| 2025-08-07 | Talk | Blackhat |
Kernel-Enforced DNS Exfiltration Security: Framework Built for Cloud Environments to Stop Data Breaches via DNS at Scale
| Vedang Parasnis | #dns#data-leak#kernel+1 |
| 2025-08-06 | Talk | Blackhat |
The 5G Titanic
| Altaf Shaik | #network-pentesting#network-architecture#architecture |
| 2025-04-04 | Tool demo | Blackhat |
SHIVA Spampot: Actionable Spam and Phishing Intelligence
| Rahul Binjve, Viren Kapadia | #honeypot#network-monitoring#incident-management+1 |
| 2025-04-03 | Tool demo | Blackhat |
Mantis - Asset Discovery at Scale
| Hitesh Thakur, Praveen Kanniah, Prateek Thakare | #asset-inventory#cloud-workload-protection#security-tools+4 |
| 2025-03-02 | Talk | Nullcon |
Cyber Security from Telco lens
| Sanjeev Dhallam | #network-architecture#network-hardening#network-monitoring+2 |
| 2025-03-02 | Panel | Nullcon |
Modernizing Security Architecture: Platforms or Best-of-Breed, What Works Best?
| Ketan Vyas, Prajal Kulkarni, Satyavathi Divadari, Srihari Kotni | #security-strategy#threat-modeling#zero-trust+3 |
| 2025-03-02 | Talk | Nullcon |
Satellite Communications: Analyzing and Protecting Space-Based Assets
| Drishti Jain | #network-pentesting#ics-security#encryption+4 |
| 2025-03-02 | Panel | Nullcon |
Cyber Fusion Center: The Command Center for Integrated Cyber Defense
| Avkash Kathiriya, Mathan Babu Kasilingam, Yogi Kapur | #security-monitoring#network-defense#threat-modeling+3 |
| 2024-12-11 | Tool demo | Blackhat |
findmytakeover - find dangling domains in a multi cloud environment
| Aniruddha Biyani | #dns#cloud-pentesting#reconnaissance |
| 2024-12-11 | Tool demo | Blackhat |
Active Directory Cyber Deception using Huginn
| Rohan Durve, Paul Laine | #active-directory#incident-management#network-forensics+1 |
| 2024-11-21 | Talk | Securityfest |
Wheels of Wonder
| Hrishikesh Somchatwar | #automotive-cybersecurity#car-hacking#embedded-systems+4 |
| 2024-11-16 | Talk | C0c0n |
Who is holding the Marauders map?
| Maya R Nair | #network-pentesting#network-monitoring#network-traffic-analysis+1 |
| 2024-11-16 | Talk | C0c0n |
Ride on the House - Exploiting Public Transport Ticketing Systems for Free Rides
| Rakesh Seal, Diptisha Samanta | #exploitation#ethical-hacking#network-pentesting+1 |
| 2024-08-29 | Tool demo | Hitbsecconf |
eBPFShield
| Sagar Bhure | #ids#incident-management#network-monitoring+1 |
| 2024-08-10 | Talk | Defcon |
Compromising an Electronic Logging Device and Creating a Truck2Truck Worm
| Rik Chatterjee, Jake Jepson | #eld#embedded-systems#ics-security+3 |
| 2024-08-09 | Talk | Defcon |
Breaking Secure Web Gateways (SWG) for Fun and Profit
| Vivek Ramachandran, Jeswin Mathai | #swg#cloud-access-security-broker#application-pentesting+4 |
| 2024-08-09 | Talk | Defcon |
Breaking Secure Web Gateways (SWG) for Fun and Profit
| Vivek Ramachandran, Jeswin Mathai | #ssl#application-pentesting#secure-coding+3 |
| 2024-08-08 | Tool demo | Blackhat |
Active Directory Cyber Deception using Huginn
| Rohan Durve, Paul Laine | #active-directory#incident-management#identity-governance+3 |
| 2024-08-07 | Tool demo | Blackhat |
TrafficWardenX: OpenWRT Security & Monitoring
| Sampad Adhikary, Tripti Sharma | #openwrt#network-monitoring#security-tools+3 |
| 2024-05-08 | Talk | Rsac |
How to CTF Infra - Beyond the Challenges and Flags
| Jayesh Chauhan, Max Gartman | #ctf#cloud-workload-protection#security-strategy+2 |
| 2024-04-18 | Tool demo | Blackhat |
findmytakeover - find dangling domains in a multi cloud environment
| Aniruddha Biyani | #dns#cloud-workload-protection#cloud-pentesting+1 |
| 2024-03-11 | Talk | Nullcon |
Hacking Trains
| Jaden Furtado | #hacking#ics-security#network-forensics+2 |
| 2023-12-06 | Tool demo | Blackhat |
SSH into any device from anywhere with ZERO Open Network ports
| Anthony Prakash, Colin Constable | #ssh#zero-trust#secure-development+1 |
| 2023-08-25 | Tool demo | Hitbsecconf |
eBPFShield
| Sagar Bhure | #dns#machine-learning#security-tools+1 |
| 2023-08-10 | Talk | Defcon |
Attacking Vehicle Fleet Management Systems
| Yashin Mehaboobe | #automotive-cybersecurity#ics-security#embedded-systems+4 |
| 2023-08-07 | Talk | C0c0n |
Darkweb Investigations
| Amit Dubey | #threat-hunting#digital-forensics#incident-management+1 |
| 2023-08-07 | Talk | C0c0n |
Enhancing Red Team OPSEC: Abusing Stealthy In-Memory Binary Execution Techniques in Linux
| Pranav Sivvam | #red-teaming#linux#memory-forensics+2 |
| 2023-08-06 | Talk | C0c0n |
Dark web for investigations
| Amit Lokhande | #threat-hunting#digital-forensics#network-forensics+3 |
| 2023-08-06 | Talk | C0c0n |
Expanding capability horizons : Homelabs and beyond
| Anant Shrivastava | #security-assessment#network-pentesting#architecture |
| 2023-05-12 | Tool demo | Blackhat |
eBPFShield: Advanced IP-Intelligence & DNS Monitoring using eBPF
| Sagar Bhure | #dns#machine-learning#network-monitoring+2 |
| 2023-05-11 | Tool demo | Blackhat |
CANalyse 2.0 : A Vehicle Network Analysis and Attack Tool
| Kartheek Lade | #automobile#car-hacking#iot-device-management+4 |
| 2022-12-07 | Tool demo | Blackhat |
h0neytr4p - How to catch the external threat actors with an easy to configure Honeypot.
| Subhash Popuri | #honeypot#ids#ips+3 |
| 2022-09-24 | Talk | C0c0n |
Deep Learning to detect Network Attacks
| Varun Kohli | #ids#network-monitoring#threat-detection+2 |
| 2022-09-24 | Talk | C0c0n |
Towards an Effective Intrusion Detection System Framework for Multi-Channel Man-in-the-Middle attacks Against Protected Wi-Fi Networks
| Manesh Thankappan | #ids#network-monitoring#network-pentesting+3 |
| 2022-09-24 | Talk | C0c0n |
CANalyse: A Vehicle Network Analysis and Attack Tool
| Kartheek Lade | #network-pentesting#network-traffic-analysis#can-bus+1 |
| 2022-08-10 | Tool demo | Blackhat |
CANalyse (2.0): A vehicle network analysis and attack tool
| Kartheek Lade, Rahul Jeyasingh | #automobile#car-hacking#iot-device-management+4 |
| 2022-08-10 | Tool demo | Blackhat |
ParseAndC 2.0 β We Don’t Need No C Programs (for Parsing)
| Parbati Kumar Manna | #reverse-engineering#dynamic-analysis#network-pentesting+4 |
| 2022-03-25 | Talk | Insomnihack |
Attacking Bluetooth LE design and implementation in mobile + wearables ecosystems
| Nitin Lakshmanan, Sunil Kumar 1 | #bluetooth#hardware-embedded#iot-pentesting+4 |
| 2022-03-24 | Talk | Insomnihack |
Practical exploitation of zigbee-class networks with USB-based RF transceivers & open source software
| Nitin Lakshmanan, Sunil Kumar 1 | #iot-pentesting#wireless-security#hardware-hacking+3 |
| 2021-11-19 | Talk | Hackfest |
Hacking with Physics
| Hrishikesh Somchatwar | #ics-security#automotive-cybersecurity#embedded-systems+4 |
| 2021-11-13 | Talk | C0c0n |
Zero Trust & Micro-segmentation
| Suresh Menon | #segmentation#zero-trust#network-architecture+1 |
| 2021-11-13 | Talk | C0c0n |
Emerging trends in cyber crimes : Investigation tools & techniques
| Triveni Singh | #incident-management#digital-forensics#forensics+3 |
| 2021-11-13 | Talk | C0c0n |
Light Basin - Telecom roaming network attack case study
| Akib Sayyed | #network-pentesting#network-traffic-analysis#gtp+2 |
| 2021-11-11 | Tool demo | Blackhat |
DejaVu ++
| Bhadreshkumar Patel, Harish Ramadoss | #blueteam#cloud-access-security-broker#cloud-compliance+4 |
| 2021-11-10 | Tool demo | Blackhat |
RIoTPot: A Modular Hybrid-Interaction IoT/OT Honeypot
| Abhimanyu Rawat, Shreyas Srinivasa, Emmanouil Vasilomanolakis | #blueteam#honeypot#network-defense+1 |
| 2021-11-10 | Tool demo | Blackhat |
Wireshark Forensics Toolkit
| Rishikesh Bhide | #forensics#network-forensics#data-protection |
| 2021-08-04 | Tool demo | Blackhat |
Attack Surface Framework
| Prajwal Panchmahalkar, Mauricio Espinosa | #network-defense#application-pentesting#attack-surface+1 |
| 2021-05-07 | Tool demo | Blackhat |
CANalyse: A Vehicle Network Analysis and Attack Tool
| Kartheek Lade | #automobile#car-hacking#iot-device-management+4 |
| 2021-03-05 | Talk | Nullcon |
Telecom Security Challenges in 5G
| Akib Sayyed | #5g#gsma#ddos |
| 2020-12-09 | Tool demo | Blackhat |
HosTaGe: mobile honeypots for rapid deployment
| Shreyas Srinivasa, Emmanouil Vasilomanolakis, Eirini Lygerou | #honeypot#blueteam#endpoint-protection+2 |
| 2020-10-02 | Tool demo | Blackhat |
OWASP Nettacker
| Sri Harsha Gajavalli, Ali Razmjoo Qalaei, Sam Stepanyan | #security-assessment#vulnerability-assessment#network-pentesting+3 |
| 2020-10-01 | Tool demo | Blackhat |
Wi-Fi Access Point Rootkits
| Nishant Sharma, Jeswin Mathai | #wifi#blueteam#iot-pentesting+1 |
| 2020-09-18 | Talk | C0c0n |
Offensive & Scope Based Recon
| Harsh Bothra | #reconnaissance#network-architecture#security-strategy+1 |
| 2020-09-18 | Talk | C0c0n |
All about IOT Forensics
| Hima Bindu Vejella | #forensics#iot-device-management#iot-pentesting+4 |
| 2020-09-18 | Talk | C0c0n |
COVID-19 Cyber impact on financial sector and remote employees
| Amit Dubey, Tal Catran, Yair Feldman | #incident-management#risk-management#cybersecurity-strategy+4 |
| 2020-03-06 | Tool demo | Nullcon |
Omniscient
| Pramod Rana | #reconnaissance#blueteam#network-monitoring+4 |
| 2020-03-06 | Tool demo | Nullcon |
PivotSuite
| Manish Gupta | #red-teaming#security-assessment#network-architecture+2 |
| 2019-12-04 | Tool demo | Blackhat |
RTTM: Real Time Threat Monitoring Tool
| Naveen Rudrappa, Murali Krishna Segu | #blueteam#network-monitoring#security-analytics+2 |
| 2019-10-14 | Talk | Hitbsecconf |
ON THE WINGS OF TIME: DEMYSTIFYING WIRELESS ETHICAL HACKING AND DEFENSES
| Harshit Agrawal, Himanshu Mehta | #wifi#red-teaming#blueteam+1 |
| 2019-10-10 | Talk | Brucon |
Security transition from 4G to 5G: are we secure enough?
