CONFidence 10

23-24 maja 2012

Kraków



  

speakers

partners

About conference

The conference took place on May 23-24, 2012 in Krakow!

During the tenth edition, there were workshops, discussion panels, a stay at Hackers 'Squad, Hackers' contests, Hackers for Charity Roulette, and many more.

Materials

Abraham Aranguren Legal and efficient Web app testing without permission
Alan Kakareka Insight into Russian black market
Alexander Minozhenko How to hack VMware vCenter server in 60 seconds
Andreas Bogk Herding RATs / How to pentest without blowing yourself up
Andrew Petukhov You won’t believe that blind can see: benchmarking SQL injection scanners
Artur Sidorko Architektura Bezpieczeństwa systemów kontroli przemysłowej
Babak Javadi Alarmed About Your Alarm System Yet?
Bernhard “Bruhns” Brehm Deniability in messaging protocols
Brad “RenderMan” Haines Hacker + Airplanes = No good can come of this
Dmitriy “D1g1″ Evdokimov Light and Dark side of Code Instrumentation
Filip Palian Simplest Ownage Human Observed… Routers
Gareth Hayes Non-alphanumeric JavaScript/PHP and Shared Fuzzing
Gaweł Mikołajczyk IPv6 insecurities at First Hop
Gregor Kopf Deniability in messaging protocols
Juraj Somorovsky All your clouds are belongs to us – security analysis of cloud management interfaces
John Draper History of hacking
Karim Valiev You won’t believe that blind can see: benchmarking SQL injection scanners
Keith Howell Alarmed About Your Alarm System Yet?
Krzysztof Kotowicz Something wicked this way comes
Luiz Eduardo Introduction to Mobile Snitch
Magdalena Kurnik Hackers: Beyond the Edge
Mario Heiderich Got your Nose! How to Steal Your Precious Data Without Using Scripts
Mateusz Kocielski Simplest Ownage Human Observed… Routers
Nicolas Grégoire Attacks on the XML data processing
Pavol Luptak Cryptoanarchy – decentralization begin
Piotr Ciepiela Architektura Bezpieczeństwa systemów kontroli przemysłowej
Raoul Chiesa Ladies and Gentlemen, here’s *Your* Cyber Army! (from a Hacker’s perspective, of course)
Sandy “Mouse” Clark Practical Insecurity in Encrypted Radio
Tomasz Sawiak Security monitoring use cases
Zane Lackey Security at scale: Web application security in a continuous deployment environment


Partners