Recon Montreal - Call For Papers - June 28 - 30 - 2019
Welcome to TeleMate!
ATDT1514XXXXXXX
CONNECT 300 
..
DATAPAC : XXXX XXXX
XXXXXXXX
DATAPAC: Call connected to XXXX XXXX

This is a private system.  Access attempts are logged.  Unauthorized 
access may result in prosecution.

Bienvenue!

  
+                    +                     +         +   
                              +                  +           +
       +                                             +
                                    \ /
                   +     _        - _+_ -                   ,__
     _=.    .:.         /=\       _|===|_                  ||::|
    |  |    _|.        |   |     | |   | |     __===_  -=- ||::|
    |==|   |  |  __    |.:.|   /\| |:. | |    |   | .|| : |||::|
    |  |-  |.:|_|. :__ |.: |--|==| |  .| |_   | ' |. ||.  |||:.|
  __|. | |_|. | |.|...||---|  |==| |   | | |_--.     ||   |||. |
 |  |  |   |. | | |::.||: .|  |==| | . : |=|===|    :|| . ||| .| 
 |:.| .|   |  | | |:.:|| . |  |==| |     |=|===| .   |'   | |  |
 |     |      |   |   |'           :   .   |   ;     ;    '    |
 '     :      `   :   '            .       '  .      .         :
 '     .                   R E C O N     2 0 1 9     .
 `                .                .                           '
                       .           C F P
       .
                            june 28 to 30, 2019
                              montreal, quebec       .                                
   
  + Hi - Flash back from 2008             .                    .
  
  + We are back
  
  ╔═════════════════════════════════════════════════════════╩════════════╗
  #                           C F P                                      #
  ╚══════════════════════════════════════════════════════════════════════╗
  We are now inviting speakers to submit proposals                       â•‘
  for Recon Montreal 2019.                                               â•‘
                                                                         â•‘
  Some guidelines for talks are:                                         â•‘
                                                                         â•‘
   - 30 or 60 minute presentations                                       â•‘
                                                                         â•‘
   - We are open to proposals for workshops that would occur alongside   â•‘
     talks                                                               â•‘
                                                                         â•‘
   - There will be time for five to ten minute informal lightning talks  â•‘
     during the REcon party                                              â•‘
                                                                         â•‘
                                                                         â•‘
                                                                         â•‘
  ╔══════════════════════════════════════════════════════════════════════╝
  ╚══════════════════════════════════════════════════════════════════════╗
                                                                         â•‘
   ____            _     _             _                                 â•‘
  |  _ \ ___  __ _(_)___| |_ _ __ __ _| |_(_) ___  _ __                  â•‘
  | |_) / _ \/ _` | / __| __| '__/ _` | __| |/ _ \| '_ \                 â•‘
  |  _ <  __/ (_| | \__ \ |_| | | (_| | |_| | (_) | | | | █════════════╗ ║
  |_| \_\___|\__, |_|___/\__|_|  \__,_|\__|_|\___/|_| |_|              â•‘ â•‘
             |___/                                                     â•‘ â•‘
                                                                       â•‘ â•‘
  Registration for the conference and training sessions is now open.   â•‘ â•‘
                             - - - - - - - -                           â•‘ â•‘
  You can register at: https://tickets.recon.cx/reconmtl/2019/         â•‘ â•‘
                                                                       â•‘ â•‘
                                                                       â•‘ â•‘
                                                                       â•‘ â•‘
                                                                       â•‘ â•‘
   _____          _                   █════════════════════════════════╩═╣
  |_   _| __ __ _(_)_ __ (_)_ __   __ _                                  â•‘
    | || '__/ _` | | '_ \| | '_ \ / _` |                                 â•‘
    | || | | (_| | | | | | | | | | (_| |                                 â•‘
    |_||_|  \__,_|_|_| |_|_|_| |_|\__, |   █═══════════════════════════╗ ║
                                  |___/                                â•‘ â•‘
                                                                       â•‘ â•‘
                                                                       â•‘ â•‘
  This year we have another great set of trainings available:          â•‘ â•‘
                                                                       â•‘ â•‘
                                                                       â•‘ â•‘
  ╔════════════════════════════════════════════════════════════════════╩═╣
  â•‘                                                                      â•‘
  ╠─■  Mobile and Telecom Applied Hacking and Reverse Engineering        █
  â•‘    by P1Sec (2 days: 26 June - 27 June)                              â•‘
  â•‘                                                                      â•‘
  ╠─■  IC Reverse Engineering & code dump by Olivier Thomas              █
  â•‘    (3 days: 25 June - 27 June)                                       â•‘
  â•‘                                                                      â•‘
  ╠─■  System Firmware Attack and Defense for the Enterprise             █
  â•‘    by Oleksandr Bazhaniuk and Jesse Michael                          â•‘
  â•‘    (4 days: 24 June - 27 June)                                       â•‘
  â•‘                                                                      â•‘
  ╠─■  An Introduction to Modern Binary Exploitation                     █
  â•‘    by Alexei Bulazel and Jeremy Blackthorne                          â•‘
  â•‘    (4 days: 24 June - 27 June)                                       â•‘
  â•‘                                                                      â•‘
  ╠─■  Program Analysis Training                                         █
  ║    by Sophia d’Antoine and Evan Jensen                               ║
  â•‘    (4 days: 24 June - 27 June)                                       â•‘
