๐Ÿงช Experimental Feature

Focus Areas are an experimental feature that groups related content by tags. This page and its functionality may change as we refine the categorization system.

Incident Response

Security incident detection and response

114
Total Entries
95
Contributors
89
Unique Tags
34
Related Tags

Top Contributors

Ankur Tyagi(8) Nikhil Mittal(5) Ajit Hatti(3) Amit Dubey(3) Amol Sarwate(3)

Related Tags (10)


All Entries (114 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-08-07Tool demoBlackhat Q-TIP (QR Code Threat Inspection Platform) Rushikesh D Nandedkarincident-responseweb-securityvulnerability-management+2
2025-08-06TalkBlackhat When ‘Changed Files’ Changed Everything: Uncovering and Responding to the tj-actions Supply Chain Breach Varun Sharma, Ashish Kurmici-cdincident-responsedevsecops+3
2024-12-11Tool demoBlackhat Active Directory Cyber Deception using Huginn Source Code Rohan Durveactive-directory
2024-11-28TalkBlackhat From Breach to Blueprint: Building a Resilient Future Amit Ghodekarincident-responsevulnerability-managementpentesting+3
2024-11-26TalkBlackhat Critical Exposures: Lessons from a Decade of Vulnerability Research Nikhil Shrivastavavulnerability-managementsql-injectionpentesting+2
2024-11-16TalkC0c0n Active Directory Deception Strategies Madhukar Raina, Sayan Mitraactive-directory
2024-08-29TalkHitb Sec Conf COMMSEC: CoralRaider Targets Victims Data and Social Media Accounts Presentation Video Chetan Raghuprasadreverse-engineeringpentestingincident-response
2024-08-29Tool demoHitb Sec Conf eBPFShield Source Code Sagar Bhureidsincident-responsenetwork-monitoring+1
2024-08-08Tool demoBlackhat Active Directory Cyber Deception using Huginn Source Code Rohan Durveactive-directory
2024-05-07TalkRsac Anatomy of a Vulnerability Response - A View from the Inside Video Mohit Aroravulnerability-managementincident-responserisk-management+1
2024-03-21TalkCan Sec West Rolling in the Dough: How Microsoft Identified and Remidiated a Baker’s Dozen of Security Threats in the Windows DNS Server Arif Hussainvulnerability-managementpentestingsecurity-architecture+1
2023-10-13TalkHackfest Exploring RAM Forensic Analysis for Effective Digital Investigations Sneha Banerjeeforensic
2023-08-07TalkC0c0n Chinese APT against Government officials using G7 summit lure Video Niranjan Jayanandaptincident-responsethreat-hunting
2023-08-07TalkC0c0n Cyber Threats to Global Financial Systems Video Lince Lawrenceincident-responserisk-management
2023-08-07TalkC0c0n Darkweb Investigations Amit Dubeythreat-huntingdigital-forensicsincident-response+1
2023-08-07TalkC0c0n Evasion Tactics of SideCopy & APT36: Persistently targeting Indian Defense Orgs Video Sathwik RAM Prakkiaptreverse-engineeringincident-response
2023-08-07TalkC0c0n Tackling Advanced Threat Landscape with MDR - Best Practices Video Vijayakumar K Mincident-responsethreat-huntingsecurity-monitoring+1
2023-08-07TalkC0c0n Trust Resiliency - A Lesson Learned from Russia Ukraine War Video Ajit Hattiincident-responsesecurity-architecturerisk-management+2
2023-08-07TalkC0c0n Cellibrite Premium Mobile Forensic tool iPhone analysis Vaibhav Kumarmobile-securitymobile-forensicsreverse-engineering+3
2023-08-06TalkC0c0n Cybercrimes Victim Compensation : Legal Remedies and Process Nisheeth Dixitcompliancegovernancerisk-management+1
2023-08-06TalkC0c0n Dark web for investigations Amit Lokhandethreat-huntingdigital-forensicsnetwork-forensics+3
2023-08-06TalkC0c0n Insider Threats - Best Practices and Common Pitfalls Video Georgie Kurieninsider-threatsrisk-managementsecurity-awareness+1
2023-08-06TalkC0c0n Playing cat and mouse with the Adversary: Sometimes a breach is inevitable Video Abhijith B Rincident-responsevulnerability-managementrisk-management
2023-08-06TalkC0c0n Russia-Ukraine Warfare โ€“ A Shift in Cyber Threat Landscape Video Jaydev Joshi, Simran Kotharithreat-landscapeincident-responsevulnerability-management
