lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Thu, 28 Feb 2013 21:32:51 +0800
From: JJ Turla <shipcodez@...il.com>
To: full-disclosure@...ts.grok.org.uk
Subject: ROOTCON 7 Call for Papers

*The wait is over; it's time for the ROOTCON Call For Papers to open its
doors.*

SUBMIT YOUR PAPER TO cfp [you-know-what] rootcon d0t org

Calling all network ninjas with special skills on Wi-Fu, Network-Fu, and
Sploit Ninja grip. It's time to show off those skills on September 13 and
14, 2013 at the Parklane International Hotel, Cebu City. What are you
waiting for? Submit those talks and let's fly to Cebu!

Please read carefully the terms of your speaking engagement at ROOTCON.

You may cut and paste the CFP form below or download the preformatted doc
file of the CFP form. Send your submission in a .doc, .docx or pdf format
to cfp [you-know-what] rootcon dot org, you will then receive a
confirmation email approximately 2 days after your submission provided your
papers don't have any problems. Call For Papers closes on May 25, 2013;
after we completed the review and selection process we will contact you of
your status (denial or acceptance). Please be aware that if you are
selected you need to submit your full presentation materials (slides,
whitepapers, demo video, etc...) on or before June 22, 2013, this is for us
to safe keep (backup is sacred =)) your presentation and for publication
purposes.

*#########*
*# Scope #*
*#########*
Topics that we would like to see submitted to ROOTCON7 includes but not
limited to:

- Exploit Development
- Reverse Engineering
- Web Application Attacks (SQL Injection, XSS, CSRF, Session Fixation,
etc..etc..)
- Tools 101 (Metasploit, Nmap, etc…etc…)
- Wireless Attacks (3G, 4G, 802.11(x))
- Cloud Security
- Vulnerability Discovery
- OS Level Vulnerabilities
- Kernel Exploitation
- Cryptography
- IPv6 Hacks
- Corporate Vulnerabilities (full-disclosure with company involve will be
required)
- Physical Security (Lock picking – Digital Locks or Digital Safes)
- Vendor Appliance Vulnerabilities
- Exploitation Techniques
- Mobile Security


If your presentation is not within these scope but you think its a form of
day to day hacks, submit them in and let the review board decide.

-- https://rootcon.org/xml/rootcon7/cfp

*ROOTCON 7 , Cebu 2013*
*September 12th - 14th, 2013*
*Parklane International Hotel*
*Cebu City, Philippines*
*https://www.rootcon.org/*

Content of type "text/html" skipped

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