
Colleagues and friends! On July 15, 2017, Pentestit Security Conference will take place in Orel - a conference dedicated to practical information security: penetration testing of modern networks and systems, detection of telecommunications equipment vulnerabilities, circumvention of modern protective equipment, detection and counteraction to attacks, forensic analysis and incident investigation.
Reports
“Management reports are too interesting, so they will not be at the conference” (c)
At CFP, only technical reports are accepted, without "water" and PR. No marketing, no “product placement” - all reports are devoted to practical aspects of information security.
')
At the moment, the following reports have been agreed (list is supplemented):
- Implementation of the GSM protocol stack;
- Using radare2 when analyzing binary files;
- Detection and analysis of spyware scripts on the site;
- OSINT automation;
- IoT / embedded devices vulnerabilities;
- Analysis of malicious code of mobile applications;
- MorphAES: polymorphic shells;
- Vulners Burp Suite plugin presentation for vulnerability detection;
- Forensic analysis of windows;
- Hash collisions;
- Topological options for the implementation of WAF;
- Heuristic malware detection algorithms;
- Distributed detection systems for computer attacks;
- WAF bypass methods.
Speakers
The speakers of the conference are experts in the field of practical security of the Pentestit company, employees of the Federal Guard Service, security experts of Russian and foreign organizations.
Laboratory penetration testing "Test lab v.11"

On June 30, 2017, the Pentestit team will launch a new, 11th penetration testing lab dedicated to the opening of the conference. As always, the laboratory will be a copy of the real corporate network of the company, containing typical vulnerabilities and configuration errors, and anyone can take part. Currently, more than 15,000 people are registered in the laboratory!
In addition to the main program of the conference, at Pentestit Security Conference 2017 we will hold a practical workshop on "Test lab v.11", including methods and techniques for testing the penetration of modern information systems
Attendees of the conference will have the opportunity to communicate in an informal setting with the creators of the laboratories, take part in contests and try their hand at hacking the infrastructure as close to real as possible.
Call for papers
If you have something to tell you - demonstrate a new vector or attack scenario, show an interesting tool in action, share a cool exploration - send requests to info@pentestit.ru (marked with CFP).
Become a partner
We offer partners of the conference a specially designated area for booths and media support. Want to join? Contact us by phone +7 (495) 204-19-72 or by email info@pentestit.ru. Increasing brand loyalty at a hacker conference is really cool!
Follow the news!
In the following articles we will discuss the topics of the reports in more detail, talk about speakers, laboratory preparation and much more. References:
-
Conference site ;
-
The site of the laboratory "Test lab" ;
-
Telegram-channel conference .