πŸ§ͺ Experimental Feature

Focus Areas are an experimental feature that groups related content by tags. This page and its functionality may change as we refine the categorization system.

🌐 Network Security

Network infrastructure security and defense

175
Contributors
174
Talks
62
Tool Demos
3
Panels

Top Contributors

Vivek Ramachandran(19) Nishant Sharma(9) Jeswin Mathai(8) Ravishankar Borgaonkar(7) Rahul Sasi(6)

Related Tags (35)

Show all 35 tags...

All Entries (239 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-08-07TalkBlackhat Kernel-Enforced DNS Exfiltration Security: Framework Built for Cloud Environments to Stop Data Breaches via DNS at Scale Presentation Whitepaper Vedang Parasnis#dns#data-leak#kernel+1
2025-08-06TalkBlackhat The 5G Titanic Presentation Video Altaf Shaik#network-pentesting#network-architecture#architecture
2025-04-04Tool demoBlackhat SHIVA Spampot: Actionable Spam and Phishing Intelligence Source Code Rahul Binjve, Viren Kapadia#honeypot#network-monitoring#incident-management+1
2025-04-03Tool demoBlackhat Mantis - Asset Discovery at Scale Source Code Hitesh Thakur, Praveen Kanniah, Prateek Thakare#asset-inventory#cloud-workload-protection#security-tools+4
2025-03-02TalkNullcon Cyber Security from Telco lens Sanjeev Dhallam#network-architecture#network-hardening#network-monitoring+2
2025-03-02PanelNullcon Modernizing Security Architecture: Platforms or Best-of-Breed, What Works Best? Ketan Vyas, Prajal Kulkarni, Satyavathi Divadari, Srihari Kotni#security-strategy#threat-modeling#zero-trust+3
2025-03-02TalkNullcon Satellite Communications: Analyzing and Protecting Space-Based Assets Video Drishti Jain#network-pentesting#ics-security#encryption+4
2025-03-02PanelNullcon Cyber Fusion Center: The Command Center for Integrated Cyber Defense Avkash Kathiriya, Mathan Babu Kasilingam, Yogi Kapur#security-monitoring#network-defense#threat-modeling+3
2024-12-11Tool demoBlackhat findmytakeover - find dangling domains in a multi cloud environment Source Code Aniruddha Biyani#dns#cloud-pentesting#reconnaissance
2024-12-11Tool demoBlackhat Active Directory Cyber Deception using Huginn Source Code Rohan Durve, Paul Laine#active-directory#incident-management#network-forensics+1
2024-11-21TalkSecurityfest Wheels of Wonder Video Hrishikesh Somchatwar#automotive-cybersecurity#car-hacking#embedded-systems+4
2024-11-16TalkC0c0n Who is holding the Marauders map? Maya R Nair#network-pentesting#network-monitoring#network-traffic-analysis+1
2024-11-16TalkC0c0n Ride on the House - Exploiting Public Transport Ticketing Systems for Free Rides Rakesh Seal, Diptisha Samanta#exploitation#ethical-hacking#network-pentesting+1
2024-08-29Tool demoHitbsecconf eBPFShield Source Code Sagar Bhure#ids#incident-management#network-monitoring+1
2024-08-10TalkDefcon Compromising an Electronic Logging Device and Creating a Truck2Truck Worm Presentation Rik Chatterjee, Jake Jepson#eld#embedded-systems#ics-security+3
2024-08-09TalkDefcon Breaking Secure Web Gateways (SWG) for Fun and Profit Video Vivek Ramachandran, Jeswin Mathai#swg#cloud-access-security-broker#application-pentesting+4
2024-08-09TalkDefcon Breaking Secure Web Gateways (SWG) for Fun and Profit Video Vivek Ramachandran, Jeswin Mathai#ssl#application-pentesting#secure-coding+3
2024-08-08Tool demoBlackhat Active Directory Cyber Deception using Huginn Source Code Rohan Durve, Paul Laine#active-directory#incident-management#identity-governance+3
