๐Ÿงช Experimental Feature

Focus Areas are an experimental feature that groups related content by tags. This page and its functionality may change as we refine the categorization system.

Network Security

Network infrastructure security and defense

57
Total Entries
39
Contributors
83
Unique Tags
39
Related Tags

Top Contributors

Sanoop Thomas(6) Vivek Ramachandran(5) Shreeraj Shah(4) Ajin Abraham(3) Ahamed Nafeez(2)

Related Tags (20)

Show all 20 tags...

All Entries (57 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-08-06TalkBlackhat The 5G Titanic Altaf Shaiknetwork-pentestingnetwork-architecturevulnerability-management+1
2025-03-02TalkNullcon Cyber Security from Telco lens Sanjeev Dhallamnetwork-architecturenetwork-hardeningnetwork-monitoring+2
2025-03-02TalkNullcon Satellite Communications: Analyzing and Protecting Space-Based Assets Drishti Jainnetwork-pentestingvulnerability-managementindustrial-control-systems-security
2024-11-16TalkC0c0n Who is holding the Marauders map? Maya R Nairnetwork-pentestingnetwork-monitoringnetwork-traffic-analysis+1
2024-08-29Tool demoHitb Sec Conf eBPFShield Source Code Sagar Bhureidsincident-responsenetwork-monitoring+1
2023-08-07TalkC0c0n Darkweb Investigations Amit Dubeythreat-huntingdigital-forensicsincident-response+1
2023-08-06TalkC0c0n Expanding capability horizons : Homelabs and beyond Video Anant Shrivastavapentestingnetwork-pentestingsecurity-architecture+1
2023-08-06TalkC0c0n Dark web for investigations Amit Lokhandethreat-huntingdigital-forensicsnetwork-forensics+3
2022-09-24TalkC0c0n Deep Learning to detect Network Attacks Varun Kohliidsnetwork-monitoringthreat-detection+2
2022-09-24TalkC0c0n Towards an Effective Intrusion Detection System Framework for Multi-Channel Man-in-the-Middle attacks Against Protected Wi-Fi Networks Manesh Thankappanidsnetwork-monitoringnetwork-pentesting+3
2022-09-24TalkC0c0n CANalyse: A Vehicle Network Analysis and Attack Tool Kartheek Ladenetwork-pentestingnetwork-traffic-analysiscan-bus+1
2021-11-13TalkC0c0n Light Basin - Telecom roaming network attack case study Video Akib Sayyednetwork-pentestingnetwork-traffic-analysisvulnerability-management
2021-11-13TalkC0c0n Zero Trust & Micro-segmentation Suresh Menonsegmentationzero-trustnetwork-architecture+1
2021-08-04Tool demoBlackhat Attack Surface Framework Source Code Prajwal Panchmahalkarnetwork-defense
2020-10-02Tool demoBlackhat OWASP Nettacker Source Code Sri Harsha Gajavallipentestingvulnerability-assessmentnetwork-pentesting+3
2019-08-07TalkBlackhat Defense Against Rapidly Morphing DDOS Presentation Video Mudit Tyagiddosblueteammachine-learning
2019-05-09TalkHitb Sec Conf HAXPO: WiCy: Monitoring 802.11AC Networks at Scale Presentation Video Vivek Ramachandrannetworkredteamwifi+1
2019-03-29Tool demoBlackhat Halcyon IDE: Nmap Script Development IDE Source Code Sanoop Thomasreconnaissanceredteamnmap
2019-03-28Tool demoBlackhat OWASP Nettacker: Automated Penetration Testing Framework Source Code Sri Harsha Gajavallinetwork-pentestingvulnerability-assessmentfirewall+3
2019-03-28Tool demoBlackhat VoIP Wireshark Attack-Defense Toolkit Source Code Nishant Sharma, Jeswin Mathai, Ashish Bhangalevoipwiresharknetwork-security+4
2018-08-11TalkDefcon Compression Oracle Attacks on VPN Networks Presentation Ahamed Nafeezvpn
2018-08-11Tool demoDefcon Halcyon IDE Source Code Sanoop Thomasreconnaissanceredteamnmap+1
2018-08-08TalkBlackhat Compression Oracle Attacks on VPN Networks Presentation Video Ahamed Nafeezredteamvpnweb+2
2018-08-08Tool demoBlackhat Halcyon IDE: For Nmap Script Developers Source Code Sanoop Thomasreconnaissanceredteamnmap+1
2017-11-17TalkDeepsec How Secure Are Your VoLTE And VoWiFi Calls? Video Sreepriya Chalakkalvoltenetworkvowifi+1
2017-10-19TalkHacklu Are your VoLTE and VoWiFi calls secure? Video Sreepriya Chalakkalvoltenetworkvowifi+1
2017-07-27TalkDefcon Recon and bug bounties what a great love story Video Abhijeth Dugginapeddivulnerability-assessmentbug-bountynetwork-pentesting+1
2017-06-23TalkHackinparis Injecting Security into Web apps with Runtime Patching and Context Learning Presentation Video Ajin Abrahamwebblueteamsecure-development+6
2017-05-23TalkPhdays Injecting security into web apps in the runtime Presentation Ajin Abrahamwebblueteamsecure-development+6
2017-03-30Tool demoBlackhat DAMN VULNERABLE SS7 NETWORK Akib Sayyednetworkmobilepentest+1
2017-03-03TalkNullcon Injecting Security into Web apps with Runtime Patching and Context Learning Presentation Video Ajin Abrahamwebblueteamsecure-development+6
2016-11-04TalkBlackhat Detach Me Not - DoS Attacks Against 4G Cellular Users Worldwide from your Desk Presentation Video Siddharth Rao, Bhanu Kottedosredteamnetwork
2016-09-23TalkRootcon Halcyon โ€“ A Faster Way to Build Custom Scripts for Nmap Scans Presentation Source Code Video Sanoop Thomassecure-codingreconnaissanceredteam+1
2016-04-01Tool demoBlackhat Halcyon โ€“ A Faster Way to Build Custom Scripts for Nmap Scans Presentation Source Code Sanoop Thomasreconnaissanceredteamnmap
2016-03-11TalkNullcon Privacy leaks on 4G-LTE networks Presentation Altaf Shaikredteam4glte+2
2015-11-05TalkGround Zero Summit Western Air Command B S Singh Deonetwork-defensenetwork-monitoringnetwork-pentesting+3
2015-11-05TalkGround Zero Summit chellam โ€“ a Wi-Fi IDS/Firewall for Windows Vivek Ramachandranwifinetworkfirewall
2015-08-09TalkDefcon 802.11 Monitoring with PCAP2XML/SQLite Video Vivek Ramachandrannetwork-forensicspacket-analysisnetwork-monitoring+3
2015-08-07TalkDefcon Chellam โ€“ a Wi-Fi IDS/Firewall for Windows Presentation Video Vivek Ramachandranwifinetworkfirewall
2015-08-06Tool demoBlackhat Chellam Vivek Ramachandranwifinetworkfirewall+2
2015-03-15TalkHitb Sec Conf Sniffing the Airwaves with RTLSDR Presentation Yashin Mehaboobenetwork-pentestingpacket-analysisnetwork-monitoring+2
2015-03-15TalkDefcon TECHNICAL TALK-WIHAWK: ROUTER VULNERABILITY SCANNER Anamika Singhnetwork-pentestingvulnerability-assessmentvulnerability-management+2
2015-02-06TalkNullcon Building custom scans for real world enterprise network Presentation Source Code Video Sanoop Thomaspentestingnetwork-pentestingvulnerability-assessment+2
2015-02-06TalkNullcon Drone Attacks: How I hijacked a drone Presentation Video Rahul Sasiredteamdronenetwork+5
2014-11-13TalkGround Zero Summit Network Time Protocol in Amplification Inferno Sriram Krishnannetwork-pentestingnetwork-vulnerability-assessment
2014-11-13TalkGround Zero Summit Detecting Fake Cell Phone Towers Vijay Mukhinetwork-pentestingnetwork-forensicsmobile-security+2
2014-03-08TalkDefcon WI-Hawk Source Code Anamika Singhnetwork-pentestingvulnerability-assessmentnetwork-vulnerability-assessment+3
2013-03-01TalkNullcon BYOD: How will it shape your wireless network security in future? Video Kiran Deshpandenetworkwifimobile+5
2012-09-29TalkNullcon Next-gen Forensics K K Mookheyforensicsdigital-forensicsincident-response+2
2011-08-03TalkBlackhat Femtocells: A poisonous needle in the operator’s hay stack Presentation Whitepaper Video Ravishankar Borgaonkarnetwork-pentestingmobile-securityvulnerability-management
2009-10-07TalkHitb Sec Conf How to Own the World โ€“ One Desktop at a Time Presentation Video Saumil Shahwebsocial-engineeringredteam+1
2009-05-19TalkSyscan Securing Applications at Gateway with Web Application Firewalls Shreeraj Shahblueteamwebfootprinting+3
2009-05-19TalkSyscan Securing Enterprise Applications Shreeraj Shahblueteamwebweb-application-security+13
2009-04-22TalkHitb Sec Conf Application Defense Tactics & Strategies - WAF at the Gateway Presentation Shreeraj Shahblueteamwebfootprinting+3
2007-04-18TalkCan Sec West Low-Rate Denial-of-Service attacks Anil Kumarredteamdos
2003-12-12TalkHitb Sec Conf Defending Web Applications: Strategies, methods and practices Shreeraj Shahwebblueteamsecure-coding+2
2001-11-21TalkBlackhat One-Way SQL Hacking : Futility of Firewalls in Web Hacking Presentation Video Saumil Shahsqlwebfirewall+1