crikeycon.com Report : Visit Site


  • Server:cloudflare...

    The main IP address: 104.28.11.34,Your server Singapore,Singapore ISP:CloudFlare Inc.  TLD:com CountryCode:SG

    The description :crikeycon february 24, 2018, brisbane. crikeycon is a community-led conference targeting those with an interest in information security....

    This report updates in 13-Jun-2018

Created Date:2014-01-08
Changed Date:2017-03-02

Technical data of the crikeycon.com


Geo IP provides you such as latitude, longitude and ISP (Internet Service Provider) etc. informations. Our GeoIP service found where is host crikeycon.com. Currently, hosted in Singapore and its service provider is CloudFlare Inc. .

Latitude: 1.2896699905396
Longitude: 103.85006713867
Country: Singapore (SG)
City: Singapore
Region: Singapore
ISP: CloudFlare Inc.

the related websites

HTTP Header Analysis


HTTP Header information is a part of HTTP protocol that a user's browser sends to called cloudflare containing the details of what the browser wants and will accept back from the web server.

Expect-CT:max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
Transfer-Encoding:chunked
Last-Modified:Thu, 22 Mar 2018 03:23:59 GMT
X-Cache-Hits:0
Access-Control-Allow-Origin:*
X-Served-By:cache-jfk8147-JFK
X-GitHub-Request-Id:2A0A:6B12:48F0010:60ED70D:5B2012F1
Expires:Tue, 12 Jun 2018 18:47:37 GMT
X-Fastly-Request-ID:475deeba5b1cac18ff4db341dcd346ce9f71f0b4
Date:Tue, 12 Jun 2018 18:37:37 GMT
CF-RAY:429e6e045ccd9224-EWR
X-Cache:MISS
Set-Cookie:__cfduid=d9b359b9aff0a2ccdfbf0f8390227986c1528828657; expires=Wed, 12-Jun-19 18:37:37 GMT; path=/; domain=.crikeycon.com; HttpOnly
Age:0
Server:cloudflare
Connection:keep-alive
Via:1.1 varnish
X-Content-Type-Options:nosniff
Content-Encoding:gzip
X-Timer:S1528828657.349779,VS0,VE20
Vary:Accept-Encoding
Cache-Control:max-age=600
Content-Type:text/html; charset=utf-8

DNS

soa:aiden.ns.cloudflare.com. dns.cloudflare.com. 2026834322 10000 2400 604800 3600
ns:aiden.ns.cloudflare.com.
hope.ns.cloudflare.com.
mx:MX preference = 1, mail exchanger = mx1.ev6.net.
MX preference = 2, mail exchanger = mx2.ev6.net.
MX preference = 3, mail exchanger = mx3.ev6.net.
MX preference = 4, mail exchanger = mx4.ev6.net.
ipv4:IP:104.28.10.34
ASN:13335
OWNER:CLOUDFLARENET - Cloudflare, Inc., US
Country:US
IP:104.28.11.34
ASN:13335
OWNER:CLOUDFLARENET - Cloudflare, Inc., US
Country:US
ipv6:2400:cb00:2048:1::681c:a22//13335//CLOUDFLARENET - Cloudflare, Inc., US//US
2400:cb00:2048:1::681c:b22//13335//CLOUDFLARENET - Cloudflare, Inc., US//US