2024-08-07Tool demoBlackhat TrafficWardenX: OpenWRT Security & Monitoring Sampad Adhikary, Tripti Sharma#openwrt#network-monitoring#security-tools+3
2024-05-08TalkRsac How to CTF Infra - Beyond the Challenges and Flags Presentation Jayesh Chauhan, Max Gartman#ctf#cloud-workload-protection#security-strategy+2
2024-04-18Tool demoBlackhat findmytakeover - find dangling domains in a multi cloud environment Source Code Aniruddha Biyani#dns#cloud-workload-protection#cloud-pentesting+1
2024-03-11TalkNullcon Hacking Trains Presentation Jaden Furtado#hacking#ics-security#network-forensics+2
2023-12-06Tool demoBlackhat SSH into any device from anywhere with ZERO Open Network ports Source Code Anthony Prakash, Colin Constable#ssh#zero-trust#secure-development+1
2023-08-25Tool demoHitbsecconf eBPFShield Source Code Sagar Bhure#dns#machine-learning#security-tools+1
2023-08-10TalkDefcon Attacking Vehicle Fleet Management Systems Presentation Video Yashin Mehaboobe#automotive-cybersecurity#ics-security#embedded-systems+4
2023-08-07TalkC0c0n Darkweb Investigations Amit Dubey#threat-hunting#digital-forensics#incident-management+1
2023-08-07TalkC0c0n Enhancing Red Team OPSEC: Abusing Stealthy In-Memory Binary Execution Techniques in Linux Video Pranav Sivvam#red-teaming#linux#memory-forensics+2
2023-08-06TalkC0c0n Dark web for investigations Amit Lokhande#threat-hunting#digital-forensics#network-forensics+3
2023-08-06TalkC0c0n Expanding capability horizons : Homelabs and beyond Video Anant Shrivastava#security-assessment#network-pentesting#architecture
2023-05-12Tool demoBlackhat eBPFShield: Advanced IP-Intelligence & DNS Monitoring using eBPF Source Code Sagar Bhure#dns#machine-learning#network-monitoring+2
2023-05-11Tool demoBlackhat CANalyse 2.0 : A Vehicle Network Analysis and Attack Tool Source Code Kartheek Lade#automobile#car-hacking#iot-device-management+4
2022-12-07Tool demoBlackhat h0neytr4p - How to catch the external threat actors with an easy to configure Honeypot. Source Code Subhash Popuri#honeypot#ids#ips+3
2022-09-24TalkC0c0n Deep Learning to detect Network Attacks Varun Kohli#ids#network-monitoring#threat-detection+2
2022-09-24TalkC0c0n Towards an Effective Intrusion Detection System Framework for Multi-Channel Man-in-the-Middle attacks Against Protected Wi-Fi Networks Manesh Thankappan#ids#network-monitoring#network-pentesting+3
2022-09-24TalkC0c0n CANalyse: A Vehicle Network Analysis and Attack Tool Kartheek Lade#network-pentesting#network-traffic-analysis#can-bus+1
2022-08-10Tool demoBlackhat CANalyse (2.0): A vehicle network analysis and attack tool Source Code Kartheek Lade, Rahul Jeyasingh#automobile#car-hacking#iot-device-management+4
2022-08-10Tool demoBlackhat ParseAndC 2.0 – We Don’t Need No C Programs (for Parsing) Source Code Parbati Kumar Manna#reverse-engineering#dynamic-analysis#network-pentesting+4
2022-03-25TalkInsomnihack Attacking Bluetooth LE design and implementation in mobile + wearables ecosystems Video Nitin Lakshmanan, Sunil Kumar 1#bluetooth#hardware-embedded#iot-pentesting+4
2022-03-24TalkInsomnihack Practical exploitation of zigbee-class networks with USB-based RF transceivers & open source software Video Nitin Lakshmanan, Sunil Kumar 1#iot-pentesting#wireless-security#hardware-hacking+3
2021-11-19TalkHackfest Hacking with Physics Hrishikesh Somchatwar#ics-security#automotive-cybersecurity#embedded-systems+4
2021-11-13TalkC0c0n Zero Trust & Micro-segmentation Suresh Menon#segmentation#zero-trust#network-architecture+1