2023-08-06TalkC0c0n Survivability in the Cyber World Video Sunil Varkeyincident-responserisk-managementsecurity-architecture
2022-09-29TalkBrucon 0wn-premises: Bypassing Microsoft Defender for Identity Video Nikhil Mittalred-teamingactive-directorythreat-detection
2022-09-24TalkC0c0n Cryptocurrency Forensics Bhushan Gulabrao Boraseforensicsdigital-forensicsblockchain-security+2
2022-09-23TalkC0c0n Battle of 300 Crore - how they lost it and got most of it back Prashant Choudharyincident-responsevulnerability-managementrisk-management+1
2022-09-23TalkC0c0n Ransomware: Prevention, Early Detection and Response Babitha Bpransomwareincident-responsevulnerability-management
2022-09-23TalkC0c0n Tracking the Bad guys. An interesting story of how the criminal underground operates Aarushi Koolwal, Anjana Sathyanthreat-huntingincident-response
2021-11-13TalkC0c0n Decoding new age hackers and Criminal Investigation Amit Dubeyincident-responsedigital-forensicsreverse-engineering
2021-11-13TalkC0c0n A look into cyber-espionage activities targeting critical infrastructure in India Saurabh Sharmaindustrial-control-systems-securitycritical-infrastructurethreat-hunting+1
2021-11-13TalkC0c0n Case Study - Cyber Heist in a Bank and Recovery of Systems and Money Prashant Choudharyincident-responseforensicsrecovery+1
2021-11-13TalkC0c0n Case study - E-crime group targeting mobile users Rahul Sasimobile-securityincident-responsevulnerability-management
2021-11-13TalkC0c0n Changing Cyber Security Paradigm & Cyber Tsunami Sunil Varkeycybersecurity-strategiesthreat-landscaperisk-management+4
2021-11-13TalkC0c0n Connecting the dots between customers and security teams Shruthi Kamathincident-responsesecurity-awarenessdevsecops+1
2021-11-13TalkC0c0n Crisis Capitalization in a Pandemic Greeshma M Rrisk-managementincident-responsesecurity-awareness+3
2021-11-13TalkC0c0n Cyber Warfare & Securing Critical Infrastructures Faruk Kazicritical-infrastructureindustrial-control-systems-securityincident-response+1
2021-11-13TalkC0c0n Emerging trends in cyber crimes : Investigation tools & techniques Triveni Singhincident-responsevulnerability-managementdigital-forensics
2021-11-13TalkC0c0n Mature Your Threat Hunting Program Neha Dhyanithreat-huntingthreat-detectionthreat_modeling+2
2021-11-13TalkC0c0n Painting Your Organizations with Shades of Red, Blue & Purple Video Hidayath Khanred-teamingethical-hackingthreat_modeling+2
2021-11-12TalkC0c0n 2021 Supply Chain Attacks Analysis Ajit Hattivulnerability-managementincident-responserisk-management+2
2021-11-10Tool demoBlackhat Wireshark Forensics Toolkit Source Code Rishikesh Bhidemalwareforensic
2021-08-07Tool demoDefcon Tenacity- An Adversary Emulation Tool for Persistence Video Atul Nair, Harshal Tupsamudreincident-responsevulnerability-management
2020-09-18TalkC0c0n COVID-19 Cyber impact on financial sector and remote employees Video Amit Dubeyincident-responserisk-management
2020-09-18TalkC0c0n Cyber Security Shifts During COVID-19 Video Sunil Kanchirisk-managementsecurity-awarenesscompliance-governance+1
2020-09-18TalkC0c0n All about IOT Forensics Hima Bindu Vejellaiotforensic
2020-08-06Tool demoBlackhat MSTICpy: The Security Analysis Swiss Army Knife Source Code Ashwin Patildata-forensicsincident-response
2020-08-06Tool demoBlackhat Dynamic Labs: Windows & Active Directory Exploitation Source Code Rohan Durvewindowsactive-directory
2020-03-06Tool demoNullcon Providence Source Code Swapnil Kumbhar, Akshay Shahincident-responselinuxmacos+2
2019-12-04Tool demoBlackhat AutoMacTC: Finding Worms in Apple Orchards - Using AutoMacTC for macOS Incident Response Kshitij Kumar, Jai Musunurimacossecure-codingforensic+2
2019-10-12TalkTexas Cyber Summit TH-2020 Rastrea2r: Collecting & Hunting for IOCs with Gusto and Style Sudheendra Bhatincident-responsethreat-huntingioc+3
2019-09-27TalkC0c0n RANSOMWARE - to pay or not to pay Seshaprakash Kusuma Sreenivasaransomwareincident-responserisk-management