HtmlToText

menu about speakers events training schedule sponsors 24 th february 2018 riverside receptions, 50 oxlade drive, brisbane qld 4005 tickets about is a community-led conference targeting those with an interest in information security around south east queensland and beyond. the informal style of the event is designed to facilitate knowledge sharing between all participants. consists of presentations and demonstrations by industry professionals, security wizards, and enthusiasts alike. is run on a costs recovery basis, with surplus funds donated to worthy registered charities in the greater brisbane area. faq code of conduct speakers for 2018 confirmed speakers for v gunter ollmann keynote - cloud effects on security professionals: attackers & defenders gunter ollmann keynote - cloud effects on security professionals: attackers & defenders public cloud, fundamentally changes the security equation for both attackers and defenders. practically every piece of the cloud is instrumented, logged, and being analyzed at the network layer, host level, and everything in between – by default, all the time. for the attacker, there is no place to hide. one errant connection or detected compromise of a host anywhere in the cloud can quickly be blocked or inoculated throughout the rest of the cloud in seconds. for the defender, scale dictates that everything needs to be automated and exceptions may be manually handled once before being learned by an ai responder. as a security professional, the cloud continues to modify our role in protecting our customers. the assets that used to be secured and managed by a customers small-team of self-learned defenders, are now protected by the latest advances in security technology; continually monitored and backed by several thousand fully trained professional defenders. meanwhile, as cloud customers move from unicorn configured hosts, to herds of iaas instances, and then migrate on to paas, saas, and eventually serverless environments, “their” security obligations are transferred to the cloud operators. so what happens to all the 3rd-party specialist security service providers as public cloud dominates and consumes the enterprise? bio gunter ollmann serves as cto for security and helps oversee the cross-pillar strategy for the cloud and enterprise security groups. he has nearly three decades of information security experience in an array of cyber security consulting and research roles. before joining microsoft, gunter served as chief security officer at vectra ai driving new research and innovation into ml-based threat detection of insider threats. prior to vectra ai, he served as cto of domain services at ncc group, where he drove strategy behind the company's generic top level domain (gtld) program. he was also cto at security consulting firm ioactive, cto and vice president of research at damballa, and chief security strategist at ibm, and built and led several well known and respected security research groups around the world - such as x-force. gunter is a widely respected authority on security issues and technologies and has researched, written and published hundreds of technical papers and by-lined articles. originally, gunter had wanted to be an architect but he lost interest after designing retaining walls during a three-month internship. after that, he qualified as a meteorologist, but was lured to the dark side of forecasting internet threats and cyber attacks. his ability to see dead people stoked an interest in history and first-millennium archaeology. close scotty brown our lovely mc scotty brown our lovely mc close peter hannay, clinton carpene & jack turner let’s play-ai super metroid peter hannay, clinton carpene & jack turner let’s play-ai super metroid. machine learning is cool right now. whether you’re an av firm struggling to detect meterpreter, a cio for an ico working out how you can legitimately work the terms “machine learning” and “blockchain” into the same sentence, or developing a robot that doesn’t walk itself into a pond, ai and machine learning is hot on everyone’s minds. in this talk we explore the basics of machine learning, exploring the general functionality of machine learning algorithms, how they work, and how they are (mis-)used. you will see first-hand our struggles to achieve our dream, to build an ai that can play videogames for us. we are determined to live the dream of never having to play video games again and we want that for you too! bio peter hannay is a lecturer and researcher based at edith cowan university in perth western australia. in addition, peter is an organiser of wahckon and generally cool guy. clinton carpene is a reformed academic that hacks for a living as a penetration tester for asterisk information security in perth. clinton is also an organiser of wahckon and sectalks perth. jack currently works as a pentester for asterisk information security in perth. he contributed a challenge to the recent wactf and previously competed in the cysca challenge for ecu. he has recently taken an interest in binary exploitation and reverse engineering, and in his spare time enjoys flying planes without engines. close david jorm & brendan scarvell analyzing java heap memory dumps david jorm & brendan scarvell analyzing java heap memory dumps during a recent penetration test, we identified a vulnerability that allowed us to download a full heap memory dump from the application server. this presentation will examine the vulnerability itself, the structure of the heap dump, and the tools available for analysing it. using a sample application, we will show the potential to extract critical information from such a memory dump, and provide some ideas for future research. bio david and brendan work for trustwave spiderlabs as part of the asia-pacific penetration testing team. they are both working towards the goal of jetski ownership, as this is a customary milestone of success in the australian infosec industry. close joshua graham vulnerability research for the skillless: substituting experience with persistence (or how i learned to stop worrying and find uxss/rce) joshua graham vulnerability research for the skillless: substituting experience with persistence (or how i learned to stop worrying and find uxss/rce) in my first year in information security i got obsessed with a couple of little bugs…and after following said bugs down the proverbial rabbit hole ended up with novel rce in sql and uxss in microsoft edge. mysql/maria db are now patched and edge is due to be patched in january. the talk will take the audience on a journey from discovering an innocent looking bug and through the process of understanding what is causing the bug and the lateral thinking used to result in big bugs. the talk will include a live demonstration + a little autohotkey. bio joshua has a background in general it and software engineering. in late 2016, through a series of unfortunate accidents, he joined tss as a full time penetration tester and fell in love with the security world. his hobbies include opening popup windows in various browsers, autohotkey and ms paint. he has achieved formal qualification training through offensive security penetration testing with kali security course and holds a bachelor of information technology majoring in software engineering. he was also a part of the winning capture the flag team at ruxcon 2016, 2nd place team at kiwicon 2016 and 4th place team at ruxcon 2017. joshua is an active security researcher with cves in high profile applications such as mysql and microsoft edge and is also a vocal member of the brisbane security community having created ctf challenges and presented at the brisbane sectalks meetup. close catherine mcilvride & fiona sasse pizza roullette catherine mcilvride & fiona sasse pizza roullette catherine and fiona are security newbies in the world of bleepbloops. as their hunger for more knowledge on security testing grows, they attempt to chomp into the cyber realm of ordering pizza. pull up a chair, grab a slice* and prepare yourself for a feast! * disclaimer: pizza will not be included. bio catherine and fiona are software testers who have been united by their passion for pizza and their curiosity for wearing black and white hats. they hammer and chisel their way through interfaces, databases, and all other places to identify cracks and gaps. now they face their next adventure roaming unfamiliar territory in the security space. close kylie how to (un)route your network kylie how to (un)route your network communication across the network is core business for most organisations and in fact the entire internet. but what happens when a hacker messes with the interconnects we rely on? this talk will overview vulnerabilities known in popular routing protocols. the presentation will explain how the protocols work and demonstrate the effectiveness (or not) of the vulnerabilities. bio kylie is currently an emerging technology researcher and security architect. she is responsible for leading applied research into emerging technologies as well as developing and providing security architecture advice to early adopters. kylie studied telco engineering at anu in the late 90s, has a masters