Penetration Testing mailing list archives
ToorCon 2004 Pre-Registration Closing
From: h1kari () toorcon org
Date: 31 Aug 2004 21:29:55 -0000
Hey everyone, ToorCon is approaching fast this year and we wanted to make sure that all of you know that we're trying hard to make ToorCon 6 the best ToorCon yet. We're still in the process of finalizing our second keynote, but otherwise the lineup is complete with over 30 talks this year! We just wanted to let you all know details about this year and that pre-registration is closing in only 10 days! Save $15 and pre-register today! DETAILS ToorCon, San Diego's own information security conference looks forward to it's 6th year in September 2004. Founded originally by the San Diego 2600 group and active members in the local security community, ToorCon has slowly grown from a small underground gathering to a conference attracting security professionals and hackers from all around the world. ToorCon's goal is simple -- To bridge the gap between intrusion and defense and create an environment that gets people motivated to learn, participate, and contribute to the community around them. Who: You What: ToorCon Information Security Conference 2004 When: September 24th-26th, 2004 Where: Manchester Grand Hyatt One Market Place San Diego, CA 92101 http://manchestergrand.hyatt.com/property/index.jhtml Why: http://www.toorcon.org PRE-REGISTRATION Pre-registration for ToorCon is $60 online before Sept. 10th. Admission will be $75 at the door. You will recieve an official ToorCon badge, an entry into the drawings, and access to all of the event except the Friday Seminars. You can either register online or at the Manchester Grand Hyatt during the conference on Friday, Saturday, or Sunday. ROOTWARS RootWars is back again this year and better than ever. Since last year the RootWars engine (openinfreno) has been open sourced and is being constantly improved. We've just recently posted this year's rules on the website along with information on how the competition will be run. To sign up your team for the competition, please email rootwars () toorcon org. BOFS The Shmoo Group will be organizing Birds of a Feather (BoF) sessions this year at ToorCon in the evening on Saturday. The point of the BoF's is to create a social environment for groups to talk about whatever topic they want. Pizza & beer will be provided during the BoF sessions and the Slagheap Party complements of The Shmoo Group and Slagheap. To sign up for a BoF, please email bofs () toorcon org. GENERAL LINEUP This year we are putting an emphasis on Privacy and Anonymity because of our theme of "20 years after big brother". To do this, we've split the lineup into two distinct tracks, Attack & Destroy and Protect & Defend spanning across 2 days. This year we will also have a special emphasis on anonymous networks, advanced attack methods, cryptography, steganography, forensics and tracking, and reverse engineering. Keynote: Richard Thieme, Thiemeworks Moving Mountains: Zen Hacking, Weakness as Strength, and Ultimate Intentions Simple Nomad, NMRC NMRC Warez: MysteryNet and Beyond Jennifer Granick, Stanford Law School Patriot Act, Privacy and You Marshall Beddoe, Baseline Research Blackbox Protocol Analysis using Bioinformatics Algorithms Jose Nazario, Arbor Networks, Inc. The Worm Problem: Darkness Ahead, but any Light? Richard Johnson, iDEFENSE Labs Hooking the Linux ELF Loader Dan Kaminsky, Avaya The Black Ops of DNS Optyx Advancement in Rootkit Technology Bill McCarty & Patrick McCarty, Azusa Pacific University Honeynets for the Masses: The Honeynet Project's Honeywall Brad Harris & Deker, Sparta, Inc. Advanced Packet Injection in 802.11a/b/g Networks aempirei, Baseline Research A Survey of Novel Approaches to Network Security Beetle, The Shmoo Group Wireless Weapons of Mass Destruction for Windows Len Sassaman TBA Brian Markus UNIX Fundamentals Justin Mason, SpamAssassin Spam Forensics: Reverse-Engineering Spammer Tactics Jaguar Reversing and Exploiting Microsoft Services for Unix Tri Huynh, SentryUnion Runtime Analysis Against Execution Tampering Matt Granet Rage against the Platform: PalmOS Brian Hernacki, Symantec Research Labs Risks in Passive Network Discovery Systems Kartik Trivedi, Foundstone Advanced Google Hacking Todd MacDermid, Jack Lloyd, and Kathy Wang CUTLASS - Cryptographic Protection for Everyone's Voice and Data Anthony Lineberry, Charles Hooper, & Jake Applebaum Hacking Embedded Linux Devices Joshua Teitelbaum & Peter Leung, CryptoMail.org CryptoMail Encrypted E-Mail for All (Including Grandma) Bruce Potter, The Shmoo Group Wireless Location Services Laurent Butti & Franck Veysset, France Telecom Wireless Security Mike Lynn, ISS A Security Analysis of Voice over IP Acidus Privacy Implications of Magstripes SEMINARS This year ToorCon is offering a day of intensive Deep Knowledge Seminars geared towards corporate attendees that are looking for a more intimate environment for learning about today's high-tech security issues. Keynote: Jon Callas, CTO, PGP Jim Butterworth, Guidance Software Incident Response: The Ultimate Network Defense Scott Kennedy, SAIC Mobile Cyber Warfare Training Tom St Denis, Secure Science Corporation Cryptanalysis in Society Dan Kaminsky, Avaya Applied Scanrand ------------------------------------------------------------------------------ Ethical Hacking at the InfoSec Institute. All of our class sizes are guaranteed to be 12 students or less to facilitate one-on-one interaction with one of our expert instructors. Check out our Advanced Hacking course, learn to write exploits and attack security infrastructure. Attend a course taught by an expert instructor with years of in-the-field pen testing experience in our state of the art hacking lab. Master the skills of an Ethical Hacker to better assess the security of your organization. http://www.infosecinstitute.com/courses/ethical_hacking_training.html -------------------------------------------------------------------------------
Current thread:
- ToorCon 2004 Pre-Registration Closing h1kari (Aug 31)