| Altaf Shaik, Ravishankar Borgaonkar | #5g#4g#network-architecture+3 |
| 2019-09-27 | Talk | C0c0n |
Advanced Persistent Threat and counter measures
| A a Gafoor | #blueteam#apt#network-defense+4 |
| 2019-09-23 | Talk | Rootcon |
Hunting Threats with Wireshark Plugins
| Nishant Sharma, Jeswin Mathai, Shivam Bathla | #blueteam#network-monitoring#security-analytics+2 |
| 2019-09-23 | Talk | Rootcon |
APAD: An EDR Grade Agent for Wi-Fi Access Points
| Vivek Ramachandran | #wifi#edr#linux |
| 2019-08-10 | Tool demo | Defcon |
Local Sheriff
| Konark Modi | #reconnaissance#blueteam#data-leak+3 |
| 2019-08-09 | Tool demo | Defcon |
PivotSuite: Hack The Hidden Network - A Network Pivoting Toolkit
| Manish Gupta | #red-teaming#security-assessment#network-pentesting |
| 2019-08-08 | Tool demo | Defcon |
Let’s Map Your Network
| Pramod Rana | #reconnaissance#blueteam#network-monitoring+4 |
| 2019-08-08 | Tool demo | Blackhat |
RWDD: Remote Web Deface Detection Tool
| K v Prashant, Ade Yoseman Putra | #blueteam#application-pentesting#security-monitoring+1 |
| 2019-08-08 | Talk | Defcon |
YOUR PHONE IS USING TOR AND LEAKING YOUR PII
| Milind Bhargava, Adam Podgorski | #data-protection#security-assessment#tor+1 |
| 2019-08-08 | Tool demo | Defcon |
PcapXray
| Srinivas Piskala Ganesh Babu | #forensics#wireshark#blueteam |
| 2019-08-07 | Talk | Blackhat |
Defense Against Rapidly Morphing DDOS
| Mudit Tyagi, Mikhail Fedorov | #ddos#blueteam#machine-learning |
| 2019-08-07 | Tool demo | Blackhat |
Medaudit: Auditing Medical Devices and Healthcare Infrastructure
| Anirudh Duggal | #security-assessment#application-pentesting#network-architecture+1 |
| 2019-08-07 | Tool demo | Blackhat |
PivotSuite: Hack The Hidden Network - A Network Pivoting Toolkit
| Manish Gupta | #red-teaming#security-assessment#network-pentesting |
| 2019-06-02 | Tool demo | Defcon |
VoIPShark: Open Source VoIP Analysis Platform
| Nishant Sharma, Jeswin Mathai, Ashish Bhangale | #voip#sip#network-pentesting+1 |
| 2019-05-21 | Talk | Phdays |
Active defense using Honeypots v2
| Rahul Binjve | #blueteam#honeypot#network-defense+4 |
| 2019-05-10 | Talk | Hitbsecconf |
HAXPO: RF Exploitation: Demystifying IoT/OT Hacks with SDR
| Himanshu Mehta, Harshit Agrawal | #rf#red-teaming#hardware-embedded+3 |
| 2019-05-09 | Talk | Hitbsecconf |
HAXPO: WiCy: Monitoring 802.11AC Networks at Scale
| Vivek Ramachandran | #red-teaming#wifi#802.11ac |
| 2019-03-29 | Tool demo | Blackhat |
Halcyon IDE: Nmap Script Development IDE
| Sanoop Thomas | #reconnaissance#red-teaming#nmap |
| 2019-03-28 | Tool demo | Blackhat |
OWASP Nettacker: Automated Penetration Testing Framework
| Sri Harsha Gajavalli, Ali Razmjoo Qalaei, Ehsan Nezami | #network-pentesting#vulnerability-assessment#firewall+3 |
| 2019-03-28 | Tool demo | Blackhat |
RTS: Real Time Scrapper
| Naveen Rudrappa | #blueteam#application-pentesting#security-monitoring+4 |
| 2019-03-28 | Tool demo | Blackhat |
VoIP Wireshark Attack-Defense Toolkit
| Nishant Sharma, Jeswin Mathai, Ashish Bhangale | #voip#wireshark#network-defense+4 |
| 2019-02-28 | Talk | Nullcon |
A Hacker Walks into a Co-working Space
| Rahul Binjve | #red-teaming#application-pentesting#network-architecture+2 |
| 2019-02-28 | Talk | Nullcon |
Dirty use of USSD Codes
| Ravishankar Borgaonkar | #ussd#red-teaming#social-engineering+3 |
| 2018-11-29 | Talk | Deepsec |
DNS Exfiltration and Out-of-Band Attacks
| Nitesh Shilpkar | #dns#red-teaming#malware-detection |
| 2018-11-02 | Talk | Hackfest |
Exploiting Connected Medical Devices: Lessons Learned & Data Earned
| Saurabh Harit | #red-teaming#wearables#iot-device-management+4 |
| 2018-11-02 | Talk | Hitbsecconf |
Defending The Enterprise in 2018
| Saumil Shah | #blueteam#security-strategy#threat-modeling+3 |
| 2018-10-05 | Talk | C0c0n |
DNS Exfiltration and Out of Band Attacks
| Nitesh Shilpkar | #red-teaming#dns#network-pentesting |
| 2018-10-05 | Talk | C0c0n |
Defending Healthcare Base
| Jiggyasu Sharma | #blueteam#incident-management#security-monitoring+4 |
| 2018-10-05 | Talk | C0c0n |
Using Fault Injection for Forensics
| Yashin Mehaboobe | #forensics#digital-forensics#security-testing+2 |
| 2018-09-27 | Talk | Rootcon |
Cyber Security Threats to Telecom Networks
| Hardik Mehta, Rosalia Dβ Alessandro, Loay Abdelrazek | #ss7#sip#gtp+2 |
| 2018-08-11 | Tool demo | Defcon |
PA ToolkitβWireshark plugins for Pentesters
| Nishant Sharma, Jeswin Mathai | #wireshark#security-assessment#reconnaissance+4 |
| 2018-08-11 | Tool demo | Defcon |
DejaVUβAn Open Source Deception Framework
| Harish Ramadoss, Bhadreshkumar Patel | #blueteam#network-defense#honeypot+4 |
| 2018-08-11 | Talk | Defcon |
Compression Oracle Attacks on VPN Networks
| Ahamed Nafeez | #vpn#network-architecture#application-pentesting+3 |
| 2018-08-11 | Tool demo | Defcon |
Halcyon IDE
| Sanoop Thomas | #reconnaissance#red-teaming#nmap+1 |
| 2018-08-09 | Talk | Defcon |
4GβWho is paying your cellular phone bill?
