Loading…
This event has ended. Visit the official site or create your own event on Sched.
It is an annual, community-driven information security conference held in Prague. The event provides a platform for cybersecurity professionals, enthusiasts, and researchers to share knowledge, exchange ideas, and discuss the latest trends in the field. It’s a unique opportunity to connect with like-minded individuals, expand professional networks, and stay informed about the ever-evolving cybersecurity landscape.
More info at www.bsidesprg.cz

Wednesday April 22, 2026 09:00 - 12:00 CEST
Decrypting agent–server communications is not a subject that can be easily researched (limited information available). Either you find corner cases debugging a binary or quite simple examples using Burp. This workshop covers them all and opens new topics that might be expanded in the future.

Description
Usually, as a pentester or a defender, when it comes to agent-server communications, we always struggle to intercept the data shared between peers. Sometimes, vendors include MITM support or provide an option to disable encryption. However, this is not as common as one might expect. Security by obscurity is still a thing and cannot be easily defeated. Nevertheless, as pentesters, finding workarounds is our job — and that’s the goal of this workshop.

During the workshop, attendees will: - Get a clear overview of the different encryption mechanisms used in the wild (HTTP, HTTPs, TCP, TLS over TCP, mutual TLS). - Learn how to circumvent each of them based on the characteristics of the binary and the protocols used: - Is the binary using HTTP or TPC? - Is it a Golang compiled? - Can we use our own self-signed certificate? - If not, do we have access to the legitimate CA? - Use Frida to dig deeper into more complex situations like mutual TLS. - Learn by practicing with custom binaries per protocol. - Obtain a mindmap for each scenario to speed up their tests - Intercept fast, test faster! - Apply this mindmap for facing a real world tool like Sliver (C2 framework).

If time permits, an extra binary will be launched at the end of the workshop as a miniCTF challenge.

Note: Slides and binaries used during the workshop will be available on GitHub.
Speakers
avatar for Jorge Escabias

Jorge Escabias

Security Engineer
I´m Jorge, a pentester at NATO Communications and Information Agency. I´m from Spain, but I live in Belgium. I studied Mathematics but I hold a Master’s in Cybersecurity (a bit random, I know). My professional career has always been tied to pentesting and presenting my researchs... Read More →
Wednesday April 22, 2026 09:00 - 12:00 CEST
Novotel - WR2 Kateřinská 38, Nové Město, 120 00 Praha-Praha 2, Czechia

Sign up or log in to save this to your schedule, view media, leave feedback and see who's attending!

Share Modal

Share this link via

Or copy link