Information Security Conference

Responsive image

Shedule

The program of the conference is supplemented, follow the update in Telegram.


Greetings of conference guests

Roman Romanov, Luka Safonov, Pentestit

The implementation of the GSM protocol stack based on OsmocomBB

Anton Gorbachev, Pentestit

Using the radare2 framework in reverse engineering to analyze binary files

Dmitry Lobzin, Pentestit

Meta-polymorphic-evasive shellcodes and MorphEUS utility

Maksim Zaytsev, ENKI (France)

Detection and analysis of spyware scripts on the site

Grigory Zemskov, Revisium

Presentation of Burp Suite plug-in from Vulners for vulnerability detection

Kirill Ermakov, QIWI

Forensic analysis .

Stanislav Karasev, The Academy of Federal Security Guard Service of the Russian Federation

Heuristic algorithms for detecting malicious code

Andrey Matskevich, The Academy of Federal Security Guard Service of the Russian Federation

Malicious code analysis of mobile applications - Android malware analysis

Vladimir Korennoy, Pentestit

Methods for bypassing signature analysis of modern Web Application Firewalls

Luka Safonov, Pentestit

Hall | Subject Speaker Time
Hall 1Greeting Romanov R., Safonov L. 10:00
Hall 1The implementation of the GSM protocol stack based on OsmocomBB Gorbachev A. 10:30
Hall 1Using the radare2 framework in reverse engineering to analyze binary files Lobzin D. 11:30
Hall 1Detection and analysis of spyware scripts on the site Zemskov G. 12:30
Hall 1Hash-functions collisions Pavlov P. 13:30
Hall 1Automation of OSINT Zapolskiy A. 14:30
Hall 1Vulnerabilities of IoT/embedded devices Gorokhov A. 15:30
Hall 1Malicious code analysis of mobile applications Korennoy V. 16:30
     
Hall 2MorphAES: Meta-polymorphic-evasive shellcodes Zaytsev M. 10:30
Hall 2Presentation of Burp Suite plug-in from Vulners for vulnerability detection Ermakov K. 11:30
Hall 2Forensic analysis Karasev S. 12:30
Hall 2Topological variants of WAF implementation Dugin A. 13:15
Hall 2Heuristic algorithms for detecting malicious code Matskevich A. 14:15
Hall 2Distributed systems for detecting computer attacks Matskevich A. 15:00
Hall 2WAF bypass methods Safonov L. 16:00

Call for papers

Want to become a speaker?
Send an application with a description of the subject to info@pentestit.ru.

The implementation of the GSM protocol stack based on OsmocomBB

Anton Gorbachev, Pentestit

Using the radare2 framework in reverse engineering to analyze binary files

Dmitry Lobzin, Pentestit

Meta-polymorphic-evasive shellcodes and MorphEUS utility

Maksim Zaytsev, ENKI (France)

Detection and analysis of spyware scripts on the site

Grigory Zemskov, Revisium

Presentation of Burp Suite plug-in from Vulners for vulnerability detection

Kirill Ermakov, QIWI

Topological variants of WAF implementation

Dugin Andrew

Forensic analysis OS Windows

Stanislav Karasev, The Academy of Federal Security Guard Service of the Russian Federation

Heuristic algorithms for detecting malicious code

Andrey Matskevich, The Academy of Federal Security Guard Service of the Russian Federation

Malicious code analysis of mobile applications - Android malware analysis

Vladimir Korennoy, Pentestit

Methods for bypassing signature analysis of modern Web Application Firewalls

Luka Safonov, Pentestit

Conference Venue

Oryol, Congress-hall Grinn, Kromskoy's highway, 4.