Muhaimin Dzulfakar to talk about Advanced SQL Exploitation

Muhaimin Dzulfakar will be demonstrating how arbitrary code execution is possible on the MySQL platform and explain the techniques and tools needed. This presentation will include a tool release as well.

T2 staff thinks that most SQL injection talks are not that hot any more. This talk should be an exception.

Please see the schedule for details.

David Batanero to talk about Forensics on Mobile Phones

David Batanero will be demonstrating how you can use inexpensive equipment to perform effective forensics analysis on modern mobile phones. He will show (among other things) how to read the flash memory and what to with it.

T2 staff has been told that this talk contains previously unpublished material and offers pretty interesting insight to modern mobile phone forensics.

Please see the schedule for details.

Alexander Polyakov to talk about SAP Security

Alexander Polyakov from Digital Security (Russia) will be demonstrating some common and uncommon vulnerabilities on SAP environment. This talk will deal with different ways to attack SAP clients and demonstrate how you can get access to the whole SAP environment just by exploiting a client side vulnerability.

T2 staff thinks that SAP security is an often overlooked topic when dealing with enterprise security. This talk should give the audience a pretty good overview of SAP security.

Please see the schedule for details.

Leonardo Nve to talk about Attacks Against Satellite Communications

Leonardo Nve will be talking about insecurity of satellite communications. This talk will cover various attacks against satellite communications as well as ways to get an anonymous connection on the network.

T2 staff thinks that this talk will give pretty good overall picture of the risks involved when dealing with satellite communications.

Please see the schedule for details.

Felix Leder and Tillmann Werner to talk about Botnet Counter-Attack Techniques

Felix Leder and Tillmann Werner will be demonstrating how it is possible to take over botnets. The talk will cover a structured botnet mitigation approach and discuss several case studies on recent sophisticated malware like Storm, Waledac, and Conficker.

T2 staff thinks that this talk is quite unique and contains some interesting research.

Please see the schedule for details.

Would You Like To Sponsor t2’09?

We are looking for sponsors, if you or your company would like to sponsor t2’09 please contact us.

To protect the independent nature of T2, the following guidelines have been established:

  • No sponsor can affect the agenda. In order to run an independent conference, it is essential that no sponsor influence the topic or content of any given presentation.
  • Each and every presenter is there because of his or her skills. Sponsorship is not a fast lane past the CFP, meaning that sponsorship will not guarantee you a presentation slot at the conference. It does not prevent it either; the bottom line is that the advisory board handles all submissions equally.

More information can be found at

Call for Papers 2009

We are pleased to announce the annual t2´09 conference, which will take place in Helsinki, Finland, from October 29 to 30, 2009.

We are looking for original technical presentations in the fields of information security. Presentations should last a minimum of 60 minutes and a maximum of two hours and be presented in English.

We will be accepting talk proposals until July 1, 2009. All submitted presentations will be reviewed by the t2 Advisory Board.

As usual selected speakers will be reimbursed for travel and hotel costs. We proud ourselves of taking good care of the speakers and there is always something going on during the evenings 🙂

We suggest strongly that you submit earlier rather than later, since we will close the CFP early once we receive enough quality submissions to fill the slots.

Please include the following with your submission:

  1. Presenter, and geographical location (country of origin/passport)
  2. Contact information (email, cell phone and postal address)
  3. Brief biography (including employer and/or affiliations)
  4. Motivations for presentation (500 words max)
  5. Presentation abstract (500 words max)
  6. If your presentation references a paper or piece of software that you have published, please provide us with either a copy of the said paper or software, or an URL where we can obtain it.
  7. List any other publications or conferences where this material has been or will be published/submitted

Please send the above information to cfp-2009 (at)

For more information:

What past speakers are saying:

What past attendees are saying:

T2´08 is over – Thank You!

All those who contributed to the conference either as an attendee or as a speaker: Thank you! It is fair to conclude that the conference was a great success. We feel that there were many very interesting presentations and a very good atmosphere for discussion and networking 🙂

We also received excellent feedback and we promise that T2´09 will be even better. See you next year at T2´09!