Good afternoon, dear habrayuzyra.

Comrades, on October 20, at 19:00, the fifth meeting of Defcon Russia will take place!
Defcon Russia is an independent and open community, united by interests in the field of IT and information security. The main goal is to create a community among students, programmers, hackers, system administrators and other geeks. The group is debatable, so everyone who wants to speak is welcome, to offer their ideas and show their work, and most importantly - to find like-minded people.
Place, time
This time, in order to expand the community, the venue is transferred to Moscow, to the Yandex office. Address: st. Leo Tolstoy, 16
')
What not to wander - a manual on how to get to the place
You can get to the office from the Park Kultury station of the Sokolnicheskaya Line (the first car from the center). Next you need to go to the intersection of Zubovsky Boulevard and Komsomolsky Avenue. From the subway door, turn right and round the ground entrance hall. Further along Komsomolsky Avenue, go to the Yandex billboard. Then turn onto Timur Frunze street and walk to the red brick building with a sign “house 11, p. 2-5”, a barrier and Yandex flags. Behind the barrier is a wide staircase, on which you need to climb and turn right. On the door it says "Entrance number 1" - this is the entrance to the Yandex office.
Free admission. BUT!Attention! To participate in the seminar, write an application for participation in a free form and send it by e-mail to
defconrussia@gmail.com with your full name, so that we would reserve a place for you. This is due to the fact that if there are too many interested people, we can simply not get involved. eight)
So, do not postpone the case and send a letter.
If you plan to arrive by car, then inform in the application for participation its brand and state registration number and you can leave it in the parking lot of Yandex. The entrance to the parking lot is from Lev Tolstoy Street (see the panorama of the area).
Topics
Dmitry Oleksyuk - “Automated malware collection and analysis for independent researchers”
As it is known, most large anti-virus laboratories use, in one form or another, various automated systems for detecting and analyzing malware, which allow them to carry out both global and specialized monitoring of the activity of various botnets. Obviously, the information obtained in the course of such monitoring may be of interest to the work of independent researchers, who are not directly related to the anti-virus industry. It is aspects of the creation of a "small virtual home computer" that will be considered in the report.
In particular, the following questions will be answered:
- Where to look for the freshest samples
- How to filter what is interesting from what is not very
- How to organize auto-packaging of samples and information extraction from them
- What information received and for what practical benefit can be used
Alexey Sintsov - “Notes of the pen-tester. Punching Lotus
Punching experience in one of the Lotus Domino services.
- Unknown Vector Study
- Creating a private exploit
- Non-standard operation of the bug
Description of private bugs and private RCE exploit attached!
Dmitry Chastukhin and Alexey Sintsov - “Experience of participating in vulnerability scan programs”
Success stories and defeats in the struggle for greens and / or art. How it was…
Additional information to consider:
Those who want to make a report, write to
defconrussia@gmail.com .
The reason for participating is even more interesting, given the opportunity to get free tickets to our ZeroNights conference (
website ,
Habr ), which will be held on November 25, 2011 in St. Petersburg.
!!! Non-technical reports (for example, about personal life experience) are also accepted !!!
Details on the group website -
http://www.defcon-russia.ru/Twitter -
https://twitter.com/defconrussia