| Isha Singh, Dr Silke Holtmanns | #4g#ipx#red-teaming+2 |
| 2018-08-08 | Tool demo | Blackhat |
DejaVu: An Open Source Deception Framework
| Bhadreshkumar Patel, Harish Ramadoss | #blueteam#network-defense#honeypot+4 |
| 2018-08-08 | Tool demo | Blackhat |
DataSploit 2.0
| Kunal Aggarwal, Shubham Mittal | #osint#reconnaissance#data-governance+4 |
| 2018-08-08 | Tool demo | Blackhat |
PA Toolkit: Wireshark Plugins for Pentesters
| Nishant Sharma, Jeswin Mathai | #wireshark#security-assessment#network-architecture+2 |
| 2018-08-08 | Tool demo | Blackhat |
Halcyon IDE: For Nmap Script Developers
| Sanoop Thomas | #reconnaissance#red-teaming#nmap+1 |
| 2018-08-08 | Talk | Blackhat |
Compression Oracle Attacks on VPN Networks
| Ahamed Nafeez | #red-teaming#vpn#blueteam+1 |
| 2018-08-08 | Tool demo | Blackhat |
ANWI (All New Wireless IDS): The $5 WIDS
| Rishikesh Bhide, Sanket Karpe | #intrusion-detection#blueteam#wifi |
| 2018-08-08 | Tool demo | Blackhat |
DARWIN: Real World Use Cases for Covert Wireless
| Arun Mane, Rushikesh D Nandedkar | #wifi#ieee802.15.4#embedded-systems |
| 2018-03-03 | Panel | Nullcon |
Managing Cyber Risk in the Connected Environment
| Gaurav Shukla, Ramachandra Hegde, Sudarshan Rajagopal, Kabir Mulchandani | #security-strategy#threat-modeling#network-monitoring+1 |
| 2018-03-01 | Talk | Nullcon |
DARWIN (A parasite covert wireless network)
| Rushikesh D Nandedkar | #wifi#red-teaming#network-architecture+1 |
| 2018-03-01 | Talk | Nullcon |
Looting your bank savings using Digital India
| Indrajeet Bhuyan | #red-teaming#application-pentesting#api-security+4 |
| 2018-03-01 | Talk | Nullcon |
Abusing and Attacking Content Sharing Solutions
| Pratap Chandra Allena | #red-teaming#wifi#bluetooth+2 |
| 2017-12-06 | Tool demo | Blackhat |
ANWI (All New Wireless IDS) - The Β£5 WIDS
| Sanket Karpe | #intrusion-detection#blueteam#wifi |
| 2017-11-17 | Talk | Deepsec |
How Secure Are Your VoLTE And VoWiFi Calls?
| Sreepriya Chalakkal | #volte#vowifi#sip+1 |
| 2017-10-19 | Talk | Hacklu |
Are your VoLTE and VoWiFi calls secure?
| Sreepriya Chalakkal | #volte#vowifi#sip+2 |
| 2017-09-13 | Talk | 44con |
Red Team Revenge : Attacking Microsoft ATA
| Nikhil Mittal | #windows#red-teaming#active-directory+4 |
| 2017-08-18 | Talk | C0c0n |
Hunting Botnets with Analytics
| Shomiron Das Gupta | #botnet#blueteam#security-analytics+2 |
| 2017-08-18 | Talk | C0c0n |
10 Things I Hate About Your Honeypots or How to Setup Honeypots That Work
| Rahul Binjve | #honeypot#blueteam#network-monitoring+3 |
| 2017-08-18 | Talk | C0c0n |
Are TOR Hidden Services really hidden? Demystifying HS Directory surveillance by injecting Decoys inside TOR!
| Abhinav Biswas | #tor#network-monitoring#incident-detection+1 |
| 2017-08-18 | Talk | C0c0n |
Cyber Security Threat Management β Model it, Collect Intelligence and Hunt them!
