SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
BruCON is an annual security and hacker(*) conference providing two days of an interesting atmosphere for open discussions of critical infosec issues, privacy, information technology and its cultural/technical implications on society. Organized in Brussels, BruCON offers a high quality line up of speakers, security challenges and interesting workshops. It's affordable, accessible and entertaining. BruCON is a conference by and for the security and hacker community. (*)Hackers are "persons who delight in having an intimate understanding of the internal workings of a system, computers and computer networks in particular." People who engage in illegal activities like unauthorized entry into computer systems are called crackers and don't have anything to do with hacking. BruCON doesn't promote any illegal activities or behavior. Many hackers today are employed by the security industry and test security software and systems to improve the security of our networks and applications. In addition, for the younger generations, we want to create some awareness and interest in IT students to learn more about IT Security.
Two day conference featuring: Christofer Hoff  - The frogs who desired a king: A virtualization & cloud computing fable Vincent Rijmen  - Trusted cryptography Chris Nickerson  - Red and tiger team Chris Gates  - Open source information gathering Jayson E. Street  - Dispelling the myths and discussing the facts of Global Cyber-Warfare Paul James Craig  - Rage against the Kiosk Eric Vyncke  - Transition to IPv6 on the Internet: Threats and mitigation techniques Eric Adrien Filiol - How to prepare, coordinate and conduct a cyber attack Esther Schneeweisz  - Building hacker spaces everywhere Brian Honan  - Knowing   Me Knowing You (The dangers of social networks) Mario Heiderich  - Malicious markup - I thought you were my friend - cycle 3 Daniel Mende  - "All your packets are belong to us" - Attacking Backbone Technologies" Sharon Conheady  - Jedi mindtricks - Social engineering for penetration testers Stephan Chenette  - A new web attack vector: Script fragmentation Justin Clarke  - SQL Injection - how far does the rabbit hole go?
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Why should people attend this event?  These are renowned speakers, international experts and book authors which you will seldom meet at other events.  It’s an event by and for the security and hacker community. With 400 seats, it's an ideal occasion to network with others and exchange knowledge.  Lightning talks will give possibilities for visitors to present their own projects, tools or website  Various workshops on wireless security, digital ID, lockpicking, VOIP,…. The Hex Factor: a contest where people can learn basics of web application security, forensics,…  both fun and challenging for both absolute beginners as well as experts. More info? How to register?  Visit http://www.brucon.org/

Mais conteúdo relacionado

Mais procurados

Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...
Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...
Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...Edureka!
 
Jerod Brennen - What You Need to Know About OSINT
Jerod Brennen - What You Need to Know About OSINTJerod Brennen - What You Need to Know About OSINT
Jerod Brennen - What You Need to Know About OSINTcentralohioissa
 
Security Presenatation for Onforce Pro Town Hall
Security Presenatation for Onforce Pro Town HallSecurity Presenatation for Onforce Pro Town Hall
Security Presenatation for Onforce Pro Town HallBev Robb
 
Mickey pacsec2016_final
Mickey pacsec2016_finalMickey pacsec2016_final
Mickey pacsec2016_finalPacSecJP
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information SecurityAna Meskovska
 
Mobile hacking, pentest, and malware
Mobile hacking, pentest, and malwareMobile hacking, pentest, and malware
Mobile hacking, pentest, and malwareAmmar WK
 
Ed McCabe - Putting the Intelligence back in Threat Intelligence
Ed McCabe - Putting the Intelligence back in Threat IntelligenceEd McCabe - Putting the Intelligence back in Threat Intelligence
Ed McCabe - Putting the Intelligence back in Threat Intelligencecentralohioissa
 
Dan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hacker
Dan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hackerDan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hacker
Dan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hackerDan Vasile
 
Cyber security[1118]
Cyber security[1118]Cyber security[1118]
Cyber security[1118]MeeraNairJ
 
Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...
Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...
Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...CODE BLUE
 
IPv6 Security - Where is the Challenge
IPv6 Security - Where is the ChallengeIPv6 Security - Where is the Challenge
IPv6 Security - Where is the ChallengeRIPE NCC
 
Owasp2013 johannesullrich
Owasp2013 johannesullrichOwasp2013 johannesullrich
Owasp2013 johannesullrichdrewz lin
 
information about virus
information about virusinformation about virus
information about virustoshan badiye
 

Mais procurados (20)

Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...
Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...
Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...
 
Jerod Brennen - What You Need to Know About OSINT
Jerod Brennen - What You Need to Know About OSINTJerod Brennen - What You Need to Know About OSINT
Jerod Brennen - What You Need to Know About OSINT
 
Hacking
HackingHacking
Hacking
 
Computer security
Computer securityComputer security
Computer security
 
Hacking
HackingHacking
Hacking
 
Security Presenatation for Onforce Pro Town Hall
Security Presenatation for Onforce Pro Town HallSecurity Presenatation for Onforce Pro Town Hall
Security Presenatation for Onforce Pro Town Hall
 
Hacking Mobile Apps
Hacking Mobile AppsHacking Mobile Apps
Hacking Mobile Apps
 
Mickey pacsec2016_final
Mickey pacsec2016_finalMickey pacsec2016_final
Mickey pacsec2016_final
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security
 
Network security
Network securityNetwork security
Network security
 
Mobile hacking, pentest, and malware
Mobile hacking, pentest, and malwareMobile hacking, pentest, and malware
Mobile hacking, pentest, and malware
 
Ed McCabe - Putting the Intelligence back in Threat Intelligence
Ed McCabe - Putting the Intelligence back in Threat IntelligenceEd McCabe - Putting the Intelligence back in Threat Intelligence
Ed McCabe - Putting the Intelligence back in Threat Intelligence
 
Dan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hacker
Dan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hackerDan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hacker
Dan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hacker
 
Cyber security[1118]
Cyber security[1118]Cyber security[1118]
Cyber security[1118]
 
Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...
Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...
Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...
 
IPv6 Security - Where is the Challenge
IPv6 Security - Where is the ChallengeIPv6 Security - Where is the Challenge
IPv6 Security - Where is the Challenge
 
Owasp2013 johannesullrich
Owasp2013 johannesullrichOwasp2013 johannesullrich
Owasp2013 johannesullrich
 
Experience Sharing on School Pentest Project (Updated)
Experience Sharing on School Pentest Project (Updated)Experience Sharing on School Pentest Project (Updated)
Experience Sharing on School Pentest Project (Updated)
 
Network Security
Network SecurityNetwork Security
Network Security
 
information about virus
information about virusinformation about virus
information about virus
 

Destaque

Pareto chart using Openoffice.org
Pareto chart using Openoffice.orgPareto chart using Openoffice.org
Pareto chart using Openoffice.orgwremes
 
Pareto Charts
Pareto ChartsPareto Charts
Pareto ChartsNat Evans
 
Pareto Principle Explained
Pareto Principle ExplainedPareto Principle Explained
Pareto Principle ExplainedEd Simpson
 
Qcl 14-v3 pareto chart-banasthali university _silky jain
Qcl 14-v3 pareto chart-banasthali university _silky jainQcl 14-v3 pareto chart-banasthali university _silky jain
Qcl 14-v3 pareto chart-banasthali university _silky jainAnubha Shukla
 
7 Quality tools by krishna heda
7 Quality tools by krishna heda7 Quality tools by krishna heda
7 Quality tools by krishna hedakrishnaheda
 
7 qc tools training material[1]
7 qc tools training material[1]7 qc tools training material[1]
7 qc tools training material[1]gurmukh singh
 
7 Quality Control Tools (SQC Model) [MARCH 2009]
7 Quality Control Tools (SQC Model) [MARCH 2009]7 Quality Control Tools (SQC Model) [MARCH 2009]
7 Quality Control Tools (SQC Model) [MARCH 2009]Fahad Mahmud Mirza
 
Strategic management full notes
Strategic management full notesStrategic management full notes
Strategic management full notesKiruthika Ruthi
 

Destaque (20)

Pareto chart using Openoffice.org
Pareto chart using Openoffice.orgPareto chart using Openoffice.org
Pareto chart using Openoffice.org
 
Pareto Charts
Pareto ChartsPareto Charts
Pareto Charts
 
Pareto Analysis
Pareto AnalysisPareto Analysis
Pareto Analysis
 
Pareto Principle Explained
Pareto Principle ExplainedPareto Principle Explained
Pareto Principle Explained
 
