On the 1st of January 2009, the IT activity, related to the corporate headquarter of the Sonelgaz Group , was converted into a joint stock company, named "EL Djazair Information Technology", identified by the abbreviation "ELIT Spa".
ELIT was created to meet
A strategy of Sonelgaz Group to develop proper means of project management in the IT and Information Systems field, and to have a pole of technological skills in the service of his companies.
The will of the Sonelgaz Group to entrust the property of Information Systems at a specialized entity and focus the capabilities of its other companies on their respective core businesses.
The services provided by ELIT address
Development of business applications ;
Collaborative tools ;
Networks and telecommunications ;
Assistance and advice.
The « DzHack Event », in his first version is designed to cover three types of activities.
- Highlighting themes, by a security experts and searchers on strategies, issues and trends of the information security.
- Open debates on specific issues, to which information security professionals are faced today.
A space where local and international experts could prepare and expose practical workshops that provide participants with opportunities to see demonstrations and exploits security flaws of a variant complexity and in real time.
This is a competition designed to test the ability of hacking teams. The challenge of the event is of type Jeopardy CTF (Capture the Flag).
|08:00 - 09:00||Welcome and Reception|
|09:00 - 09:20||CEO of ELIT welcome address|
|09:20 - 09:40||SONELGAZ Chairman welcome address|
|09:40 - 10:20||Auditorium||
La Sécurité des Illusions
|10:20 - 11:00||Auditorium||
Hacker's Impression of ICS Security
Until recently, ICS remained beyond hackers' vision, but public authorities and the owners of large companies have started expressing concern about the problems they might face because manufacturing facilities are vulnerable to hacker attacks. As a result, industrial enterprises and equipment manufacturers show more interest in SCADA and ICS security assessment.
Dmitry Kuznetsov will focus on the penetration testing of industrial control systems and security analysis of SCADA performed by Positive Technologies for a variety of vendors. During this talk, he will cover the main threats to manufacturing enterprises, attack types and vulnerabilities typical of such systems.
|11:30 - 12:10||Auditorium||
Exploiting RFID vulnerabilities using NFC phones
The goal of the presentation is to describe potential vulnerabilities in various RFID devices (Mifare, RFID biometric passport, Mastercard PayPass and VISA PayWave) and how to exploit them u to show how they can be significantly simplified and executed using current smartphones with NFC capabilities.
|12:10 - 12:50||Auditorium||
Traitement du volet humain dans le domaine de la sécurité numérique
|14:00 - 14:40||Auditorium||
Protection des Infrastructures critiques industrielles
|14:40 - 15:20||Auditorium||
Are we ready for the new CyberWar?
|15:20 - 16:00||Auditorium||
Reactions and learnings from the Sony Hack
First we thought North Korea was behind the Sony cyberattacks. Then we thought it was a couple of hacker guys with an axe to grind. Now we think North Korea is behind it again, but the connection is still tenuous.
In a world where everything happens online, including what we think of as ephemeral conversation, everything is potentially subject to public scrutiny. Companies need to make sure their computer and network security is up to snuff, and their incident response and crisis management plans can handle this sort of thing. In this session Bruce will highlight how to secure your company against this sort of attack.
|16:00 - 16:40||Auditorium||
La protection du Cloud Computing et de l'infrastructure virtuelle
|Hafedh BEN HAMIDA||French|
|16:40 - 17:40||Auditorium||
Round Table "How to convince your management for investing in IT security."
|11:00 - 11:20||Coffee Break|
|13:00 - 14:00||Lunch break|
|10:00 - 17:00||
Offensive Python For Networkers
Python is becoming day after day more popular and widespread over the world, most hackers and security researchers use High Level Programming languages such as Python for the purpose of creating Proof Of Concepts really fast.
|10:00 - 17:00||
|10:00 - 17:00||
La Sécurité des systèmes SCADA
|Haythem EL MIR||French|
|10:00 - 17:00||
Hacking RFID devices using NFC smartphones
The goal of the presentation is to describe potential vulnerabilities in various RFID devices (Mifare, RFID biometric passports, Mastercard PayPass, VISA PayWave) and how to exploit them using common NFC smartphones.
|10:00 - 17:00||
Raison d’être et de gouvernance de la SSI dans les organisations
|19:00 - 07:00||CTF|
|17:40 - 18:20||Conference closing|
|07:00 - 07:40||CTF award ceremoney|
With so much to see and do at the event, make sure you get the most from your visit to DzHack having all the necessary information of the event in your pocket.
