[ :: mainpage :: register :: conference :: training :: venue map :: agenda :: press/media ]
[ :: capture the flag (CTF) :: zone-h hacking challenge :: open-hack :: forum :: sponsors ]
[ :: contact :: past conferences :: open source security project showcase ]

Conference presentation materials have been released.
You can download them from Packet Storm

THIS PAGE IS CLOSED

Filed under: Main Page — Administrator @ 1:41 pm

May 4, 2006

This site is no longer being updated. Please click here to go to our latest conference page.

HITBSecConf2005 - Conference Agenda Released

Filed under: Main Page — Administrator @ 3:40 pm

August 10, 2005

The 2-day Dual-Track security conference agenda is now online. Do note that the schedule is subject to minor changes as we add in the final group of speakers. Our conference kit can be downloaded from here.

The following papers have been announced:

Corp. vs. Corp: Profiling Modern Espionage - Roberto Preatoni & Fabio Ghioni

STIF-ware Evolution - Fyodor Yarochkin & Meder Kydyraliev

Web hacking Kung-Fu and Art of Defense - Shreeraj Shah

VoIPhreaking: How to make free phone calls and influence people - The Grugq

Trends in Real World Attacks: A Compilation of Case Studies - Rohyt Belani

Analyzing Code for Security Defects - Nish Bhalla

Hide-And-Seek: Defining the Roadmap for Malware Detection on Windows - Joanna Rutkowska

Exploiting Microsoft Services For Unix - Swaraj

Java & Secure Programming - Marc Shoenefeld

Wi-Fi Hotspot Security - Jim Geovedi

Social Engineering Fundamentals - Anthony Zboralski & Dave Mckay

Analyzing all that data: Techniques for sifting haystacks and finding needles - Jose Nazario

Hacking Windows CE - San (XFocus)

Hacking Internet Banking Applications - Fabrice Marie

Phishing Attacks: A guide to self assessment - Aaron Higbee

Project Blinkenlights & Arcade - Tim Pritlove

Nematodes - Beneficial Worms - Dave Aitel

Assessing Server Security - State of the Art - Christoff Breytenbach


If you haven’t booked your seats, you are encouraged to REGISTER IMMEDIATELY


REGISTER HERE

Updated Speaker List

Filed under: Main Page — Administrator @ 1:54 pm

July 18, 2005

We are proud to announce that Tony Chor, Group Program Manager for Microsoft Internet Explorer is set to present a keynote paper titled “Internet Explorer Security: Past, Present, and Future”.

We are also happy to announce that the following speakers are also lined up for the event:

Dave Aitel, CEO Immunity Inc
Tim Pritlove, Chaos Computer Club
Christoff Breytenbach, Senior IT Security Consultant, Sensepost
Marc Shoenefeld, Freelance Network Security Consultant
Aaron Higbee, Principal Consultant, Foundstone, a division of McAfee.

HITBSecConf Official Airline Partner: Malaysia Airlines

Filed under: Main Page, Official Airline Partner — Administrator @ 10:32 am

July 15, 2005

We are very pleased to announce that Malaysia Airlines has agreed to come on board as the Official Airline Partner for the HITBSecConf series… With this partnership in place we hope that more of you from around the world will consider visiting sunny Malaysia to experience a HITB Security Conference first hand…

We strongly recommend that all attendees make their flight bookings on Malaysia Airlines to enjoy the savings offered. In order to enjoy these special rates, attendees and accompanying persons should contact the nearest Malaysia Airlines ticketing office or Global Sales Agents (GSA) and quote “G HITBSecConf” for further assistance.

Do note that these special fares are applicable across ALL SECTORS, EXCLUDING Singapore and internal domestic flights.

We look forward to seeing you in September! Should you have any difficulties with your flight booking, kindly contact us.

MCMC Endorses and Supports HITBSecConf2005

Filed under: Main Page — Administrator @ 8:49 am

July 4, 2005


We are proud to announce that the Malaysian Communications and Multimedia Commission (MCMC) has come on board to endorse and support HITBSecConf2005 - Malaysia. The Malaysian Communications and Multimedia Commission is the regulator for the converging communications and multimedia industry. At the time it was created, its key role was the regulation of the communications and multimedia industry based on the powers provided for in the Malaysian Communications and Multimedia Commission Act (1998) and the Communications and Multimedia Act (1998). Pursuant to these Acts the role of the Malaysian Communications and Multimedia Commission is to implement and promote the Government’s national policy objectives for the communications and multimedia sector. MCMC is also charged with overseeing the new regulatory framework for the converging industries of telecommunications, broadcasting and on-line activities.

.

Hack In The Box Security Conference 2005 - Malaysia

Filed under: Main Page — Administrator @ 6:21 pm

April 25, 2005



Welcome to the official homepage of HITBSecConf2005 - Malaysia. The main aim of the HITBSecConf conference series is to enable the dissemination, discussion and sharing of deep knowledge network security information. Featuring presentations by respected members of both the mainstream network security arena as well as the underground or black hat community, HITBSecConf2005 - Malaysia will see over 30 of the world’s leading network security specialists down to present their research and findings. Set to take place from September 26th - 29th 2005 at The Westin Kuala Lumpur, the event will feature 6 hands-on technical training sessions and 2-days of deep knowledge presentations.

