Pod koniec maja odbędą się w Krakowie dwie konferencje na których będę miał razem 3 prelekcje: dwie 24-25 maja na SEConference, oraz jedną (razem z j00ru) na CONFidence.
SEConference
Bezpłatna konferencja organizowana przez Koło Naukowe IT Security Group działające przy Wydziale Fizyki, Matematyki i Informatyki Politechniki Krakowskiej.
Kiedy: 24-25 maja 2013
Gdzie: Pawilon Konferencyjno-Wystawowy "Kotłownia" na terenie Politechniki, Kraków.
Prelekcja 1: Dziesięć tysięcy pułapek: ZIP, RAR, etc.
Rzut okiem "od podszewki" na kilka formatów archiwów, oczywiście od strony pt. "co by tu można popsuć".
Prelekcja 2: CTFs, and Compos, and WarGames! Oh, my!
Popularyzacyjno-motywacyjna prelekcja o różnego rodzaju mniej lub bardziej formalnych konkursach związanych z sec/hack, RE, czy programowaniem.
CONFidence
Międzynarodowa, płatna, konferencja organizowana przez fundację PROIDEA. Moim zdaniem najlepsza i największa konferencja poświęcona sec/hack w Polsce.
Kiedy: 28-29 maja 2013
Gdzie: Budynek zabytkowej przepompowni wody na Bielanach, Kraków.
Prelekcja: Beyond MOV ADD XOR – the unusual and unexpected in x86 (wspólnie z j00ru)
Intel x86 and the derived AMD64 architecture families are by far the most widespread and commonly known ones, powering millions and millions of desktop PCs, server racks and even some mobile devices. Although understanding low-level X86 assembly code has been subject to extensive study by hobbyists, professional reverse engineers and exploit developers alike, the research typically covers only a small subset of both instruction set and features the architecture has to offer. In this presentation, we will address numerous interesting, often security-relevant tidbits, unpopular features and unusual behaviors that we have came across during our journey through the manuals, books and research papers, as well as our own experience.
Basic knowledge of x86 assembly and its execution environment is highly recommended.
(Taak, jak się można domyślić prelekcja będzie w języku angielskim)
Tak więc do zobaczenia w Krakowie ;>
Sections
- lang: |
- RSS: |
- About me
- Tools
- → YT YouTube (EN)
- → D Discord
- → M Mastodon
- → T Twitter
- → GH GitHub
Links / Blogs
- → dragonsector.pl
- → vexillium.org
- Security/Hacking:
- Reverse Eng./Low-Level:
- Programming/Code:
Posts
- Paged Out! #5 is out,
- CVEs of SSH talk this Thursday,
- Debug Log: Internet doesn't work (it was the PSU),
- FAQ: The tragedy of low-level exploitation,
- Solving Hx8 Teaser 2 highlight videos!,
- Gynvael on SECURITYbreak podcast,
- Paged Out! #4 is out,
- I won't be able to attend CONFidence'24 after all :(,
- xz/liblzma: Bash-stage Obfuscation Explained,
- Two of my bookmarklets: image extraction and simple TTS,
- → see all posts on main page
// copyright © Gynvael Coldwind
// design & art by Xa
// logo font (birdman regular) by utopiafonts / Dale Harris
/* the author and owner of this blog hereby allows anyone to test the security of this blog (on HTTP level only, the server is not mine, so let's leave it alone ;>), and try to break in (including successful breaks) without any consequences of any kind (DoS attacks are an exception here) ... I'll add that I planted in some places funny photos of some kittens, there are 7 of them right now, so have fun looking for them ;> let me know if You find them all, I'll add some congratz message or sth ;> */
Vulns found in blog:
* XSS (pers, user-inter) by ged_
* XSS (non-pers) by Anno & Tracerout
* XSS (pers) by Anno & Tracerout
* Blind SQLI by Sławomir Błażek
* XSS (pers) by Sławomir Błażek
// design & art by Xa
// logo font (birdman regular) by utopiafonts / Dale Harris
/* the author and owner of this blog hereby allows anyone to test the security of this blog (on HTTP level only, the server is not mine, so let's leave it alone ;>), and try to break in (including successful breaks) without any consequences of any kind (DoS attacks are an exception here) ... I'll add that I planted in some places funny photos of some kittens, there are 7 of them right now, so have fun looking for them ;> let me know if You find them all, I'll add some congratz message or sth ;> */
Vulns found in blog:
* XSS (pers, user-inter) by ged_
* XSS (non-pers) by Anno & Tracerout
* XSS (pers) by Anno & Tracerout
* Blind SQLI by Sławomir Błażek
* XSS (pers) by Sławomir Błażek
Comments:
Z poprzednich konferencji CONFidence są materiały, więc w tym roku pewnie też będą.
Add a comment: