CFP is closed! We got 23 submissions and in following days will start announcing the chosen talks/workshops.


While participation is FREE, you still need a ticket.

Remaining tickets will go out in next two rounds:

  • February 16th, 10 am (CET),
  • March 1st, 10 am (CET).

.. and yes, the amount of tickets is limited. Please see tickets page for more details. Keep in mind that besides the free tickets there are also supporter tickets available, that helps us cover some of the costs. Be supporter or if you are a company, consider sponsoring us.

We need your HELP!

| December 23rd, 2017

New editiaon of BSidesLjubljana is in preparation. Please save the date – BSidesLjubljana will take place on March 10th in 2018 at Poligon creative centre, Ljubljana.

BSides is community driven information security event and here is the challenge – WE NEED YOUR HELP! We cannot do it without your participation (giving a talk/workshop, sponsoring, volunteering, helping us or just be at present there).

Here is how YOU can help:

  • Call for papers is online and open – so please submit your talk/workshop proposal, share CFP with your friends and colleagues, follow us on twitter (@BSidesLjubljana) and spread the word.
  • To keep BSidesLjubljana free for all participants we need sponsors to cover the costs. Can we count on your help or you might know someone or some company who can help us out. Please get in touch with us via sponsorship [at] bsidesljubljana [dot] si or twitter (@BSidesLjubljana). More on this topic, together with sponsorship KIT is available at here
  • Spread the word about #BSidesLjubljana on social networks, between your friends and colleagues – share, tweet, retweet, blog, reblog, use hashtag #BSidesLjubljana. Make some noise!

Here are some dates YOU NEED to REMEMBER:

  • 2017 December 1st: CFP Open (see link above)
  • 2018 February 10th: CFP deadline
  • .. in-between tickets will become available (limited amount)
  • 2018 March 10th: BSides Ljubljana 0x7E2

We look forward to seeing you this coming March. If you don’t find the information you are looking for on this site don’t hesitate to reach out to ‘hello [at] bsidesljubljana [dot] si’ or twitter (@BSidesLjubljana)

loding BSidesLjubljana0x7E2

| December 1st, 2017
msf > banner

MMMMMMMMMMMMMMMMNmddmNMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM
MMN..-..--+MMNy:...-.-/yNMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM
MMy..ymd-.:Mm::-:osyo-..-mMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM
MM:..---.:dM/..+NNyyMN/..:MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM
Mm../dds.-oy.-.dMh--mMds++MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM
My:::::/ydMmo..-hMMMmo//omMs/+Mm+++++shNMN+//+//+oMNy+///ohM
MMMs//yMNo+hMh---m:-:hy+sMN..+Mo..os+.-:Ny--ossssdN-.:yyo+mM
MMMo..oMNo/hMo..-m:..-:+hMy--dN-./MMMo.-d/..::::sMN:..-:+hMM
MMMN:../yddy:...hyymdh:..m:--Mh--yNms--om--+ddddNMmymdy:..mM
MMMMMy/....---omd:-.--.:hd..oM/....-:+dMs--::--.ym:..--.:yMM
MMMMMMMMmdddNMMMMMMmmmNMMNmmNMNmmmmMMMMMNmmmmmNmMMMNmdmNMMMM

       =[ metasploit v4.14.1-dev [core:4.14.1.pre.dev api:1.0.0]]
+ -- --=[ 1372 exploits - 766 auxiliary - 221 post        ]
+ -- --=[ 340 payloads - 37 encoders - 8 nops             ]
+ -- --=[ Free Metasploit Pro 			          ]

msf > set RHOST 0x7e2.bsidesljubljana.si
RHOST => 0x7e2.bsidesljubljana.si
msf > set RPORT 443
RPORT => 44
3runmsf > use exploit/bsides/bsides_module
msf exploit(bsides_module) > info

       Name: Security BSides Module
     Module: exploit/bsides/bsides_module
    Version: 0x7E2
   Platform: FruBSD
 Privileged: No
    License: Metasploit Framework License (BSD)
       Rank: Excellent

Provided by:
  lowk3y 

Available targets:
  Id  Name
  --  ----
  0   Automatic Targeting

Basic options:
  Name  Current Setting  Required  Description
  ----  ---------------  --------  -----------
  RHOST  ***********      yes       The target address
  RPORT  445              yes       Set the CTP service port
  DATA   LOAD-CFP    	  yes       The output data

Payload information:

Description:
  If this module loads, you know you're doing it right.

References:
  http://bsidesljubljana.si

msf exploit(bsides_module) > check
[*] Verifying vulnerable status... (path: 0x0000005a)
[*] System is not vulnerable (status: 0x00000000)
[*] The target is exploitable.

msf exploit(bsides_module) > exploit

[*] Starting bind handler
[*] Automatically detecting the target
[*] Extracting data

<<<<<< dadad09a2-dda||ddMMDSA1@-kkk@@!(#[da[[fsfa9f4]]])dapdfm..mcbvc MMMMMMMMMMMMMMMMNmddmNMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM MMN..-..--+MMNy:...-.-/yNMMMMMMMMM10/03/2018MMMLJUBLJANAMMMM
MMy..ymd-.:Mm::-:osyo-..-mMMMMMMMMMMMMPOLIGONMMMMMMMMMMMMMMM
MM:..—.:dM/..+NNyyMN/..:MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM
Mm../dds.-oy.-.dMh–mMds++MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM
My:::::/ydMmo..-hMMMmo//omMs/+Mm+++++shNMN+//+//+oMNy+///ohM
MMMs//yMNo+hMh—m:-:hy+sMN..+Mo..os+.-:Ny–ossssdN-.:yyo+mM
MMMo..oMNo/hMo..-m:..-:+hMy–dN-./MMMo.-d/..::::sMN:..-:+hMM
MMMN:../yddy:…hyymdh:..m:–Mh–yNms–om–+ddddNMmymdy:..mM
MMMMMy/….—omd:-.–.:hd..oM/….-:+dMs–::–.ym:..–.:yMM
MMMMMMMMmdddNMMMMMMmmmNMMNmmNMNmmmmMMMMMNmmmmmNmMMMNmdmNMMMM
MMMMC/F/P/|OPEN.>><>https://0x7e2.bsidesljubljana.si/cfp>>>>>>>>>>>
dasdad0d00ffdff
…..

kernel: msfconsole[15514]: segfault at 794ef0 ip 080513b sp 794ef0 error 6 in msfconsole[8048000+24000]