| Illyas Kooliyankal | #blueteam#cyber-crime#intelligence-sharing+3 |
| 2017-08-18 | Talk | C0c0n |
The Covert Cupid Under .11 Veil !!! /* Approach for Covert WIFI*/
| Rushikesh D Nandedkar | #wifi#network-pentesting#security-tools+1 |
| 2017-07-29 | Tool demo | Defcon |
WIDY 2.0: WIFI 0WNAGE IN UNDER $5 RELOADED
| Vivek Ramachandran, Nishant Sharma, Ashish Bhangale | #wifi#red-teaming#blueteam+1 |
| 2017-07-29 | Tool demo | Defcon |
WiMonitor - an OpenWRT package for remote WiFi sniffing
| Vivek Ramachandran, Nishant Sharma, Ashish Bhangale | #openwrt#red-teaming#sniffing+1 |
| 2017-07-27 | Talk | Defcon |
Recon and bug bounties what a great love story
| Abhijeth Dugginapeddi | #vulnerability-assessment#bug-bounty#network-pentesting+1 |
| 2017-06-24 | Talk | Lehack |
When encryption is not enough: Attacking Wearable - Mobile communication over BLE
| Sumanth Naropanth, Eliza Chelleng, Kavya Racharla | #bluetooth#device-security#encryption+3 |
| 2017-06-23 | Talk | Hackinparis |
Injecting Security into Web apps with Runtime Patching and Context Learning
| Ajin Abraham | #blueteam#secure-development#sqli+4 |
| 2017-05-23 | Talk | Phdays |
Injecting security into web apps in the runtime
| Ajin Abraham | #blueteam#secure-development#sqli+4 |
| 2017-04-14 | Talk | Hitbsecconf |
COMMSEC: IoT Hacking Simplified
| Aseem Jakhar | #red-teaming#iot-pentesting#hardware-embedded+2 |
| 2017-03-30 | Tool demo | Blackhat |
Datasploit - Automated Open Source Intelligence (OSINT) Tool
| Shubham Mittal | #osint#reconnaissance#security-tools+3 |
| 2017-03-30 | Tool demo | Blackhat |
DAMN VULNERABLE SS7 NETWORK
| Akib Sayyed | #security-assessment#dos#ss7 |
| 2017-03-30 | Tool demo | Blackhat |
WiDy: WiFi 0wnage in Under $5
| Vivek Ramachandran, Nishant Sharma, Ashish Bhangale | #wifi#red-teaming#blueteam+1 |
| 2017-03-03 | Talk | Nullcon |
Injecting Security into Web apps with Runtime Patching and Context Learning
| Ajin Abraham | #blueteam#secure-development#sqli+4 |
| 2016-11-04 | Talk | Blackhat |
Detach Me Not - DoS Attacks Against 4G Cellular Users Worldwide from your Desk
| Siddharth Rao, Bhanu Kotte, Dr. Silke Holtmanns | #dos#red-teaming#ss7+4 |
| 2016-11-03 | Talk | Blackhat |
WiFi-Based IMSI Catcher
| Ravishankar Borgaonkar, Piers O Hanlon | #wifi#android#ios |
| 2016-10-27 | Talk | Brucon |
Decepticon The Rise and Evolution of an Intelligent Evil Twinβ¦!!!
| Rushikesh D Nandedkar, Amrita C Iyer, Krishnakant Patil | #reverse-engineering#evil-twin-attack#network-monitoring+3 |
| 2016-10-13 | Talk | Appsecusa |
When encryption is not enough: Attacking Wearable - Mobile Application communication over BLE
| Sumanth Naropanth, Kavya Racharla, Chandra Prakash Gopalaiah | #reverse-engineering#secure-development#ble+4 |
| 2016-10-05 | Talk | Virusbulletin |
One-Click Fileless Infection
| Himanshu Anand, Chastine Menrige | #reverse-engineering#incident-management#endpoint-protection+3 |
| 2016-09-23 | Talk | Rootcon |
Halcyon β A Faster Way to Build Custom Scripts for Nmap Scans
| Sanoop Thomas | #secure-coding#reconnaissance#red-teaming+1 |
| 2016-08-19 | Talk | C0c0n |
How (in)secure are Indian GSM networks?
| Ajay Fuloria | #gsm#gtp#imsi+4 |
| 2016-08-06 | Tool demo | Defcon |
Datasploit
| Shubham Mittal | #osint#reconnaissance#data-leak+4 |
| 2016-08-04 | Tool demo | Blackhat |
Maltese (Malware Traffic Emulating Software)
| Sasi Siddharth | #dns#secure-coding#malware-detection+2 |
| 2016-08-03 | Tool demo | Blackhat |
DataSploit
| Sudhanshu Chauhan, Shubham Mittal, Nutan Kumar Panda | #security-assessment#threat-hunting#osint+1 |
| 2016-08-03 | Tool demo | Blackhat |
Visual Network and File Forensics Using Rudra
| Ankur Tyagi | #blueteam#forensics#network-forensics+2 |
| 2016-04-01 | Tool demo | Blackhat |
Halcyon β A Faster Way to Build Custom Scripts for Nmap Scans
| Sanoop Thomas | #reconnaissance#red-teaming#nmap |
| 2016-03-11 | Talk | Nullcon |
Privacy leaks on 4G-LTE networks
| Altaf Shaik | #red-teaming#4g#lte+1 |
| 2016-03-11 | Talk | Nullcon |
Real-time Ingestion of security telemetry data into Hadoop distributed system to respond to 0-day
| Pallav Jakhotiya, Vipul Sawant | #secure-development#blueteam#data-analytics+3 |
| 2015-11-05 | Talk | Groundzerosummit |
chellam β a Wi-Fi IDS/Firewall for Windows
| Vivek Ramachandran | #wifi#firewall#ids+3 |
| 2015-11-05 | Talk | Groundzerosummit |
Western Air Command
| B S Singh Deo | #network-defense#network-monitoring#network-pentesting+3 |
| 2015-11-05 | Talk | Groundzerosummit |
Wolves Among Sheep: Defeating Targeted Attacks With Deception
| Sahir Hidayatullah, Raviraj Doshi | #blueteam#incident-detection#honeypot+2 |
| 2015-10-08 | Talk | Brucon |
The .11 Veil, Camouflage & Covert!!! Invisible Wifi, Revealed
| Rushikesh D Nandedkar, Amrita C Iyer | #wifi#network-pentesting#security-testing+2 |
