July 9, 2019
[44Con Announce] we <3 memory c̷͕̣͆͌̆o̶̡̯̦̗̲͔͍̥̞̦͂̓̀̀̓r̴̮͔̍̿r̶̜̤̦̳̜͂̈̅̂̿̏̿̉͂̌ü̵̪͕̐͝p̵̢̯͇̣̣͙̺̯̊͊̐͒͐͐̈́͘ṭ̶̢̧̛̦̼̼͚̾i̸̡̺̤̤͌̋̑̄̊͌͆͋̍̓o̶̮̰͐͒ň̶͚̼̈́̇́
|IF:MC_PREVIEW_TEXT|
[if !gte mso 9]>|MC_PREVIEW_TEXT|
|
|
Try viewing this email in your browser |
|
|
end header bar
header left
|
|
|
We <3 Memory CorrupAAAAsegmentation fault |
|
Exploiting memory corruption bugs isn't hard, it just needs time and attention to detail. Learn more with these talks and workshops at 44CON 2019. |
|
|
|
|
|
Hunting Bugs, Catching Dragons |
|
Nicolas Joly provides a fresh Outlook (groan!) on mail scripting bugs. |
|
|
|
|
Intro to GLIBC Heap Exploitation |
|
A 2 Hour long GLIBC heap exploitation workshop with Max Kamper. |
|
|
|
|
CAN Bus Basics With Hands-on Fuzzing |
|
Ian Tabor's Car in a box workshop. Zero to hero CAN bus fuzzing. |
|
|
|
|
|
|
|
£50 OFF AT THE BOTTOM OF THIS EMAIL |
|
Ready To Book? |
|
|
|
|
|
|
|
|
|
Code Injection and Exfiltration Training |
|
Two highly specialist deep dive courses, never before given at 44CON. |
|
|
|
|
|
Code Injections from beginners to advanced |
|
Learn how to implement and detect modern code injection techniques from CreateRemoteThread to process hollowing, atom bombing, and more. 3 days of intense training from Ada Logics. |
|
|
|
|
In & Out: Network Data Exfiltration Training |
|
Thinking of taking CC SAS? Need to boost pivoting and exfil skills? Lezek Miś leads 3 days of pivoting, pillaging and plundering practice. Become a post-exploitation powerhouse with this course. |
|
|
|
|
|
|
|
|
44CON News |
|
What we've been up to. |
|
|
|
|
|
Building A Safe Space for Security Research |
|
YouTube's ban on "Instructional Hacking Videos" threatens everyone from local OWASP chapters to DEFCON. Here's our take, a new platform and offer of help. |
|
|
|
|
44CON's 8-bit Arcade Championship Tour |
|
We're bringing two Commodore 64s fully loaded to SteelCon. Will you take part in our championship? 16 may enter, but only 2 will walk away with free 44CON tickets! |
|
|
|
|
|
|
|
|
Talks We've Loved |
|
Blog post above aside, we're moving all of our talks from Vimeo to our 44CON TV YouTube channel. Here are a couple of talks we think you'll enjoy. |
|
|
|
|
Breaking AV Software |
|
|
How secure is security software? Joxean Koret investigated, and found an answer best described as 'LOLWUT'. |
|
|
|
|
|
|
|
|
|
Get In The Ring0 |
|
|
Graham Sutherland explores the world of Windows Drivers. Learn how they work, how to build them and how to debug them. |
|
|
|
|
|
|
|
end header left
1/2 right 1
end 1/2 right 1
1/2 left 1
end 1/2 left 1
cta
end cta
headline
end headline
1/1 panel
end 1/1 panel
2/2 content
end 2/2 content
3/3 content
end 3/3 content
2/2 panel
end 2/2 panel
3/3 panel
end 3/3 panel
profile
end profile
contact
end contact
1/2 left 2
end 1/2 left 2
1/2 right 2
end 1/2 right 2
header right
end header right
content right
end content right
content left
end content left
quote
end quote
1/3 left
end 1/3 left
1/3 right
end 1/3 right
1/1 content
end 1/1 content
footer