<style type="text/css"> .wpb_animate_when_almost_visible { opacity: 1; }</style>
Header Image

درباره نشست

نشست امنیت تدافعی و عاملیاتی توسط دانشگاه صنعتی ارومیه برگزار می شود. این نشست یک روزه برای محققان، علاقه مندان به امنیت، هکرهای کلاه سفید، کارکنان حوزه فناوری اطلاعات و کارشناسان امنیت تدارک دیده شده است. نشست بین المللی P0SCon به جمع آوری آخرین تکنیک ها، ابزار، پروژه ها و حوزه های دفاع و حمله در سیستم های کامپیوتری و موبایل خواهد پرداخت.

زمانبندی نشست

  • 08:00 - 09:00
Opening speech
  • 09:00 - 09:15
Amir Rasouli

Dealing with the New Generation of Cyber Attacks in Iran

Pouya Darabi


Sponsor speech
  • 10:45 - 11:00
Coffee break
  • 11:00 - 11:30
Forough Fallahfar

Don’t trust the DOM!
Bypassing XSS Mitigations via Script Gadgets

Nikita Tarakanov

Exploiting Kernel Pool Overflows on Windows 10

Noon break
  • 13:00 - 14:00
Sponsor speech
  • 14:00 - 14:15
Babak Amin Azad

Fingerprinting Users On The Web, The Good, The Bad and The Ugly.

Kenan Abdullahoglu

Ethereum: The Treasure and The Threat (TTTT)

Sponsor speech
  • 15:45 - 16:00
Coffee break
  • 16:00 - 16:30
Amir Kiyani

Hidden Crimes Beyond the Keyboard


Urmia CERT speech

Closing speech
  • 18:45 - 19:00
Offsec research group

How NetBaan can Detect DNS Data Exfiltration (DNS Tunneling)?

Morteza Ramazanzadeh

Traditional vs. New Generation Bots

Cyber-crimes encounter when special types of Trojan viruses are in use for security breach of several clients, resulting in loosing control of system by the clients. The infected machines are then reorganized to be parts of network of “bots” managed by criminals. Botnets posses the capability of infecting and controlling thousands, tens of thousands or in some cases millions of computers over the networks, with the power of managing very large zombie networks through several types of attacks including ransomware. Utilizing Botnets as cyber crime takes place in forms of network rentals or outright to other cyber-criminal groups, nowadays becoming a trade. Through this hands-on training, we will learn and analyze the mechanism of bots, see how they are detected, and practice the methods of mitigating the effects.

Mohammadreza Zamiri

Security and penetration testing in industrial control systems