Hackers of India
Home
Timeline
Books
Tools
Focus Area
🤝
Contribute
🗺️
RoadMap
ℹ️
About
☀️
🌙
Ground Zero Summit
Discontinued since 2015
List of Sessions
Jump to:
2016 (5)
|
2015 (17)
|
2014 (21)
|
2013 (16)
2016
Nov 06
-
Talk
-
Hacking The Droids
-
Anto Joseph
Apr 08
-
Panel
-
Make in India for Makers of India
-
Sachin Burman
,
Nandkumar Saravade
,
Govind
,
Bikram Singh
,
Shri Srinath
Apr 07
-
Workshop
-
Basics to Advanced Cryptography & PKI for Penetration Testers and Auditors
-
Ajit Hatti
Mar 15
-
Talk
-
Web App Security
-
Harpreet Singh
,
Himanshu Sharma
,
Nipun Jaswal
Mar 15
-
Talk
-
r00tKidz and Hacking
-
Triveni Singh
,
Lea Paul
2015
Nov 05
-
Talk
-
XSS - The art of evading web application filters!
-
Anirudh Anand
Nov 05
-
Talk
-
Wolves Among Sheep: Defeating Targeted Attacks With Deception
-
Sahir Hidayatullah
,
Raviraj Doshi
Nov 05
-
Talk
-
Trailing Terror in the Darknets
-
Shesh Sarangdhar
Nov 05
-
Talk
-
Thanks for the free cookies
-
Anshul Saxena
,
Nishant Yadav
Nov 05
-
Talk
-
Sanctioned to Hack: Your SCADA HMIs Belong to Us!
-
Aditya K Sood
Nov 05
-
Talk
-
OSINT Black Magic: Listen who whispers your name in the dark!!!
-
-
Sudhanshu Chauhan
,
Nutan Kumar Panda
Nov 05
-
Talk
-
Hacking RFIDs under 2000INR
-
Jayesh Chauhan
Nov 05
-
Talk
-
Elliptical Curve Cryptography
-
Aneesha S
Nov 05
-
Talk
-
Economics of Post Quantum Crypto Systems : Do we really Need it
-
Ajit Hatti
Nov 05
-
Talk
-
Dissecting Android Malware
-
Anto Joseph
Nov 05
-
Talk
-
Credit Card Frauds – The money making Ecosystem for Cyber criminals
-
Abhinav Singh
Nov 05
-
Talk
-
chellam – a Wi-Fi IDS/Firewall for Windows
-
Vivek Ramachandran
Nov 05
-
Talk
-
Browser based Malware attacks
-
Harsh Daftary
Nov 05
-
Talk
-
Authentication flaw in Automatic Bank Passbook printing machine.
-
Indrajeet Bhuyan
Nov 05
-
Talk
-
Western Air Command
-
B S Singh Deo
Nov 05
-
Talk
-
Exposing Cyber Espionage: Hello from Pakistan- IIC Session
-
Jiten Jain
Nov 05
-
Talk
-
Cyber Security in Hospitals:Hospitals Under Seige
-
Anirudh Duggal
2014
Nov 13
-
Talk
-
Vulnerability Reproduction using Zest
-
Deep Shah
Nov 13
-
Talk
-
SCADA Exploitation through Firmware
-
Ashish Saxena
Nov 13
-
Talk
-
National Cyber Policy and its impact on Business
-
Vaishali Bhagwat
Nov 13
-
Talk
-
Mobile security Automation Framework for Intelligent Auditing
-
Ankur Bhargava
Nov 13
-
Talk
-
Making and Breaking Embedded Security
-
-
Yashin Mehaboobe
Nov 13
-
Talk
-
Internet Governance
-
Anjana Kovacs
Nov 13
-
Talk
-
How I won Browser Fuzzing
-
Amol Naik
Nov 13
-
Talk
-
Hacking consumer electronics for Fun
-
Atul Alex
Nov 13
-
Talk
-
Fuzzing Asynchronous Protocols built over Websockets
-
Lavakumar Kuppan
Nov 13
-
Talk
-
Financial Integrity and Cyber Security
-
Karnal Singh
Nov 13
-
Talk
-
Evaluating WAF (Web Application Firewall) for Fun and Profit with WOF
-
Bhaumik Merchant
Nov 13
-
Talk
-
Enterprise Security
-
Mano Paul
Nov 13
-
Talk
-
Detecting Fake Cell Phone Towers
-
Vijay Mukhi
Nov 13
-
Talk
-
Cyber ‘BrahMos’ - Static analysis driven secure coding
-
Joy Sen
Nov 13
-
Talk
-
Attacking Web-Proxies like never before
-
Ahamed Nafeez
Nov 13
-
Talk
-
APT protection for the Enterprise
-
Deepak Singla
Nov 13
-
Talk
-
9 Cell Cyber Diplomacy
-
Alok Vijayant
Nov 13
-
Talk
-
Security vulnerabilities in DVB-C networks: Hacking Cable TV network
-
Rahul Sasi
Nov 13
-
Talk
-
Network Time Protocol in Amplification Inferno
-
Sriram Krishnan
Nov 13
-
Talk
-
Identity theft and its impact on Cyber - Warfare
-
Tarun Wig
Nov 13
-
Talk
-
Attacking Cryptography & PKI Implementations
-
Ajit Hatti
2013
Nov 07
-
Talk
-
Understanding the anatomy of advanced targeted attacks – The Trend Micro approach
-
Tarun Gupta
Nov 07
-
Talk
-
Towards a next generation secure Internet
-
Sanjay Deshpande
Nov 07
-
Talk
-
The seven sins of Wi-Fi security
-
Vivek Ramachandran
Nov 07
-
Talk
-
Setting the Data Center on fire
-
Ajit Hatti
Nov 07
-
Talk
-
Serial killing of embedded systems
-
Atul Alex
Nov 07
-
Talk
-
Securing government Critical Information Infrastructure
-
Kapil Awasthi
Nov 07
-
Talk
-
Malware for Firefox Mobile OS
-
Shantanu Gawde
Nov 07
-
Talk
-
IronWASP
-
-
Lavakumar Kuppan
Nov 07
-
Talk
-
Internet – Transforming terrorism
-
Sameer Saxena
Nov 07
-
Talk
-
How I built a pentest lab in under 70 USD
-
Swaroop Yermalkar
Nov 07
-
Talk
-
Evolution of network security around Software Defined Networking (SDN) – The intelligent network
-
Diwakar Dayal
Nov 07
-
Talk
-
Cloud Security: Enabling continuous, scalable security for today’s hyper connected world
-
Sumedh Thakar
Nov 07
-
Talk
-
Central Monitoring System and IT Act 2000 – Balance between rights of citizens and state
-
Vaishali Bhagwat
Nov 07
-
Talk
-
Approach to containing the outbreak of malicious information in online social networks
-
Sriniketh Vijayaraghavan
Nov 07
-
Talk
-
Advanced security for advanced threats
-
Kartik Shahani
Nov 07
-
Talk
-
Abusing Google Apps: Google is my command and control center
-
-
Ajin Abraham