in computer networking with csu, several industry qualifications and is also an adjunct lecturer with unsw canberra. she is the co-organiser of bsides canberra and co-owner of canberra’s hackerspace - infosect. kylie has previously presented at the australian cyber security centre (acsc) conference, bsides canberra, wahckon and christchurch hackercon (chcon). close clinton kerrison putting the mitm in hdmi(tm) clinton kerrison putting the mitm in hdmi(tm) the presentation will centre on the demonstration of a hdmi and usb hid mitm dropbox for client site assessments, with some history of the different versions of the project. bio clinton is an experienced end user troubleshooting and support consultant, with 4 years of experience operating an in-home computer consultancy and a junior security consultant with alcorn group. close fraser tweedale open source user session recording fraser tweedale open source user session recording in this presentation we will discuss the limitations of existing open source approaches, then present the scribery project, an end-to-end session recording solution with features including: terminal session playback and real-time monitoring (including what the user sees) centralised storage and correlation with auditd log events centralised control of what or whom to record, via sssd and in the future freeipa cockpit integration the presentation will include a demo of a user session being recorded, stored centrally, inspected and played back. we will look at the architecture, discuss implementation challenges, and conclude with an overview of the road ahead. the intended audience is system administrators and security officers responsible for security and compliance, and developers of security, identity and policy management systems. bio fraser works at red hat on the freeipa identity management system and dogtag certificate system. he's interested in security, cryptography, functional programming, type theory and theorem proving. jalapeño aficionado. close eric pinkerton red team black bag golden ticket or white elephant? eric pinkerton red team black bag golden ticket or white elephant? in this talk i will explain some of the many tools and techniques of the fascinating field of red teaming physical security and give you my own thoughts on what is actually useful versus what is a complete waste of money and space. bio eric has been breaking things just to fix them again since he was five, at 20, he spent his summer evenings working the door in a nightclub, and reading tarot cards during the day. he didn’t realise it back then, but nothing could have prepared him better for a career in infosec. cutting his teeth in the last century working as a technologist for the bbc world service in london eric developed a passion for emerging technologies, with a particular bent for security. arriving in australia in 2003 he landed an operational role at australia’s first ip telco, comindico, before moving to telstra, then stratsec (acquired by bae systems), csc and finally hivint. he has presented at cebit, auscert and aisa, ausnog and crikey he remains a healthy sceptic who is still partial to aluminium millinery, he blogs about privacy, security and the myth of infallibility in humanss. close mark piper ct logs are the new black mark piper ct logs are the new black this talk is the result of a small personal side project for better understanding ct logs and how they may be used. it resulted in crunching some decent sized data sets (numerous terabytes of compressed data) to extract certificate data relevant for work in nz & au, contemplating this datasets use and relevance for both blue and red teams. we will examine a series of basic questions such as; what are ct logs? what is stored in the logs? how can we access and query these logs? how is any of this useful for attackers and defenders alike? bio officially hired as a network ransacker; pipes spends his days looking at applications, executing red teams and generally musing about security for insomnia security. while his current location is somewhat transient, he finds it pretty hard to resist a trip to queensland each summer. close nicole becher cyber insurance nicole becher cyber insurance the market for cyber insurance is expected to reach $14 billion by 2022. many companies, large and small, have purchased it already or are in the process of evaluating. technical information security professionals are being asked to participate in this process with little to no background information on the commercial insurance industry as a whole, and more specifically the cyber insurance market. many insurance carriers are piling into the market but is there a lack of real and valuable data are they instead focused on increasing market share and profitability. cyber insurers need to focus on pricing this risk correctly, otherwise the financial risk could devastate market participants. what data would be more useful for cyber insurers to better understand, price and write this risk? this talk will explore an (hopefully not boring) overview insurance industry as a whole, specific cyber policies that are currently being written, how this risk is priced, what data would be more useful for insurers to use to underwrite and an overall focus on what cyber insurance can do for the cyber security industry as a whole. bio nicole becher is professional information security consultant. she has been in the cybersecurity space for over ten years working mainly in offensive security capacities. she manages penetration testing and red teams, forensics and incident responders, and malware reverse engineering team. she has also worked on cyber policy for new york state department of financial services, where she helped develop the first-in-nation regulatory framework for assessing the cybersecurity of large and complex financial institutions. she also help draft the first-in-nation regulatory and licensing framework for bitcoin and virtual currencies. nicole is also as an adjunct instructor at new york university (nyu), where she teaches courses on offensive and defensive computer security, network security, web application security, and computer forensics. she is a chapter leader for owasp brooklyn (open web application security project) and the project leader for owasp’s newest project, devslop. nicole has presented both talks and trainings, at various conferences around the world on topics related to her research interests. these include web application and api security, malware analysis techniques, economics of cybersecurity, cyber insurance, cybercrime, and international cyberlaws and regulation. she has also advised hollywood scriptwriters on cybersecurity and hacking. nicole is on the smart conservation technology security council, working to improve the security of animal and environmental conservation. she is a cybersecurity fellow of new america, a washington dc-based think-tank, and is a fellow of the madison policy forum, a cybersecurity-focused policy group bridging military, government and industry. she is a certified information systems security professional (cissp). close alex operation luigi: how i hacked my friend without her noticing alex operation luigi: how i hacked my friend without her noticing yep so i asked my friend if i could hack her and she said yes. this is about what worked, what went wrong, all the flubs i made, and how to not suffer the same fate as her. also mario's green brother is there, and then that part takes a sinister turn. bio alex is a blue teamer, magician, sweet mango boy, five-time celebrity masterchef winner, and a certified luigi technician. critics have described him as "aggressively wonky". you can find his internet antics at https://mango.pdf.zone. close events for 2018 v events include: pre-registration friday evening at the embassy pre-registration pre-registration the welcome event! collect your badge early, stay for nibbles or a drink, meet the other attendees, speakers and crew. please register for this free event below. register now close post-con notworking saturday evening at riverside receptions post-con notworking post conference snacks and social! please register for this free event below. register now close burp plugins workshop 10:30 saturday with sajeeb lohani burp plugins workshop come by the beauty and the beast: burp and its extender, to learn about how to automate tasks using burp suite's powerful extender api. there is also a prize for the most creative, efficient, and well engineered plugin! bio sajeeb lohani is one of the freshest worker bees at hivint: a developer-turned-penetration tester who’s passionate about annoying client developers by day, and open source developers by night. on his quest for excellence, sajeeb has been a busy bee indeed, creating some extensions for burp suite and automating tedious work. check out his workshop at this year’s ! close crikeygirls crikeygirls the 2018 crikey con crikeygirls dinner: bringing together the geek girls of brisbane this year’s crikey girls event will be an evening of insightful conversation with other hacking, security and it professionals (and amateurs?) over nibbles, drinks and networking. not limited to hackers, this event aims to bring together brilliant female minds from all areas of it to talk security, eat canapes and compare tech. please register for the event below. is subsidising the event, so please pick either a free ticket or a contributory ticket at your discretion! register now close plc skill tester joshua riesenweber plc skill tester joshua riesenweber the plc skill tester is a special booth at the conference where attendees take turns in some hands-on attacking of a programmable logic controller. setup as a gamified machine, visitors can hijack plc traffic to dispense a prize (think arcade claw machine with better odds). no experience is necessary, everyone is encouraged to have a try and ask questions! the plc skill tester is a fun, novel machine that demonstrates basic plc logic and interference in an interactive, gamified, mini-ctf kind of way. plc hacking is something that’s not often shown in a hands-on way, and this provides an introduction in a way that people will enjoy. duration all day bio joshua is a well-rounded security professional who has undertaken penetration testing for universities, financial institutions and numerous other corporations. over the past decade, he has established a formidable reputation in technical consulting. with a background as a senior network engineer and head of infrastructure designs, he uses his knowledge of enterprise technology to provide insight in securing corporate systems. close hack-a-bomb richard sims hack-a-bomb richard sims you are a government agent who needs to hack a terrorist computer to gain a deactivation code for the bomb! enter the code into the deactivation panel and the countdown timer will stop (hopefully!) close lockpicking run by our friends at ozseccon lockpicking run by our friends at ozseccon ever picked a lock? know how to get yourself out of handcuffs with just a paper clip? come join our awesome friends from ozseccon for some lockpicking fun, learning, competition and everything locks close ctf back for its 3rd year ctf pwn all the things! the ctf is a beginner ctf, but there should be challenges for the beginningist beginner and the l33tist of l33t0r [email protected] ! if you've never played a ctf before, come along and have a go. we will have loan laptops available for people to use if you don't want to use your own challenge categories include: web binaries crypto social engineering lock picking trivia coding audio forensics rf hacking awkward hugs hacker 101 wireless hacking ...and more! the ctf this year is brought to you by bull , dook , timk and codingo . and our awesome ctf sponsors pentesterlab & ozhack.com have donated more awesome prizes, which will be given to the top 3 winning teams, as well as random prize giveaways during the ctf. close training for 2018 v training options include: sagi shahar windows privilege escalation sagi shahar windows privilege escalation this free-of-charge workshop will cover all (currently) known attack vectors of local user privilege escalation on the windows operating systems: this is a one-day course which will discuss in detail the theory behind each attack vector, identification of the conditions required to perform it successfully, and finally the exploitation steps. in addition to the theoretical part, each attack is given to the students as an exercise where they practically identify and execute the attack all by themselves. register now close kevin alcock bluetooth hacking 101 kevin alcock bluetooth hacking 101 this training is for those that are interested in the world of iot hacking but don’t know where to start. this course gives them basic knowledge in a safe environment. this course provides the student with a bluetooth dongle, a vm and a target device. kevin will take the students through an introduction and the in to a hands on workshop. topics: what is bluetooth and how it works getting started what hardware do you need what software tools understanding of attacks getting information out how to carry on beyond this session and more... register now close schedule fri 23 rd feb sat 24 th feb 9am to 5pm droppy academy training 3:30pm to 7:30pm 2018 pre-registration & welcome event embassy craft beer bar, 214 elizabeth st, brisbane 7pm to 9:30pm 2018 crikeygirls dinner 8am to 9am the doors opening 9am to 9:15am announcements the crikey crew present the opening and ctf starting.! 9:15am to 10am cloud effects on security professionals: attackers and defenders public cloud, fundamentally changes the security equation for both attackers and defenders. practically every piece of the cloud is instrumented, logged, and being analyzed at the network layer, host level, and everything in between – by default, all the time. for the attacker, there is no place to hide. one errant connection or detected compromise of a host anywhere in the cloud can quickly be blocked or inoculated throughout the rest of the cloud in seconds. for the defender, scale dictates that everything needs to be automated and exceptions may be manually handled once before being learned by an ai responder. 10am to 10:30am pizza roullette catherine and fiona are security newbies in the world of bleepbloops. as their hunger for more knowledge on security testing grows, they attempt to chomp into the cyber realm of ordering pizza. pull up a chair, grab a slice* and prepare yourself for a feast! 10:30am to 11am analyzing java heap memory dumps during a recent penetration test, we identified a vulnerability that allowed us to download a full heap memory dump from the application server. this presentation will examine the vulnerability itself, the structure of the heap dump, and the tools available for analyzing it. using a sample application, we will show the potential to extract critical information from such a memory dump, and provide some ideas for future research. 11am to 11:30am morning break time to get some coffee! 11:30am to 12:15pm vulnerabilities in popular routing protocols communication across the network is core business for most organisations and in fact the entire internet. but what happens when a hacker messes with the interconnects we rely on? this talk will overview vulnerabilities known in popular routing protocols. the presentation will explain how the protocols work and demonstrate the effectiveness (or not) of the vulnerabilities. 12:15pm to 1pm cyber insurance: a primer for infosec the market for cyber insurance is expected to reach $14 billion by 2022. many companies, large and small, have purchased it already or are in the process of evaluating. technical information security professionals are being asked to participate in this process with little to no background information on the commercial insurance industry as a whole, and more specifically the cyber insurance market. many insurance carriers are piling into the market but is there a lack of real and valuable data are they instead focused on increasing market share and profitability. cyber insurers need to focus on pricing this risk correctly, otherwise the financial risk could devastate market participants. what data would be more useful for cyber insurers to better understand, price and write this risk? this talk will explore an (hopefully not boring) overview insurance industry as a whole, specific cyber policies that are currently being written, how this risk is priced, what data would be more useful for insurers to use to underwrite and an overall focus on what cyber insurance can do for the cyber security industry as a whole. 1pm to 2pm lunch food food food 2pm to 2:45pm operation luigi: how i hacked my friend without her noticing yep so i asked my friend if i could hack her and she said yes. this is about what worked, what went wrong, all the flubs i made, and how to not suffer the same fate as her. also mario's green brother is there, and then that part takes a sinister turn. 2:45pm to 3:30pm how i learned to stop worrying and find uxss/rce in my first year in information security i got obsessed with a couple of little bugs…and after following said bugs down the proverbial rabbit hole ended up with novel rce in sql and uxss in microsoft edge. mysql/maria db are now patched and edge is due to be patched in january. the talk will take the audience on a journey from discovering an innocent looking bug and through the process of understanding what is causing the bug and the lateral thinking used to result in big bugs. the talk will include live demonstration + a little autohotkey. 3:30pm to 4pm open source user session recording this presentation we will discuss the limitations of existing open source approaches, then present the scribery project, an end-to-end session recording solution with features. 4pm to 4:15pm hd-am-i-in-the-middle the presentation will centre on the demonstration of a hdmi and usb hid mitm dropbox for client site assessments, with some history of the different versions of the project. 4:15pm to 4:45pm afternoon tea break yes, tea! 4:45pm to 5:15pm red team black bag golden ticket or white elephant? in this talk i will explain some of the many tools and techniques of the fascinating field of red teaming physical security and give you my own thoughts on what is actually useful versus what is a complete waste of money and space. 