International Speakers - Simultaneous translation

SOCIAL

Google Groups
Email:
Visit this group

TRAININGS

Architecture Hacking: Understanding the concepts for code exploitation

Instructor: Ygor da Rocha Parreira

Total seats: 15

Vacancies: 5

Minimum Required: 7

Duration: 16 hours

Date: 20 and 21 of october, 2014

Bring your own Laptop: Yes

Language: Portuguese

Investment: R$ 850,00

 

Reverse engineering in Linux

Instructor: Fernando Merces

Total seats: 15

Vacancies: 7

Minimum Required: 7

Duration: 16 hours

Date: 22 and 23 of october, 2014

Bring your own Laptop: Yes

Language: Portuguese

Investment: R$ 850,00

 

CONFIRMED SPEAKERS

 

Reversing firmware using radare2
DemystiPHYing 802.15.4 Digital Radio; or, How to Weaponize ingerprinting for PacketinPacket Mitigation Bypasses
For Want of a Nail (*): A LangSec look at parser bugs in the Pwnies
Android file system monitoring discussion
LTE vs Darwin: Return of the SON
Keynote
Who put the backdoor in my modem
State of the Art in IPv6 Security
Keynote
Catch­me if you can: TOR tricks for bots, shells and general hacking
Hardware Backdooring X11 with much class and no privileges
HexRaysCodeXplorer: object oriented RE for fun and profit
Practical Analysis of Embedded Microcontrollers against Clock Glitching Attacks
Headless Browser Hide and Seek
Option ROMs: A Hidden (But Privileged) World
Pesquisa de XSS e seus variantes em consoles de gateways voltados a SI

 

 


The use of "hacker" to mean "security breaker" is a confusion on the part of the mass media. We hackers refuse to recognize that meaning, and continue using the word to mean, "Someone who loves to program and enjoys being clever about it".

Richard Stallman

 

 

 ORGANIZATION

 

 

 PLATINUM SPONSORS

 

 

 GOLD SPONSORS

 

 

 

 SILVER SPONSORS

 

 

 BRONZE SPONSORS

 

 

 

 

 

 

 

 

 

 HACKING

 

 

 SUPPORTING ORGANIZATIONS