As we promised, the security conferences “Survival guide” for 2017 Q2 is here!
We have gathered the following information for you for each conference:
Dates Place Link to official conference website Ticket price Lectures WorkshopsSo let’s get started:
Security conferences Survival guide part 2
Infiltrate
Dates: 6-7 April 2017 Place: Fontainebleau Miami,Florida US Link to official conference website: http://infiltratecon.com/ Ticket price: 2400$ Lectures: Logic Bug Hunting in Chrome on Android by Georgi Geshev and Robert Miller 802.11 Protocol Chaos by Andres Blanco Sierra Had a Little Lamb: A Userland Kit for MacOS by Stephanie Archibald Be a Binary Rockstar: Next-level Static Analysis For Vulnerability Research by Sophia d’Antoine, Peter LaFosse and Rusty Wagner Forget Enumerating a Network, Hack the SIEM and Win the War by John Grigg Did I hear a shell popping in your baseband? by Ralf-Phillip Weinmann COM in Sixty Seconds! (well minutes more likely) by James Forshaw BugID Automated Bug Analysis by Berend-Jan Wever Remotely Compromising a Modern iOS Device by Marco Grassi and Liang Chen Cloud Post Exploitation Techniques by Andrew Johnson and Sacha Faust The Shadow Over Android: Heap Exploitation Assistance for Android’s libc allocator by Vasilis Tsaousoglou and Patroklos Argyroudis Hunting for Vulnerabilities in Signal by Jean-Philippe Aumasson and Markus Vervier Workshops: Web Hacking Language Review (Taught Remotely via WebEx) Web Hacking Wide Open To Interpretation Click Here For Ring0 Master Track: Applied Cryptanalysis Master Track: Kernel Exploitation
HITBSecConf
Dates: 10-14 April 2017 Place: NH Grand Krasnapolsky, Amsterdam Link to official conference website: http://conference.hitb.org/hitbsecconf2017ams/ Ticket price: Starting at 1,199 Lectures: Redefining Defense by Saumil Shah Breaking the Fourth Wall: Hacking Customer Information Control System by Ayoub Elaassal Femtocell Hacking: From Zero to Zero Day by JeongHoon Shin HITB Lab: Introduction to windows Logical Privilege Escalation by James Forshaw We Broke all CSPs and You Won’t Believe What Happened Next! by Michele Spagnuolo and Lukas Weichselbaum Can’t Touch This: Cloning Any Android HCE Contactless Card by Slawomir Jasek A New RISC by Don Bailey The Secret of ChakraCore: 10 Ways to Go Beyond the Edge by Linan Hao and Long Liu HITB Lab: Unbridled HIDIOcy by Steve Lord Drammer: The Making-Of by Victor van der Veen Using MBAE to Disable MBAE and Subvert ASLR/DEP by Abdulellah Alsaheel Harnessing Intel Processor Trace on Windows for Vulnerability Discovery by Richard Johnson ShadowBox: The Practical and Omnipotent Sandbox by Seunghun Han HITB Lab: Analyzing Malicious Office Documents by Didier Stevens I Got 99 Trends and a # is All of Them! How We Found Over 100 RCE Vulnerabilities in Trend Micro Software by Steven Seeley and Roberto Suggi Liverani Most Impressive: A Guide to Key Impressioning Attacks by Jos Weyers Everybody Wants SOME: Advance Same Origin Method Execution by Ben Hayak Chasing Cars: Keyless Entry System Attacks by Yingtao Zeng, Qing Yang and Jun Li HITB Lab: Practical Machine Learning in InfoSecurity by Clarence Chio and Anto Joseph Extracting All Your Secrets: Vulnerabilities in Android Password Managers by Stephan Huber, Steven Arzt and Siegfried Rasthofer The Best Laid Schemes: Attacking URL Schemes by Yu Hong Hunting For Vulnerabilities in Signal by Markus Vervier An Attack-in-Depth Analysis of Multicast DNS and DNS Service Discovery by Antonios Atlasis HITB Lab: Blue Picking: Hacking Bluetooth Smart Locks by Slawomir Jasek OverSight: Exposing Spies on macOS by Patrick Wardle Bypassing Memory Mitigations Using Data-Only Exploitation Techniques (Part II) by Bing Sun and Chong Xu Heads Up: Bootstrapping Systems with Open Source Firmware by Trammell Hudson Is There a Doctor in The House? Hacking Medical Devices and Healthcare Infrastructure by Anirudh Duggal Workshops: ICS/SCADA Security The ARM Exploit Laboratory Mastering Burp Suite Pro: 100% Hands-On Advanced Malware Analysis: Combating Exploit Kits Threat Intelligence Using Maltego Practical IoT Hacking linux Kernel Exploitation Techniques
x33fcon
Dates: 27-28 April 2017 Place: Pomeranian Science and Technology Park, Gdynia, Poland Link to official conference website: https://www.x33fcon.com/ Ticket price: starting at 190 EUR + Lectures: Dirty Little Secrets They Didn’t Teach You In Purple Team Class by Rob Fuller (aka mubix) Billions and Billions of Logs; Oh My by Jack Crook PowerShell for Practical Purple Teaming by Nikhil Mittal Upping your Bug hunting skills using symbolic virtual machines! by Anto Joseph In Cyber trenches, stories from firing range by Maciej Kotowicz (aka mak) Toppling the Stack: Outlier Detection for Threat Hunters by David J. Bianco Red teaming in Poland test cases by Borys cki The Covert Cupid Under .11 Veil by Rushikesh D. Nandedkar Where Cypherpunk Meets Organized Crime by Benjamin Brown Enhancing your threat Simulation: How to look less like a pentester and more like a threat actor A Defender’s perspective by Aaron Wade Invoke-CradleCrafter: Moar PowerShell obFUsk8tion & Detection (@(‘Tech’,’niques’) -Join ‘’) by Daniel Bohannon Weaponizing the USB Armory by Yashin Mehaboobe Workshops: Mobile Application Exploitation (iOS & Android) by Prateek Gianchandani Offensive PowerShell for Red and Blue Teams by Nikhil Mittal Metasploit Basics Extended Edition by mubix & carnal0wnage Web Application Security Attack and Defence by LogicalTrust Windows Kernel Exploitation by Ashfaq Ansari Ghost in Networks (network forensics) by Himanshu Anand POWER Class by Mikkel Gudse & Klaus Hoffbeck
CODEGATE
Dates: 11-13 April 2017 Place: Dongdaemun Design Plaza(DDP), Seoul, South Korea Link to official conference website: http://www.codegate.org/en/ Ticket