Advertisement
Guest User

Untitled

a guest
Aug 17th, 2017
103
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 0.82 KB | None | 0 0
  1.  
  2.  
  3. IDEAS on what we may see from you:
  4.  
  5. - General system exploitation techniques, vuln-dev and shellcoding
  6.  
  7. - Web application hacking
  8.  
  9. - Mobile exploitation
  10.  
  11. - Breach cases and analysis
  12.  
  13. - Reverse engineering
  14.  
  15. - Rootkits
  16.  
  17. - Wireless security
  18.  
  19. - Hardware hacking
  20.  
  21. - RFID, SmartCard, Auth Tech exploitation
  22.  
  23. - Creative Compliance and/or PitFalls
  24.  
  25. - Software Security and Code Analysis
  26.  
  27. - Offensive Security (targeted system attacks like Scada, chipsets, od OS.. etc)
  28.  
  29. - Crypto
  30.  
  31. - Lockpicking, trashing and urban exploration
  32.  
  33. - Red Team Testing
  34.  
  35. - Corporate Intelligence / Industrial Espionage
  36.  
  37. - Something so Heavy... No one is ready... cept for the BSiders... (see moxie's talk from BSidesLV2010)
  38.  
  39. - And anything else you can/want to make a case for..... an uncensored speech for all to learn/interact with
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement