Nullcon Dwititya - International Security & Hacking Conference at Goa on 25-26 Feb

null - The open security community (registered non-profit society) is
back with nullcon Dwitiya Goa - International Security & Hacking
conference. We have some amazing talks lined up this time around that
will surely change your perspective of security in the future. We
thank the community for supporting us, it is your support that we have
grown and are able to serve the community in a better way.

Venue & Dates
25-26th Feb 2011
The RETREAT by Zuri
Pedda, Uttor Doxi, Varca, Salcete
Goa 403 721

Registration
Nullcon Security Conference & Training
For offline registration and accommodation queries kindly send an
email to #-Link-Snipped-#

Talks
Nullcon Security Conference & Training
Nullcon Security Conference & Training
Nullcon Security Conference & Training

CXO Track
There will be a full blown parallel Business track for CXOs/managers
where top corporates will give their take on security from the
Global/Indian perspective.

Desi Jugaad
1. Hacking the Parliament: A classic social engineering attack - By
Anurag Dhanda
2. Hari K Prasad : Security Analysis of India’s Electronic Voting Machines: Memoirs of a whistleblower

Security and Hacking Tools
1. Chupa Rustam: Unauthorized usage of IP video phones as video
surveillance cameras - By Abhijeet Hatekar
2. Jugaad Beta: Linux Thread injection for Malware PoC - By Aseem Jakhar
3. SSLSmart: Smart SSL cypher enumeration - By Gursev Kalra
4. (Secure) SiteHoster: Disable XSS & SQL Injection - By Abhishek Kumar

Security Research & Technology talks
1. Exploiting SCADA Systems - By Jeremy Brown
2. ZeuS MitMo – A real case of banking fraud through mobile phones -
By Mikel Gastesi & Jose Miguel Esparza
3. Penetration Testing a Biometric System - By Rahul Sasi
4. Is it stormy outside or just cloudy? - By Alexei Kachalin
5. Memory analysis – Looking into the eye of the bits - By Assaf Nativ
6. Lessons learned from 2010 - By Saumil Shah
7. Botnet Detection approach by DNS behavior and clustering analysis -
By Nilesh Sharma & Pulkit Mehndiratta
8. JSON Fuzzing: New approach to old problems - By Tamaghna Basu & K.V. Prashant
9. No bullshit on underground crime: traces, trends, attribution
techniques and more - By Yarochkin Fyodor
10. Automatic Program Analysis using Dynamic Binary Instrumentation
(DBI) - By Sunil Kumar
11. Fuzzing with complexities - By Vishwas Sharma
12. Reversing microsoft patches to reveal vulnerable code - By Harsimran Walia
13. Buffer Under Run Exploits - By Chinmaya Kamal & Saurabh Sharma

Precon Challenge - HackIM is on. Play and win Free Corporate Pass and
2 nights stay at the venue. Details:
Nullcon Security Conference & Training

Hacker challenge at nullcon - Battle Underground. Play and win SANS
SEC 504:Hacker Techniques, Exploits & Incident Handling class (worth
USD 4095/-)

Replies

You are reading an archived discussion.

Related Posts

hi all 😁, I needed some help. I wanted to do a training/course for learning Microsoft SQL Server 2008 administration, but i am unable to find a good training institute...
Hello All! Let me present to you the first version of software for 3D design of direct stroke lightning protection. 3D Lightning is FREEWARE. This program uses the RSM [1]...
The Philippines is all set to embrace a futuristic undersea project to rival those in Maldives, Dubai and Fiji, according to a Filipino team of developer and architects, which is...
Can any crazy engineer suggest me some crazy project on powder metallurgy for my college project ? Send me some ideas soon, and i will make them viable. Either mail...
Hi Guys, NOTE: THIS IS FOR EDUCATION PURPOSE ONLY I WILL NOT TAKE ANY CLAIM FOR YOUR ACTIONS!! Last time when i posted about sql injection it was theoretical (...