| 2015-08-09 | Talk | Defcon |
802.11 Monitoring with PCAP2XML/SQLite
| Vivek Ramachandran | #network-forensics#packet-analysis#network-monitoring+3 |
| 2015-08-08 | Talk | Defcon |
Chigula β a framework for Wi-Fi Intrusion Detection and Forensics
| Vivek Ramachandran | #wifi#intrusion-detection#forensics+1 |
| 2015-08-07 | Talk | Defcon |
Chellam β a Wi-Fi IDS/Firewall for Windows
| Vivek Ramachandran | #wifi#firewall#ids+4 |
| 2015-08-06 | Tool demo | Blackhat |
Chellam
| Vivek Ramachandran | #wifi#firewall#blueteam+1 |
| 2015-03-15 | Talk | Hitbsecconf |
Sniffing the Airwaves with RTLSDR
| Yashin Mehaboobe | #network-pentesting#packet-analysis#network-monitoring+2 |
| 2015-02-06 | Talk | Nullcon |
Drone Attacks: How I hijacked a drone
| Rahul Sasi | #red-teaming#drone#gps+2 |
| 2015-02-06 | Talk | Nullcon |
Hunting and Decrypting Ghost communications using Memory Forensics
| Monnappa K A | #forensics#blueteam#memory-forensics+2 |
| 2015-02-06 | Talk | Nullcon |
Building custom scans for real world enterprise network
| Sanoop Thomas | #security-assessment#network-pentesting#vulnerability-assessment+1 |
| 2014-11-13 | Talk | Groundzerosummit |
Network Time Protocol in Amplification Inferno
| Sriram Krishnan | #network-pentesting#network-vulnerability-assessment#network-architecture+2 |
| 2014-11-13 | Talk | Groundzerosummit |
Detecting Fake Cell Phone Towers
| Vijay Mukhi | #network-pentesting#network-forensics#network-traffic-analysis+1 |
| 2014-11-13 | Talk | Groundzerosummit |
Security vulnerabilities in DVB-C networks: Hacking Cable TV network
| Rahul Sasi | #red-teaming#dvb-c#network-pentesting |
| 2014-10-23 | Talk | Hacklu |
WiHawk - Router Vulnerability Scanner
| Anamika Singh | #wifi#red-teaming#csrf+1 |
| 2014-09-28 | Talk | Blackhat |
Understanding IMSI Privacy
| Swapnil Udar, Ravishankar Borgaonkar | #imsi#red-teaming#android+4 |
| 2014-08-22 | Talk | C0c0n |
Hacking Communication
| Akib Sayyed | #red-teaming#network-architecture#social-engineering+1 |
| 2014-08-22 | Talk | C0c0n |
Idle Machines doing Bounty Hunting (Behind your Back)
| Mrityunjay Gautam | #bug-hunting#red-teaming#automated-scanning+3 |
| 2014-08-22 | Talk | C0c0n |
Piracy Tracker
| Vargheese Babu | #blueteam#network-monitoring#security-analytics+3 |
| 2014-08-07 | Tool demo | Blackhat |
C-SCAD: Assessing Security flaws in clearscada Web_X client!
| Aditya K Sood | #red-teaming#security-assessment#ics-security+3 |
| 2014-08-06 | Tool demo | Blackhat |
Flowinspect: Yet another network inspection tool
| Ankur Tyagi | #security-assessment#network-monitoring#ids+2 |
| 2014-02-15 | Tool demo | Nullcon |
NoSQL Exploitation Framework
| Francis Alexander | #red-teaming#application-pentesting#security-tools+3 |
| 2014-02-14 | Talk | Nullcon |
User Privacy in Cellular Networks
| Ravishankar Borgaonkar | #data-protection#network-architecture#data-governance+2 |
| 2014-02-14 | Talk | Nullcon |
Wi-Hawk Password Auditing Tool
| Anamika Singh | #wifi#red-teaming#network-architecture |
| 2014-02-14 | Talk | Nullcon |
Multi-value W-Fi What the Heck is it
| Abhijeet Ghosh | #wifi#blueteam#network-defense+1 |
| 2014-02-14 | Talk | Nullcon |
2014 The year in which we cannot ignore SCADA
| Amol Sarwate | #scada#blueteam#ics-security+4 |
| 2014-02-14 | Talk | Nullcon |
Flowinspect - A Network Inspection Tool
| Ankur Tyagi | #security-assessment#malware-detection#network-monitoring+2 |
| 2014-02-14 | Talk | Nullcon |
Hacking YOu’r Cable TV Network.
| Rahul Sasi, Ahamed Nafeez | #red-teaming#network-pentesting#endpoint-protection+1 |
| 2014-02-14 | Talk | Nullcon |
Attacking WPA/WPA2 in the Cloud
| Vivek Ramachandran | #wifi#wpa2#red-teaming |
| 2014-02-14 | Talk | Nullcon |
In air they wander, we exist to blow their cover!!! {Approaches to Evil Twin Detection from a normal user’s perspective}
| Rushikesh D Nandedkar, Amrita C Iyer | #wifi#evil-twin-attack#phishing+1 |
| 2013-11-21 | Talk | Deepsec |
Europe In The Carna Botnet: Telnet’s Threat To The Largest Economy
| Parth Shukla | #botnet#telnet#network-architecture+3 |
| 2013-11-20 | Talk | Appsecusa |
Why is SCADA Security an Uphill Battle?
| Amol Sarwate | #scada#application-pentesting#application-hardening+4 |
| 2013-11-07 | Talk | Groundzerosummit |
The seven sins of Wi-Fi security
| Vivek Ramachandran | #wifi#network-architecture#phishing+1 |
| 2013-11-07 | Talk | Groundzerosummit |
Advanced security for advanced threats
| Kartik Shahani | #blueteam#security-strategy#threat-modeling+4 |
| 2013-09-27 | Talk | C0c0n |
Pwning WiFi Devices!
| Swaroop Yermalkar | #wifi#red-teaming#network-pentesting+2 |
| 2013-07-31 | Talk | Blackhat |
LTE booms with vulnerabilities
| Ankit Gupta | #lte#ddos#network-architecture+2 |
| 2013-03-01 | Talk | Nullcon |
BYOD: How will it shape your wireless network security in future?