2019-08-10TalkDefcon RACE - Minimal Rights and ACE for Active Directory Dominance Presentation Video Nikhil Mittalactive-directoryredteamwindows
2019-08-08Tool demoDefcon PcapXray Source Code Srinivas Piskala Ganesh Babuforensicnetworkwireshark+1
2019-08-07Tool demoBlackhat RedHunt-OS v2: Virtual Machine for Adversary Emulation and Threat Hunting Source Code Sudhanshu Chauhan, Kunal Aggarwalvirtual-machineblueteamforensic+2
2019-08-05Tool demoBlackhat CertPivot: Infra-Chaining + Cert-Check Ajit Hattiincident-responsethreat-hunting
2019-03-28TalkBlackhat Investigating Malware Using Memory Forensics - A Practical Approach Presentation Video Monnappa K Aforensicblueteam
2018-10-10TalkBrucon Forging Trusts for Deception in Active Directory Video Nikhil Mittalwindowsactive-directoryredteam
2018-10-05TalkC0c0n Using Fault Injection for Forensics Yashin Mehaboobeforensic
2018-10-04TalkBrucon Disrupting the Kill Chain Video Vineet Bhatiaincident-responsevulnerability-managementsecurity-architecture
2018-09-06TalkGrrcon Angad: A Malware Detection Framework using Multi-Dimensional Visualization Presentation Whitepaper Source Code Video Ankur TyagiblueteamAutomationpentest+1
2018-08-11Tool demoDefcon ADRecon: Active Directory Recon Presentation Source Code Prashant Mahajanactive-directorywindowsreconnaissance+1
2018-08-11Tool demoDefcon Angad: A Malware Detection Framework using Multi-Dimensional Visualization Source Code Ankur TyagiblueteamAutomationpentest+1
2018-08-09Tool demoBlackhat rastrea2r (reloaded!): Collecting & Hunting for IOCs with Gusto and Style Presentation Source Code Sudheendra Bhatopensourceincident-responserest-api+1
2018-08-08Tool demoBlackhat AutoMacTC: Finding Worms in Apple Orchards - Using AutoMacTC for macOS Incident Response Kshitij Kumar, Jai Musunurimacossecure-codingforensic+2
2018-08-08Tool demoBlackhat ADRecon: Active Directory Recon Presentation Source Code Prashant Mahajanactive-directorywindowsreconnaissance+1
2018-08-08Tool demoBlackhat RedHunt OS (VM): A Virtual Machine for Adversary Emulation and Threat Hunting Source Code Sudhanshu Chauhanvirtual-machineblueteamforensic+2
2018-03-22Tool demoBlackhat ADRecon: Active Directory Recon Presentation Source Code Prashant Mahajanactive-directorywindowsreconnaissance+1
2017-08-18TalkC0c0n Call Centre Frauds Parry Aftabsocial-engineeringsecurity-awarenessrisk-management+1
2017-08-18TalkC0c0n Cyber bullying-Screen the Mean Nitin Awade, Surjata Awadesecurity-awarenessincident-responsedigital-forensics
2017-07-27TalkBlackhat Evading Microsoft ATA for Active Directory Domination Presentation Video Nikhil Mittalactive-directoryredteampentest+1
2017-04-19TalkBrucon Evading Microsoft ATA for Active Directory Domination Presentation Video Nikhil Mittalactive-directoryredteamwindows
2017-03-03TalkNullcon Breach Response - Time to shake up the status quo Video K K Mookhey, Pranesh Prakash, Sahir Hidayatullah, Shobha Jagathpalincident-responsevulnerability-managementrisk-management+2
2016-10-05TalkVirus Bulletin One-Click Fileless Infection Presentation Whitepaper Video Himanshu Anandreverse-engineeringincident-responsevulnerability-management
2016-08-19TalkC0c0n SSD Forensics : A Nightmare for Forensic Investigators Santosh Khadsareforensic
2016-08-06Tool demoDefcon Visual Network and File Forensics using Rudra Source Code Video Ankur Tyagianalysisblueteamnetwork+2
2016-08-03Tool demoBlackhat Visual Network and File Forensics Using Rudra Source Code Ankur Tyagianalysisblueteamforensic+1
2016-04-01Tool demoBlackhat Rudra: The Destroyer of Evil Source Code Ankur Tyagianalysisblueteamnetwork+2
2015-11-13Tool demoBlackhat Rudra - The Destroyer of Evil Source Code Ankur Tyagianalysisblueteamnetwork+2
2015-11-05TalkGround Zero Summit Exposing Cyber Espionage: Hello from Pakistan- IIC Session Jiten Jainincident-responsereverse-engineeringpentesting
2015-08-09TalkDefcon 802.11 Monitoring with PCAP2XML/SQLite Video Vivek Ramachandrannetwork-forensicspacket-analysisnetwork-monitoring+3
2015-08-08TalkDefcon Chigula โ€” a framework for Wi-Fi Intrusion Detection and Forensics Video Vivek Ramachandrannetworkwifiintrusion-detection+2
2015-08-08Tool demoDefcon Rudra Source Code Ankur Tyagianalysisblueteamnetwork+2
2015-08-05Tool demoBlackhat Rudra - The Destroyer of Evil Source Code Ankur Tyagianalysisblueteamnetwork+2
2015-03-15TalkBlackhat 2015 State of Vulnerability Exploits Presentation Video Amol Sarwatevulnerability-managementautomated-scanningvulnerability-assessment+2
2015-02-06TalkNullcon Hunting and Decrypting Ghost communications using Memory Forensics Presentation Monnappa K Aforensicblueteamnetwork
2015-01-27TalkOwasp App Sec California Anatomy of memory scraping, credit card stealing POS malware Video Amol Sarwatereverse-engineeringvulnerability-managementincident-response+1
2014-11-13TalkGround Zero Summit Detecting Fake Cell Phone Towers Vijay Mukhinetwork-pentestingnetwork-forensicsmobile-security+2
2014-09-18TalkApp Sec Usa Anatomy of memory scraping, credit card stealing POS malware Video Amol Sarwatereverse-engineeringmemory-forensicsincident-response+1
2013-11-07TalkGround Zero Summit Approach to containing the outbreak of malicious information in online social networks Sriniketh Vijayaraghavanincident-responsesocial-engineering
2013-11-07TalkGround Zero Summit Understanding the anatomy of advanced targeted attacks โ€“ The Trend Micro approach Tarun Guptaforensic
2013-09-13TalkGrrcon Matriux Leandros - An Open Source Penetration Testing and Forensic Distribution Prajwal Panchmahalkarpentestingforensicsdigital-forensics+2
2012-09-29TalkNullcon Next-gen Forensics K K Mookheyforensicsdigital-forensicsincident-response+2
2012-09-26TalkNullcon Forensics Timeline Analysis Video Aashish Kunteforensicanalysisblueteam
2012-08-03TalkC0c0n I haz you and pwn your maal Presentation Harsimran Singh Waliaandroidmobilereverse-engineering+1
2012-07-14TalkHope Advancements in Botnet Attacks and Malware Distribution Video Aditya K Soodmalwarebotnetweb-security+2
2011-12-04TalkClubhack Android Forensics Presentation Manish Chastamobileandroidforensic
2011-10-07TalkC0c0n Digital Evidence Sushanth Samudralaforensic
2011-09-06TalkSecuritybyte Using Data Analytics for Incident Response Presentation Samir Saklikarincident-responsedata-analytics
2011-02-25TalkNullcon Incident Management and Beyond Dinesh O Barejaincident-responseincident-managementinfrastructure
2010-12-04TalkClubhack Windows Memory Forensic Analysis Presentation Aashish Kuntewindowsforensicanalysis
2010-08-01TalkC0c0n Concept, Methodology and Challenges in Computer Forensics Sebastian Edasseryforensic
2010-08-01TalkC0c0n Dangers and dynamic Malware analysis Chandrasekarforensic
2009-12-05TalkClubhack Incident Handling and Log Analysis for Web Based Incidents Presentation Manindra Kishoreincident-responselogsweb+2
2009-12-05TalkClubhack Advance Computer Forensic concepts (windows) Presentation Kush Wadhwaforensicwindows
2009-11-17TalkSecuritybyte Behind the scenes at the MSRC Presentation Suresh Venkateswaranincident-responseforensic
2009-11-17TalkSecuritybyte Business Continuity Case Study Venkataram Arabolubusiness-continuityrisk-managementbusiness-resilience+3
2009-08-06TalkC0c0n Cyber Victimisation K Jaishankarcybersecurity-educationsecurity-awarenessrisk-management+2
2009-08-06TalkC0c0n Cyber Forensics Krishna Sastry Pendyalforensic
2007-12-09TalkClubhack Mining Digital Evidence in Microsoft Windows โ€“ Answering Who, When, Why and How? Presentation Chetan Guptaforensicwindows
2007-08-02TalkBlackhat Smoke ’em Out! Presentation Whitepaper Rohyt Belaniforensicincident-responseweb
2007-08-02TalkBlackhat The Evolution Of Phishing To Organized Crime Video Rohyt Belanisocial-engineeringphishingthreat_modeling+2
2004-04-21TalkCan Sec West Cisco PSIRT TCP/BGP Sharad Ahlawatincident-responseforensic