Qcl 14-v3 pareto chart-banasthali university _silky jain
Qcl 14-v3 pareto chart-banasthali university _silky jainQcl 14-v3 pareto chart-banasthali university _silky jain
Qcl 14-v3 pareto chart-banasthali university _silky jain
 
pareto diagram
pareto diagrampareto diagram
pareto diagram
 
Pareto Chart
Pareto ChartPareto Chart
Pareto Chart
 
Pareto analysis
Pareto analysisPareto analysis
Pareto analysis
 
7 Quality tools by krishna heda
7 Quality tools by krishna heda7 Quality tools by krishna heda
7 Quality tools by krishna heda
 
Pareto principle
Pareto principlePareto principle
Pareto principle
 
Histogram
HistogramHistogram
Histogram
 
Histograms
HistogramsHistograms
Histograms
 
Pareto analysis
Pareto analysisPareto analysis
Pareto analysis
 
Motion and time study
Motion and time studyMotion and time study
Motion and time study
 
7 qc tools training material[1]
7 qc tools training material[1]7 qc tools training material[1]
7 qc tools training material[1]
 
7 Quality Control Tools (SQC Model) [MARCH 2009]
7 Quality Control Tools (SQC Model) [MARCH 2009]7 Quality Control Tools (SQC Model) [MARCH 2009]
7 Quality Control Tools (SQC Model) [MARCH 2009]
 
Strategic management ppt
Strategic management pptStrategic management ppt
Strategic management ppt
 
7 qc toolsTraining pdf
7 qc toolsTraining pdf7 qc toolsTraining pdf
7 qc toolsTraining pdf
 
Strategic management full notes
Strategic management full notesStrategic management full notes
Strategic management full notes
 
Vision and mission of companies
Vision and mission of companies Vision and mission of companies
Vision and mission of companies
 

Semelhante a Brucon presentation

Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...Black Duck by Synopsys
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introductionsunnysmith
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network SecurityMelissa Dudas
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network SecurityDawn Robertson
 
Internet Security And The Internet
Internet Security And The InternetInternet Security And The Internet
Internet Security And The InternetJennifer Jones
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionBharat Thakkar
 
A COMPREHENSIVE STUDY ON ETHICAL HACKING
A COMPREHENSIVE STUDY ON ETHICAL HACKINGA COMPREHENSIVE STUDY ON ETHICAL HACKING
A COMPREHENSIVE STUDY ON ETHICAL HACKINGScott Bou
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityBryCunal
 
Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Umang Patel
 
Top 5 Ways You Can Protect Your Privacy On Web
Top 5 Ways You Can Protect Your Privacy On WebTop 5 Ways You Can Protect Your Privacy On Web
Top 5 Ways You Can Protect Your Privacy On WebSheila Guy
 
Laureate Online Education Information Security Engineering .docx
Laureate Online Education Information Security Engineering .docxLaureate Online Education Information Security Engineering .docx
Laureate Online Education Information Security Engineering .docxDIPESH30
 
Cybercrime And Internet Hacking And Its Effect On The...
Cybercrime And Internet Hacking And Its Effect On The...Cybercrime And Internet Hacking And Its Effect On The...
Cybercrime And Internet Hacking And Its Effect On The...Amanda Barber
 
Detecting ARP Spoofing Essay
Detecting ARP Spoofing EssayDetecting ARP Spoofing Essay
Detecting ARP Spoofing EssayKimberly Bundy
 
Why do women love chasing down bad guys?
Why do women love chasing down bad guys? Why do women love chasing down bad guys?
Why do women love chasing down bad guys? SITA
 
Industrial Control Cybersecurity USA Cyber Senate conference
 Industrial Control Cybersecurity USA Cyber Senate conference Industrial Control Cybersecurity USA Cyber Senate conference
Industrial Control Cybersecurity USA Cyber Senate conferenceJames Nesbitt
 
AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)Takeshi Takahashi
 

Semelhante a Brucon presentation (20)

Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introduction
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
 
Internet Security And The Internet
Internet Security And The InternetInternet Security And The Internet
Internet Security And The Internet
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
A COMPREHENSIVE STUDY ON ETHICAL HACKING
A COMPREHENSIVE STUDY ON ETHICAL HACKINGA COMPREHENSIVE STUDY ON ETHICAL HACKING
A COMPREHENSIVE STUDY ON ETHICAL HACKING
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006
 
Essay Viruses And Internet Security
Essay Viruses And Internet SecurityEssay Viruses And Internet Security
Essay Viruses And Internet Security
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Cyber Security in 2018
Cyber Security in 2018Cyber Security in 2018
Cyber Security in 2018
 