5:15pm to 6pm let’s play-ai super metroid machine learning is cool right now. whether you’re an av firm struggling to detect meterpreter, a cio for an ico working out how you can legitimately work the terms “machine learning” and “blockchain” into the same sentence, or developing a robot that doesn’t walk itself into a pond, ai and machine learning is hot on everyone’s minds. 6pm to 6:30pm ct logs are the new black this talk is the result of a small personal side project for better understanding ct logs and how they may be used. it resulted in crunching some decent sized data sets (numerous terabytes of compressed data) to extract certificate data relevant for work in nz & au, contemplating this datasets use and relevance for both blue and red teams. 6:30pm to 7pm the crew closes things out 7pm to 9pm post con notworking! our sponsors if you want to join their ranks, get in contact with us. gold sponsors silver sponsors sponsors & supporters friends of contact us we can be reached by email ( [email protected] ), on twitter ( @ ), or by shouting obscenities (\o/) in the street. © 2018 archives project name lorem ipsum dolor sit amet consectetur. use this area to describe your project. lorem ipsum dolor sit amet, consectetur adipisicing elit. est blanditiis dolorem culpa incidunt minus dignissimos deserunt repellat aperiam quasi sunt officia expedita beatae cupiditate, maiores repudiandae, nostrum, reiciendis facere nemo! date: january 2017 client: threads category: illustration close project project name lorem ipsum dolor sit amet consectetur. use this area to describe your project. lorem ipsum dolor sit amet, consectetur adipisicing elit. est blanditiis dolorem culpa incidunt minus dignissimos deserunt repellat aperiam quasi sunt officia expedita beatae cupiditate, maiores repudiandae, nostrum, reiciendis facere nemo! date: january 2017 client: explore category: graphic design close project project name lorem ipsum dolor sit amet consectetur. use this area to describe your project. lorem ipsum dolor sit amet, consectetur adipisicing elit. est blanditiis dolorem culpa incidunt minus dignissimos deserunt repellat aperiam quasi sunt officia expedita beatae cupiditate, maiores repudiandae, nostrum, reiciendis facere nemo! date: january 2017 client: finish category: identity close project project name lorem ipsum dolor sit amet consectetur. use this area to describe your project. lorem ipsum dolor sit amet, consectetur adipisicing elit. est blanditiis dolorem culpa incidunt minus dignissimos deserunt repellat aperiam quasi sunt officia expedita beatae cupiditate, maiores repudiandae, nostrum, reiciendis facere nemo! date: january 2017 client: lines category: branding close project project name lorem ipsum dolor sit amet consectetur. use this area to describe your project. lorem ipsum dolor sit amet, consectetur adipisicing elit. est blanditiis dolorem culpa incidunt minus dignissimos deserunt repellat aperiam quasi sunt officia expedita beatae cupiditate, maiores repudiandae, nostrum, reiciendis facere nemo! date: january 2017 client: southwest category: website design close project <3 lorem ipsum dolor sit amet consectetur. use this area to describe your project. lorem ipsum dolor sit amet, consectetur adipisicing elit. est blanditiis dolorem culpa incidunt minus dignissimos deserunt repellat aperiam quasi sunt officia expedita beatae cupiditate, maiores repudiandae, nostrum, reiciendis facere nemo! date: january 2017 client: window category: photography close project faq all you need to know. what's the vision? we will continue to grow a grass-roots, not-for-profit, community-led conference targeting security folk around south-east queensland and beyond. the event is to be informal to encourage a greater flow of information between attendees and speakers. where did come from? was founded in 2014 to address the brisbane local demand for a community styled security conference. is a not-for-profit, community-led conference targeting those interested in information security around south-east queensland and beyond. the informal style of the event is designed to facilitate knowledge sharing between all participants. the event consists of presentations and demonstrations by industry professionals, security wizards and enthusiasts alike. active participation is strongly encouraged with q&a; sessions after each presentation to draw on the intellect of the speakers and participants to help break new ground. what's about? the focus is on information security with the usual mix of infrastructure- and application-space shenanigans. we want to push out from the core though, so are keen to get submissions on the social, political and environment twists on the theme, the impact of technology on our daily lives, shifting perspectives and pretty much anything that interests you if you’ve poked around the site this far. dig out your old survivalist txts and give us a history lesson. what about the venue? we want to maintain the informal and interactive air about the conference, encouraging information exchange and quality discussion. to support this, the venue for the event is a riverfront reception venue with food and drink facilities. for the entrance fee, the attendees will get access to great talks, some side activities, and great people (organisers excepted). food and drink are not included in the cost. talks will be in a dedicated room with av, speakers are encouraged to keep the presentations as active as possible rather than making attendees suffer death by powerpoint. active q&a; sessions are expected after each talk concludes. we’ve got access to some additional spaces this year, and will have some other activities going on during the day to keep you entertained if you want a change of scenery. do you have a code of conduct (coc)? yep. code of conduct close code of conduct is a diverse and inclusive conference dedicated to providing a harassment-free experience for everyone, regardless of gender, gender identity and expression, sexual orientation, disability, neuro-difference, physical appearance, body size, race, or religion. we do not tolerate harassment of participants in any form. expected behaviour if you can’t act like a decent human being for a few hours, then please do not attend . be considerate, respectful, collaborative, and inclusive. seek permission before taking photos of individuals (giving a presentation is implied permission). seek permission before initiating any physical contact that may be unwelcome. if you are subjected to unacceptable behaviour, notice that someone else is being subjected to unacceptable behaviour, or have any other concerns, please notify a conference organiser as soon as possible. if you see something, say something! unacceptable behaviour and materials general intimidating, harassing, abusive, derogatory, or demeaning materials or conduct by any attendees. gratuitous or off-topic sexual images or behaviour in spaces where they’re not appropriate (including presentation slides). deliberate intimidation, stalking, or following. continued personal communication after requests to cease. sustained disruption of talks or other events. inappropriate physical contact, simulated physical contact (e.g. textual descriptions like “*hug*” or “*backrub*”), or sexual attention without consent or after a request to stop. any physical force whatsoever against any person, which in any way is disruptive or dangerous, or creates apprehension in a person. possessing any open can, bottle or other receptacle containing any alcoholic beverages, except in areas specifically designated for the consumption of alcohol. please drink responsibly. underage drinking, or supplying alcohol to a minor. smoking – other than in designated areas. hacking, cracking, breaking, or lock picking, if you haven’t been given explicit permission, e.g. the following is unacceptable: socially engineering attendees; fiddling with venue gear; picking venue locks; doxing attendees; pineapples; wifi honeypots; dumpster diving; rf jamming. unapproved photography or recording of any attendee, training session, or presentation. failure to obey any rules or regulations of the venue. any illegal activity. diversity and inclusion offensive or discriminatory material or comments (verbal, written, or otherwise) related to gender, gender identity and expression, sexual orientation, race, religion, disability, neuro-difference, physical appearance, body size, age. wearing clothing that is potentially offensive. unwelcome comments regarding a person’s lifestyle choices and practices, including those related to food, health, parenting, drugs, and employment. deliberate misgendering or use of ‘dead’ or rejected names. deliberate “outing” of any aspect of a person’s identity without their consent scope this code of conduct applies to all participants (staff, sponsors, volunteers, speakers, attendees, media, and other guests) at all conference spaces and conference-related events, but if you are being harassed by a participant of outside our spaces, we still want to know about it. the conference organisers will take all good-faith reports of harassment by participants seriously. this includes harassment within the security community but outside our spaces, and harassment that took place at any point in time. the conference organisers reserve the right to exclude people from the conference based on their past behaviour, including behaviour outside conference spaces and behaviour towards people who are not a participant. in order to protect volunteers from abuse and burnout, we reserve the right to reject any report we believe to have been made in bad faith. we are not here to explain power differentials or other social justice concepts to you. reports intended to silence legitimate criticism may be deleted without response. some events or areas may have additional rules in place, which will be made clearly available to participants. participants are responsible for knowing and abiding by these rules. we will respect confidentiality requests for the purpose of protecting victims of abuse. consequences of unacceptable behaviour anyone asked to stop unacceptable behaviour is expected to comply immediately. if a participant engages in unacceptable behaviour, the conference organisers may take any action they deem appropriate, e.g. a verbal warning, expulsion from the conference without refund, expulsion from all future events without refund, and/or take steps to notify appropriate authorities. the conference organisers will attempt to escalate consequences in a reasonable manner. organisers will be happy to help participants contact local law enforcement, provide escorts, or otherwise assist those experiencing harassment to feel safe for the duration of the conference. we value your attendance. thanks to geek feminism ( http://geekfeminism.wikia.com/wiki/conference_anti-harassment ) for guidance and templates. close call for presentations, training, events and workshops are now open call for presentations what are we looking for? nominally, 45-minute talks (including question time), but we're flexible! need 15 minutes to have a passionate rant? please submit, coz we're listening... presenters from diverse backgrounds. we want a fully diverse and inclusive conference. we have a diverse selection panel for presentation submissions, and encourage people from all walks of life to be a part of this fantastic community. interesting presentations that don't involve death by powerpoint (we love the edge of your seat action of a live demo) topics that information security professionals find interesting. examples include: web application hacking network testing securing windows/linux systems source code reviews business excellence and thought leadership in infosec secure programming/development privacy concerns malware analysis penetration testing exploit development reverse engineering hardware hacking internet of things lockpicking red teaming software defined radio proposals on topics not listed above, but related to the conference interests (i.e. information security / hacking) may also be accepted, especially if they are interesting, different, or edgy. no vendor pitches!! let's keep this vendor agnostic interpretive dance and kittens are a bonus mentoring is this may your first time speaking? if so and you want some help, please get in touch. we want to encourage everyone to join in on the fun and we can put you in touch with someone that can help. so, if you want to bounce your ideas off someone, want some help with polishing your presentation, or want advice in doing a live demo, then let us know! [email protected] what do you get? a hug, and free entry of course! a special “speaker” badge access to our green room during the con, and to any vip events our devoted admiration a little token of our appreciation possibly a free beer or two, or alternate tipple of your choice you can brag about it as much as you want unfortunately we are a nfp so we can't pay for your flights and accommodation (you can always sleep in a tent in an organiser's backyard if you want though) how do i apply? good question .. send the following information to [email protected] (pgp) contact information (full name, alias, e-mail, phone, photo). speaker biography short description of your presentation. why is your presentation different or innovative or significant or edgy or an important presentation? any research papers or other information that are relevant to your presentation let us know if you do not wish for your talk to be recorded and made available online (we record and upload by default - but are happy not to if asked) if you are happy for your talk to be recorded and made available online, are you happy for it to be released under a creative commons attribution 4.0 international license? the deadline for submission is 24th november 2017. call for training note: training will be on 23rd february 2018 - the day before the conference. what are we looking for? we are seeking training proposals on any of the following topics (in no particular order): infosec 101 web application hacking network testing securing windows/linux systems source code reviews business excellence and thought leadership in infosec secure programming/development privacy concerns malware analysis penetration testing exploit development reverse engineering hardware hacking internet of things lockpicking red teaming software defined radio proposals on topics not listed above, but related to the conference interests (i.e. information security / hacking) may also be accepted, especially if they are interesting, different, or edgy. what do you get? free entry to , of course! a special “speaker” badge access to our green room during the con, and to any vip events space to hold your event our devoted admiration a little token of our appreciation possibly a free beer or two, or alternate tipple of your choice you can brag about it as much as you want unfortunately we are a nfp so we can't pay for your flights and accommodation (you can always sleep in a tent in an organiser's backyard if you want though) how do i apply? good question. send the following information to [email protected] : contact information (full name, alias, e-mail, phone, photo). brief biography including any relevant credentials (e.g. training classes conducted previously) training title training introduction/description student prerequisites software requirements hardware requirements course outline (1 day or half day) number of students (minimum and maximum) contact information (full name, alias, e-mail, phone, photo) employment and/or affiliations information, if relevant why is your material different or innovative or significant or an important tutorial? details of any requirements (some examples: table with seating for 12, power, wifi, projector) details of any costs to training classes are assumed be 1 full day (0900 hours - 1700 hours). please inform the cft committee if your training is shorter than 1 day during your cft submission. all submissions must be in english. the more information you provide, the better the chance for selection. understand that there are people who cannot afford to pay for training events and we want to encourage the next generation of security professionals. therefore, we will be offering a number of free seats to any training event. the deadline for submission is 24th november 2017. call for events and workshops what are we looking for? creative and innovative events or workshops events or workshops that will keep bringing people back to challenges worthy of attendees some events and workshops that will give you a good idea of what we are seeking: capture the flag (some examples: jeopardy, wireless, forensics, social engineering, badge challenge) hardware hacking workshop lockpicking village software defined radio demos solder station tamper evident village & contest “defuse the bomb” challenge black bag competition counterfeit badge contest scavenger hunt bio hacking village mohawk-con chili eating contest what do you get? free entry to , of course! a special “speaker” badge access to our green room during the con, and to any vip events space to hold your event or workshop our devoted admiration a little token of our appreciation possibly a free beer or two, or alternate tipple of your choice you can brag about it as much as you want unfortunately we are a nfp so we can't pay for your flights and accommodation (you can always sleep in a tent in an organiser's backyard if you want though) how do i apply? good question. send the following information to [email protected] : contact information (full name, alias, e-mail, phone, photo). brief biography including any relevant credentials (e.g. similar events or workshops conducted previously). event or workshop details (including step by step information on how will you conduct it) title introduction/description duration (all day, 1 hour, etc.) employment and/or affiliations information, if relevant details of any requirements (some examples: table with seating for 12, power, wifi, a separate room, beer) details of any costs to why is your event or workshop different or innovative or significant or edgy or an important event? all submissions must be in english. the more information you provide, the better the chance for selection. the deadline for submission is 24th november 2017. close