2021-11-13TalkC0c0n Emerging trends in cyber crimes : Investigation tools & techniques Triveni Singh#incident-management#digital-forensics#forensics+3
2021-11-13TalkC0c0n Light Basin - Telecom roaming network attack case study Video Akib Sayyed#network-pentesting#network-traffic-analysis#gtp+2
2021-11-11Tool demoBlackhat DejaVu ++ Source Code Bhadreshkumar Patel, Harish Ramadoss#blueteam#cloud-access-security-broker#cloud-compliance+4
2021-11-10Tool demoBlackhat RIoTPot: A Modular Hybrid-Interaction IoT/OT Honeypot Source Code Abhimanyu Rawat, Shreyas Srinivasa, Emmanouil Vasilomanolakis#blueteam#honeypot#network-defense+1
2021-11-10Tool demoBlackhat Wireshark Forensics Toolkit Source Code Rishikesh Bhide#forensics#network-forensics#data-protection
2021-08-04Tool demoBlackhat Attack Surface Framework Source Code Prajwal Panchmahalkar, Mauricio Espinosa#network-defense#application-pentesting#attack-surface+1
2021-05-07Tool demoBlackhat CANalyse: A Vehicle Network Analysis and Attack Tool Source Code Kartheek Lade#automobile#car-hacking#iot-device-management+4
2021-03-05TalkNullcon Telecom Security Challenges in 5G Video Akib Sayyed#5g#gsma#ddos
2020-12-09Tool demoBlackhat HosTaGe: mobile honeypots for rapid deployment Source Code Shreyas Srinivasa, Emmanouil Vasilomanolakis, Eirini Lygerou#honeypot#blueteam#endpoint-protection+2
2020-10-02Tool demoBlackhat OWASP Nettacker Source Code Sri Harsha Gajavalli, Ali Razmjoo Qalaei, Sam Stepanyan#security-assessment#vulnerability-assessment#network-pentesting+3
2020-10-01Tool demoBlackhat Wi-Fi Access Point Rootkits Nishant Sharma, Jeswin Mathai#wifi#blueteam#iot-pentesting+1
2020-09-18TalkC0c0n Offensive & Scope Based Recon Video Harsh Bothra#reconnaissance#network-architecture#security-strategy+1
2020-09-18TalkC0c0n All about IOT Forensics Hima Bindu Vejella#forensics#iot-device-management#iot-pentesting+4
2020-09-18TalkC0c0n COVID-19 Cyber impact on financial sector and remote employees Video Amit Dubey, Tal Catran, Yair Feldman#incident-management#risk-management#cybersecurity-strategy+4
2020-03-06Tool demoNullcon Omniscient Source Code Pramod Rana#reconnaissance#blueteam#network-monitoring+4
2020-03-06Tool demoNullcon PivotSuite Source Code Manish Gupta#red-teaming#security-assessment#network-architecture+2
2019-12-04Tool demoBlackhat RTTM: Real Time Threat Monitoring Tool Source Code Naveen Rudrappa, Murali Krishna Segu#blueteam#network-monitoring#security-analytics+2
2019-10-14TalkHitbsecconf ON THE WINGS OF TIME: DEMYSTIFYING WIRELESS ETHICAL HACKING AND DEFENSES Presentation Video Harshit Agrawal, Himanshu Mehta#wifi#red-teaming#blueteam+1
2019-10-10TalkBrucon Security transition from 4G to 5G: are we secure enough? Presentation Video Altaf Shaik, Ravishankar Borgaonkar#5g#4g#network-architecture+3
2019-09-27TalkC0c0n Advanced Persistent Threat and counter measures A a Gafoor#blueteam#apt#network-defense+4
2019-09-23TalkRootcon Hunting Threats with Wireshark Plugins Presentation Video Nishant Sharma, Jeswin Mathai, Shivam Bathla#blueteam#network-monitoring#security-analytics+2
2019-09-23TalkRootcon APAD: An EDR Grade Agent for Wi-Fi Access Points Presentation Video Vivek Ramachandran#wifi#edr#linux
2019-08-10Tool demoDefcon Local Sheriff Source Code Konark Modi#reconnaissance#blueteam#data-leak+3
2019-08-09Tool demoDefcon PivotSuite: Hack The Hidden Network - A Network Pivoting Toolkit Source Code Manish Gupta#red-teaming#security-assessment#network-pentesting
2019-08-08Tool demoDefcon Let’s Map Your Network Source Code Pramod Rana#reconnaissance#blueteam#network-monitoring+4
