[<prev] [next>] [day] [month] [year] [list]
Message-ID: <AANLkTiknYmPcpB83enoOnwoCiHHNkhLDcGJ4tS5bHrPm@mail.gmail.com>
Date: Fri, 28 Jan 2011 19:36:10 +0530
From: nullcon <nullcon@...lcon.net>
To: full-disclosure@...ts.grok.org.uk
Subject: nullcon Goa Dwitiya security Conference 25-26th
Feb 2011
Greetings from null!
null - The open security community (registered non-profit society) is
back with nullcon Goa Dwitiya - International Security & Hacking
conference. We have some amazing talks lined up this time around that
will surely change your perspective of security in the future. We
thank the community for supporting us, it is your support that we have
grown and are able to serve the community in a better way.
Venue & Dates
25-26th Feb 2011
The RETREAT by Zuri
Pedda, Uttor Doxi, Varca, Salcete
Goa 403 721
Registration
http://nullcon.net/register
For offline registration and accommodation queries kindly send an
email to register_at_nullcon.net
Group booking discount available on 3 or more passes.
Talks
http://nullcon.net/speakers/bakkar/
http://nullcon.net/speakers/tez/
http://nullcon.net/speakers/workshop/
CXO Track
There will be a full blown parallel Business track for CXOs/managers
where top corporates will give their take on security from the
Global/Indian perspective.
Desi Jugaad
1. Hacking the Parliament: A classic social engineering attack - By
Anurag Dhanda
Security and Hacking Tools
1. Chupa Rustam: Unauthorized usage of IP video phones as video
surveillance cameras - By Abhijeet Hatekar
2. Jugaad Beta: Linux Thread injection for Malware PoC - By Aseem Jakhar
3. SSLSmart: Smart SSL cypher enumeration - By Gursev Kalra
4. (Secure) SiteHoster: Disable XSS & SQL Injection - By Abhishek Kumar
Security Research & Technology talks
1. Exploiting SCADA Systems - By Jeremy Brown
2. ZeuS MitMo – A real case of banking fraud through mobile phones -
By Mikel Gastesi & Jose Miguel Esparza
3. Penetration Testing a Biometric System - By Rahul Sasi
4. Is it stormy outside or just cloudy? - By Alexei Kachalin
5. Memory analysis – Looking into the eye of the bits - By Assaf Nativ
6. Lessons learned from 2010 - By Saumil Shah
7. Botnet Detection approach by DNS behavior and clustering analysis -
By Nilesh Sharma & Pulkit Mehndiratta
8. JSON Fuzzing: New approach to old problems - By Tamaghna Basu & K.V.
Prashant
9. No bullshit on underground crime: traces, trends, attribution
techniques and more - By Yarochkin Fyodor
10. Automatic Program Analysis using Dynamic Binary Instrumentation
(DBI) - By Sunil Kumar
11. Fuzzing with complexities - By Vishwas Sharma
12. Reversing microsoft patches to reveal vulnerable code - By Harsimran
Walia
13. Buffer Under Run Exploits - By Chinmaya Kamal & Saurabh Sharma
For general queries/sponsorship opportunities/contribution kindly email us
at
null_at_null.co.in or void_at_null.co.in
Thanks to our Sponsors
Gold - Qualys
Silver - SANS
Bronze - Praxeva
Associate - iSIGHT Partners, IIS, Innobuz, Secfence
Media Partners - Searchsecurity.in, securitytube.net, Clubhack Mag, Digit
Supporters - Hack in the Box, Confidence, Matriux
Best Regards,
null Team
Content of type "text/html" skipped
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists