Ruxcon 2013

| June 21, 2013
October 26, 2013 – October 28, 2013 all-day
CQ Function Centre
113 Queen Street
Melbourne VIC 3000
Early Bird = $250 (ex GST)

Ruxcon 2013 LogoRuxcon 2013

Ruxcon 2013 is a computer security conference that aims to bring together the best and the brightest security talent within the Aus-Pacific region. The conference is a mixture of live presentations, activities and demonstrations presented by security experts from the Aus-Pacific region and invited guests from around the world. Ruxcon is widely regarded as a leading computer security conference within Australia attracting all facets of the security landscape from industry, academics, to enthusiasts.

Topic Scope for Ruxcon 2013

  • Mobile Device Security
  • Virtualization, Hypervisor, and Cloud Security
  • Malware Analysis
  • Reverse Engineering
  • Exploitation Techniques
  • Rootkit Development
  • Code Analysis
  • Forensics and Anti-Forensics
  • Embedded Device Security
  • Web Application Security
  • Network Traffic Analysis
  • Wireless Network Security
  • Cryptography and Cryptanalysis
  • Social Engineering
  • Law Enforcement Activities
  • Telecommunications Security (SS7, 3G/4G, GSM, VOIP, etc.)


Monday 21st – Wednesday 23th, October 2013

Breakpoint Training provides a unique opportunity for students to receive specialist security training not usually available in Australia. Our trainers are considered to be world leading experts in their given security fields and have a great deal of experience training students at security events across the globe. Breakpoint training will take place just before the Breakpoint conference, starting on Monday the 21th of October and concluding on Wednesday the 23th of October. Depending on the course, training will run over two or three day periods. Sessions commence at 9:00am and finish up at 5:00pm. For most courses, each student will receive a printed and bound training guide. Complementary catering is provided.

Ruxcon is a seperate conference and Ruxcon registration is not included with Breakpoint registration.


  • Metasploit Mastery by James Lee (@eygp7) 2 days Oct 22
  • PentesterLab’s Web-Jitsu by Louis Nyffenegger (@pentesterlab) 2 days Oct 22
  • The Art of Exploiting Injection Flaws by Sumit Siddharth (@notsosecure) 2 days Oct 22
  • Mobile Application – Scan, Attack and Exploit by Hemil Shah 2 days Oct 22
  • Utilizing Programmable Logic for Hardware Reverse-Engineering by Dmitry Nedospasov and Thorsten Schroeder 3 days Oct 21


Comments are closed.