2019-08-08Tool demoBlackhat RWDD: Remote Web Deface Detection Tool Source Code Video K v Prashant, Ade Yoseman Putra#blueteam#application-pentesting#security-monitoring+1
2019-08-08TalkDefcon YOUR PHONE IS USING TOR AND LEAKING YOUR PII Presentation Milind Bhargava, Adam Podgorski#data-protection#security-assessment#tor+1
2019-08-08Tool demoDefcon PcapXray Source Code Srinivas Piskala Ganesh Babu#forensics#wireshark#blueteam
2019-08-07TalkBlackhat Defense Against Rapidly Morphing DDOS Presentation Video Mudit Tyagi, Mikhail Fedorov#ddos#blueteam#machine-learning
2019-08-07Tool demoBlackhat Medaudit: Auditing Medical Devices and Healthcare Infrastructure Source Code Anirudh Duggal#security-assessment#application-pentesting#network-architecture+1
2019-08-07Tool demoBlackhat PivotSuite: Hack The Hidden Network - A Network Pivoting Toolkit Source Code Manish Gupta#red-teaming#security-assessment#network-pentesting
2019-06-02Tool demoDefcon VoIPShark: Open Source VoIP Analysis Platform Presentation Source Code Video Nishant Sharma, Jeswin Mathai, Ashish Bhangale#voip#sip#network-pentesting+1
2019-05-21TalkPhdays Active defense using Honeypots v2 Presentation Rahul Binjve#blueteam#honeypot#network-defense+4
2019-05-10TalkHitbsecconf HAXPO: RF Exploitation: Demystifying IoT/OT Hacks with SDR Presentation Video Himanshu Mehta, Harshit Agrawal#rf#red-teaming#hardware-embedded+3
2019-05-09TalkHitbsecconf HAXPO: WiCy: Monitoring 802.11AC Networks at Scale Presentation Video Vivek Ramachandran#red-teaming#wifi#802.11ac
2019-03-29Tool demoBlackhat Halcyon IDE: Nmap Script Development IDE Source Code Sanoop Thomas#reconnaissance#red-teaming#nmap
2019-03-28Tool demoBlackhat OWASP Nettacker: Automated Penetration Testing Framework Source Code Sri Harsha Gajavalli, Ali Razmjoo Qalaei, Ehsan Nezami#network-pentesting#vulnerability-assessment#firewall+3
2019-03-28Tool demoBlackhat RTS: Real Time Scrapper Source Code Naveen Rudrappa#blueteam#application-pentesting#security-monitoring+4
2019-03-28Tool demoBlackhat VoIP Wireshark Attack-Defense Toolkit Source Code Nishant Sharma, Jeswin Mathai, Ashish Bhangale#voip#wireshark#network-defense+4
2019-02-28TalkNullcon A Hacker Walks into a Co-working Space Video Rahul Binjve#red-teaming#application-pentesting#network-architecture+2
2019-02-28TalkNullcon Dirty use of USSD Codes Ravishankar Borgaonkar#ussd#red-teaming#social-engineering+3
2018-11-29TalkDeepsec DNS Exfiltration and Out-of-Band Attacks Video Nitesh Shilpkar#dns#red-teaming#malware-detection
2018-11-02TalkHackfest Exploiting Connected Medical Devices: Lessons Learned & Data Earned Video Saurabh Harit#red-teaming#wearables#iot-device-management+4
2018-11-02TalkHitbsecconf Defending The Enterprise in 2018 Saumil Shah#blueteam#security-strategy#threat-modeling+3
2018-10-05TalkC0c0n DNS Exfiltration and Out of Band Attacks Nitesh Shilpkar#red-teaming#dns#network-pentesting
2018-10-05TalkC0c0n Defending Healthcare Base Jiggyasu Sharma#blueteam#incident-management#security-monitoring+4
2018-10-05TalkC0c0n Using Fault Injection for Forensics Yashin Mehaboobe#forensics#digital-forensics#security-testing+2
2018-09-27TalkRootcon Cyber Security Threats to Telecom Networks Presentation Video Hardik Mehta, Rosalia D’ Alessandro, Loay Abdelrazek#ss7#sip#gtp+2
2018-08-11Tool demoDefcon PA Toolkitβ€”Wireshark plugins for Pentesters Source Code Nishant Sharma, Jeswin Mathai#wireshark#security-assessment#reconnaissance+4
