[Full-disclosure] nullcon Delhi 2012 Call for Paper/Call for Event

2012-04-28 Thread murtuja bharmal


 Hi All,

For the very first time nullcon now comes to Delhi - to showcase cutting edge 
security technologies and discuss new attack vectors and security threats among 
the  Corporate world and the Government sector. The event brings together 
thought leaders,Corporates, Government and security professionals all under one 
roof.

Prototype:
-
We are introducing a new sub-event - Prototype at nullcon Delhi 2012. The event 
provides opportunities to innovative companies to showcase their latest and new 
technology/products to the nullcon audience. The main aim behind Prototype is 
to enable and boost companies driving innovation in security domain and provide 
them a perfect platform to boast about their new technology and at the same 
time grab the attention of potential investors and business partners at minimal 
cost. For more details about the event, its costing and how your organization 
can participate kindly contact: info_at_nullcon.net

Categories:
—

The talk time duration includes time for questions and answers (5-10 minutes).

1. Research Category  (40 mins - 1 hr) is a deep knowledge technical track that 
includes
new research, tools, vulnerabilities, zero days or exploits.

2. Technical Category  (30 mins - 1 hr)  comprises of known security issues, 
case
studies, twist to an existing research, tool, vulnerability, exploit or
research-in-progress. Although this track is fairly technical, it covers
known techniques and analysis and is specially created for security
professionals who are not too much into new research, are auditors, management
professionals and newbies.

3. Desi Jugaad (1 hr) is our signature research category talk and includes any 
local
Indian/Asian hacks.

Submission Topics:
———

1. One of the topics of interest to us is Desi Jugaad(Local Indian/Asian
Hack) and has a separate track of its own. Submissions can be any kind of
local hacks that you have worked on (hints: electronic/mechanical meters,
automobile hacking, Hardware, mobile phones,  lock-picking, bypassing
procedures and processes, etc. Be creative!)

2. The topics pertaining to security and hacking in the following
domains(but not limited to):
- Hardware Hacking(ex: RFID, Magnetic Strips, Card Readers, Mobile Devices,
Electronic Devices)
- Tools/exploits/Zero-days (noncommercial)
- Programming/Software Development security and weaknesses
- Network vulnerabilities.
- Information Warfare, cyber espionage, cyber crime, cyber laws
- Malware, Botnets
- Web attacks and application hacking
- New attack vectors
- Mobile malware, vulnerabilities, exploits, VOIP and Telecom
- Virtualization security, hacking VMs, breaking out of VMS etc
- Cloud security, threats and exploitation
- Critical Infrastructure
- Satellite hacking
- Wireless hacking
- Forensics

Submission Format:
———

Email the Paper to: cfp_at_nullcon.net
Subject should be: CFP Delhi 2012 Paper Title
Email Body:
1. Name
2. Handle
3. Track ( Time required in case of General/Business track)
4. Paper Title
5. Country(and City) of residence
6. Organization and Designation
7. Contact no.
8. Have you presented or submitted this paper at any other conference(s) or
magazine(s)?
Yes, No. If yes, where? and how this submission is different from the
previous ones. Note that new research talks already given elsewhere or are
due to be given elsewhere prior to nullcon will be considered as Technical 
category
talks unless they consist of cutting edge and ground breaking
technology, which is at the judgment of the review committee.
9. Are you releasing an open source tool?
Yes/No. (If yes, please include the source code for review)
10. Are you releasing an exploit?
Yes/No. (If yes, please include the source and vulnerability details for
review)
11. Are you releasing a new vulnerability/Zero-day?
Yes/No. (If yes, please send us the details, including reproduction
procedure, for review)
12. Why do you think your paper is different/innovative (for all tracks) and
how does it qualify as new work/research(for Research track only)?
13. Are there any live demonstrations (These earn you good points during
review)?
Yes/No. (If Yes, how many? Also please explain each demo)
14. Brief Profile ( = 500 Words)
15. Paper Abstract - Please provide detailed working or your research/work. The 
more details you provide the better it is for the reviewers. Please keep the 
abstract to the point. Please do not try to hide the technical details or say 
“I can't disclose it till bla bla” as it does not help the reviewers in any way 
and may give your paper a low score because of insufficient information 
available in the abstract.
16. Your high resolution photo (attached)