Top 5 Ways You Can Protect Your Privacy On Web
Top 5 Ways You Can Protect Your Privacy On WebTop 5 Ways You Can Protect Your Privacy On Web
Top 5 Ways You Can Protect Your Privacy On Web
 
Laureate Online Education Information Security Engineering .docx
Laureate Online Education Information Security Engineering .docxLaureate Online Education Information Security Engineering .docx
Laureate Online Education Information Security Engineering .docx
 
Cybercrime And Internet Hacking And Its Effect On The...
Cybercrime And Internet Hacking And Its Effect On The...Cybercrime And Internet Hacking And Its Effect On The...
Cybercrime And Internet Hacking And Its Effect On The...
 
Detecting ARP Spoofing Essay
Detecting ARP Spoofing EssayDetecting ARP Spoofing Essay
Detecting ARP Spoofing Essay
 
Why do women love chasing down bad guys?
Why do women love chasing down bad guys? Why do women love chasing down bad guys?
Why do women love chasing down bad guys?
 
Industrial Control Cybersecurity USA Cyber Senate conference
 Industrial Control Cybersecurity USA Cyber Senate conference Industrial Control Cybersecurity USA Cyber Senate conference
Industrial Control Cybersecurity USA Cyber Senate conference
 
AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)
 

Mais de wremes

Distributed Denial Of Service Introduction
Distributed Denial Of Service IntroductionDistributed Denial Of Service Introduction
Distributed Denial Of Service Introductionwremes
 
Intro to Malware Analysis
Intro to Malware AnalysisIntro to Malware Analysis
Intro to Malware Analysiswremes
 
Crème Brulée :-)
Crème Brulée :-)Crème Brulée :-)
Crème Brulée :-)wremes
 
Vinnes jayson koken
Vinnes jayson kokenVinnes jayson koken
Vinnes jayson kokenwremes
 
Build Your Own Incident Response
Build Your Own Incident ResponseBuild Your Own Incident Response
Build Your Own Incident Responsewremes
 
Secure Abu Dhabi talk
Secure Abu Dhabi talkSecure Abu Dhabi talk
Secure Abu Dhabi talkwremes
 
Collaborate, Innovate, Secure
Collaborate, Innovate, SecureCollaborate, Innovate, Secure
Collaborate, Innovate, Securewremes
 
Data Driven Infosec Services
Data Driven Infosec ServicesData Driven Infosec Services
Data Driven Infosec Serviceswremes
 
SOPA 4 dummies
SOPA 4 dummiesSOPA 4 dummies
SOPA 4 dummieswremes
 
In the land of the blind the squinter rules
In the land of the blind the squinter rulesIn the land of the blind the squinter rules
In the land of the blind the squinter ruleswremes
 
And suddenly I see ... IDC IT Security Brussels 2011
And suddenly I see ... IDC IT Security Brussels 2011And suddenly I see ... IDC IT Security Brussels 2011
And suddenly I see ... IDC IT Security Brussels 2011wremes
 
Blackhat Workshop
Blackhat WorkshopBlackhat Workshop
Blackhat Workshopwremes
 
SIEM brown-bag presentation
SIEM brown-bag presentationSIEM brown-bag presentation
SIEM brown-bag presentationwremes
 
10 things we're doing wrong with SIEM
10 things we're doing wrong with SIEM10 things we're doing wrong with SIEM
10 things we're doing wrong with SIEMwremes
 
Fosdem10
Fosdem10Fosdem10
Fosdem10wremes
 
OSSEC @ ISSA Jan 21st 2010
OSSEC @ ISSA Jan 21st 2010OSSEC @ ISSA Jan 21st 2010
OSSEC @ ISSA Jan 21st 2010wremes
 
Open Source Security
Open Source SecurityOpen Source Security
Open Source Securitywremes
 
Teaser
TeaserTeaser
Teaserwremes
 
Ossec Lightning
Ossec LightningOssec Lightning
Ossec Lightningwremes
 

Mais de wremes (19)

Distributed Denial Of Service Introduction
Distributed Denial Of Service IntroductionDistributed Denial Of Service Introduction
Distributed Denial Of Service Introduction
 
Intro to Malware Analysis
Intro to Malware AnalysisIntro to Malware Analysis
Intro to Malware Analysis
 
Crème Brulée :-)
Crème Brulée :-)Crème Brulée :-)
Crème Brulée :-)
 