2018-08-11Tool demoDefcon DejaVUβ€”An Open Source Deception Framework Source Code Harish Ramadoss, Bhadreshkumar Patel#blueteam#network-defense#honeypot+4
2018-08-11TalkDefcon Compression Oracle Attacks on VPN Networks Presentation Ahamed Nafeez#vpn#network-architecture#application-pentesting+3
2018-08-11Tool demoDefcon Halcyon IDE Source Code Sanoop Thomas#reconnaissance#red-teaming#nmap+1
2018-08-09TalkDefcon 4Gβ€”Who is paying your cellular phone bill? Presentation Video Isha Singh, Dr Silke Holtmanns#4g#ipx#red-teaming+2
2018-08-08Tool demoBlackhat DejaVu: An Open Source Deception Framework Source Code Bhadreshkumar Patel, Harish Ramadoss#blueteam#network-defense#honeypot+4
2018-08-08Tool demoBlackhat DataSploit 2.0 Source Code Kunal Aggarwal, Shubham Mittal#osint#reconnaissance#data-governance+4
2018-08-08Tool demoBlackhat PA Toolkit: Wireshark Plugins for Pentesters Source Code Nishant Sharma, Jeswin Mathai#wireshark#security-assessment#network-architecture+2
2018-08-08Tool demoBlackhat Halcyon IDE: For Nmap Script Developers Source Code Sanoop Thomas#reconnaissance#red-teaming#nmap+1
2018-08-08TalkBlackhat Compression Oracle Attacks on VPN Networks Presentation Video Ahamed Nafeez#red-teaming#vpn#blueteam+1
2018-08-08Tool demoBlackhat ANWI (All New Wireless IDS): The $5 WIDS Source Code Rishikesh Bhide, Sanket Karpe#intrusion-detection#blueteam#wifi
2018-08-08Tool demoBlackhat DARWIN: Real World Use Cases for Covert Wireless Arun Mane, Rushikesh D Nandedkar#wifi#ieee802.15.4#embedded-systems
2018-03-03PanelNullcon Managing Cyber Risk in the Connected Environment Video Gaurav Shukla, Ramachandra Hegde, Sudarshan Rajagopal, Kabir Mulchandani#security-strategy#threat-modeling#network-monitoring+1
2018-03-01TalkNullcon DARWIN (A parasite covert wireless network) Video Rushikesh D Nandedkar#wifi#red-teaming#network-architecture+1
2018-03-01TalkNullcon Looting your bank savings using Digital India Presentation Video Indrajeet Bhuyan#red-teaming#application-pentesting#api-security+4
2018-03-01TalkNullcon Abusing and Attacking Content Sharing Solutions Presentation Pratap Chandra Allena#red-teaming#wifi#bluetooth+2
2017-12-06Tool demoBlackhat ANWI (All New Wireless IDS) - The Β£5 WIDS Source Code Sanket Karpe#intrusion-detection#blueteam#wifi
2017-11-17TalkDeepsec How Secure Are Your VoLTE And VoWiFi Calls? Video Sreepriya Chalakkal#volte#vowifi#sip+1
2017-10-19TalkHacklu Are your VoLTE and VoWiFi calls secure? Video Sreepriya Chalakkal#volte#vowifi#sip+2
2017-09-13Talk44con Red Team Revenge : Attacking Microsoft ATA Presentation Video Nikhil Mittal#windows#red-teaming#active-directory+4
2017-08-18TalkC0c0n Hunting Botnets with Analytics Shomiron Das Gupta#botnet#blueteam#security-analytics+2
2017-08-18TalkC0c0n 10 Things I Hate About Your Honeypots or How to Setup Honeypots That Work Rahul Binjve#honeypot#blueteam#network-monitoring+3
2017-08-18TalkC0c0n Are TOR Hidden Services really hidden? Demystifying HS Directory surveillance by injecting Decoys inside TOR! Presentation Abhinav Biswas#tor#network-monitoring#incident-detection+1
2017-08-18TalkC0c0n Cyber Security Threat Management – Model it, Collect Intelligence and Hunt them! Illyas Kooliyankal#blueteam#cyber-crime#intelligence-sharing+3
2017-08-18TalkC0c0n The Covert Cupid Under .11 Veil !!! /* Approach for Covert WIFI*/ Rushikesh D Nandedkar#wifi#network-pentesting#security-tools+1
2017-07-29Tool demoDefcon WIDY 2.0: WIFI 0WNAGE IN UNDER $5 RELOADED Vivek Ramachandran, Nishant Sharma, Ashish Bhangale#wifi#red-teaming#blueteam+1
