Training at Kiwicon has a twist; there's some for-pay training classes available on Tuesday 9th, and the same (or similar) training is available for free on Wednesday 10th. Why would you pay for something that you can get for free? Well, consider the abridged Kiwicon Code Of Conduct:
"Don't be a shitweasel"
If you work in the industry, or your work is paying for you to be at the Con, or if you have some other kind of fat cash paying gig, then we think it'd be swell of you to pay your way, and leave the free classes for those who can't afford it. In particular, we'll give priority to those with student tickets or jobs outside the relatively-well paid IT sector. If you try and sign up for the free classes from your fancy-pants dr.contractor.mr.the.plague.sir@fatcash.govt.nz, you're a jerk.
Kiwicon's about sharing the knowledge, so by paying your way, you're helping those who cant yet afford to.
UPDATED 15 Oct 2014: Note that training venues and times are still being arranged. The day won't change, but the times are unconfirmed at present.
Quick List
Details
Title | Penetration Testing Java applications for Fun and Profit (Paid) |
Abstract | Training info |
Location | Tue 09 0900 @ Enspiral Board Room |
Duration | 240 mins |
Name | David Jorm |
Origin | Brisbane, Australia |
Bio | David has been involved in the security industry for the last 15 years. He currently works as a manager for Red Hat's product security team, focusing on cloud and middleware products. He has been quoted in a major newspaper as saying North Korea's nuclear program is "ready to rock". |
Title | OSINT Training (paid) |
Abstract | Training info |
Location | Tue 09 0900 @ Auldhouse Training |
Duration | 480 mins |
Name | Simon Howard |
Origin | Wellington, New Zealand |
Bio | Simon owns and operates security consultancy ZX Security which helps organisations inject security into their processes and systems. Simon also co-founded and helps run NZ bestest Hacker conference - Kiwicon. |
Title | Intro to SDR and Signal Processing (Paid) |
Abstract | Training info |
Location | Tue 09 0900 @ Catalyst Training Room |
Duration | 480 mins |
Name | Tim Kuester |
Origin | Maryland USA |
Bio | Wow. Writing about yourself in the 3rd person is weird.
Tim Kuester is a Computer Engineer living in Maryland. Over the past
four years, he's worked on some pretty sweet projects involving FPGA's,
microcontrollers, circuit board design, and radios. He secretly wants
to write a blog like Dave Jones and Craig Heffner, but he's not cool
enough to do that yet. |
Title | Security for Rails Developers (Paid) |
Abstract | Training info |
Location | Tue 09 0900 @ Aura Infosec Office |
Duration | 480 mins |
Name | Andrew Kampjes, @akampjes |
Origin | Wellington |
Bio | Andrew Kampjes enjoys getting under the hood of Rails and playing with its quirks. He also gets a sick satisfaction finding security flaws in other’s code. |
Title | LittleHackMe v2.0 (Free, Tue) |
Abstract | Training info |
Location | Tue 09 0930 @ Lateral Security Office |
Duration | 240 mins |
Name | Nick Breese & Niresh Singh |
Origin | New Zealand and Malaysia |
Bio | Niresh and Nick are both consultants from your friendly local
Lateral Security. Niresh actually is a foreigner and Nick only sounds
like one. |
Title | Electronic Security Systems Basics (Paid) |
Abstract | Training info |
Location | Tue 09 1000 @ Assurity Board Room |
Duration | 240 mins |
Name | Britta / 4core |
Origin | NZ |
Bio | Brittas “career”, or less cynically, her tech pedigree, consists
of a mongrel mish-mash of different tech related work.
From wiring up crane controls and potato baggers in Palmerston North,
to commercial fibreglassing in Bunnythorpe, to doing sole IT helpdesk
at a veterinary science uni department, to wind monitoring
installations on farms (in NZ) and windfarm operations (not NZ), to
electronic security installation work and now teaching computing with
robot voices to vi people … if this list of jobs doesn’t make any
sense … it can be simply summed up as a Techs life in NZ, surfing the
ubiquitous skills shortages. |
Title | Lock Picking 101 (Paid) |
Abstract | Training info |
Location | Tue 09 1200 @ 3C Bar & Restaurant |
Duration | 210 mins |
Name | D.Roc (Derek Robson) |
Origin | "The Hutt", AKA Lower Hutt |
Bio | D.Roc is the organiser of LockSport NZ, also works as a IT security type person for a government type place. |
Title | Practical VoIP Hacking with Viproy (Paid) |
Abstract | Training info |
Location | Tue 09 1300 @ Enspiral Red Room |
Duration | 240 mins |
Name | Fatih Ozavci |
Origin | Sydney, AU |
Bio | Fatih Ozavci is a Security Researcher and a Senior Security Consultant with Sense of Security. He is the author of the Viproy VoIP Penetration Testing Kit and has published research and a paper about Hacking SIP Trust Relationships. Fatih has discovered several previously unknown security vulnerabilities and design and protocol flaws in VoIP environments for his customers, and analyses VoIP design and implementation flaws which helps them improve their VoIP infrastructures. His current research is based on attacking mobile VoIP clients, VoIP service level vulnerabilities, decrypting custom mobile application protocols and MITM attacks for mobile applications. Fatih has presented his VoIP research and tool at Black Hat USA’14, Def Con 22, Def Con 21, AustCert’14, Cluecon 2013 and Ruxcon 2013.
Homepage : http://viproy.com/fozavci
Linkedin : http://tr.linkedin.com/pub/fatih-ozavci/54/a71/a94 |
Title | Penetration Testing Java applications for Fun and Profit (Free) |
Abstract | Training info |
Location | Wed 10 0900 @ Insomnia Security Meeting Room |
Duration | 240 mins |
Name | David Jorm |
Origin | Brisbane, Australia |
Bio | David has been involved in the security industry for the last 15 years. He currently works as a manager for Red Hat's product security team, focusing on cloud and middleware products. He has been quoted in a major newspaper as saying North Korea's nuclear program is "ready to rock". |
Title | Intro to SDR and Signal Processing (Free) |
Abstract | Training info |
Location | Wed 10 0900 @ Catalyst Training Room |
Duration | 480 mins |
Name | Tim Kuester |
Origin | Maryland USA |
Bio | Wow. Writing about yourself in the 3rd person is weird.
Tim Kuester is a Computer Engineer living in Maryland. Over the past
four years, he's worked on some pretty sweet projects involving FPGA's,
microcontrollers, circuit board design, and radios. He secretly wants
to write a blog like Dave Jones and Craig Heffner, but he's not cool
enough to do that yet. |
Title | Bug Hunting for Amateur Naturalists |
Abstract | Training info |
Location | Wed 10 0900 @ Aura Infosec Office |
Duration | 480 mins |
Name | Emmanuel Law & Mike Haworth |
Origin | unspecified |
Bio | Emmanuel and Mike are working as legalised hackers in Aura Information Security. |
Title | Bootstrapping Agile Security |
Abstract | Training info |
Location | Wed 10 0900 @ Enspiral Board Room |
Duration | 450 mins |
Name | Laura Bell |
Origin | New Zealand |
Bio | With almost a decade of experience in software development and information security, Laura specialises in bringing security practices and culture into organisations of every shape and size. Her recent research into agile security practices has generated a set of tools and processes that can enable the management of security risk without compromising innovation or speed. |
Title | Passive DNS: Forensics and Analysis (Free) |
Abstract | Training info |
Location | Wed 10 0900 @ BNZ Harbour Quays Meeting Room |
Duration | 240 mins |
Name | Ben April |
Origin | Somewhat murky. |
Bio | Ben April is the Director of Engineering at Farsight Security, Inc.
Prior to joining Farsight, Ben worked eight years at Trend Micro, where
he became the Americas regional manager of the Forward-looking Threat
Research team. Before making the jump to security, Ben worked his way
upstream hop-by-hop from a small dial-up ISP to a regional ISP to a
global backbone carrier, with roles in customer support, network
operations, system administration and provisioning. Ben is also a
volunteer sysadmin and coder for some community security projects.
Ben has presented to security conferences on four continents, covering
topics like Bitcoin, NFC, operational security and infrastructure
security. He has built research systems for collecting and aggregating
data, from Whois and the Bitcoin block-chain to the global routing
table. His current crusade is to eliminate the technical and policy
barriers that impede data-sharing among white-hat security researchers.
"Once the good guys can share data as effectively as the criminals, we
might have a chance. |
Title | Consulting Like a Boss |
Abstract | Training info |
Location | Wed 10 0900 @ Catalyst Small Room |
Duration | 480 mins |
Name | Edward Farrell, Chris Gatford |
Origin | Australia... and kinda New Zealand |
Bio | Chris is a professional cat herder and his perfected the art of cat hair removal mostly from pen tester reports.
Edward is a hairless cat and security sellout who splits his time between wearing boardshorts and tailored pants... he hates pants.
Origin: Australia... and kinda New Zealand |
Title | OSINT Training (free) |
Abstract | Training info |
Location | Wed 10 0900 @ Auldhouse Training |
Duration | 480 mins |
Name | Simon Howard |
Origin | Wellington, New Zealand |
Bio | Simon owns and operates security consultancy ZX Security which helps organisations inject security into their processes and systems. Simon also co-founded and helps run NZ bestest Hacker conference - Kiwicon. |
Title | Practical VoIP Hacking with Viproy (Free) |
Abstract | Training info |
Location | Wed 10 1300 @ Enspiral Red Room |
Duration | 240 mins |
Name | Fatih Ozavci |
Origin | Sydney, AU |
Bio | Fatih Ozavci is a Security Researcher and a Senior Security Consultant with Sense of Security. He is the author of the Viproy VoIP Penetration Testing Kit and has published research and a paper about Hacking SIP Trust Relationships. Fatih has discovered several previously unknown security vulnerabilities and design and protocol flaws in VoIP environments for his customers, and analyses VoIP design and implementation flaws which helps them improve their VoIP infrastructures. His current research is based on attacking mobile VoIP clients, VoIP service level vulnerabilities, decrypting custom mobile application protocols and MITM attacks for mobile applications. Fatih has presented his VoIP research and tool at Black Hat USA’14, Def Con 22, Def Con 21, AustCert’14, Cluecon 2013 and Ruxcon 2013.
Homepage : http://viproy.com/fozavci
Linkedin : http://tr.linkedin.com/pub/fatih-ozavci/54/a71/a94 |
Title | LittleHackMe v2.0 (Free, Wed) |
Abstract | Training info |
Location | Wed 10 1400 @ Meow |
Duration | 240 mins |
Name | Nick Breese & Niresh Singh |
Origin | New Zealand and Malaysia |
Bio | Niresh and Nick are both consultants from your friendly local
Lateral Security. Niresh actually is a foreigner and Nick only sounds
like one. |