URL analysis for crikeycon.com


https://www.crikeycon.com/#sagishaharmodal
https://www.crikeycon.com/#burppluginmodal
https://www.crikeycon.com/#about
https://www.crikeycon.com/#kevinalcockmodal
https://www.crikeycon.com/#scottybrownmodal
https://www.crikeycon.com/#events
https://www.crikeycon.com/#ericpinkertonmodal
https://www.crikeycon.com/#schedule
https://www.crikeycon.com/#page-top
https://www.crikeycon.com/#davidbrendanmodal
https://www.crikeycon.com/archive
https://www.crikeycon.com/#frasertweedalemodal
https://www.crikeycon.com/#markpipermodal
https://www.crikeycon.com/#kyliemodal
https://www.crikeycon.com/#preregistrationmodal

Whois Information


Whois is a protocol that is access to registering information. You can reach when the website was registered, when it will be expire, what is contact details of the site with the following informations. In a nutshell, it includes these informations;

Domain Name: CRIKEYCON.COM
Registry Domain ID: 1841858814_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.enom.com
Registrar URL: http://www.enom.com
Updated Date: 2017-03-02T20:17:59Z
Creation Date: 2014-01-08T00:44:24Z
Registry Expiry Date: 2018-01-08T00:44:24Z
Registrar: eNom, Inc.
Registrar IANA ID: 48
Registrar Abuse Contact Email:
Registrar Abuse Contact Phone:
Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
Name Server: NS1.EV6.NET
Name Server: NS2.EV6.NET
Name Server: NS3.EV6.NET
Name Server: NS4.EV6.NET
Name Server: NS5.EV6.NET
DNSSEC: unsigned
URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
>>> Last update of whois database: 2017-08-11T21:14:33Z <<<

For more information on Whois status codes, please visit https://icann.org/epp

NOTICE: The expiration date displayed in this record is the date the
registrar's sponsorship of the domain name registration in the registry is
currently set to expire. This date does not necessarily reflect the expiration
date of the domain name registrant's agreement with the sponsoring
registrar. Users may consult the sponsoring registrar's Whois database to
view the registrar's reported date of expiration for this registration.

TERMS OF USE: You are not authorized to access or query our Whois
database through the use of electronic processes that are high-volume and
automated except as reasonably necessary to register domain names or
modify existing registrations; the Data in VeriSign Global Registry
Services' ("VeriSign") Whois database is provided by VeriSign for
information purposes only, and to assist persons in obtaining information
about or related to a domain name registration record. VeriSign does not
guarantee its accuracy. By submitting a Whois query, you agree to abide
by the following terms of use: You agree that you may use this Data only
for lawful purposes and that under no circumstances will you use this Data
to: (1) allow, enable, or otherwise support the transmission of mass
unsolicited, commercial advertising or solicitations via e-mail, telephone,
or facsimile; or (2) enable high volume, automated, electronic processes
that apply to VeriSign (or its computer systems). The compilation,
repackaging, dissemination or other use of this Data is expressly
prohibited without the prior written consent of VeriSign. You agree not to
use electronic processes that are automated and high-volume to access or
query the Whois database except as reasonably necessary to register
domain names or modify existing registrations. VeriSign reserves the right
to restrict your access to the Whois database in its sole discretion to ensure
operational stability. VeriSign may restrict or terminate your access to the
Whois database for failure to abide by these terms of use. VeriSign
reserves the right to modify these terms at any time.

