule-slot-info\">\n                                                                                            <a target=\"_blank\"\n                                                   href=\"https:\/\/bsidestirana.al\/?ts-speaker=nick-dunn\">\n                                                    <img loading=\"lazy\" decoding=\"async\" width=\"80\" height=\"80\" src=\"https:\/\/bsidestirana.al\/wp-content\/uploads\/2023\/08\/nick-dunn-150x150.jpg\" class=\"schedule-slot-speakers\" alt=\"\" \/>                                                <\/a>\n                                                                                        <div class=\"schedule-slot-info-content\">\n                                                <p class=\"schedule-speaker speaker-1\">\n                                                                                                            Nick Dunn                                                                                                    <\/p>\n\n                                                <h3 class=\"schedule-slot-title\">\n                                                    Using the OWASP Top 10 to Save the Astronauts from HAL                                                    <!-- <strong>@ Fredric Martinsson<\/strong> -->\n                                                <\/h3>\n                                                <p>\n                                                    <p class=\"m-b-md\">A discussion of the OWASP ML Top 10 and OWASP LLM Top 10, and how a failure to apply these principles in the movie 2001 A Space Odyssey, led to disastrous consequences for the crew.<\/p><p>The talk will use the OWASP Top 10 for ML and OWASP Top 10 for LLMs to anyalze the nature of the flaws in HAL 9000, the AI in 2001: A Space Odyssey, and how this led to disastrous results for the mission.<br \/>There will be a discussion of failures to consider different aspects of both the LLM and ML top 10 during HAL's design and training phases, and the subsequent attempts to implement fixes during the mission. Each omission or failure to apply an OWASP principle, that led to the vulnerabilities will be discussed in detail, and also related to real life applications, to ensure the talk isn't just a geeky discussion of a cool-looking scf-fi AI.<\/p>                                                <\/p>\n                                            <\/div>\n                                            <!--Info content end -->\n                                        <\/div>\n                                        <!-- Slot info end -->\n                                    <\/div>\n                                                                                                        <div class=\"schedule-listing\">\n                                        <div class=\"schedule-slot-time\">\n                                            <span> 15:20 - 15:40 <\/span>\n\n                                        <\/div>\n                                        <div class=\"schedule-slot-info\">\n                                                                                        <div class=\"schedule-slot-info-content\">\n                                                <p class=\"schedule-speaker speaker-1\">\n                                                                                                    <\/p>\n\n                                                <h3 class=\"schedule-slot-title\">\n                                                    Coffee Break                                                    <!-- <strong>@ Fredric Martinsson<\/strong> -->\n                                                <\/h3>\n                                                <p>\n                                                                                                    <\/p>\n                                            <\/div>\n                                            <!--Info content end -->\n                                        <\/div>\n                                        <!-- Slot info end -->\n                                    <\/div>\n                                                                                                        <div class=\"schedule-listing\">\n                                        <div class=\"schedule-slot-time\">\n                                            <span> 15:40 - 16:00 <\/span>\n\n                                        <\/div>\n                                        <div class=\"schedule-slot-info\">\n                                                                                            <a target=\"_blank\"\n                                                   href=\"https:\/\/bsidestirana.al\/?ts-speaker=andi-ahmeti\">\n                                                    <img loading=\"lazy\" decoding=\"async\" width=\"80\" height=\"80\" src=\"https:\/\/bsidestirana.al\/wp-content\/uploads\/2024\/08\/andi-ahmeti-e1755276641273-150x150.jpg\" class=\"schedule-slot-speakers\" alt=\"\" srcset=\"https:\/\/bsidestirana.al\/wp-content\/uploads\/2024\/08\/andi-ahmeti-e1755276641273-150x150.jpg 150w, https:\/\/bsidestirana.al\/wp-content\/uploads\/2024\/08\/andi-ahmeti-e1755276641273-300x297.jpg 300w, https:\/\/bsidestirana.al\/wp-content\/uploads\/2024\/08\/andi-ahmeti-e1755276641273-768x760.jpg 768w, https:\/\/bsidestirana.al\/wp-content\/uploads\/2024\/08\/andi-ahmeti-e1755276641273.jpg 920w\" sizes=\"(max-width: 80px) 100vw, 80px\" \/>                                                <\/a>\n                                                                                        <div class=\"schedule-slot-info-content\">\n                                                <p class=\"schedule-speaker speaker-1\">\n                                                                                                            Andi Ahmeti                                                                                                    <\/p>\n\n                                                <h3 class=\"schedule-slot-title\">\n                                                    Inbox Under Siege: Real-World BEC Attacks, Tactics &amp; Lessons Learned                                                    <!