  â•‘                                                                      â•‘
  ╠─■  WebAssembly Module Reverse Engineering and Analysis               █
  â•‘    by Patrick Ventuzelo                                              â•‘
  â•‘    (4 days: 24 June - 27 June)                                       â•‘
  â•‘                                                                      â•‘
  ╠─■  WReal-world IoT & embedded device hacking by Thomas Roth          █
  â•‘    (4 days: 24 June - 27 June)                                       â•‘
  â•‘                                                                      â•‘
  ╠─■  Reverse Engineering Malware by Nicolas Brulez                     █
  â•‘    (4 days: 24 June - 27 June)                                       â•‘
  â•‘                                                                      â•‘
  ╠─■  Windows Internals for Reverse Engineers by Alex Ionescu           █
  â•‘    (4 days: 24 June - 27 June)                                       â•‘
  â•‘                                                                      â•‘
  ╠─■  Hardware Hacking by Dmitry Nedospasov                             █
  â•‘    (4 days: 24 June - 27 June)                                       â•‘
  â•‘                                                                      â•‘
  ╠─■  The ARM IoT Exploit Laboratory by Saumil Shah                     █
  â•‘    (4 days: 24 June - 27 June)                                       â•‘
  â•‘                                                                      â•‘
  ╠─■  Windows Kernel Rootkits Techniques and Analysis by Bruce Dang     █
  â•‘    (4 days: 24 June - 27 June)                                       â•‘
  â•‘                                                                      â•‘
  ╠─■  Botnet Takeover Attacks For Reverse Engineers                     █
  â•‘    by Brett Stone-Gross and Tillmann Werner                          â•‘
  â•‘    (4 days: 24 June - 27 June)                                       â•‘
  â•‘                                                                      â•‘
  ╠─■  MacOS Mojave and iOS 12 Kernel Internals for Security Researchers █
  â•‘    by Stefan Esser                                                   â•‘
  â•‘    (4 days: 24 June - 27 June)                                       â•‘
  â•‘                                                                      â•‘
  ╠─■ Advanced Fuzzing and Crash Analysis 				 ║
  â•‘    by Richard Johnson (4 days: 24 June - 27 June)                    â•‘
  â•‘                                                                      â•‘
    ____             __                                                  â•‘
   / ___|___  _ __  / _| ___ _ __ ___ _ __   ___ ___                     â•‘
  | |   / _ \| '_ \| |_ / _ \ '__/ _ \ '_ \ / __/ _ \                    â•‘
  | |__| (_) | | | |  _|  __/ | |  __/ | | | (_|  __/  █═══════════════╗ ║
   \____\___/|_| |_|_|  \___|_|  \___|_| |_|\___\___|                  â•‘ â•‘
                                                                       â•‘ â•‘
                                                                       â•‘ â•‘
  Conference talks in the following fields are encouraged (but not     â•‘ â•‘
  limited to):                                                         â•‘ â•‘
                                                                       â•‘ â•‘
                                                                       â•‘ â•‘
  ╔════════════════════════════════════════════════════════════════════╝ ║
  ╠─■  Hardware reverse engineering                                      ║
  â•‘                                                                      â•‘
  ╠─■  Software reverse engineering                                      █
  â•‘                                                                      â•‘
  ╠─■  Protocol reverse engineering                                      █
  â•‘                                                                      â•‘
  ╠─■  Finding vulnerabilities and writing exploits                      █
  â•‘                                                                      â•‘
  ╠─■  Novel data visualization for hackers and reverse engineers        █
  â•‘                                                                      â•‘
  ╠─■  Bypassing security and software protections                       █
  â•‘                                                                      â•‘
  ╠─■  Attacks on cryptography in hardware and software                  █
  â•‘                                                                      â•‘
  ╠─■  Techniques for any of the above on new or interesting architectures
  â•‘                                                                      â•‘
  ╠─■  Wireless hacking (We aren't talking about wifi here)              █
  â•‘                                                                      â•‘
  ╠─ ┼ Anything else K-Rad 1337   █══════════════════════════════════════╣
  â•™                                                                      â•‘