| Kiran Deshpande | #wifi#dos#mac-spoofing+2 |
| 2013-03-01 | Talk | Nullcon |
Rest - A Real Stealth and Semi Stealth MITM Attack Tool for IPv4 Networks
| Naga Rohit Samineni | #ipv4#mitm#blueteam+2 |
| 2013-03-01 | Talk | Nullcon |
CSRF Finder as a Mozilla Addon
| Piyush Pattanayak | #csrf#blueteam#application-pentesting+4 |
| 2013-03-01 | Talk | Nullcon |
Sensitive Campus Security with Network
| Aravind Sitaraman | #blueteam#network-monitoring#security-strategy+4 |
| 2013-03-01 | Talk | Nullcon |
SMS to Meterpreter - Fuzzing USB Modems
| Rahul Sasi | #red-teaming#fuzzing#network-pentesting+2 |
| 2012-12-01 | Talk | Clubhack |
Real Time Event Recording System, the tool for Digital Forensics Investigation
| Madhav Limaye | #digital-forensics#endpoint-protection#endpoint-hardening+4 |
| 2012-09-29 | Talk | Nullcon |
Next-gen Forensics
| K K Mookhey | #forensics#digital-forensics#incident-management+2 |
| 2012-09-27 | Talk | Grrcon |
The Realm of Third Generation Botnet Attacks
| Aditya K Sood, Dr. Richard J Enbody | #red-teaming#botnet#dynamic-analysis+1 |
| 2012-09-26 | Talk | Nullcon |
Forensics Timeline Analysis
| Aashish Kunte | #forensics#blueteam#digital-forensics+3 |
| 2012-09-26 | Talk | Nullcon |
Highly Harmful Audio Waves aka DTMF Fuzzing
| Rahul Sasi | #dtmf#red-teaming#fuzzing+3 |
| 2012-08-03 | Talk | C0c0n |
Contemporary Transcription and Resource Parasitism
| Arpit Patel | #exploitation#firewall#network-monitoring+1 |
| 2012-08-03 | Talk | C0c0n |
Enterprise server security
| Raghav Shandilya | #blueteam#security-tools#network-monitoring+2 |
| 2012-03-16 | Talk | Blackhat |
IVR Security- Internal Network Attack via Phone Lines
| Rahul Sasi | #red-teaming#ivrs#network-pentesting+3 |
| 2011-12-14 | Talk | Blackhat |
SCADA Security - Why Is It So Hard?
| Amol Sarwate | #scada#ics-security#control-systems+1 |
| 2011-12-04 | Talk | Clubhack |
Exploit the Exploit Kits
| Dhruv Soi | #red-teaming#exploit-kit#malware-distribution+4 |
| 2011-12-04 | Talk | Clubhack |
Wi-Fi malware for Fun and Profit
| Vivek Ramachandran | #wifi#malware-distribution#exploit-delivery |
| 2011-10-07 | Talk | C0c0n |
Network Security- Modern Mechanism for Intrusion Detection and avoidance in a P2P Network
| Bala Kumar S, Mohamed Emraanullah | #blueteam#intrusion-detection#ids+3 |
| 2011-10-07 | Talk | C0c0n |
Exploiting the TCP Simultaneous Connection to Provide a Low Cost DoS Mitigation Solution
| Ahamed Nafeez | #red-teaming#network-pentesting#network-architecture |
| 2011-10-07 | Talk | C0c0n |
Digital Evidence
| Sushanth Samudrala | #forensics#digital-forensics#incident-management+2 |
| 2011-10-07 | Talk | C0c0n |
Wi-Fi Malware for Fun and Profit
| Vivek Ramachandran | #red-teaming#network-pentesting#malware-distribution+2 |
| 2011-09-19 | Talk | Brucon |
Wifi malware for fun and profit
| Vivek Ramachandran | #wifi#red-teaming#endpoint-protection+3 |
| 2011-09-07 | Talk | Securitybyte |
Enterprise Wi-Fi Worms, Backdoors and Botnets for Fun and Profit
| Vivek Ramachandran | #wifi#worm#botnet+1 |
| 2011-09-06 | Talk | Securitybyte |
Private Internet Circuits - Towards A Next Generation Internet
| Sanjay Deshpande | #network-architecture#encryption#network-defense |
| 2011-09-06 | Talk | Securitybyte |
Using Data Analytics for Incident Response
| Samir Saklikar | #incident-management#data-analytics#security-analytics+3 |
| 2011-08-03 | Talk | Blackhat |
Killing the Myth of Cisco IOS Diversity: Towards Reliable, Large-Scale Exploitation of Cisco IOS
| Jatin Kataria, Ang Cui, Salvatore Stolfo | #cisco-ios#hardware-embedded#firmware-analysis+4 |
| 2011-08-03 | Talk | Blackhat |
Femtocells: A poisonous needle in the operator’s hay stack
| Ravishankar Borgaonkar, Nico Golde, Kevin Redon | #network-pentesting#identity-theft#firmware-analysis |
| 2011-02-15 | Talk | Nullcon |
Botnet Detection approach by DNS behavior and clustering analysis
| Nilesh Sharma, Pulkit Mehndiratta | #botnet#dns#blueteam |
| 2010-12-04 | Talk | Clubhack |
Ultimate Pen Test β Compromising a highly secure environment
| Nikhil Mittal | #security-assessment#social-engineering#application-pentesting+4 |
| 2010-10-29 | Talk | T2 |
Hacking Femtocells
| Ravishankar Borgaonkar, Kevin Redon | #reverse-engineering#device-security#hardware-embedded+3 |
| 2010-08-01 | Talk | C0c0n |
VoIP Security
| Mukund Krishnamurthy | #purpleteam#voip#sip+4 |
| 2010-08-01 | Talk | C0c0n |
Wireless MITM
| Prashant Mahajan | #red-teaming#network-pentesting#security-tools |
| 2010-07-31 | Talk | Defcon |
WPA Too!