-- <strong>@ Fredric Martinsson<\/strong> -->\n                                                <\/h3>\n                                                <p>\n                                                    <p class=\"m-b-md\">Business Email Compromise (BEC) remains one of the most lucrative and evolving cyber threats, costing organizations billions annually. This session takes a deep dive into real-world BEC attacks, dissecting the tactics used by adversaries, from social engineering and credential theft to the abuse of inbox rules for stealthy persistence. Attendees will gain insights into how attackers manipulate trust, bypass security measures, and execute fraudulent transactions\u2014often without triggering traditional alerts.<\/p><p>Using real case studies, we\u2019ll explore how inbox rules play a critical role in concealing fraudulent communications, intercepting emails, and evading detection. The session will also cover detection strategies and actionable defenses to help security teams stay ahead of BEC threats.<\/p><p>Whether you're in threat hunting, incident response, or security leadership, this talk will provide practical takeaways to better protect your organization from BEC attacks.<\/p>                                                <\/p>\n                                            <\/div>\n                                            <!--Info content end -->\n                                        <\/div>\n                                        <!-- Slot info end -->\n                                    <\/div>\n                                                                                                        <div class=\"schedule-listing\">\n                                        <div class=\"schedule-slot-time\">\n                                            <span> 16:00 - 16:30 <\/span>\n\n                                        <\/div>\n                                        <div class=\"schedule-slot-info\">\n                                                                                            <a target=\"_blank\"\n                                                   href=\"https:\/\/bsidestirana.al\/?ts-speaker=georg-ph-e-heise\">\n                                                    <img loading=\"lazy\" decoding=\"async\" width=\"80\" height=\"80\" src=\"https:\/\/bsidestirana.al\/wp-content\/uploads\/2025\/08\/georg-ph.-e.-heise-1-e1755270178100-150x150.jpg\" class=\"schedule-slot-speakers\" alt=\"\" \/>                                                <\/a>\n                                                                                        <div class=\"schedule-slot-info-content\">\n                                                <p class=\"schedule-speaker speaker-1\">\n                                                                                                            Georg Ph. E. Heise                                                                                                    <\/p>\n\n                                                <h3 class=\"schedule-slot-title\">\n                                                    Breaking Bad AD: What Red Teams Wish You&#039;d Fix Yesterday                                                    <!-- <strong>@ Fredric Martinsson<\/strong> -->\n                                                <\/h3>\n                                                <p>\n                                                    <p class=\"m-b-md\">Active Directory (AD) remains a cornerstone of enterprise IT infrastructure, yet it often harbours misconfigurations that adversaries exploit with alarming ease. Despite advancements in security practices, many organisations continue to grapple with outdated software, excessive permissions, and neglected configurations, leaving them vulnerable to sophisticated attacks.<\/p><p>This session will examine real-world scenarios in which mismanaged AD environments could have led to significant security breaches. We\u2019ll also look into how this could have been avoided and how small- to medium-sized businesses can have an up-to-date Active Directory that makes adversaries' lives hard.<\/p>                                                <\/p>\n                                            <\/div>\n                                            <!--Info content end -->\n                                        <\/div>\n                                        <!-- Slot info end -->\n                                    <\/div>\n                                                                                                        <div class=\"schedule-listing\">\n                                        <div class=\"schedule-slot-time\">\n                                            <span> 16:30 - 17:00 <\/span>\n\n                                        <\/div>\n                                        <div class=\"schedule-slot-info\">\n                                                                                        <div class=\"schedule-slot-info-content\">\n                                                <p class=\"schedule-speaker speaker-1\">\n                                                                                                    <\/p>\n\n                                                <h3 class=\"schedule-slot-title\">\n                                                    Closing Speech                                                    <!-- <strong>@ Fredric Martinsson<\/strong> -->\n                                                <\/h3>\n                                                <p>\n                                                    <ul><li>Closing speech<\/li><li>Announcement of Capture the Flag winners<\/li><\/ul>                                                <\/p>\n                                            <\/div>\n                                            <!--Info content end -->\n                                        <\/div>\n                                        <!-- Slot info end -->\n                                    <\/div>\n                                                                <!