NOTE:
—
Only the original authors should submit their research and any submission from 
a third party will be rejected. The Abstract should clearly mention the 
techniques and hacks in detail and merely mentioning that it works will not 
help in understanding the research
to its full 

[Full-disclosure] nullcon CTF Battle Underground 2012 is on

2012-02-16 Thread murtuja bharmal



We are back !

http://nullcon.net/battleunderground/

LaLa Land is going to wage war against Penguin Land.


LaLa Land's newly founded National Hacker's Organization (NHO) is
tasked to penetrate Penguin's Ice Headquarters (IHQ) and gather
information about Penguin deployment plans and orbats.

LaLa Land’s Technical LaLa Division decided to create Teams of Hackers
in NHO and independently task them to gather as much information as
possible.

Your job as a respected member of LaLa Land’s NHO is to penetrate
Penguin Land’s IHQ network and gather as much documents as you can
which will earn you brownie points.

Rules
__

This is an open ended contest and the winner will be declared based on maximum 
score at the end of day 2. The winner will be contacted via the e-mail address 
they use for registration.


Player need to create an account in order to participate in the challenge. 

Please use a valid email address as the account needs to be validated before 
you can start the fun.
Only the First Person to complete challenge will win SANS SEC 504: Hacker 
Techniques, Exploits  Incident Handling Class (worth $4095)

Battle Underground (2012) does NOT give participants any legal permission to 
exploit http://nullcon.net or its hosting partner in a destructive manner . Any 
attack against the site or the hosted servers will be observed under general 
legal framework.

The winner can claim his prize only after submission of very brief writeup  
(Vulnerability found) of the contest and his solution / approach

The unofficial back channel for Battle Underground (2012) 
is irc.chat4all.org #nullcon
Follow us on @nullcon for twitter updates.

Cheers
|\/|___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] Battle Underground 2012 will start on 17th Feb 2012 10:30 am GMT +5:30

2012-02-15 Thread murtuja bharmal


LaLa Land is going to wage war against Penguin Land.


LaLa Land's newly founded National Hacker's Organization (NHO) is
tasked to penetrate Penguin's Ice Headquarters (IHQ) and gather
information about Penguin deployment plans and orbats.

LaLa Land’s Technical LaLa Division decided to create Teams of Hackers
in NHO and independently task them to gather as much information as
possible.

Your job as a respected member of LaLa Land’s NHO is to penetrate
Penguin Land’s IHQ network and gather as much documents as you can
which will earn you brownie points.

Rules
__

This CTF will be online during the days of the conference ie. 17th and 18th Feb 
only. This is an open ended contest and the winner will be declared based on 
maximum score at the end of day 2. The winner will be contacted via the e-mail 
address they use for registration.


Player need to create an account in order to participate in the challenge. 

Please use a valid email address as the account needs to be validated before 
you can start the fun.
Only the First Person to complete challenge will win SANS SEC 504: Hacker 
Techniques, Exploits  Incident Handling Class (worth $4095)

Battle Underground (2012) does NOT give participants any legal permission to 
exploit http://nullcon.net or its hosting partner in a destructive manner . Any 
attack against the site or the hosted servers will be observed under general 
legal framework.

The winner can claim his prize only after submission of very brief writeup  
(Vulnerability found) of the contest and his solution / approach

The unofficial back channel for Battle Underground (2012) 
is irc.chat4all.org #nullcon
Follow us @nullcon for twitter updates.

Cheers

Murtuja Bharmal
website: http://null.co.in___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/