Full Disclosure mailing list archives
nullcon Goa Dwitiya security Conference 25-26th Feb 2011
From: nullcon <nullcon () nullcon net>
Date: Fri, 28 Jan 2011 19:36:10 +0530
Greetings from null! null - The open security community (registered non-profit society) is back with nullcon Goa Dwitiya - International Security & Hacking conference. We have some amazing talks lined up this time around that will surely change your perspective of security in the future. We thank the community for supporting us, it is your support that we have grown and are able to serve the community in a better way. Venue & Dates 25-26th Feb 2011 The RETREAT by Zuri Pedda, Uttor Doxi, Varca, Salcete Goa 403 721 Registration http://nullcon.net/register For offline registration and accommodation queries kindly send an email to register_at_nullcon.net Group booking discount available on 3 or more passes. Talks http://nullcon.net/speakers/bakkar/ http://nullcon.net/speakers/tez/ http://nullcon.net/speakers/workshop/ CXO Track There will be a full blown parallel Business track for CXOs/managers where top corporates will give their take on security from the Global/Indian perspective. Desi Jugaad 1. Hacking the Parliament: A classic social engineering attack - By Anurag Dhanda Security and Hacking Tools 1. Chupa Rustam: Unauthorized usage of IP video phones as video surveillance cameras - By Abhijeet Hatekar 2. Jugaad Beta: Linux Thread injection for Malware PoC - By Aseem Jakhar 3. SSLSmart: Smart SSL cypher enumeration - By Gursev Kalra 4. (Secure) SiteHoster: Disable XSS & SQL Injection - By Abhishek Kumar Security Research & Technology talks 1. Exploiting SCADA Systems - By Jeremy Brown 2. ZeuS MitMo – A real case of banking fraud through mobile phones - By Mikel Gastesi & Jose Miguel Esparza 3. Penetration Testing a Biometric System - By Rahul Sasi 4. Is it stormy outside or just cloudy? - By Alexei Kachalin 5. Memory analysis – Looking into the eye of the bits - By Assaf Nativ 6. Lessons learned from 2010 - By Saumil Shah 7. Botnet Detection approach by DNS behavior and clustering analysis - By Nilesh Sharma & Pulkit Mehndiratta 8. JSON Fuzzing: New approach to old problems - By Tamaghna Basu & K.V. Prashant 9. No bullshit on underground crime: traces, trends, attribution techniques and more - By Yarochkin Fyodor 10. Automatic Program Analysis using Dynamic Binary Instrumentation (DBI) - By Sunil Kumar 11. Fuzzing with complexities - By Vishwas Sharma 12. Reversing microsoft patches to reveal vulnerable code - By Harsimran Walia 13. Buffer Under Run Exploits - By Chinmaya Kamal & Saurabh Sharma For general queries/sponsorship opportunities/contribution kindly email us at null_at_null.co.in or void_at_null.co.in Thanks to our Sponsors Gold - Qualys Silver - SANS Bronze - Praxeva Associate - iSIGHT Partners, IIS, Innobuz, Secfence Media Partners - Searchsecurity.in, securitytube.net, Clubhack Mag, Digit Supporters - Hack in the Box, Confidence, Matriux Best Regards, null Team
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- nullcon Goa Dwitiya security Conference 25-26th Feb 2011 nullcon (Jan 28)