2017-07-29Tool demoDefcon WiMonitor - an OpenWRT package for remote WiFi sniffing Vivek Ramachandran, Nishant Sharma, Ashish Bhangale#openwrt#red-teaming#sniffing+1
2017-07-27TalkDefcon Recon and bug bounties what a great love story Video Abhijeth Dugginapeddi#vulnerability-assessment#bug-bounty#network-pentesting+1
2017-06-24TalkLehack When encryption is not enough: Attacking Wearable - Mobile communication over BLE Presentation Video Sumanth Naropanth, Eliza Chelleng, Kavya Racharla#bluetooth#device-security#encryption+3
2017-06-23TalkHackinparis Injecting Security into Web apps with Runtime Patching and Context Learning Presentation Video Ajin Abraham#blueteam#secure-development#sqli+4
2017-05-23TalkPhdays Injecting security into web apps in the runtime Presentation Ajin Abraham#blueteam#secure-development#sqli+4
2017-04-14TalkHitbsecconf COMMSEC: IoT Hacking Simplified Presentation Source Code Video Aseem Jakhar#red-teaming#iot-pentesting#hardware-embedded+2
2017-03-30Tool demoBlackhat Datasploit - Automated Open Source Intelligence (OSINT) Tool Source Code Shubham Mittal#osint#reconnaissance#security-tools+3
2017-03-30Tool demoBlackhat DAMN VULNERABLE SS7 NETWORK Source Code Akib Sayyed#security-assessment#dos#ss7
2017-03-30Tool demoBlackhat WiDy: WiFi 0wnage in Under $5 Vivek Ramachandran, Nishant Sharma, Ashish Bhangale#wifi#red-teaming#blueteam+1
2017-03-03TalkNullcon Injecting Security into Web apps with Runtime Patching and Context Learning Presentation Video Ajin Abraham#blueteam#secure-development#sqli+4
2016-11-04TalkBlackhat Detach Me Not - DoS Attacks Against 4G Cellular Users Worldwide from your Desk Presentation Video Siddharth Rao, Bhanu Kotte, Dr. Silke Holtmanns#dos#red-teaming#ss7+4
2016-11-03TalkBlackhat WiFi-Based IMSI Catcher Presentation Video Ravishankar Borgaonkar, Piers O Hanlon#wifi#android#ios
2016-10-27TalkBrucon Decepticon The Rise and Evolution of an Intelligent Evil Twin…!!! Video Rushikesh D Nandedkar, Amrita C Iyer, Krishnakant Patil#reverse-engineering#evil-twin-attack#network-monitoring+3
2016-10-13TalkAppsecusa When encryption is not enough: Attacking Wearable - Mobile Application communication over BLE Video Sumanth Naropanth, Kavya Racharla, Chandra Prakash Gopalaiah#reverse-engineering#secure-development#ble+4
2016-10-05TalkVirusbulletin One-Click Fileless Infection Presentation Whitepaper Video Himanshu Anand, Chastine Menrige#reverse-engineering#incident-management#endpoint-protection+3
2016-09-23TalkRootcon Halcyon – A Faster Way to Build Custom Scripts for Nmap Scans Presentation Source Code Video Sanoop Thomas#secure-coding#reconnaissance#red-teaming+1
2016-08-19TalkC0c0n How (in)secure are Indian GSM networks? Ajay Fuloria#gsm#gtp#imsi+4
2016-08-06Tool demoDefcon Datasploit Source Code Shubham Mittal#osint#reconnaissance#data-leak+4
2016-08-04Tool demoBlackhat Maltese (Malware Traffic Emulating Software) Source Code Sasi Siddharth#dns#secure-coding#malware-detection+2
2016-08-03Tool demoBlackhat DataSploit Source Code Sudhanshu Chauhan, Shubham Mittal, Nutan Kumar Panda#security-assessment#threat-hunting#osint+1
2016-08-03Tool demoBlackhat Visual Network and File Forensics Using Rudra Source Code Ankur Tyagi#blueteam#forensics#network-forensics+2
2016-04-01Tool demoBlackhat Halcyon – A Faster Way to Build Custom Scripts for Nmap Scans Presentation Source Code Sanoop Thomas#reconnaissance#red-teaming#nmap
2016-03-11TalkNullcon Privacy leaks on 4G-LTE networks Presentation Altaf Shaik#red-teaming#4g#lte+1
