From owner-freebsd-security@FreeBSD.ORG Mon Sep 19 10:27:09 2005 Return-Path: X-Original-To: freebsd-security@freebsd.org Delivered-To: freebsd-security@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 3D4AE16A41F for ; Mon, 19 Sep 2005 10:27:09 +0000 (GMT) (envelope-from cfp@ruxcon.org.au) Received: from ruxcon.org.au (mail.ruxcon.org.au [209.9.226.180]) by mx1.FreeBSD.org (Postfix) with ESMTP id 0100443D46 for ; Mon, 19 Sep 2005 10:27:08 +0000 (GMT) (envelope-from cfp@ruxcon.org.au) Received: by ruxcon.org.au (Postfix, from userid 1005) id B7EC71AD4004; Mon, 19 Sep 2005 10:27:07 +0000 (UTC) Date: Mon, 19 Sep 2005 10:27:07 +0000 To: undisclosed-recipients: ; Message-ID: <20050919102707.GA6779@ruxcon.org.au> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.5.6+20040907i From: cfp@ruxcon.org.au (RUXCON Call for Papers) X-Mailman-Approved-At: Mon, 19 Sep 2005 11:33:46 +0000 Subject: RUXCON 2005 Update X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 19 Sep 2005 10:27:09 -0000 Hi, RUXCON is quickly approaching yet again. This e-mail is to bring you up to date on the latest developments on this years conference. Our speakers list is complete [1] and our timetable has been finalised [2]. Below is a list of presentations for RUXCON 2005 (in order of acceptance): 1. Breaking Mac OSX - Ilja Van Sprundel & Neil Archibald 2. Binary protection schemes - Andrew Griffiths 3. Using OWASP Guide 2.0 for Deep Penetration Testing - Andrew van der Stock 4. Black Box Web Application Penetration Testing - David Jorm 5. Long Filename, Long Parameter, Malformed Data. Another Day, Another Vulnerability. Same Bug, Different App. - Brett Moore 6. Computer Forensics: Practise and Procedure - Adam Daniel 7. Poker Paranoia - Sean Burford 8. Moving towards the Artificial Hacker - Ashley Fox 9. Attack automation - Roelof Temmingh 10. Electronic Evidence - a Law Enforcement Perspective - Jason Beckett 11. Beyond NX: An attackers guide to anti-exploitation technology for Windows - Ben Nagy 12. Crypto Rodeo - Amy Beth Corman 13. Trust Transience: Post Intrusion SSH Hijacking - Metlstorm 14. Attacking WiFi with traffic injection - Cedric "Sid" Blanche 15. Securing Modern Web Applications - Nik Cubrilovic 16. Malware Analysis - Nicolas Brulez 17. Deaf, Dumb and Mute: Defeating Network Intrusion Detection Systems (NIDS) - Christian Heinrich As in previous years, there will be activities and competitions, which allow attendees to have fun, win prizes, and socialise, all while enjoying a cold beer on an Australian summers day. Some activities which will be held during the conference include: * Capture the flag * Reverse engineering * Exploit development * Chilli eatoff * Trivia This will be the third year in a row in which we've brought a quality conference to the Australian computer security community. Hope to see you there. Regards, RUXCON Staff http://www.ruxcon.org.au [1] http://www.ruxcon.org.au/2005-presentations.shtml [2] http://www.ruxcon.org.au/2005-timetable.shtml