   ____  _   _ ____  __  __ ___ _____   _                                â•‘
  / ___|| | | | __ )|  \/  |_ _|_   _| | |                               â•‘
  \___ \| | | |  _ \| |\/| || |  | |   | |                               â•‘
   ___) | |_| | |_) | |  | || |  | |   |_|                               â•‘
  |____/ \___/|____/|_|  |_|___| |_|   (_)                               â•‘
                                                                         â•‘
  â– â– â– â– â– â– â– â– â– â– â– â– â– â– â– â– â– â– â– â– â– â– â– â– â– â– â– â– â– â– â– â– â– â– â– â– â– â– â– â– â– â– â– â– â– â– â– â– â– â– â– â– â– â– â– â– â– â– â– â– â– â– â– â– â– â– â– â– â– â– â– â– 
                                                                         â•‘
  How to submit: https://cfp.recon.cx/reconmtl2019/		         â•‘
                                                                         â•‘
  Alternatively you can send your submission to cfpmontreal2019@recon.cx â•‘
                                                                         â•‘
  You may send additional supporting parser exploits in other formats.   â•‘
                                                                         â•‘
  Please include:                                                        â•‘
                                                                         â•‘
   - Speaker name(s) and/or handle                                       â•‘
   - Contact information, e-mail, and cell phone (optional)              â•‘
   - Presentation title                                                  â•‘
   - Presentation subtitle                                               â•‘
   - Length of presentation (30 or 60 minutes)                           â•‘
   - Description of the presentation                                     â•‘
   - Brief biography                                                     â•‘
   - If available, presentation supporting materials (website, code,     â•‘
     paper, slides, outline, ...)                                        â•‘
   - Why it is cool / why you want to present it                         â•‘
   - If you have any objections to recording the presentation            â•‘
   - Country of origin (Passport origin, current geographical location)  â•‘
   - Let us know if you need help with a Canadian visa (So we can start  â•‘
     the procedure early)                                                â•‘
   - Whether your employer will pay for your travel or if you need       â•‘
     assistance from us.                                                 â•‘
                                                                         â•‘
                                                                         â•‘
  Get back to us soon! The first round of the CFP will end on April 14,  â•‘
  and the CFP closes on May 12.                                          â•‘
                                                                         â•‘
  You can optionally email your response using the following PGP key (Youâ•‘
  can also find it at https://recon.cx/2019/montreal/contact/):          â•‘
                                                                         â•‘
  ╔═══════════════════════════════════════════╦══════════════════════════╝
  THIS FILE PASSED THROUGH...
   _______________________________________________________________________
  /                                                      NO    STANDARDS  \
 /   *   *   *   *   *   *   *   *   *   *    *    *                       \
/__  HS  AA  CD  OH  RD  SD  TR  MR  RS  CS  ARQ  SYN     DeC    USHQ     __\
   \---------------------------------------------------------------------/
    \   R E C 0 N  BBS   KNOWN    W O R L D-W I D E  FOR 0-DAY WAREZ    /
 .oo*\____   ___________________________________________________   ____/
 O        \_/     KRu1z1n' At 9600         14.0 Gigz Online     \_/
 o
  O            +------------------------------------------+
   o                               514
   O              SERVING THE PHRESHEST CRACKS IN THE LATA
    O                              514
    O               CHECK:
   O                        [*] 0-1(MAX) DAY LATE
  O                         [*] H/P/A/V/C
  O                         [*] Demos/Artpacks
   O                        [*] 1200/2400/9600 BAUD
    O                       [*] 1500MB
     "o.                    [ ] LAMERS
        "O                  [?] DRAMA
         "O
           "ooo##" BROUGHT TO YOU BY:
                  Sysop........................Dataworm
                  CoSysop.....................TheGamble
                  CoSysop......................ChatBoss
                  CoSysop........................Fukami
                  CoSysop.....................IronEagle
                  Ex-CoSysop.....................Nivenh
                           +1[514] XXX - 6PWN
                           +1[337] XXX - 9777
                           +1[LUL] XXX - 3771
                           +9[110] KID - DING 

