This archive includes talk slides, source code and general accompanying files from talks and competitions at RUXCON 2003. If you have any enquiries or find any broken links report them to web ruxcon org au
.
Using Data Recovery and Discovery Techniques for Presenting Forensic Evidence by Rival |
|
|
Privilege Separation and Related Technologies by Solace |
|
|
GSM Operators Security by Emmanuel Gadaix |
|
|
The State of Web Applications Security by David Jorm |
|
|
Decompilation for Security Analysts by Trent Waddington |
|
|
Writing Exploits under Mips/IRIX by Peter Werner |
|
|
Smart Cards and Side-Channel Cryptanalysis by Ryan Junee |
|
|
Law enforcement, cyber crime and the Australian security community by Alastair MacGibbon |
|
|
Attacking RSA Key Generators by Icebsd |
|
|
Breaking Network Authentication, from Passwords to Hardware by Ruptor |
|
|
Regulation of Encryption Technologies by Nick Ellsmore |
|
|
Auditing the (opensource) kernel [kfc style] by Silvio Cesare |
|
|
Artificial Intelligence for the Lazy Hacker by Fyodor Yarochkin and Mikasoft |
|
|
All material is for educational purposes and to supplement talks that were presented at RUXCON 2003. All views expressed in the material present is that of the speaker and not reflective of RUXCON. Any programs or source code contained within this material is purely for proof of concept.