2016-03-11TalkNullcon Real-time Ingestion of security telemetry data into Hadoop distributed system to respond to 0-day Presentation Pallav Jakhotiya, Vipul Sawant#secure-development#blueteam#data-analytics+3
2015-11-05TalkGroundzerosummit chellam – a Wi-Fi IDS/Firewall for Windows Vivek Ramachandran#wifi#firewall#ids+3
2015-11-05TalkGroundzerosummit Western Air Command B S Singh Deo#network-defense#network-monitoring#network-pentesting+3
2015-11-05TalkGroundzerosummit Wolves Among Sheep: Defeating Targeted Attacks With Deception Sahir Hidayatullah, Raviraj Doshi#blueteam#incident-detection#honeypot+2
2015-10-08TalkBrucon The .11 Veil, Camouflage & Covert!!! Invisible Wifi, Revealed Presentation Video Rushikesh D Nandedkar, Amrita C Iyer#wifi#network-pentesting#security-testing+2
2015-08-09TalkDefcon 802.11 Monitoring with PCAP2XML/SQLite Video Vivek Ramachandran#network-forensics#packet-analysis#network-monitoring+3
2015-08-08TalkDefcon Chigula β€” a framework for Wi-Fi Intrusion Detection and Forensics Video Vivek Ramachandran#wifi#intrusion-detection#forensics+1
2015-08-07TalkDefcon Chellam – a Wi-Fi IDS/Firewall for Windows Presentation Video Vivek Ramachandran#wifi#firewall#ids+4
2015-08-06Tool demoBlackhat Chellam Vivek Ramachandran#wifi#firewall#blueteam+1
2015-03-15TalkHitbsecconf Sniffing the Airwaves with RTLSDR Presentation Yashin Mehaboobe#network-pentesting#packet-analysis#network-monitoring+2
2015-02-06TalkNullcon Drone Attacks: How I hijacked a drone Presentation Video Rahul Sasi#red-teaming#drone#gps+2
2015-02-06TalkNullcon Hunting and Decrypting Ghost communications using Memory Forensics Presentation Monnappa K A#forensics#blueteam#memory-forensics+2
2015-02-06TalkNullcon Building custom scans for real world enterprise network Presentation Source Code Video Sanoop Thomas#security-assessment#network-pentesting#vulnerability-assessment+1
2014-11-13TalkGroundzerosummit Network Time Protocol in Amplification Inferno Sriram Krishnan#network-pentesting#network-vulnerability-assessment#network-architecture+2
2014-11-13TalkGroundzerosummit Detecting Fake Cell Phone Towers Vijay Mukhi#network-pentesting#network-forensics#network-traffic-analysis+1
2014-11-13TalkGroundzerosummit Security vulnerabilities in DVB-C networks: Hacking Cable TV network Rahul Sasi#red-teaming#dvb-c#network-pentesting
2014-10-23TalkHacklu WiHawk - Router Vulnerability Scanner Presentation Source Code Anamika Singh#wifi#red-teaming#csrf+1
2014-09-28TalkBlackhat Understanding IMSI Privacy Presentation Video Swapnil Udar, Ravishankar Borgaonkar#imsi#red-teaming#android+4
2014-08-22TalkC0c0n Hacking Communication Akib Sayyed#red-teaming#network-architecture#social-engineering+1
2014-08-22TalkC0c0n Idle Machines doing Bounty Hunting (Behind your Back) Mrityunjay Gautam#bug-hunting#red-teaming#automated-scanning+3
2014-08-22TalkC0c0n Piracy Tracker Vargheese Babu#blueteam#network-monitoring#security-analytics+3
2014-08-07Tool demoBlackhat C-SCAD: Assessing Security flaws in clearscada Web_X client! Presentation Source Code Aditya K Sood#red-teaming#security-assessment#ics-security+3
2014-08-06Tool demoBlackhat Flowinspect: Yet another network inspection tool Source Code Ankur Tyagi#security-assessment#network-monitoring#ids+2
2014-02-15Tool demoNullcon NoSQL Exploitation Framework Source Code Francis Alexander#red-teaming#application-pentesting#security-tools+3
2014-02-14TalkNullcon User Privacy in Cellular Networks Ravishankar Borgaonkar#data-protection#network-architecture#data-governance+2
