5.7.16 Posted by Shipcode
Do you have that hacker spirit and culture? Do you love ROOTCON very much? If yes then you must be our next ROOTCON Ambassador? Don't worry it's not a contest! You just need to apply and we will check if you are fit to become one.
1. 20% discount on ROOTCON tickets applicable only on regular rates.
2. 10% off on all official ROOTCON swags.
3. FREE Entrance on ROOTCON Hackerspace activities.
4. FREE drinks at the ROOTCON chill-out area on the day of the event. ( NEW! )
5. Priority lane during ROOTCON event check-in.
P.S. The more entries you submit does not guarantee the chances of winning since this is not a contest :p
19.4.16 Posted by Shipcode
Hey all geeks!
We've got some good news for yah. Yeah that's right! Our CFP board has just approved three talks waiting to be served on ROOTCON X: https://www.rootcon.org/xml/rc10/talks
A first time speaker at ROOTCON, Eskie Cirrus James D. Maquilang, C)PEH will be delivering his talk on "Exploiting Home Routers". For those of you who don't know Eskie, he is the guy responsible for the Vulnerability Note VU#525276 wherein he reported multiple vulnerabilities of SpeedSurf 504AN and Kasda KW58293 modems distributed by PLDT (Phillipine Long Distance Telephone).
Another first time speaker is a seasoned speaker at OWASP India, Nullcon, Blackhat Asia and many other conferences. Let us all welcome Sanoop Thomas who is the author of Xtreme Vulnerable Web Application (XVWA) and Halcyon. This year he will be presenting his very own Halcyon - "Halcyon – A Faster Way to Build Custom Scripts for Nmap Scans".
8.4.16 Posted by Shipcode
One of the main reasons why geeks go to a hacker conference and information security gathering are the awesome lineup of speakers and interesting talks. Thus, I decided to create a list of hackers we want for our conference this year. I wanna tempt you guys to come to this year's ROOTCON with these pictures:
We are definitely eyeing and convincing these guys to visit this year.
|Kryptia on Defcon - we want these kind of guys too|
Daniel is one of the most respected influencers in the field of Cyber Security and Infosec. He is the former Practice Principal at HP Fortify and now the Director of Client Advisory Services at IOActive. According to Onalytica, he ranks number one in their recent announcement entitled Cyber Security and InfoSec: Top 100 Influencers and Brands.
He is also known as sinn3r and is the longest serving Metasploit Exploit Developer who works at Rapid7. We want this Metasploit guy rocking on our conference for his skills and good personality. Whenever, I create a new Metasploit module - he is always there to help me and guide me.
The Entire Metasploit Team at Rapid7
We are not only inviting Wei Chen! If you are on the Metasploit Team then you are definitely invited to speak at ROOTCON. Paging jvasquez, James Lee (egyp7), William Vu (wvu-r7), Tod Beardsley, Mo Sadek, etc.
He is the founder of Whitehat Security, Professional Hacker, Black Belt in Brazilian Jiu-Jitsu and is one of the top influencers in the field of web application security. He has also presented numerous topics about web security in various hacker conferences.
In the 1990's, Caleb pioneered research on SQL Injection - yes he is a Legend! Now he is the Executive Chairman and Co-Founder of Bluebox Security. Here is his bio that I grabbed from his company's website:
He is also known as @WebBreacher in Twitter. He is an active member in the NoVAHackers community, writes Recon-ng modules, SANS Certified Instructor and enjoys tackling issues with the Python scripting language.
Alexander is another authority in SAP Cyber Security. He is the founder of ERPScan and President of the EAS-SEC.org project. Recognized as an R&D professional and Entrepreneur of the year, his expertise covers the security of enterprise business-critical software like ERP, CRM, SRM and industry specific solutions for Oil and Gas, Manufacturing, Retail and Banking; as well as other verticals developed by enterprise software companies such as SAP and Oracle.
Mon has been a consultant to international organizations such as WHO and NEC, is the Co-Head Security Architect of DOST-ICTO for the Integrated Government Project (iGov), the Network Infrastructure and Security Consultant of the UP Computer Center, etc.
A member of Team Manila, Mon, with Paul Prantilla, has competed in the DEFCON 22 in Las Vegas this 2014. The team participated in multiple contests achieving 4th out of 264 teams for the Network Forensics Puzzle Contest (NFPC), and also 4th at the Capture the Packet Contest (CTP) championship round. They also competed in the 2014 Capture The Flag contest at Hack In The Box, Kuala Lumpur -- making them the first and only team from the Philippines to ever compete in an international CTF event.
Bruce is one of the most influential security guru in the field of cryptography. He has been involved in the creation of many cryptographic algorithms: Skein, Solitaire, Phelix, Helix, Fortuna, Yarrow algorithm, Twofish, Blowfish, Threefish, and MacGuffin Pictures.
