About Us

iHack Ottawa is an immersive cybersecurity conference and capture-the-flag event hosted every summer in Ottawa. Each year we provide our valued attendees with hands-on workshops, villages, competitions, and talks covering a wide range of cybersecurity topics including forensics, reverse engineering, exploitation, and defense. Our goal is to ensure a fun, inclusive, safe, and vibrant learning environment for all our attendees in an effort to narrow the global cybersecurity skills gap the world is facing.

This year we are pleased to offer our attendees with access to 5 talks, 3 workshops, 3 villages, and an all-night international CTF!

Our Mandate

1. Foster the growth and development of Canada’s next generation of cyber-warriors.

2. Provide an immersive cybersecurity learning experience by complementing academic and government initiatives.

3. Champion the advancement of women and people of diverse backgrounds in cybersecurity careers.

Event Schedule - Register Now!

The moral of the story is, we're here on Earth to fart around. And, of course, the computers will do us out of that. And, what the computer people don't realize, or they don't care, is we're dancing animals. You know, we love to move around. And, we're not supposed to dance at all anymore.

Day 1
Lockpick Village
IoT Village
RFID Village
Talks (Room 2200)
Lockpick Village (Room 3220)

If you can abide by these simple guidelines then members of the Ottawa LockSport Group would like to share with you the inner workings of locks, how lock picking works and give you a chance to try picking a variety of different types of locks.

- Never pick a lock you do not have permission to open
- Never pick a lock you depend on (like your front door)

The Ottawa Lock picking Enthusiasts (
https://www.meetup.com/Ottawa-Lockpicking-Enthusiasts/) includes people with a wide range of careers/experiences but is predominately IT Professionals interested in understanding how things work. These skills may also prove invaluable for Penetration Testing and helping absent minded friends.

Lock picking is a very rewarding experience and in under and hour many people are able to master the techniques and get the thrill of opening some of the most common padlocks available. Other hands on training will include lock pinning, handcuffs and bypass tools

12:30 - 17:00
Session logo
A Gentle Introduction To Fuzzing (Room 3228)

Fuzzing could be summed up as a testing method feeding random inputs to a program. Where a more traditional approach to testing relies on manual design of tests based on known assumptions, fuzzing bring an automated mean of creating test cases. Although a single test generated by a fuzzer is unlikely to find any defaults, millions of them in quick iterations makes it very likely to trigger unexpected behaviours and crashes. With the rise of smarter fuzzers, fuzzing has become an efficient and reliable way to test most edge cases of a program and makes it possible to cover very large programs that would require otherwise a large amount of effort from manual reviewing and testing. The low amount of manual intervention required to setup a modern smart fuzzer dismiss any pretexts a developer or security research might have to not fuzz its project. If you aren't fuzzing, the bad guys will (and find all the bugs that comes with it).

This workshop aims to introduce the basic concepts of fuzzing to the participants and to enable them to make fuzzing a critical step of their testing process. The class is going to start with a quick introduction about the concepts of fuzzing, why they should do it and some benefits other organizations have gain from it. The workshop will then move on to a hands-on approach on how to set up AFL and run it against a program and how to interpret the outputs. Most of the exercise will turn around a sample program with intentional bugs and gotchas, and once the participants will have an understanding of the basis, they will be walked through real world scenarios. Finally, a time will be allocated at the end for the participants to fuzz a project of their choice with the assistance of the presenters.

For a better experience participants must:
- Bring their own laptops with a working Docker installation. Docker will be used to give a proper AFL working environment to all participants. No support will be provided for participants running AFL outside of the provided Docker image. We might be able to provide remote environments through ssh. In any case, it is likely to be slow and suboptimal to quickly find crashes with AFL.
For a better experience we encourage participants to:
- Have a basic knowledge of C and common C vulnerabilities (Buffer Overflow, Format String, etc). The workshop won’t cover the exploitation of found crashes, but it might be more helpful to understand why those crashes happen and what can be done from them.
- Command-line knowledge, particularly how to build a program with gcc from the command-line interface.

13:30 - 16:00
David Manouchehri avatar
Jean-marc Le Blanc avatar
Session logo
Hiveplots for Binary Analysis

Hive plots, first described by Krzywinski, Birol, Jones and Marra (please see http://www.hiveplot.com/) can be used to visualize hierarchical data along where the nodes have an ordering. This has been applied to genomes and source code bases. We demonstrate (via pretty pictures!) the application of hive plots to static- and dynamic- analysis of binaries. The scripts for creating the hiveplots are published on github: https://github.com/cloakware-ctf/idascripts. We examine hive plots of static-analysis CALL cross-references and show some alternate perspectives of binaries as well.

14:30 - 15:00
Ben Gardiner avatar
Session logo

Our Partners

Our Sponsors

This website uses cookies. By continuing to browse you agree to this and Conferize's terms of service.