Invalid quantity. Please enter a quantity of 1 or more.

The quantity you chose exceeds the quantity available.

Please enter your name.

Please enter an email address.

Please enter a valid email address.

Please enter your message or comments.

Please enter the code as shown on the image.

Please enter an email address.

Please enter a valid email address in the To: field.

Please enter a subject for your message.

Please enter a message.

You can only send this invitations to 10 email addresses at a time.

$$$$ is not a properly formatted color. Please use the format #RRGGBB for all colors.

Please limit your message to $$$$ characters. There are currently ££££.

$$$$ is not a valid email address.

Please enter a promotional code.

N/A

Sold Out

Unavailable

Please enter a password with at least 8 characters.

You have exceeded the time limit and your reservation has been released.



The purpose of this time limit is to ensure that registration is available to as many people as possible. We apologize for the inconvenience.

This option is not available anymore. Please choose a different option.

Please read and accept the waiver.

All fields marked with * are required.

Please double check your email address. The email address format does not appear valid.

Please double check your email address. Your emails do not match.

$$$$ requires a number between ££££ and §§§§

US Zipcodes need to be 5 digits.

Postal code may contain no more than 9 letter or number characters.

Please double check your website URL.

All fields marked with * are required.

Your card CSC needs to be 4 digits.

Please confirm your order:

$$$$

You have selected to Pay by Check.



Click OK to confirm your order.

Please confirm your order:

$$$$

You have selected to Pay at the Door.



Click OK to confirm your order.

Please confirm your order:

$$$$

You have selected to Pay upon Receiving an Invoice.



Click OK to confirm your order.

Your card CSC needs to be 3 digits.

Sofort is only available in Germany and Austria.

Boleto Bancario is only available in Brazil.

OXXO is only available in Mexico.

PagoFacil is only available in Argentina.

Rapipago is only available in Argentina.

Please enter a valid IBAN number.

You need to accept to charge your bank account.

Your billing zip code needs to be 5 digits.

Please double check your CEP info. The CEP format should be something like 12345-678.

Please double check your tax identifier.

There was a problem saving your address.

There was a problem saving your card info.

There was a problem saving your personal information.

McAfee Secure sites help keep you safe from identity theft, card fraud, spyware, spam, viruses and online scams.

Copying Prohibited by Law - McAfee Secure is a Trademark of McAfee, Inc.

Unknown card type.

No card number provided.

card number is in invalid format.

Wrong card type or card number is invalid.

card number has an inappropriate number of digits.

Please enter numbers here.

Please enter an integer value.

Numbers must be less or equal to $$$$

All the required fields have not been filled out. Click OK to proceed without all the required information, or click Cancel to finish entering the missing data.

Job titles must be less than 50 characters.

There is currently an issue with card submission on Safari with iOS7. Please try again with a different browser or device.

Sorry, invalid event registration form.

Sorry, invalid event or database error.

Sorry, quantity must be a positive integer.

Sorry, you did not select a valid ticket.

Sorry, invalid event organizer email address.

Your order was canceled.

Thank You. Your order has been successfully completed. Your name and email address have been added to the list of event attendees.

Sorry, that option is sold out.

Sorry, that option is no longer available.

Sorry, you entered an invalid quantity. Please enter a quantity of 1 or more next to the type or types of tickets you would like to purchase.

Sorry, you did not select any tickets to purchase. Please enter a quantity of 1 or more next to the type or types of tickets you would like to purchase.

Sorry, there are no tickets left for this event.

The tickets, ticket quantity or date and time you've requested are no longer available, due to previous sales. Please choose a different date, time or number of tickets and place your order again.

Sorry, one or more of the tickets you requested are no longer available for purchase.

Sorry, you need to select the date you want to attend.

Sorry, the promotional code you entered is not valid yet.

Sorry, the promotional code you entered has expired.

Sorry, the promotional code you entered is not valid.

Your session has expired. Try ordering again.

Sorry, your requested ticket quantity exceeds the number provided by your promotional code.

Sorry, the payment type chosen is invalid for this event.

Sorry, there is only 1 ticket left for this event.

We're sorry, this invitation is invalid.

We're sorry, this invitation has already been used.

We're sorry, you already have an order being processed for this event. Please wait a few minutes and try again.

We're sorry, there is a problem with your invitation. Please try again.

Invalid quantity of tickets selected.

Invalid donation amount.

Sorry, the promotional code you entered has been claimed.

The payment was cancelled.

The payment was declined by the bank.

The payment failed.

The payment expired.

Bummer! This team is full. Please join a different team.

Sorry, the tickets you've selected are no longer available.

We couldn't process your order because you have this event open on multiple tabs in your browser. Please try again with only one browser tab open.

Based on the quantity selected we are unable to seat your group together. Please try a smaller quantity.

Your browser does not support picking your own seat. Please select a quantity and the best available seats will be assigned to you.

Sorry, we can't complete your order in preview. Please make your event live to complete your order.

Group registration has been disabled for this event.

Sorry, you cannot reserve seats when your event is in draft mode.

There was a problem submitting your order. Code 17

Sorry, the payment type chosen is invalid for this event.

Sorry, your billing address was not saved properly, please try again.

Sorry, we experienced an internal error, please try again.

The captcha you entered is invalid. Please try again.

Invalid card selected. You have been logged out.

Sorry, your team selection was not valid.

It looks like this event organizer is unable to process your order through their payment processor. Please try again later, or contact the organizer directly

Sorry, the payment type chosen is invalid for this event.

Sorry, your billing address was not saved properly, please try again.

Sorry, we experienced an internal error, please try again.

Please double check your email address. The email address format does not appear valid.

State

Zip Code

Province

Postal Code

County

State/Territory

State/Province

State

This event has ended

None B-Sides CT NESIT Saturday, June 11, 2011 from 9:00 AM to 4:00 PM (EDT) Meriden, CT Ticket Information Type Remaining End Quantity B-SidesCT 36 Tickets Ended Free Share B-Sides CT Share Tweet Event Details Event details When: Saturday, June 11th, 2011 (9:00AM - 4:00PM) Where: NESIT Labs (Map) Cost: Free (as always!) Invite your friends by posting this on Twitter: " #BSidesCT June, 11,2011: Discover the next big thing!" Sponsors Events Sponsors: Please contact bsides@nesit.net if interested in sponsoring! ForeSite has been providing solutions for technology problems since 1997 through the IT division which provides everything from help desk, to network maintenance, projects and technology planning, and the Development division which focuses on designing and developing effective custom websites and applications. We strive to be a true technology partner to our clients, whether we are acting as their full IT Department or as a valuable supplemental resource for their internal IT staff. Our clients are a mix of nonprofit and for profit organizations ranging from 5-10 person offices to Fortune 500 companies. Learn more at http://www.foresitetech.com At Technology Partners, we are dedicated to helping our clients recover from any type of data loss. When your data goes missing or your systems go down, we’re just a phone call away. Our mission is to ensure that our clients' data is always “protected, accessible, and secure.” Learn more at http://www.tpartners.com Talks: Tim Armstrong Kaspersky Danger in the Mobile Marketplace The Android operating system is on an explosive growth pattern, and has recently surpassed Apple’s iPhone for market share. The growth of this largely uncontrolled mobile platform and application market presents a new and evolving challenge for security practitioners. Google’s Android Market is likely to become the new source for cybercriminals. There have already been multiple reports of malicious applications in the store from information stealers to GPS Trojans. This presentation will take a look at the security aspects of the Android Market. I’ll delve into the architecture of the security model and its flaws, some of the malware currently found as well as future threats to expect. Finally, various steps for mitigation will be suggested and discussed. Kizz MyAnthia Weaponizing The Smartphone: Deploying the Perfect WMD "Weaponizing The Smarphone: Deploying The Perfect WMD" will show the audience how to create a deployable package on a MicroSD card for use on the HTC Rhodium (AT&T Tilt2) or similar Windows Mobile 6.5 smartphone. Then using a test wireless AP, a windows server 2003 VM, and The loaded WMD Smartphone the audience will be presented with a live demonstration of some of the tools including NMap, Metasploit, and The Social Engineering Toolkit to exploit the Windows Server 2003 VM and gain administrative access. David Sugar GNU Telephony GNU Free Call; communications for free societies GNU Free Call is a project that was introduced to create a world-wide free as in freedom secure self-organizing intercept-free peer-to-peer realtime communication networks from the bottom up without requiring mediating service providers and by using existing foundations such as SIP, ZRTP derived protocols, and the GNU SIP Witch server. Our goal includes providing the means for any individual or private organizations to create their own private secure communication network as well as to participate and create a global network. The ability to communicate securely, privately, and to even do so anonymously, are essential freedoms and have become a question of basic human dignity in the 21st century. Our initial focus is on delivering sustainable medical communication infrastructure where the need for privacy is also essential to protect patents dignity. Charlie Vedaa - PacketProtector pwn0- game on! Have you ever wanted to go all 'Grand Theft Auto' on a network? To brazenly scan and sploit everything in your path? But you're too nice to unleash your hacker fury on the neighbor's wifi? Then check out pwn0.com and help build an online playground where people can meet to pwn and be pwned.