Vinnes jayson koken
Vinnes jayson kokenVinnes jayson koken
Vinnes jayson koken
 
Build Your Own Incident Response
Build Your Own Incident ResponseBuild Your Own Incident Response
Build Your Own Incident Response
 
Secure Abu Dhabi talk
Secure Abu Dhabi talkSecure Abu Dhabi talk
Secure Abu Dhabi talk
 
Collaborate, Innovate, Secure
Collaborate, Innovate, SecureCollaborate, Innovate, Secure
Collaborate, Innovate, Secure
 
Data Driven Infosec Services
Data Driven Infosec ServicesData Driven Infosec Services
Data Driven Infosec Services
 
SOPA 4 dummies
SOPA 4 dummiesSOPA 4 dummies
SOPA 4 dummies
 
In the land of the blind the squinter rules
In the land of the blind the squinter rulesIn the land of the blind the squinter rules
In the land of the blind the squinter rules
 
And suddenly I see ... IDC IT Security Brussels 2011
And suddenly I see ... IDC IT Security Brussels 2011And suddenly I see ... IDC IT Security Brussels 2011
And suddenly I see ... IDC IT Security Brussels 2011
 
Blackhat Workshop
Blackhat WorkshopBlackhat Workshop
Blackhat Workshop
 
SIEM brown-bag presentation
SIEM brown-bag presentationSIEM brown-bag presentation
SIEM brown-bag presentation
 
10 things we're doing wrong with SIEM
10 things we're doing wrong with SIEM10 things we're doing wrong with SIEM
10 things we're doing wrong with SIEM
 
Fosdem10
Fosdem10Fosdem10
Fosdem10
 
OSSEC @ ISSA Jan 21st 2010
OSSEC @ ISSA Jan 21st 2010OSSEC @ ISSA Jan 21st 2010
OSSEC @ ISSA Jan 21st 2010
 
Open Source Security
Open Source SecurityOpen Source Security
Open Source Security
 
Teaser
TeaserTeaser
Teaser
 
Ossec Lightning
Ossec LightningOssec Lightning
Ossec Lightning
 

Último

UKCGE Parental Leave Discussion March 2024
UKCGE Parental Leave Discussion March 2024UKCGE Parental Leave Discussion March 2024
UKCGE Parental Leave Discussion March 2024UKCGE
 
3.21.24 The Origins of Black Power.pptx
3.21.24  The Origins of Black Power.pptx3.21.24  The Origins of Black Power.pptx
3.21.24 The Origins of Black Power.pptxmary850239
 
CapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptxCapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptxCapitolTechU
 
HED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdfHED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdfMohonDas
 
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRADUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRATanmoy Mishra
 
How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17Celine George
 
Presentation on the Basics of Writing. Writing a Paragraph
Presentation on the Basics of Writing. Writing a ParagraphPresentation on the Basics of Writing. Writing a Paragraph
Presentation on the Basics of Writing. Writing a ParagraphNetziValdelomar1
 
How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17Celine George
 
How to Add a many2many Relational Field in Odoo 17
How to Add a many2many Relational Field in Odoo 17How to Add a many2many Relational Field in Odoo 17
How to Add a many2many Relational Field in Odoo 17Celine George
 
Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.raviapr7
 
CAULIFLOWER BREEDING 1 Parmar pptx
CAULIFLOWER BREEDING 1 Parmar pptxCAULIFLOWER BREEDING 1 Parmar pptx
CAULIFLOWER BREEDING 1 Parmar pptxSaurabhParmar42
 
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptx
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptxPISA-VET launch_El Iza Mohamedou_19 March 2024.pptx
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptxEduSkills OECD
 
Human-AI Co-Creation of Worked Examples for Programming Classes
Human-AI Co-Creation of Worked Examples for Programming ClassesHuman-AI Co-Creation of Worked Examples for Programming Classes
Human-AI Co-Creation of Worked Examples for Programming ClassesMohammad Hassany
 
M-2- General Reactions of amino acids.pptx
M-2- General Reactions of amino acids.pptxM-2- General Reactions of amino acids.pptx
M-2- General Reactions of amino acids.pptxDr. Santhosh Kumar. N
 
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptxSandy Millin
 
How to Filter Blank Lines in Odoo 17 Accounting
How to Filter Blank Lines in Odoo 17 AccountingHow to Filter Blank Lines in Odoo 17 Accounting
How to Filter Blank Lines in Odoo 17 AccountingCeline George
 
AUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptxAUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptxiammrhaywood
 
The Singapore Teaching Practice document
The Singapore Teaching Practice documentThe Singapore Teaching Practice document
The Singapore Teaching Practice documentXsasf Sfdfasd
 
Education and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptxEducation and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptxraviapr7
 
Prescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptxPrescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptxraviapr7
 

Último (20)

UKCGE Parental Leave Discussion March 2024
UKCGE Parental Leave Discussion March 2024UKCGE Parental Leave Discussion March 2024
UKCGE Parental Leave Discussion March 2024
 
3.21.24 The Origins of Black Power.pptx
3.21.24  The Origins of Black Power.pptx3.21.24  The Origins of Black Power.pptx
3.21.24 The Origins of Black Power.pptx
 
CapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptxCapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptx
 
HED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdfHED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdf
 
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRADUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
 
How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17
 
Presentation on the Basics of Writing. Writing a Paragraph
Presentation on the Basics of Writing. Writing a ParagraphPresentation on the Basics of Writing. Writing a Paragraph
Presentation on the Basics of Writing. Writing a Paragraph
 
How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17
 
How to Add a many2many Relational Field in Odoo 17
How to Add a many2many Relational Field in Odoo 17How to Add a many2many Relational Field in Odoo 17
How to Add a many2many Relational Field in Odoo 17
 
Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.
 
CAULIFLOWER BREEDING 1 Parmar pptx
CAULIFLOWER BREEDING 1 Parmar pptxCAULIFLOWER BREEDING 1 Parmar pptx
CAULIFLOWER BREEDING 1 Parmar pptx
 
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptx
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptxPISA-VET launch_El Iza Mohamedou_19 March 2024.pptx
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptx
 
Human-AI Co-Creation of Worked Examples for Programming Classes
Human-AI Co-Creation of Worked Examples for Programming ClassesHuman-AI Co-Creation of Worked Examples for Programming Classes
Human-AI Co-Creation of Worked Examples for Programming Classes
 
M-2- General Reactions of amino acids.pptx
M-2- General Reactions of amino acids.pptxM-2- General Reactions of amino acids.pptx
M-2- General Reactions of amino acids.pptx
 
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
 
How to Filter Blank Lines in Odoo 17 Accounting
How to Filter Blank Lines in Odoo 17 AccountingHow to Filter Blank Lines in Odoo 17 Accounting
How to Filter Blank Lines in Odoo 17 Accounting
 
AUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptxAUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptx
 
The Singapore Teaching Practice document
The Singapore Teaching Practice documentThe Singapore Teaching Practice document
The Singapore Teaching Practice document
 
Education and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptxEducation and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptx
 
Prescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptxPrescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptx
 

Brucon presentation

  • 1. BruCON is an annual security and hacker(*) conference providing two days of an interesting atmosphere for open discussions of critical infosec issues, privacy, information technology and its cultural/technical implications on society. Organized in Brussels, BruCON offers a high quality line up of speakers, security challenges and interesting workshops. It's affordable, accessible and entertaining. BruCON is a conference by and for the security and hacker community. (*)Hackers are "persons who delight in having an intimate understanding of the internal workings of a system, computers and computer networks in particular." People who engage in illegal activities like unauthorized entry into computer systems are called crackers and don't have anything to do with hacking. BruCON doesn't promote any illegal activities or behavior. Many hackers today are employed by the security industry and test security software and systems to improve the security of our networks and applications. In addition, for the younger generations, we want to create some awareness and interest in IT students to learn more about IT Security.
  • 2. Two day conference featuring: Christofer Hoff - The frogs who desired a king: A virtualization & cloud computing fable Vincent Rijmen - Trusted cryptography Chris Nickerson - Red and tiger team Chris Gates - Open source information gathering Jayson E. Street - Dispelling the myths and discussing the facts of Global Cyber-Warfare Paul James Craig - Rage against the Kiosk Eric Vyncke - Transition to IPv6 on the Internet: Threats and mitigation techniques Eric Adrien Filiol - How to prepare, coordinate and conduct a cyber attack Esther Schneeweisz - Building hacker spaces everywhere Brian Honan - Knowing Me Knowing You (The dangers of social networks) Mario Heiderich - Malicious markup - I thought you were my friend - cycle 3 Daniel Mende - "All your packets are belong to us" - Attacking Backbone Technologies" Sharon Conheady - Jedi mindtricks - Social engineering for penetration testers Stephan Chenette - A new web attack vector: Script fragmentation Justin Clarke - SQL Injection - how far does the rabbit hole go?
  • 3.
  • 4. Why should people attend this event? These are renowned speakers, international experts and book authors which you will seldom meet at other events. It’s an event by and for the security and hacker community. With 400 seats, it's an ideal occasion to network with others and exchange knowledge. Lightning talks will give possibilities for visitors to present their own projects, tools or website Various workshops on wireless security, digital ID, lockpicking, VOIP,…. The Hex Factor: a contest where people can learn basics of web application security, forensics,… both fun and challenging for both absolute beginners as well as experts. More info? How to register? Visit http://www.brucon.org/