-----BEGIN PGP PUBLIC KEY BLOCK-----
Comment: GPGTools - https://gpgtools.org

mQINBFyYL/gBEAC4urkKZyy0SowGWOg4Xkq6FfgSPynUx3e55fU/liaxx+3Owm2Y
TgQDG8usoqPyOZQovYyfNglJSH1ut5t7/Jjv4YLWG9F4O9lmkQi8dryziYFqlTdP
SvXytYFZ5Ruu5ZgvKDw4mxA6KFHKq0jhHpFkNpP2hNOJKWKsMI//i2EkGxhztehy
dWOYTwcDeVbNdLeE/tmef+zh+7eWKfUW6fN7UUaUKc4d+4wz5+Hkw/2CJhGfKIIX
UXehMRFtns37GznENi+jIl8bg4CrNWQOioJusOZiZLGOaLwf2i37PpfsTm6UIYU+
ptDQUD5Y9GSDlcDMnE7E3WkxdMfLUuTk0rBJfHfB2GzB+2GWk/ylH+B7ErY/9cmo
66BUiY1aF54ZY4LRf+uB/r3tN4tBNIifERWn81p33Bes7qO+qoETC4hQOh0I3UpA
F30emiW2J55jv1jo2qpktUsRngioDlT6bnS4anMBliFVLmjLICGYe2/oGYOR6mH6
3uXwS6mqM+h7GEOZemd5viuj5ZS+nL19etkcxx1JztpOzkIKGcwljNVCA/S60s+P
zEvcn+d3fLRqwbVCzqbAAhqahk9FgkjgRElP+ioq2kYq11E4SyZA2stKJau75G3Q
DyCEd0MdzF++Je+06LFdi4YZJi8LN5naxICFbRb3ICvtYmNfdBJPPoaNsQARAQAB
tDtjZnBtb250cmVhbDIwMTkgKENGUCBSZWNvbiAyMDE5KSA8Y2ZwbW9udHJlYWwy
MDE5QHJlY29uLmN4PokCPQQTAQoAJwUCXJgv+AIbAwUJAeEzgAULCQgHAwUVCgkI
CwUWAgMBAAIeAQIXgAAKCRDra4v0GeMELSYpD/9h+mqxzAZEaMGMf6qmbBHlAXZs
jKy2H0MEhQCQuicjJSDG8/7IqvK7Lao2NhGdBG4dxAOPY7pUglfXMhBUdPB8yEj/
gam8egRpFY1Uzlm0qmQEWH7kqLcM4N/mH8x+bcXOiBU+UCI0duQCMkU0OR6TemVj
ICFvb1A9N4pznxyAsse9ilDixuNg9Mx/voKDIcOCyLd5Xsz/13uVcKXhSPcIIRHx
HzKJBDQaS5oxqCYiLK8J1y970NZnZ1f4gx9jTCuxljqzUpUqhgYmNbVHMstqNufJ
Gc2CQw6Y8WVujKYgacewJljyY6xxdM8+/LUrXz+0DqbTTMxOu1TX9sj+V3etEYBd
8YnyF+nwkOtEcRWR370SIbl9a/wpuaeOkBHvhi8smG5TBjkl5kKHUW9YwmOabD9j
HzS/yoc5DP5q4feS1K+UIqwojaXNxGefqRsbFgP9JRi+PkXmU/71ip1tsayE2PiI
onUB6MlJ02mQd9K1k4tuf40OREORcMGlIvpPLWe7YbROen/myVjhrlJnJQGymMcE
i5cj5w4DJ/ASHNV/bMeYkXJPNDysQN8wwVrwQBV+xiOebNflnkxO8YhsIeJrS6AS
AFIyUY9fhB5Ps+mpA7lTFGapA8kYw7fWsc0lINzEn0KzV1hgrz3ydsbYxzngzl1E
oL6rlKc7zSo1tgWHK7kCDQRcmC/4ARAAtNoNcD5+0eOjUTgHIDO3EGi8mhhscgzG
s35APPSw/pKlEJ1+jYKfqgvSiMl0V6xDf5N0/1qvjrJicnxcaD2Er8cWdB/Gisw9
CKPzz9x2tlPpM5Ngz8xeWdn8onfFURR87y0AhQK7Kg0rdRSNhDv4dU9qRUYweYrY
eCzbz1pm21Wyq97Eo4iH6CjSWOaAZxLcE3I8qgft3ln+4tbKA/i98oGpA1Je/tI0
IpLuB/SjX9wGaMAf4xUb6CFWU3T5R5PEDSDVeFRCTute3/B42VtGd4wqroqc5wBo
FamzZqkwmwYFC2vENwNU6FkqDkigd5DPJwCg1PJbTZC8xseFit26ylfv/tM6UUPv
t4MJO5YOO/CNUI7B7p4cm+Ax1qoY9jgiLv9Rk9aJUjegyQP1q8OHk1nivcKlvWsD
w3lmwyCKV3bOL/sgkawhvaS6F+VfuMvzjYLNBlOqrxX6AJm6FbQ3ew/+mF9emYNM
5vYb7ixbR+XwpqjIFh3nsv79lnUPYRP0QF1kQ/UwxauEhLp3m/YxtasJKfuTTctY
b3B3um2Z6tGunBH1bPoHIst2rzCQDT7LWqwWSRS7t7BcffMymruc6eklBygX1ybs
ki8taeen0EAnUgUjM9wLZxENzB4PUmvbzxJehq3SMaL3WatNHi+eFXQ7Qr5Ss22w
OZU+7xFu8REAEQEAAYkCJQQYAQoADwUCXJgv+AIbDAUJAeEzgAAKCRDra4v0GeME
LewzD/4zkRi9beqWYtld9+JS4LQKisXJdZmItlpOO+kgIOMTZdt/3zYzAzyqrn+e
9tWoLyo+0po5WVmBbtVBaE8E36YWnmxfxEDRzMYHHdf3QHXjdOKRT0UntkLhUTBU
RkrBPQt1/m/nbKyFjRJx6U2uzro5HPnVzPjoU2SNPIkf+2jOrdBL9/ymS0ukAotq
Tj8Vg42nLoJ3PolWBZEs5Vy36Ql2pTZcuLILe8rLdl/vWsMNl/f4vGpf+wUfpJdD
a+0/yuUI9ruS9IuJsr6BU12oJaCuXUXeCX6yZA8+a23ruPg1F7H+IHrEEAhViPnY
p54l5lCiDVtO9fcF/8q1nbtInex1YEbiuFMR3PRkYCzwfioUwvcFv63LM1jwNhI/
OMq3x22nJTSKjEzAMMYkqABmp5CcvoXZEfVTGehjRNrIMCvoKP/k6q88fmPsvej1
WAh30P9eyWX+HPUpVVrngN4I0W8p8fSg9AzcK5O/I6K0DSnJtMG5LL47Uejjw47O
ZzfvnmS4J1nv/Xbso7f3a6z2OUeDvLWkn5JcnZCTLbkKZKA9+b2rI3Dda2yybzGE
u0Jbqoe+qVIB2OR0+MNgrmV/DClvG5bKxjMLBsVBRqP77dYty2fhJWH0ve7wwTw/
DfStWyb3iR1o/hHko35LTswuTEaYLG5X2qDOEPV2T6kVeM232w==
=F4B9
-----END PGP PUBLIC KEY BLOCK-----

+++ATH0

N0 C4RR13R