Georgia Weidman (Of Shmoocon Fame) Transparent Command and Control for Smartphones over SMS Redux As smartphones become increasingly ubiquitous and powerful, they become appealing targets for botnet infections. Many of the top selling smartphone platforms are built on common PC operating systems. This makes the transition from developing PC based malware to smartphone based malware nearly trivial. Smartphone malware and specifically botnets have been seen both in security research and in the wild. The GSM modem can be viewed as a public IP address without filtering or firewall capabilities. The presentation shows an example of a smartphone botnet that is controlled over the GSM function SMS. The presented system works at the base operating system below the application layer, resulting in transparency to the user. Details of the system are discussed with particular interest on cryptography and security concerns. This attack vector will be put to the test, to defeat new defense techniques that have been released since this attack was first shown. Boris Sverdlik SR Partner Jaded Security

Hacking The Interview We have all had that interview where you walk out with that knot in your stomach knowing that it did not go well. This can happen to the best of us regardless of who you are and how good you are at your craft. The problem with an interview is that you have a very short time to self yourselves to the potential employer. What if you could walk into an interview and know as much information about your potential new boss as his spouse? That would definitely change the odds in your favor. Now imagine if you could pick up on his or her social weaknesses within the first few minutes of the conversation? Ryan O'Horo IOActive Pen Testing People: Social Engineering Integration The security regimen most companies follow rarely includes the most critical element of any infrastructure – its people. The numbers don’t lie, targeted social engineering attacks are extremely effective and simple steps can be taken to immediately and consistently reduce the threat. In this presentation, Ryan O’Horo will take you into the psychology of a social engineering attack and the unfortunate truth of how unprepared companies can be against them. Critically, strategies for running social engineering test cases as part of regular security audits and educating end-users in resisting social engineering attacks will help you integrate social engineering with your organization and shrink your attack surface. Chris Karr, CISSP - ÜberGuard Information Security Consulting, LLC SCADA Security Smart Grid operators must be diligent against international security threats from cyber terrorists, organized hackers, rogue states, etc. SCADA systems are intelligent IP-based hardware controls that are deployed to control and monitor the physical processes that make up the operation of energy utilities. The security challenges faced by power system operations are very different from those facing most other industries. Connecting a SCADA system to a public-facing network provides a host of security challenges. Since Chinese hackers have infiltrated the U.S. Smart Grid in 2009, where they left logic bombs and also gained control of many SCADA systems, SCADA security has moved into the limelight with the FBI, the Secret Service, the CIA, the NSA as well as the private-sector InfoSec community. Dan Weinstein Technology Partners Cloud Backup and Disaster Recovery (Abstract Pending) Grecs Founder, NovaInfosecPortal.com Hacking Your Career Talk Hi, I'm Grecs. Would you believe me if I told you that I went from being a bankrupt first level help desk technician to being a poser 37337 hacker millionaire in just 5 years? Some days I have a hard time believing it myself, but it’s true! Although my life is amazing now, it wasn’t always like this... When I declared bankruptcy it seemed like my life was over at just 25 years old. I was ashamed, embarrassed and felt like a failure. My relationship with my girlfriend was on shaky ground. My health was deteriorating and I wasn’t sure how I was going to feed my two young cats. My only computer was a botnet and pr0n infested Pentium II running Windows 98SE. To say the least, I was not the provider I wanted to be. To the astonishment of my friends and family I was able scrape together $450 and turn it into a net worth of over $1 million dollars in just 60 months! You must be wondering how this is even possible. The answer is infosec certifications. Now my new hackerin wife and I live in the loft of a 10,000ft hacker space on a large fresh water lake surrounded by beautiful mountains with 2 swimming pools, 3 hot tubs, tennis courts, and a private gym in the richest county in the country. I impress people by pretending to hack on my dream computer - a Mac Pro with 12 2.93GHz processor cores, 64G of DDR3 ECC SDRAM memory, 2TB of SSD storage, and dual 27" LED cinema displays - paid in cash. Our cats go to the obedience school of our choice. Best of all, my wife and I don’t argue about money and I am finally able to relax and hack without constantly worrying about money. This has all been possible because of infosec certifications. … Ok the above is a bunch of BS … but if infosec is your hobby and you want to learn how to turn this into a career or if you are early in your career and looking to take it to the next level, come join me for a light hearted fun-filled session on hacking your career. Attendee list available at: http://bsidesCT.eventbrite.com Features: Network king of the hill (Provided by NESIT Labs) Organizers William Genovese

William Reyor

Nate Ferrara

Greg McGuire

Patrick Tassos

Ron Barnes

Jeremy Shaffer Have questions about B-Sides CT? Attendee List Sort by: | First Name | Last Name Show More When & Where

NESIT

290 Pratt ST

Floor #2 - call 203-514-2257 for directions

Meriden, CT 06450



Saturday, June 11, 2011 from 9:00 AM to 4:00 PM (EDT)

Add to my calendar

Outlook Calendar Google Calendar Yahoo! Calendar iCal Calendar Organizer NESIT NESIT is a Connecticut hackerspace located in Meriden, CT. It is a place where people can come together to work on project, share knowledge and ideas, and use that knowledge to build a community to help others. NESIT is a 501(c)(3) Charitable Organization View organizer profile http://www.nesit.org

Interested in hosting your own event? Join millions of people on Eventbrite. Learn More