Presentations |
Download |
Keynote: Secure Development Lifecycle Jamil Valliani,
Security Program Manager, Microsoft, USA |
[pending] |
Beyond NX: An
attackers guide to anti-exploitation technology for Windows
Ben Nagy, eEye Digital Security |
Presentation |
Hackers
Methodology and Incident Handling
Faiz Ahmad Shuja, Sr. Information Security Consultant, CYBERNET,
Pakistan |
Presentation |
Identifying
Cyber Crime - Pakistan's Response
Jawad Sarwana, Pakistan |
Presentation |
X.25 Security
Emmanuel Gadaix |
[did not present] |
IDS Evasion - Attack and
Detection
Sumit Siddharth, Information Security Analyst, NII Consultancy, India |
[did not present] |
Exploring the
World of Threats in eBanking of Pakistan
Nizar Diamond Ali, Pakistan |
[censored due to responsible
disclosure] |
Bank Scams: Latest Threat to
Pakistani Online Banking
Pakistan Honeynet Project |
Presentation (Omar) [faiz's part censored due to further
investigation] |
Web Applications: Attacks and
Defense
Muhammad Ahmed Siddiqui |
Presentation |
Computer
Forensic 101
Dewan Chowdhury, DNC, USA |
Presentation |
0day:
Heap-based Format String Bug in Real-/Helix-players on *nix
c0ntex |
Presentation |
Malware: The
Inside Story
Ahmad Elkhatib, UAE |
Presentation |
Metasploit
Framework - The Exploitation Machine
Omar Khan &
Jahanzaib Sarfaraz, Pakistan |
Presentation |