Notas do Editor

  1. Brian Honan Brian Honan is recognised as an industry expert on information security and has addressed a number of major conferences relating to the management and securing of information technology. Brian is author of the book "Implementing ISO 27001 in a Windows Environment" ( http://www.itgovernance.co.uk/products/2207 ) and has also published a number of technical papers and has been technical editor and reviewer of a number of industry recognised publications. Brian is also the European editor for the SANS Institute’s weekly SANS NewsBites, a semi-weekly electronic newsletter. Brian founded the Irish Reporting and Information Security Service (IRISS www.iriss.ie) which is Ireland's first national CSIRT (Computer Security Incident Response Team). He is a member of the Information Systems Security Association, Irish Information Security Forum, Information Systems Audit and Control Association, a member of the Irish Computer Society,the Business Continuity Institute and was a founding member of the Irish Corporate Windows NT User Group. Chris Gates Chris Gates (CG). Founder Full Scope Security performing full scope penetration testing and security engineering. Previous jobs includes full scope penetration tester for one of the DoD Red Teams and Army Signal Officer spending gobs of time in layer 2 and layer 3 land. EthicalHacker.net columnist and security blogger. http://carnal0wnage.blogspot.com Chris Nickerson Chris Nickerson is a Certified Information Systems Security Professional (CISSP) whose main area of expertise is focused on Red Team Testing and Social Engineering. In order to help companies better defend and protect their critical data and key information systems, he has created a blended methodology to assess, implement, and manage information security realistically and effectively. At Lares, Chris leads a team of security consultants who conduct Security Risk Assessments, which can cover everything from penetration testing, Application Testing and Vulnerability assessments, to policy design, Social Engineering, Penetration Testing, Red Team Testing and Regulatory compliance testing. Prior to starting Lares, Chris was Director of Security Services at Alternative Technology, a Sr. IT compliance at KPMG, Chief Security Architect at Sprint Corporate Security, and developed an enterprise security design as network engineer for an international law firm. Chris is a member of OWASP, ISACA Denver and is also a featured member of TruTV's Tiger Team, a reality television program showing the activities of actual penetration tests and active assessments. He is also co-founder and host of the Exotic Liability Security Podcast, www.exoticliability.com. Christofer Hoff Christofer Hoff has over 15 years of experience in high-profile global roles in network and information security architecture, engineering, operations and management with a focus on virtualization and Cloud Computing security. Hoff is currently doing nothing until he finds something more fun to do or his wife goes mad and sends him to Starbucks to pretend to work. Prior to his role as unofficial beach bum of the blogosphere, he was Unisys Corporation’s Chief Security Architect, he served as Crossbeam Systems' chief security strategist, was the CISO for a $25 billion financial services company and was founder/CTO of a national security consultancy. Hoff obviously also enjoys referencing himself in the third person. Daniel Mende Daniel Mende is a German security researcher specialized on network protocols and technologies. He's well known for his Layer2 extensions of he SPIKE and Sulley fuzzing frameworks, he has discussed new ways in botnet-building and presented on protocol security at many occasions including Troopers08, ShmooCon and Blackhat. Usually he releases a new tool when giving a talk. Eric Adrien Filiol Eric Adrien Filiol has been an officer in the French Army for 20 years. He is now head scientist officer and professor in a research lab working for different department in France (justice, police, defense, academic). He holds a PhD in mathematics and computer science, a habilitation thesis in computer science, an engineer diploma in cryptology and has graduated from NATO in InfoOps. Eric Vyncke Before joining Cisco Systems in 1997, Eric worked for Siemens as their chief architect of the firewall product. Now, he is a Distinguished Engineer and assists customers with security designs and deployments. He is a guest professor at several Belgian Universities, participates regularly at the IETF. He wrote a book on LAN Switch Security and another one on IPv6 Security. Esther Schneeweisz Jayson E. Street Jayson is well versed in the ten domains of Information Systems