Sir Tophs has spoken at ROOTCON for two conferences already and yes we want him back! He is the Principal Malware Scientist at RSA. He has a long history of digital threat and malware expertise, reversing, research and product development started at Trend Micro as one of the pioneers of TrendLabs where he honed his skills in malware reversing. He then built F-Secure’s Asia R&D where he spearheaded projects in vulnerability discovery, web security and mobile security. After F-Secure, he joined Damballa as their resident malware subject matter expert and reverse engineer. He speaks at conferences around the world and frequently provides expert opinion about malware, botnets and advance persistent threats for leading industry and mainstream publications. Elisan’s published works include "Advanced Malware Analysis."
Shawn a.k.a lattera is a Security Engineer and Co-founder of the HardenedBSD project. It would be nice if he can introduce his project during ROOTCON 10. He is also a long-time crew member of SOLDIERX.
He is the organizer of the major event Blackhat Arsenal Tools (US and Europe) since 2011 and the founder and the main maintainer of toolswatch.org. He also maintains the projects; DPE (Default Password Enumeration), vFeed® the open source correlated & cross-linked vulnerability database, FireCAT the Firefox Catalog of Auditing exTensions, and KromCAT – Google Chrome Catalog of Auditing exTensions. Maybe he can organize an event like Arsenal Tools? Let's see!
He is the founder of the open source OSSEC HIDS and the Founder/CTO of Sucuri. He is also the co-writer of the Host-Based Intrusion Detection book and is an active writer at blog.sucuri.net.
Tavis has been seen nowadays in the mailing lists and exploit databases breaking antivirus software. This guy is legit since he is currently employed by Google as part of their Project Zero team. Tavis you are an inspiration!
Dan is one of the few elite hackers in the Philippines who is a chick magnet according to Tikbalang. He is the Vice-President of the Information Security Division in PSBank, one of goons of ROOTCON, and an Outstanding ASEAN CISO Awardee for 2013.
Craig runs runs Theia Labs, a research firm that focuses on security auditing and building hardware and software prototypes. He has worked for several auto manufacturers and provided them with his public research. He is also a founder of the Hive13 hackerspace and OpenGarages.org. Craig is a frequent speaker on car hacking and has run workshops at RSA, DEF CON, and other major security conferences. He is the author of the book "Car Hacker's Handbook: A Guide for the Penetration Tester".
He is the founder of WeakNet Laboratories, and the lead developer of known open-source security projects and tools like WEAKERTHAN Linux, WiFiCake-NG, WardriveSQL, GPS-Parser-ng, WPA Phishing Attack for EAP Phishing, SSWR (Scripted Security for Wireless Routers), Catchme-NG, Perlwd (Perl UNiX MD5 HASH Cracking application), and many more.
Oh wait, you are not on the list? Don't worry! If you think you can do better than these guys which I think you can then please submit your talk at cfp [at] rootcon [dot] org and follow the instructions here: https://www.rootcon.org/xml/rc10/cfp.
7.4.16 Posted by ROOTCON
5.4.16 Posted by Shipcode
- How to Shot Web: Better Web Hacking in 2015 by Jason Haddix
- BackDooring Git by John Menerick
- Open Source Internet Infrastructure Insecurity by John Menerick
- Unmasking Malware by Christopher Elisan
- Hacking Time by Carlos Tingson
- Hiding Behind ART by Paul Sabanal
- Building Automation and Control: Hacking Energy Saving System by Philippe Z Lin
- Detecting Indicators of a Compromise Using an SDN-Based Network Access Control Implementation by Mon Nunez & Paul Prantilla
- Incident Response for Targeted attacks by Jose Ramon Palanco
- How safe is my system from reverse engineering by Markku Kero
- Fixing CSRF Vulnerabilities Effectively by Lu Zhao
- Once more unto the data breach by Steve Miller
- Oh My Honey: Honeypots (or honeynets) by Ray Torres
- Understanding HTTP/2 by Nathan LaFollette
- Real-life hack (responsible disclosure)
- Non-tech hacking
- New tool release
- Exploit Development
- Reverse Engineering
- Web Application Attacks
- Tools 101 (Metasploit, Nmap, etc…etc…)
- Wireless Attacks (3G, 4G, 802.11(x))
- Cloud Security
- Vulnerability Discovery
- OS Level Vulnerabilities
- Physical Security (Lock picking – Digital Locks or Digital Safes)
- SQL Injections
- Vendor Appliance Vulnerabilities
- Exploitation Techniques
- Mobile Security
- Internet of Things (IOT)
7.10.15 Posted by ROOTCON
Another epic ROOTCON event has been nailed in history, not just on the ROOTCON history but a history in the Philippine Information Security industry. This year we took extra leap of challenge, we chose another venue for ROOTCON, it was a very hard turn-point for the ROOTCON logistics as we don't know the challenges ahead, but it turned out to be very epic!!!