BruCON 2009 Sept. 18, 2009 to Sept. 19, 2009, Brussels, Belgium

Event Page

Notes :

Tell us about missing data
Title Speakers Summary Topic Types
Trusted Cryptography Vincent Rijmen Until late in the last century, cryptology and cryptographers were working almost exclusively for the ... Cryptography
Sql Injection - How Far Does The Rabbit Hole Go? Justin Clarke SQL Injection has been around for over 10 years, and yet it is still to ... SQL
Physical Locks By Toool Toool The Open Organization of Lockpickers (TOOOL) was founded in Amsterdam. Meanwhile, we have groups in ... Workshops
Social Engineering For Penetration Testers Sharon Conheady In recent years, people have become more familiar with the term "social engineering", the use ... Social Engineering
“I Am Walking Through A City Made Of Glass And I Have A Bag Full Of Rocks” (Dispelling The Myths And Discussing The Facts Global Cyber-Warfare) Jayson E. Street There is a war being raged right now. It is being fought in your living ... Others Security
Arduino: How We Made The Beerduino RandomData Arduino is an open-source electronics prototyping platform based on flexible, easy-to-use hardware and software. It's ... Hardware Reverse Engineering Hardware General Workshops
Wireless Auditing Thomas D'otreppe During this workshop, I'll tackle different scenarios that could happen during an audit of WiFi ... Wireless
How To Prepare, Coordinate And Conduct A Cyber Attack Eric Filiol This talk intends to present how true cyberattack could be planned and launched from a ... Security Cyberwar
Transition To Ipv6 On The Internet: Threats And Mitigation Techniques Eric Vyncke While IPv6 security is relatively well known in European Universities, most enterprises and service providers ... IPv6 Risk
Digital Id Anonymous Speaker This workshop will show you how to read your digital identification documents you're carrying with ... Workshops
A New Web Attack Vector: Script Fragmentation Stephan Chenette This presentation will introduce a new web-based attack vector which utilizes client-side scripting to fragment ... Web Exploitation Risk
Botnets, Ransomware, Malware, And Stuff! Julia Wolf This talk will cover some of the interesting trends in malware over the last several ... Malware Botnets
Rage Against The Kiosk Paul Craig My name is Paul Craig, and I am the self proclaimed "King of Kiosk Hacking". ... Security Others Exploitation
All Your Packets Are Belong To Us - Attacking Backbone Technologies Daniel Mende , Roger Klose The year 2008 has seen some severe attacks on infrastructure protocols (SNMP, DNS, BGP). We ... Security Network Penetration
Soldering: How Not To Burn Your Fingers Anonymous Speaker In this workshop the HackerSpace syn2cat will get you up to speed on the Basics ... Workshops
Lightning Talks Day 1 Anonymous Speaker Lightning Talks are 4-minute talks by various people combined in a set of 10 talks ... Lightning Talk
Update On The Belgian Information Security Initiative Jean-luc Allard , Alain De greve Last year, the Belgian Information Security Initiative (BISIS) was launched to improve the Belgian information ... Security Others
Open Source Information Gathering Chris Gates Security Others
Red And Tiger Team Chris Nickerson The world of Information Security is changing. Budgets are tighter, attacks are more sophisticated, and ... Mobile Security Security Others Deep Knowledge Application Security Monitoring Social Engineering Reverse Engineering Network Penetration Physical Pentesting
Knowing Me Knowing You (The Dangers Of Social Networks) Brian Honan In late 2008 the author was challenged by an Irish security journalist to steal her ... Security Others
Building Hackerspaces Everywhere Astera Within the last 12 months, we've seen hackerspaces spread all across the world at an ... Security Others
Auditing Voip Sandro Gauci , Joffrey Czarny Joffrey Czarny and Sandro Gauci will be giving a workshop about VOIP security. Content of ... Security Infrastructure
Malicious Markup - I Thought You Were My Friend - Cycle 3 Mario Heiderich The talk will cover a short exegesis of how and where browser vendors talk about ... Security Others Browser
The Belgian Beer Lovers Guide To Cloud Security Craig Balding In a hurry? The short version: learn about cloud security and in the process win ... Security Cloud