| Md Sohail Ahmad | #wifi#red-teaming#blueteam+1 |
| 2010-02-25 | Talk | Nullcon |
Malware Detection Tool for Websites: A Proof-Of-Concept
| Anant Kochhar | #blueteam#malware-detection#application-pentesting+3 |
| 2010-02-25 | Talk | Nullcon |
Botnet mitigation, monitoring and management.
| Harshad Patil | #botnet#blueteam#malware-detection+4 |
| 2010-02-25 | Talk | Nullcon |
Software Fuzzing with Wireplay.
| Abhisek Datta | #fuzzing#red-teaming#network-pentesting+3 |
| 2010-02-25 | Talk | Nullcon |
Imposter ke karnamey: The Browser Phishing Tool.
| Lavakumar Kuppan | #phishing#red-teaming#security-testing+1 |
| 2009-12-05 | Talk | Clubhack |
Lust 2.0 β Desire for free WiFi and the threat of the Imposter
| Lavakumar Kuppan | #wifi#red-teaming#phishing+1 |
| 2009-11-17 | Talk | Securitybyte |
Behind the scenes at the MSRC
| Suresh Venkateswaran, Dave Midturi | #incident-management#forensics#memory-forensics+1 |
| 2009-11-17 | Talk | Securitybyte |
Lust 2.0 β Desire for free WiFi and the threat of the Imposter
| Lavakumar Kuppan | #wifi#phishing#social-engineering |
| 2009-10-07 | Talk | Hitbsecconf |
How to Own the World β One Desktop at a Time
| Saumil Shah | #social-engineering#red-teaming#firewall |
| 2009-08-02 | Talk | Defcon |
Wi-Fish Finder: Who Will Bite the Bait
| Md Sohail Ahmad, Prabhash Dhyani | #wifi#honeypot#phishing+1 |
| 2009-05-19 | Talk | Syscan |
Securing Applications at Gateway with Web Application Firewalls
| Shreeraj Shah | #blueteam#footprinting#firewall+1 |
| 2009-04-22 | Talk | Hitbsecconf |
Application Defense Tactics & Strategies - WAF at the Gateway
| Shreeraj Shah | #blueteam#footprinting#firewall+1 |
| 2008-08-09 | Talk | Defcon |
Autoimmunity Disorder in Wireless LAN
| Jvr Murthy, Amit Vartak, Md Sohail Ahmad | #wifi#wireless-security#red-teaming |
| 2008-08-07 | Talk | Blackhat |
Got Citrix, Hack It!
| Shanit Gupta | #red-teaming#rdp#application-pentesting+1 |
| 2008-08-06 | Talk | Blackhat |
Bad Sushi: Beating Phishers at Their Own Game
| Nitesh Dhanjani | #phishing#blueteam#network-forensics+2 |
| 2007-12-09 | Talk | Clubhack |
Vulnerabilities in VoIP Products and Services
| Gaurav Saha | #voip#red-teaming#sip+3 |
| 2007-12-09 | Talk | Clubhack |
Legiment Techniques of IPS/IDS Evasion
| Ajit Hatti | #red-teaming#network-monitoring#ids+2 |
| 2007-08-04 | Talk | Defcon |
The Emperor Has No Cloak - WEP Cloaking Exposed
| Vivek Ramachandran | #wifi#red-teaming#aircrack |
| 2007-08-02 | Talk | Blackhat |
Smoke ’em Out!
| Rohyt Belani | #forensics#incident-management#digital-forensics+4 |
| 2007-08-01 | Talk | Blackhat |
PISA: Protocol Identification via Statistical Analysis
| Rohit Dhamankar, Rob King | #blueteam#network-defense#intrusion-detection |
| 2007-08-01 | Talk | Blackhat |
Vulnerabilities in Wi-Fi/Dual-Mode VoIP Phones
| Krishna Kurapati | #wifi#voip#red-teaming |
| 2007-04-18 | Talk | Cansecwest |
Low-Rate Denial-of-Service attacks
| Anil Kumar | #red-teaming#dos#network-defense+2 |
| 2006-09-21 | Talk | Hitbsecconf |
Smashing the Stack for Profit - Period
| Rohyt Belani | #red-teaming#application-pentesting#code-review+3 |
| 2006-08-05 | Talk | Defcon |
Zulu A Command Line Wireless Frame Generator
| Anmol Sheth, Damon Mccoy | #debugging#network-pentesting#linux+1 |
| 2005-09-29 | Talk | Hitbsecconf |
Trends in Real World Attacks: A Compilation of Case Studies
| Rohyt Belani | #red-teaming#application-pentesting#application-hardening+4 |
| 2005-07-27 | Talk | Blackhat |
iSCSI Security (Insecure SCSI)
| Himanshu Dwivedi | #red-teaming#iscsi#network-storage |
| 2004-04-21 | Talk | Cansecwest |
Cisco PSIRT TCP/BGP
| Sharad Ahlawat | #incident-management#forensics#network-forensics |
| 2003-12-16 | Talk | Blackhat |
HTTP Fingerprinting & Advanced Assessment Techniques
| Saumil Shah | #fingerprinting#blueteam#network-defense+3 |
| 2003-12-12 | Talk | Hitbsecconf |
Defending Web Applications: Strategies, methods and practices
| Shreeraj Shah | #blueteam#secure-coding#firewall+1 |
| 2003-12-12 | Talk | Hitbsecconf |
Threats to Wireless Networks - War Driving
| Anurana Saluja | #wifi#network-architecture#threat-modeling+1 |
| 2003-02-26 | Talk | Blackhat |
HTTP: Advanced Assessment Techniques
| Saumil Shah | #fingerprinting#blueteam#application-pentesting+4 |
| 2001-11-21 | Talk | Blackhat |
One-Way SQL Hacking : Futility of Firewalls in Web Hacking
| Saumil Shah | #firewall#red-teaming#sql-injection+2 |