Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- IDEAS on what we may see from you:
- - General system exploitation techniques, vuln-dev and shellcoding
- - Web application hacking
- - Mobile exploitation
- - Breach cases and analysis
- - Reverse engineering
- - Rootkits
- - Wireless security
- - Hardware hacking
- - RFID, SmartCard, Auth Tech exploitation
- - Creative Compliance and/or PitFalls
- - Software Security and Code Analysis
- - Offensive Security (targeted system attacks like Scada, chipsets, od OS.. etc)
- - Crypto
- - Lockpicking, trashing and urban exploration
- - Red Team Testing
- - Corporate Intelligence / Industrial Espionage
- - Something so Heavy... No one is ready... cept for the BSiders... (see moxie's talk from BSidesLV2010)
- - And anything else you can/want to make a case for..... an uncensored speech for all to learn/interact with
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement