Hackers of India
Home
Timeline
Tools
About
RoadMap
Ground Zero Summit
Discontinued since 2015
List of Conferences
---- 2015 ----
<-------- Talk -------->
2015/11/05
:
XSS - The art of evading web application filters!
-
Anirudh Anand
2015/11/05
:
Wolves Among Sheep: Defeating Targeted Attacks With Deception
-
Sahir Hidayatullah
Raviraj Doshi
2015/11/05
:
Trailing Terror in the Darknets
-
Shesh Sarangdhar
2015/11/05
:
Thanks for the free cookies
-
Anshul Saxena
Nishant Yadav
2015/11/05
:
Sanctioned to Hack: Your SCADA HMIs Belong to Us!
-
Aditya K Sood
2015/11/05
:
OSINT Black Magic: Listen who whispers your name in the dark!!!
-
Sudhanshu Chauhan
Nutan Kumar Panda
2015/11/05
:
Hacking RFIDs under 2000INR
-
Jayesh Chauhan
2015/11/05
:
Elliptical Curve Cryptography
-
Aneesha S
2015/11/05
:
Economics of Post Quantum Crypto Systems : Do we really Need it
-
Ajit Hatti
2015/11/05
:
Dissecting Android Malware
-
Anto Joseph
2015/11/05
:
Credit Card Frauds – The money making Ecosystem for Cyber criminals
-
Abhinav Singh
2015/11/05
:
chellam – a Wi-Fi IDS/Firewall for Windows
-
Vivek Ramachandran
2015/11/05
:
Browser based Malware attacks
-
Harsh Daftary
2015/11/05
:
Authentication flaw in Automatic Bank Passbook printing machine.
-
Indrajeet Bhuyan
2015/11/05
:
Western Air Command
-
B S Singh Deo
2015/11/05
:
Exposing Cyber Espionage: Hello from Pakistan- IIC Session
-
Jiten Jain
2015/11/05
:
Cyber Security in Hospitals:Hospitals Under Seige
-
Anirudh Duggal
---- 2014 ----
<-------- Talk -------->
2014/11/13
:
Vulnerability Reproduction using Zest
-
Deep Shah
2014/11/13
:
SCADA Exploitation through Firmware
-
Ashish Saxena
2014/11/13
:
National Cyber Policy and its impact on Business
-
Vaishali Bhagwat
2014/11/13
:
Mobile security Automation Framework for Intelligent Auditing
-
Ankur Bhargava
2014/11/13
:
Making and Breaking Embedded Security
-
Yashin Mehaboobe
2014/11/13
:
Internet Governance
-
Anjana Kovacs
2014/11/13
:
How I won Browser Fuzzing
-
Amol Naik
2014/11/13
:
Hacking consumer electronics for Fun
-
Atul Alex
2014/11/13
:
Fuzzing Asynchronous Protocols built over Websockets
-
Lavakumar Kuppan
2014/11/13
:
Financial Integrity and Cyber Security
-
Karnal Singh
2014/11/13
:
Evaluating WAF (Web Application Firewall) for Fun and Profit with WOF
-
Bhaumik Merchant
2014/11/13
:
Enterprise Security
-
Mano Paul
2014/11/13
:
Detecting Fake Cell Phone Towers
-
Vijay Mukhi
2014/11/13
:
Cyber ‘BrahMos’ - Static analysis driven secure coding
-
Joy Sen
2014/11/13
:
Attacking Web-Proxies like never before
-
Ahamed Nafeez
2014/11/13
:
APT protection for the Enterprise
-
Deepak Singla
2014/11/13
:
9 Cell Cyber Diplomacy
-
Alok Vijayant
2014/11/13
:
Security vulnerabilities in DVB-C networks: Hacking Cable TV network
-
Rahul Sasi
2014/11/13
:
Network Time Protocol in Amplification Inferno
-
Sriram Krishnan
2014/11/13
:
Identity theft and its impact on Cyber - Warfare
-
Tarun Wig
2014/11/13
:
Attacking Cryptography & PKI Implementations
-
Ajit Hatti
---- 2013 ----
<-------- Talk -------->
2013/11/07
:
Understanding the anatomy of advanced targeted attacks – The Trend Micro approach
-
Tarun Gupta
2013/11/07
:
Towards a next generation secure Internet
-
Sanjay Deshpande
2013/11/07
:
The seven sins of Wi-Fi security
-
Vivek Ramachandran
2013/11/07
:
Setting the Data Center on fire
-
Ajit Hatti
2013/11/07
:
Serial killing of embedded systems
-
Atul Alex
2013/11/07
:
Securing government Critical Information Infrastructure
-
Kapil Awasthi
2013/11/07
:
Malware for Firefox Mobile OS
-
Shantanu Gawde
2013/11/07
:
IronWASP
-
Lavakumar Kuppan
2013/11/07
:
Internet – Transforming terrorism
-
Sameer Saxena
2013/11/07
:
How I built a pentest lab in under 70 USD
-
Swaroop Yermalkar
2013/11/07
:
Evolution of network security around Software Defined Networking (SDN) – The intelligent network
-
Diwakar Dayal
2013/11/07
:
Cloud Security: Enabling continuous, scalable security for today’s hyper connected world
-
Sumedh Thakar
2013/11/07
:
Central Monitoring System and IT Act 2000 – Balance between rights of citizens and state
-
Vaishali Bhagwat
2013/11/07
:
Approach to containing the outbreak of malicious information in online social networks
-
Sriniketh Vijayaraghavan
2013/11/07
:
Advanced security for advanced threats
-
Kartik Shahani
2013/11/07
:
Abusing Google Apps: Google is my command and control center
-
Ajin Abraham