Event Details

Venue: The Westin Kuala Lumpur
199 Jalan Bukit Bintang
55100 Kuala Lumpur

Date: 26th September
Time: 0900 - 1800
Item: 6-tracks Hands-On Technical Training (Day 1)

Date: 27th September
Time: 0900 - 1800
Item: 6-tracks Hands-On Technical Training (Day 2)

Date: 28th September
Time: 0900 - 1800
Item: Dual Track Security Conference & Capture The Flag ‘Live Hacking’ Competition (Day 1)

Date: 29th September
Time: 0900 - 1800
Item: Dual Track Security Conference & Capture The Flag ‘Live Hacking’ Competition (Day 2)

Hands-On Technical Training

TECH TRAINING 1: Web Application – Attacks and Defense
Trainer: Shreeraj Shah Founder/Director, Net-Square Consulting

TECH TRAINING 2: Exploiting & Defending Networks
Trainer: Nish BhallaVP Consulting Solutions, Security Compass

TECH TRAINING 3: War Driving Kuala Lumpur
Trainers: Anthony Zboralski (Gaius),Founder Hackers Emergency Response Team (HERT) & Jim Geovedi, Information Security Consultant PT Bellua Asia Pacific.

TECH TRAINING 4: Packet Mastering The Monkey Way
Trainers: Dr. Jose NazarioSenior Software Engineer, Arbor Networks and Marius Eriksen Software Engineer, Google.com

TECH TRAINING 5: Digital Investigations: Practical Digital Forensic Analysis
Trainer: The Grugq

TECH TRAINING 6: Hacking By Numbers - Guerilla Edition
Trainer: Christoff Breytenbach

TECH TRAINING 7: The Exploit Laboratory - Buffer Overflow Black Arts
Trainers: Saumil Udayan Shah (Founder, Net-Square) & SK Chong (Security Consultant, SCAN Associates).

HITBSecConf2005 - Keynote Speakers

1.) Tony Chor, Group Program Manager, Microsoft Internet Explorer, Microsoft Corporation
2.) Mikko Hypponen, Chief Research Officer, F-Secure Corp.

HITBSecConf2005 - Conference Speakers

(Listed in alphabetical order)

1. Aaron Higbee, Principal Consultant, Foundstone, a division of McAfee,Inc.
2. Anthony Zboralski (Gaius), Founder, Hackers Emergency Response Team (HERT)
3. Christoff Breytenbach, Senior IT Security Consultant, Sensepost
4. Dave Aitel , CEO, Immunity Inc.
5. Dave Mckay, Independent Security Consultant
6. Emmanuel Gadaix, Founder, Telecom Security Task Force (TSTF)
7. Fabio Ghioni
8. Fabrice Marie, Manager, FMA-RMS
9. Fyodor Yarochkin, Co-Author, X-Probe
10. Jim Geovedi, Information Security Consultant, PT Bellua Asia Pacific
11. Joanna Rutkowska Founder, Invisiblethings.org
12. Jose Nazario, Senior Software Engineer, Arbor Networks
13. Nish Bhalla, VP Consulting Solutions, Security Compass
14. Marc Shoenefeld,Freelance Network Security Consultant
15. Marius Eriksen, Google
16. Meder Kydyraliev, Co-Author, X-Probe
17. Roberto Preatoni, Founder, Zone-H Defacement Mirror
18. Rohyt Belani, Director, Red Cliff Consulting
19. San, Member, X-Focus China
20. Shreeraj Shah, Director, Net-Square Solutions
21. Swaraj, Suresec UK
22. The grugq, Independent Anti-forensics Researcher
23. Tim Pritlove, Chaos Computer Club
24. Zubair Khan, Freelance Network Security Consultant



Event Organizer


Hack In The Box (M) Sdn. Bhd.

Supported & Endorsed By


Malaysian Communications and Multimedia Commission (MCMC)


Malaysian Administrative Modernisation & Management Planning Unit

Main Sponsor


Microsoft Corporation


Official Airline Partner


Malaysia Airlines


Open-Hack Sponsor


VIA Technologies Inc.


CTF Sponsor


Scan Associates


CTF Prize Sponsor


Defenxis


Media Partners:


The Virus Bulletin Conference takes place at The Burlington, Dublin, Ireland, 5 to 7 October 2005. Register here.

Phrack Magazine


Our Speakers Are Supported By:


Bellua Asia Pacific


F-Secure Corporation


Supporting Organizations


HERT


Chaos Computer Club (Germany)


X-Focus China


Zone-H Defacement Mirror


Xatrix Security


SyScan05


Special Interest Group in Security & Information InteGrity Singapore