Melbourne

Details

When Friday 25th August 2017
Where RMIT, City Campus: Building 80, floor 1, room 2
Time 6:00 PM
After Talks Captain Melville, 34 Franklin St, Melbourne
Organisers Luke, Yianni, John, Jeremiah Jenkins
Contact melbourne@ruxmon.com
Save Event

Notification List

Please sign up to our email notification list for advanced notification of planned Ruxmon events and presentation details.

Location

RMIT, City Campus: Building 80, floor 1, room 2


Presentations

BitcoinCTF III - Luke Jahnke

Level: Intermediate

Luke will talk about BitcoinCTF, a web-based Capture The Flag (CTF) competition he recently launched for the third time. The talk will cover details and solutions for a limited set of challenges. He will also discuss his motivations for creating a CTF, some tips for people looking to run their own and future plans for BitcoinCTF.


Bio

Luke Jahnke is a security researcher at elttam. He enjoys playing CTFs as part of the team TheGoonies and you may have solved some of his previous challenges in the Ruxcon CTF.

Building a SOC for fun and profit - Barry Anderson

Level: Intermediate

A SOC (or Security Operations Centre) is the nerve centre of defending a network. Defending networks is almost as much fun as attacking them and, just like for offence, while you can pay ridiculous amounts of money for the software tools to get your job done, there are many great tools available as FOSS (Free and Open Source Software).

Bio

 Formerly a Security Solution Architect for a Security and Networking vendor, currently a Security Solution Architect for a Utility.


Archive

When Title Speaker Materials

Friday 25th August 2017

BitcoinCTF III

Luke Jahnke

Not available

Friday 25th August 2017

Building a SOC for fun and profit

Barry Anderson

Not available

Friday 28th July 2017

Keyboard cowboys - Herding shells

Eldar Marcussen

Not available

Friday 28th July 2017

Not available

Friday 30th June 2017

Internal Pentest: from z3r0 to h3r0

Marcio Almeida

Not available

Friday 30th June 2017

Not available

Friday 26th May 2017

Advancements in p455w0rd cr4ck1n6

John Gerardos

Not available

Friday 26th May 2017

Not available

Friday 28th April 2017

The Application security aspect of cyber is very, very tough

Louis Nyffenegger and Ash Fox

Not available

Friday 28th April 2017

Not available

Friday 31st March 2017

UniFi'd Ownage - Centralised and Automated Network Management

Tim Noise

Not available

Friday 31st March 2017

Not available

Friday 26th August 2016

Making GDB fun again

Chris Alladoum

Not available

Friday 26th August 2016

Not available

Friday 27th May 2016

The Devopsification of IT Security

Barry Anderson

Not available

Friday 27th May 2016

Uncaging Faraday

Ulisses Albuquerque

Not available

Friday 29th April 2016

Swimming drunk in a croc infested billabong: Practical Exploitation of DROWN

Tim Noise

Slides

Friday 29th April 2016

Enterprise Wi-Fi Recon: rEAPing the benefits

Luke McDonnell

Slides

Friday 18th March 2016

American Fuzzy Lop - fuzzing like there's no tomorrow

Joaquim Espinhara

Not available

Friday 18th March 2016

Web Application Security

Louis Nyffenegger

Slides

Friday 25th September 2015

What's your Zodiac Sign?

Kayne Naughton

Not available

Friday 25th September 2015

Not available

Friday 28th August 2015

Hacking Web Apps like a pimp

Chris Alladoum

Not available

Friday 28th August 2015

You probably DO need a cryptographic hash function

Michael Samuel

Not available

Friday 31st July 2015

Security Anti-Patterns

Barry Anderson

Slides

Friday 31st July 2015

Journey from research to exploit

Tim Noise

Not available

Friday 12th June 2015

Hacking trends, types of attacks, cool and interesting technical details

Mike Smith - CTO Akamai Technologies

Not available

Friday 12th June 2015

Not available

Friday 29th May 2015

QEMUing up a storm: why QEMU is awesome for doing embedded stuff

Peter Fillmore

Not available

Friday 29th May 2015

BitcoinCTF II - The Shadow and the Flame

Luke Jahnke

Not available

Friday 24th April 2015

Introduction to security code review for the web

Louis Nyffenegger

Slides

Friday 24th April 2015

Opening garage doors with an iPhone and HackRF: Adventures in Software-defined Radio

Hubert Seiwert

Not available

Friday 27th March 2015

Building an FPGA-based Glitcher to Defeat Hardware

Silvio Cesare

Not available

Friday 27th March 2015

Bug Bounties -- What's the Story?

Nathaniel Wakelam

Not available

Friday 1st August 2014

Why would a geek leak?

Thomas Drake & Jesselyn Radack

Not available

Friday 1st August 2014

Not available

Friday 27th June 2014

Post-Snowden OpenSSH

Damien Miller

Not available

Friday 27th June 2014

Rogue Containers – A Virtual Disk Escape

Shanon Olsson

Not available

Friday 30th May 2014

Git Money: Snatching Source Trees

Tim Noise

Not available

Friday 30th May 2014

B.R.E.A.M. (A.K.A the Blockchain Ruins Everything Around Me)

Kayne Naughton

Not available

Friday 28th March 2014

Avocent Virtual Media Pwnage

Michael Sameul

Not available

Friday 28th March 2014

Pager Security

Andrew Horton

Slides

Friday 28th February 2014

RuxLox

Topy

Not available

Friday 28th February 2014

Goto Fail: Apple SSL broken again

Hubert Seiwert

Not available

Supported By