security defined by the International Information Systems Security Certification Consortium ([ISC]2). He specializes in intrusion detection response, penetration testing, and auditing. Jayson has created and conducted security awareness training for a major Internet bank and have created security policies and procedures currently used by several companies. He also created and taught a three day training course on Intrusion Detection Systems for an undisclosed government agency in Washington D.C.. His consultation with the FBI on attempted network breaches resulted in the capture and successful prosecution of the criminals involved. In 2007 He consulted with the Secret Service on the WI-FI security posture at the White House. He is on the SANS GIAC Advisory Board. Also a current member on the board of directors for the Oklahoma "INFRAGARD". Jayson is also Vice President of the ISSA OKC chapter and a member of the "OSVDB". He is also a longtime member of the "SNOsoft" research team. Julia Wolf Julia Wolf does malware analysis, exploit research, reverse engineering, cryptography, and other low-level bit-twiddling. Currently she creates technologies for the analysis and detection of malware for Fireeye, inc. Justin Clarke Justin Clarke is a co-founder and Director at Gotham Digital Science, based in the United Kingdom. He has over twelve years of experience in assessing the security of networks, web applications, and wireless networks for large financial, retail, technology and government clients in the United States, the United Kingdom and New Zealand. Justin is the co-author of "Network Security Tools: Writing, Hacking, and Modifying Security Tools" (O’Reilly 2005), a contributing author to "Network Security Assessment: Know Your Network, 2nd Edition" (O’Reilly 2007), and the technical editor and lead author of “SQL Injection Attacks and Defense” (Syngress 2009) as well as a speaker at a number of conferences and events on security topics, including Black Hat USA, EuSecWest, OSCON, ISACA, RSA, SANS, OWASP, and the British Computer Society. He is the author of the open source SQLBrute blind SQL injection testing tool, and is the Chapter Leader for the London chapter of OWASP. Mario Heiderich Mario Heiderich is a cologne based CTO for an online enterprise based in Cologne and New York. He was a visitor and speaker on several OWASP conferences, maintains the PHPIDS and other security related projects and recently authored a German book on Web Security together with Christian Matthies, fukami and Johannes Dahse. Mario is currently into browser security and digging the HTML5 specifications. Paul James Craig Principal Security Consultant Security-Assessment.com Sharon Conheady Sharon Conheady is a social engineer/penetration tester at First Defence Information Security in the UK. She has social engineered her way into dozens of organisations across the UK and abroad, including company offices, sports stadiums, government facilities and more. She has presented on social engineering at security conferences including Deepsec, Recon, CONFidence, ISSE, ISF, SANS Secure Europe and more. After inventing the Internet alongside Al Gore, Sharon moved on to the development of security protocols that were used to crack 128 bit encryption. She holds a degree in Computer Science from Trinity College Dublin and a MSc in Information Security from Westminster University. Three times winner of the Nobel Prize, Sharon enjoys belly dancing and space travel. If you see Sharon around your office, she kindly requests that you open the door to let her in. Stephan Chenette Stephan Chenette is a Senior Security Researcher for Websense Security Labs working on malcode detection techniques. Mr. Chenette specializes in research tools ranging from kernel-land sandboxes, to static analysis scanners. He has released public analyses on various vulnerabilities and malware. Prior to joining Websense, Stephan was a security software engineer for 4 years working in research and product development at eEye Digital Security. Vincent Rijmen Vincent Rijmen is a Belgian cryptographer and one of the designers of the Rijndael, the Advanced Encryption Standard (AES). Rijmen is also the co-designer of the WHIRLPOOL cryptographic hash function, and the block ciphers Anubis, KHAZAD, Square, NOEKEON and SHARK. Since 1 August 2001, Rijmen has been working as chief cryptographer with Cryptomathic. From 2001–2003, Rijmen was a visiting professor at the Institute for Applied Information Processing and Communications at Graz University of Technology (Austria), and a full professor there from 2004–2007. Since October 2007, Rijmen is an associate professor (hoofddocent) at K.U.Leuven, working once again with the COSIC lab.