The Registry database contains ONLY .COM, .NET, .EDU domains and
Registrars.

  REGISTRAR eNom, Inc.

SERVERS

  SERVER com.whois-servers.net

  ARGS domain =crikeycon.com

  PORT 43

  TYPE domain

DOMAIN

  NAME crikeycon.com

  CHANGED 2017-03-02

  CREATED 2014-01-08

STATUS
clientTransferProhibited https://icann.org/epp#clientTransferProhibited

NSERVER

  NS1.EV6.NET 213.165.242.13

  NS2.EV6.NET 195.74.119.66

  NS3.EV6.NET 62.3.99.93

  NS4.EV6.NET 213.165.242.14

  NS5.EV6.NET 77.95.39.212

  REGISTERED yes

Go to top

Mistakes


The following list shows you to spelling mistakes possible of the internet users for the website searched .

  • www.ucrikeycon.com
  • www.7crikeycon.com
  • www.hcrikeycon.com
  • www.kcrikeycon.com
  • www.jcrikeycon.com
  • www.icrikeycon.com
  • www.8crikeycon.com
  • www.ycrikeycon.com
  • www.crikeyconebc.com
  • www.crikeyconebc.com
  • www.crikeycon3bc.com
  • www.crikeyconwbc.com
  • www.crikeyconsbc.com
  • www.crikeycon#bc.com
  • www.crikeycondbc.com
  • www.crikeyconfbc.com
  • www.crikeycon&bc.com
  • www.crikeyconrbc.com
  • www.urlw4ebc.com
  • www.crikeycon4bc.com
  • www.crikeyconc.com
  • www.crikeyconbc.com
  • www.crikeyconvc.com
  • www.crikeyconvbc.com
  • www.crikeyconvc.com
  • www.crikeycon c.com
  • www.crikeycon bc.com
  • www.crikeycon c.com
  • www.crikeycongc.com
  • www.crikeycongbc.com
  • www.crikeycongc.com
  • www.crikeyconjc.com
  • www.crikeyconjbc.com
  • www.crikeyconjc.com
  • www.crikeyconnc.com
  • www.crikeyconnbc.com
  • www.crikeyconnc.com
  • www.crikeyconhc.com
  • www.crikeyconhbc.com
  • www.crikeyconhc.com
  • www.crikeycon.com
  • www.crikeyconc.com
  • www.crikeyconx.com
  • www.crikeyconxc.com
  • www.crikeyconx.com
  • www.crikeyconf.com
  • www.crikeyconfc.com
  • www.crikeyconf.com
  • www.crikeyconv.com
  • www.crikeyconvc.com
  • www.crikeyconv.com
  • www.crikeycond.com
  • www.crikeycondc.com
  • www.crikeycond.com
  • www.crikeyconcb.com
  • www.crikeyconcom
  • www.crikeycon..com
  • www.crikeycon/com
  • www.crikeycon/.com
  • www.crikeycon./com
  • www.crikeyconncom
  • www.crikeyconn.com
  • www.crikeycon.ncom
  • www.crikeycon;com
  • www.crikeycon;.com
  • www.crikeycon.;com
  • www.crikeyconlcom
  • www.crikeyconl.com
  • www.crikeycon.lcom
  • www.crikeycon com
  • www.crikeycon .com
  • www.crikeycon. com
  • www.crikeycon,com
  • www.crikeycon,.com
  • www.crikeycon.,com
  • www.crikeyconmcom
  • www.crikeyconm.com
  • www.crikeycon.mcom
  • www.crikeycon.ccom
  • www.crikeycon.om
  • www.crikeycon.ccom
  • www.crikeycon.xom
  • www.crikeycon.xcom
  • www.crikeycon.cxom
  • www.crikeycon.fom
  • www.crikeycon.fcom
  • www.crikeycon.cfom
  • www.crikeycon.vom
  • www.crikeycon.vcom
  • www.crikeycon.cvom
  • www.crikeycon.dom
  • www.crikeycon.dcom
  • www.crikeycon.cdom
  • www.crikeyconc.om
  • www.crikeycon.cm
  • www.crikeycon.coom
  • www.crikeycon.cpm
  • www.crikeycon.cpom
  • www.crikeycon.copm
  • www.crikeycon.cim
  • www.crikeycon.ciom
  • www.crikeycon.coim
  • www.crikeycon.ckm
  • www.crikeycon.ckom
  • www.crikeycon.cokm
  • www.crikeycon.clm
  • www.crikeycon.clom
  • www.crikeycon.colm
  • www.crikeycon.c0m
  • www.crikeycon.c0om
  • www.crikeycon.co0m
  • www.crikeycon.c:m
  • www.crikeycon.c:om
  • www.crikeycon.co:m
  • www.crikeycon.c9m
  • www.crikeycon.c9om
  • www.crikeycon.co9m
  • www.crikeycon.ocm
  • www.crikeycon.co
  • crikeycon.comm
  • www.crikeycon.con
  • www.crikeycon.conm
  • crikeycon.comn
  • www.crikeycon.col
  • www.crikeycon.colm
  • crikeycon.coml
  • www.crikeycon.co
  • www.crikeycon.co m
  • crikeycon.com
  • www.crikeycon.cok
  • www.crikeycon.cokm
  • crikeycon.comk
  • www.crikeycon.co,
  • www.crikeycon.co,m
  • crikeycon.com,
  • www.crikeycon.coj
  • www.crikeycon.cojm
  • crikeycon.comj
  • www.crikeycon.cmo
Show All Mistakes Hide All Mistakes