William Robinet

William manages the technical team behind AS197692 at Conostix S.A. in Luxembourg. He’s been working in cybersecurity using free and opensource software on a daily basis for more than 25 years. Recently, he presented his ASN.1 templating tool at Pass the SALT 2023 in Lille. He contributed to the cleanup and enhancement efforts done on ssldump lately. He particularly enjoys tinkering with open (and not so open) hardware. Currently he likes playing around with new tools in the current ML scene, building, hopefully, useful systems for fun and, maybe, profit. When not behind an intelligent wannabe machine, he's doing analog music with his band of humans.


Sessions

10-22
10:15
90min
Exploring OpenSSH: Hands-On Workshop for Beginners
William Robinet

During this workshop, you will learn how to use the various tools from the
OpenSSH suite. We will start with a presentation of the problems that are solved
by OpenSSH, then we will dive into the details of its most important and useful
features.
Among the topics covered, we will discuss about remote host authentication,
password and public key client authentication, key generation, local and remote
port forwarding, forward and reverse SOCKS proxying, X11 forwarding, jumphosts, connection to legacy systems, and more.

Hands-on exercises will be proposed throughout the exploration of the tool suite
using real-life scenarios. There will be space for questions and discussion.

This workshop is intended for beginners who wants to improve their practical
knowledge and experience with OpenSSH.

Basic networking and Linux shell knowledge are required in order to follow this
workshop. Each participant will need a Linux machine (on which they have root access) with Docker pre-installed and Internet access.

topic: hack.lu
Hollenfels
10-24
10:15
90min
NLP deep-dive: Transformers for Text Mining and Text Generation in Cybersecurity
William Robinet, Pauline Bourmeau (Cookie)

The application of Natural Language Processing (NLP) has become increasingly vital for cybersecurity threat intelligence and response strategies today. NLP plays a crucial role by enabling more accurate and nuanced analyses of potential threats through linguistic techniques. Among other applications, NLP allows quicker categorization of threats based on their nature – such as phishing schemes or anomalous behaviors – and enables prioritizing responses accordingly. NLP can also facilitate the development of content prediction schemes for analysts or provide powerful information extraction tools. We will cover two text-mining techniques that we believe are a good starting point with NLP for analysts and incident responders: sentiment analysis and Named Entity Recognition (NER). While sentiment analysis reveals underlying emotions or biases in social media content potentially linked to malicious activities, NER identifies critical information such as IP addresses, domains, and user details essential for correlating incidents across different data sources.

topic: hack.lu
Hollenfels