BruCON

BruCON is an annual security and hacker conference providing two days of an interesting atmosphere for open discussions of critical infosec issues, privacy, information technology and its cultural/technical implications on society. Organized in Belgium, BruCON offers a high quality line up of speakers, security challenges and interesting workshops. BruCON is a conference by and for the security and hacker community.

The conference tries to create bridges between the various actors active in computer security world, included but not limited to hackers(*), security professionals, security communities, non-profit organizations, CERTs, students, law enforcement agencies,

p

Conference information

Location

Aula Academica of the Ghent University
Voldersstraat 9
9000 Gent
Belgium

Conference program

The conference program can be viewed here.

News

  • 04-10-2014 | First batch of BruCON 0x06 videos online – Read more

Aula Academica of the Ghent University

Articles

WPScan vulnerability database a new WordPress security resource

29-09-2014 | During last weekend’s BruCon in Belgium, U.K.-based security researcher Ryan Dewhurst released the WPScan Vulnerability Database, a one-stop shop for the latest WordPress, plug-in and theme vulnerabilities that he hopes becomes an indispensable resource for pen-testers, administrators and WordPress developers. Read more

How Metal Gear Online was revived by professional hackers

27-09-2014 | Tartaro detailed how the team utilized their efforts and techniques to reverse engineer an MMO that had been shutdown and left to die by the publisher, at the Brucon Security Conference. Read more

My first #BruCON — Hackers & B33R

26-09-2014 | So let’s talk BruCON. After weeks of convincing my friend Floyd finally talked me in to going to BruCON with him. Me never having been to a ‘real’ hackers conference did not know what to expect. Read more

Available videos

BruCON 2010: Embedded system hacking and my plot to take over the world 1/4

BruCON 2010: Embedded system hacking and my plot to take over the world 1/4

This presentation analyzes common vulnerabilities in popular embedded systems that carry sensitive data every day.

d

Available playlists

Tweets