With the mobile application and the web portal of the event, you can:
Browse the event agenda
Have information about conferences
Have information about Workshops
Discover the Event Speakers
Discover the venue and the map of the event
Receive notifications about the event
Play the game and win a tablet
Download the Android Application :
Do not have an Android ?
The DzHack 2015 Web App gives you access to the same information through: www.appdzhack.elit.dz
Computer security is nowadays a hot topic that everyone knows or at least have heard about it. Moreover, our daily life is closely linked to new technologies that are mostly diverted and pirated either to access to our private life and properties, or to get to organizations and their sensitive information.
To share professional experiences in the field and inform users about security risks, ELIT organizes, for the first time, a computer security event called "DzHack Event", to bring together some of the IT community and specifically those of information systems security (experts, researchers, ethical hackers whether they are amateurs or professionals) around this theme to discuss and share their experiences.
Opening of the call for Paper : January 15, 2015
End of the call for Paper :
February 28, 2015 Deadline for Call for Papers extended to March 9, 2015
Notification for the participants :
March 08, 2015 Deadline for Notification : March 22, 2015
Delivery of the final versions (Camera-Ready) :
April 01, 2015 April 12, 2015
Themes of the conferences or of the workshop are :
Protection of cloud computing and virtual infrastructures
Prevention against the zero day attacks ( DDOS)
Computer crime, law enforcement and forensics analysis
Malware analysis and the newest trends of malicious codes
The security of industrial control systems (SCADA)
The security of business applications and ERP
The security of the networks communication
Exploitation and vulnerability assessment
Hardware hacking: RFID ,GSM ,CONSOLES
Standards and compliance
The audit of source code
Other topics may be proposed, provided they have a relationship with computer security.
HOW TO SUBMIT
To make a proposition for a conference or for a workshop, you have to fill the following details :
Surname and other names
E-mail address and other contacts twitter, linkedin,…
Personal informations: Phone number, Home address
Type of participation: Conference / Workshop
Tittle of the subject
Summary of the participation: not more than 250 words, without abbreviations
Contribution of the subject to the security field
Language of the participation
The requirements that you will need (detailed list)
Your submission will be evaluated by a validation committee. Any detail you provide for your participation will be useful and allows the committee to evaluate your proposal at its fair value. Please send your application as soon as possible in order to have a better chance of being selected.
Speakers and workshops providers will be offered :
Speakers and workshops providers are invited to submit their topics before February 28, 2015. After this date, no submissions will be accepted.
All participations (workshops and conferences) will be in Arabic, English or French (depending on the speaker).
All fees for conference travel, including airfare, hotel and meals will be covered by ELIT. However, all extra demands (extended stays, coverage of companion expenses …) will not be covered.
The length of the conference is 30 to 45 minutes with 15 more minutes for the debate.
The duration of Workshop is at least 6 hours.
If accepted, an email will be sent informing you that your contribution was accepted. From there, you have to meet the deadlines for submission of final versions. Otherwise, the validation committee will consider the possibility of canceling and replacing the speaker.
No advertising of any product, service or business will be tolerated.
The documents of the first submission must be in PDF format.
Your submissions must be sent to the following email address :
We inform you that registration is closed and a confirmation was sent to selected guests. We received a number important requests that we can not meet, we apologize to unsuccessful applicants hoping to see you in future editions.
We inform you that registration is closed and a confirmation was sent to the earliest applicants. We received a large number of applications that we can not meet, we apologize to unsuccessful applications, hoping to see you in our next editions.
Addressee : SN. N°38 Djisser Kasantina, Algiers, Alegria
Telephone : +213 21 83 62 64
Fax : +213 21 83 62 04
For further information, please feel free to contact us at :