• WHAT

    REcon is a computer security conference with a focus on reverse engineering and advanced exploitation techniques.

    REcon will be held for the second time in Brussels, Belgium. It offers a single track of presentations over the span of three days with a focus on reverse engineering and advanced exploitation techniques.

    For more information, including pricing and hotel reservation details, head over to the conference page.

    WHEN

    Conference: February 2 - 4, 2018

    Training: January 29 to February 1 2018

    WHERE

    REcon will be held in Brussels, Belgium, at The Egg.

    REGISTER

    Trainings registrations are now open.

    Conference registration is now open.

  • Recon Brussels 2018 - Schedule

    You can see the full schedule here

  • The Reverseer

    roger

    lore

    You know what to do! [Roger svg] [Lore svg] [reconGothic.ttf]
    CC BY-NC-SA

  • Announcing talks for Brussels 2018

    Good news everyone !

    Here is the list of selected talks for Recon Brussels 2018.


    • Breaking state-of-the-art binary code obfuscation - A program synthesis based approach

      – by Tim Blazytko & Moritz Contag

    • Decompiler internals: microcode

      – Ilfak Guilfanov

    • DIY ARM Debugger for Wi-Fi Chips

      – by Matthias Schulz

    • Dissecting QNX - Analyzing & Breaking QNX Exploit Mitigations and Secure Random Number Generators

      – by Ali Abbasi & Jos Wetzels

    • Hacking Toshiba Laptops - Or how to mess up your firmware security

      – by Michał Kowalczyk & Serge Bazanski

    • Linux Vulnerabilities, Windows Exploits: Escalating Privileges with WSL

      – by Saar Amar

    • Mess with the best, die like the rest (mode).

      – by Volodymyr Pikhur

    • Neurosurgery for Industrial Routers: Security of Sarian OS

      – by Danila Parnishchev

    • Reverse Engineering Windows Defender’s JavaScript Engine

      – by Alexei Bulazel

    • Reversing IoT: Xiaomi ecosystem - Gain cloud independence and additional functionality by firmware modification

      – by Dennis Giese & Daniel Wegemer

    • Robin Hood vs Cisco ASA AnyConnect - Discovering and exploiting a vulnerability in your firewall

      – by Cedric Halbronn

    • Starcraft: Emulating a buffer overflow for fun and profit

      – by Elias “@0xeb” Bachaalany

    • Subverting your server through its BMC: the HPE iLO4 case

      – by Alexandre Gazet, Joffrey Czarny & Fabien Perigaud

    • Visiting The Snake Nest

      – by Matthieu Faou & Jean-Ian Boutin

    • When Virtual Hell Freezes Over - Reversing C++ Code

      – by Gal Zaban

  • The first round of talks has been selected, CFP extension, and extra goodies!

    …A short break in the static…

    Hello everyone, apologies for the extended radio silence.

    Firstly, we would like to congratulate the submitters who have been selected for the first phase of the CFP!
    They are:

    • Breaking state-of-the-art binary code obfuscation

      – by Tim Blazytko and Moritz Contag

    • DIY ARM Debugger for Wi-Fi Chips

      – by Matthias Schulz

    • Reverse Engineering Windows Defender’s JavaScript Engine

      – by Alexei Bulazel

    • Starcraft: Emulating a buffer overflow for fun and profit

      – by Elias Bachaalany

    • Subverting your server through its BMC: the HPE iLO4 case

      – by Alexandre Gazet, Joffrey Czarny and Fabien Perigaud

    Additionally, the late birds might be excited to hear that we are extending the CFP until November 27th! There is still some time to get your submissions in for REcon Brussels 2018!

    And as a small treat before the holidays, the REcon Montreal 2017 recordings are starting appear online!

    +++ATH0

    …N0 C4RR13R…

  • Recon BRX 2018 CFP

    The REcon Brussels 2018 CFP and Trainings have been announced!

  • Announcing REcon Brussels 2017 Recordings

    We have just released the REcon Brussels 2017 recordings !

  • Announcing REcon Brussels 2017 Slides

    Here are the REcon Brussels 2017 slides !

subscribe via RSS