--schedule-listing end -->\n                            <\/div>\n                                                                                                    <div role=\"tabpanel\" class=\"tab-pane\"\n                                 id=\"date4113ac02\">\n                                                                                                        <div class=\"schedule-listing\">\n                                        <div class=\"schedule-slot-time\">\n                                            <span> 10:30 - 11:45 <\/span>\n\n                                        <\/div>\n                                        <div class=\"schedule-slot-info\">\n                                                                                            <a target=\"_blank\"\n                                                   href=\"https:\/\/bsidestirana.al\/?ts-speaker=blerim-jahiu\">\n                                                    <img decoding=\"async\" class=\"schedule-slot-speakers\"\n                                                         src=\"https:\/\/bsidestirana.al\/wp-content\/uploads\/2025\/08\/blerim-jahiu.jpg\"\n                                                         alt=\" Use of AI in offensive Cybersecurity , Integration of ShellGPT into Parrot Security or Kali Linux\">\n                                                <\/a>\n                                                                                        <div class=\"schedule-slot-info-content\">\n\n                                                <p class=\"schedule-speaker speaker-1\">\n                                                                                                            Blerim Jahiu                                                                                                    <\/p>\n\n                                                <h3 class=\"schedule-slot-title\">\n                                                    Use of AI in offensive Cybersecurity , Integration of ShellGPT into Parrot Security or Kali Linux                                                    <!-- <strong>@ Fredric Martinsson <\/strong> -->\n                                                <\/h3>\n                                                <p>\n                                                    <p>Use of AI in Offensive Cybersecurity<\/p><p>This workshop explores the transformative role of Artificial Intelligence (AI) in offensive cybersecurity. Participants will gain insights into the evolution of offensive security, from traditional penetration testing to the integration of AI-powered automated attacks. The session will highlight key AI technologies, including machine learning, natural language processing (NLP), and deep learning, and their applications in reconnaissance, exploitation, and post-exploitation phases.<\/p><ul><li>Key topics covered include:<\/li><li>The evolution of offensive cybersecurity techniques<\/li><li>Advantages and risks of using AI in red-teaming operations<\/li><li>How AI can enhance the speed, precision, and scalability of attacks<\/li><li>Ethical and legal considerations in the use of AI in offensive campaigns<\/li><li>Future trends, including autonomous red team agents and multimodal AI<\/li><\/ul><p>The workshop will feature live demonstrations of AI tools like ShellGPT in a Linux terminal, showing practical applications of AI in real-world offensive security scenarios. Participants will leave with a deeper understanding of how AI is shaping the future of cybersecurity and how to responsibly integrate these tools into their operations.<\/p>                                                <\/p>\n                                            <\/div>\n                                            <!--Info content end -->\n                                        <\/div>\n                                        <!-- Slot info end -->\n                                    <\/div>\n                                                                                                        <div class=\"schedule-listing\">\n                                        <div class=\"schedule-slot-time\">\n                                            <span> 13:30 - 16:00 <\/span>\n\n                                        <\/div>\n                                        <div class=\"schedule-slot-info\">\n                                                                                            <a target=\"_blank\"\n                                                   href=\"https:\/\/bsidestirana.al\/?ts-speaker=robert-shala\">\n                                                    <img decoding=\"async\" class=\"schedule-slot-speakers\"\n                                                         src=\"https:\/\/bsidestirana.al\/wp-content\/uploads\/2024\/08\/robert-shala.jpg\"\n                                                         alt=\" Wargaming Cyber Persistence - \u201cExploitation, Not Coercion\u201d\">\n                                                <\/a>\n                                                                                        <div class=\"schedule-slot-info-content\">\n\n                                                <p class=\"schedule-speaker speaker-1\">\n                                                                                                            Robert Shala                                                                                                    <\/p>\n\n                                                <h3 class=\"schedule-slot-title\">\n                                                    Wargaming Cyber Persistence - \u201cExploitation, Not Coercion\u201d                                                    <!