RUXCON 2005 Timetable
08:30 | Doors open |
09:30 | Presentation: To be announced |
10:30 | Presentation: Attack Automation |
11:30 | Presentation: Beyond NX: An attackers guide to anti-exploitation technology for Windows |
12:30 | Presentation: Long Filename, Long Parameter, Malformed Data. Another Day, Another Vulnerability. Same Bug, Different App. |
13:30 | Activity: Capture The Flag Launch |
13:30 | Activity: Chilli Eating Competition |
14:30 | Presentation: Binary protection schemes Presentation: Securing Modern Web Applications |
15:30 | Presentation: Using OWASP Guide 2.0 for Deep Penetration Testing Presentation: Moving towards the Artificial Hacker |
16:30 | Activity: Street Fighter II Competition |
17:30 | Presentation: Computer Forensics: Practise and Procedure Presentation: Black Box Web Application Penetration Testing |
18:30 | Presentation: Trust Transience: Post Intrustion SSH Hijacking Presentation: Crypto Rodeo |
20:00 | Activity: Pool Competition |
top ^
10:30 | Doors open |
11:30 | Presentation: Deaf, Dumb and Mute: Defeating Network Intrusion Detection Systems |
12:30 | Presentation: Attacking WiFi with traffic injection |
13:30 | Activity: Lunch time Quiz |
14:30 | Presentation: Malware Analysis |
15:30 | Presentation: Breaking Mac OSX |
16:30 | Break |
17:30 | Presentation: Electronic Evidence - a Law Enforcement Perspective |
18:30 | Presentation: Poker Paranoia |
19:30 | Activity: Panel |
20:30 | Closing speech |