-- <strong>@ Fredric Martinsson <\/strong> -->\n                                                <\/h3>\n                                                <p>\n                                                    <p class=\"m-b-md\">Exploitation, Not Coercion is a strategic\/operational level wargame designed to explore the realities of contemporary state-sponsored cyber operations. Unlike traditional conflict that is shaped by coercive dynamics, this game is built on the concepts of cyber persistence theory, persistent engagement, and the dynamics of continuously converting exploitation into meaningful, strategic outcomes. Players take on the roles of CMU\/APT units, building capacities and managing resource constraints to achieve strategic goals. Through asymmetric objectives, asymmetric capabilities, and dynamic resource allocation, the game models real-world challenges such as:<\/p><ul><li class=\"m-b-md\">Managing talent, equities, and capability pipelines<\/li><li class=\"m-b-md\">Gaining and maintaining access in changing environments<\/li><li class=\"m-b-md\">Managing stealth and operational security<\/li><li class=\"m-b-md\">Trade-offs between speed, scale, scope, and long-term persistence.<\/li><\/ul><p class=\"m-b-md\">The workshop blends hands-on gameplay with strategic discussion, giving participants insight into both the technical and strategic dimensions of cyber conflict.<\/p>                                                <\/p>\n                                            <\/div>\n                                            <!--Info content end -->\n                                        <\/div>\n                                        <!-- Slot info end -->\n                                    <\/div>\n                                                                <!--schedule-listing end -->\n                            <\/div>\n                                                                                                    <div role=\"tabpanel\" class=\"tab-pane\"\n                                 id=\"date4113ac03\">\n                                                                                                        <div class=\"schedule-listing\">\n                                        <div class=\"schedule-slot-time\">\n                                            <span> 9:00 - 17:00 <\/span>\n\n                                        <\/div>\n                                        <div class=\"schedule-slot-info\">\n                                                                                            <a target=\"_blank\"\n                                                   href=\"https:\/\/bsidestirana.al\/?ts-speaker=sina-kheirkhah\">\n                                                    <img decoding=\"async\" class=\"schedule-slot-speakers\"\n                                                         src=\"https:\/\/bsidestirana.al\/wp-content\/uploads\/2025\/08\/1749462781306.jpeg\"\n                                                         alt=\" Advanced .NET Exploitation Workshop (BSides Tirana 2025)\">\n                                                <\/a>\n                                                                                        <div class=\"schedule-slot-info-content\">\n\n                                                <p class=\"schedule-speaker speaker-1\">\n                                                                                                            Sina Kheirkhah                                                                                                    <\/p>\n\n                                                <h3 class=\"schedule-slot-title\">\n                                                    Advanced .NET Exploitation Workshop (BSides Tirana 2025)                                                    <!-- <strong>@ Fredric Martinsson <\/strong> -->\n                                                <\/h3>\n                                                <p>\n                                                    <h3><strong>About the workshop<\/strong><\/h3><p>Join us for a special 1-day hands-on workshop with the Summoning Team, based on their acclaimed Advanced .NET Exploitation Training (normally \u20ac4K). You'll dive into real-world .NET exploitation techniques, learn to chain bugs, bypass mitigations, and pop shells \u2014 all in a friendly and practical environment.<\/p><p>Taught by Sina Kheirkhah (@SinSinology), Pwn2Own \"Master of Pwn\"<\/p><p>Learn from one of the best in the game!<\/p><p>Spots are limited. Don\u2019t miss it!<\/p><p><strong>Coffee, food &amp; snacks included<\/strong><\/p><p>Buy Tickets: https:\/\/www.eventbrite.com\/e\/advanced-net-exploitation-workshop-bsides-tirana-2025-tickets-1404861551719?aff=oddtdtcreator<\/p>                                                <\/p>\n                                            <\/div>\n                                            <!--Info content end -->\n                                        <\/div>\n                                        <!-- Slot info end -->\n                                    <\/div>\n                                                                <!--schedule-listing end -->\n                            <\/div>\n                                                                <\/div>\n            <\/div>\n        <\/div>\n    <\/div>\n    <!-- container end-->\n<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>BSides Tirana 2025 Talks 19 September 2025 Workshops 19 September 2025 8:30 &#8211; 9:00 Registration and Networking Registration and networking over fresh coffee and pastries. 9:00 &#8211; 9:15 Opening Speech 9:15 &#8211; 9:55 Valentina Palmiotti Keynote Speaker BSides Tirana 2025 Keynote 9:55 &#8211; 10:15 Andrey Parshin You, But Not You? How Your Digital Identity Becomes [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-768","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/bsidestirana.al\/index.php?rest_route=\/wp\/v2\/pages\/768","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bsidestirana.al\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/bsidestirana.al\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/bsidestirana.al\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bsidestirana.al\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=768"}],"version-history":[{"count":78,"href":"https:\/\/bsidestirana.al\/index.php?rest_route=\/wp\/v2\/pages\/768\/revisions"}],"predecessor-version":[{"id":1196,"href":"https:\/\/bsidestirana.al\/index.php?rest_route=\/wp\/v2\/pages\/768\/revisions\/1196"}],"wp:attachment":[{"href":"https:\/\/bsidestirana.al\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=768"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}