2014-02-14TalkNullcon Wi-Hawk Password Auditing Tool Presentation Source Code Anamika Singh#wifi#red-teaming#network-architecture
2014-02-14TalkNullcon Multi-value W-Fi What the Heck is it Video Abhijeet Ghosh#wifi#blueteam#network-defense+1
2014-02-14TalkNullcon 2014 The year in which we cannot ignore SCADA Presentation Video Amol Sarwate#scada#blueteam#ics-security+4
2014-02-14TalkNullcon Flowinspect - A Network Inspection Tool Presentation Video Ankur Tyagi#security-assessment#malware-detection#network-monitoring+2
2014-02-14TalkNullcon Hacking YOu’r Cable TV Network. Video Rahul Sasi, Ahamed Nafeez#red-teaming#network-pentesting#endpoint-protection+1
2014-02-14TalkNullcon Attacking WPA/WPA2 in the Cloud Presentation Video Vivek Ramachandran#wifi#wpa2#red-teaming
2014-02-14TalkNullcon In air they wander, we exist to blow their cover!!! {Approaches to Evil Twin Detection from a normal user’s perspective} Presentation Video Rushikesh D Nandedkar, Amrita C Iyer#wifi#evil-twin-attack#phishing+1
2013-11-21TalkDeepsec Europe In The Carna Botnet: Telnet’s Threat To The Largest Economy Video Parth Shukla#botnet#telnet#network-architecture+3
2013-11-20TalkAppsecusa Why is SCADA Security an Uphill Battle? Video Amol Sarwate#scada#application-pentesting#application-hardening+4
2013-11-07TalkGroundzerosummit The seven sins of Wi-Fi security Vivek Ramachandran#wifi#network-architecture#phishing+1
2013-11-07TalkGroundzerosummit Advanced security for advanced threats Kartik Shahani#blueteam#security-strategy#threat-modeling+4
2013-09-27TalkC0c0n Pwning WiFi Devices! Swaroop Yermalkar#wifi#red-teaming#network-pentesting+2
2013-07-31TalkBlackhat LTE booms with vulnerabilities Whitepaper Ankit Gupta#lte#ddos#network-architecture+2
2013-03-01TalkNullcon BYOD: How will it shape your wireless network security in future? Video Kiran Deshpande#wifi#dos#mac-spoofing+2
2013-03-01TalkNullcon Rest - A Real Stealth and Semi Stealth MITM Attack Tool for IPv4 Networks Source Code Video Naga Rohit Samineni#ipv4#mitm#blueteam+2
2013-03-01TalkNullcon CSRF Finder as a Mozilla Addon Video Piyush Pattanayak#csrf#blueteam#application-pentesting+4
2013-03-01TalkNullcon Sensitive Campus Security with Network Video Aravind Sitaraman#blueteam#network-monitoring#security-strategy+4
2013-03-01TalkNullcon SMS to Meterpreter - Fuzzing USB Modems Video Rahul Sasi#red-teaming#fuzzing#network-pentesting+2
2012-12-01TalkClubhack Real Time Event Recording System, the tool for Digital Forensics Investigation Presentation Video Madhav Limaye#digital-forensics#endpoint-protection#endpoint-hardening+4
2012-09-29TalkNullcon Next-gen Forensics K K Mookhey#forensics#digital-forensics#incident-management+2
2012-09-27TalkGrrcon The Realm of Third Generation Botnet Attacks Video Aditya K Sood, Dr. Richard J Enbody#red-teaming#botnet#dynamic-analysis+1
2012-09-26TalkNullcon Forensics Timeline Analysis Video Aashish Kunte#forensics#blueteam#digital-forensics+3
2012-09-26TalkNullcon Highly Harmful Audio Waves aka DTMF Fuzzing Video Rahul Sasi#dtmf#red-teaming#fuzzing+3
2012-08-03TalkC0c0n Contemporary Transcription and Resource Parasitism Arpit Patel#exploitation#firewall#network-monitoring+1
2012-08-03TalkC0c0n Enterprise server security Raghav Shandilya#blueteam#security-tools#network-monitoring+2
2012-03-16TalkBlackhat IVR Security- Internal Network Attack via Phone Lines Presentation Source Code Video Rahul Sasi#red-teaming#ivrs#network-pentesting+3
2011-12-14TalkBlackhat SCADA Security - Why Is It So Hard? Presentation Whitepaper Source Code Amol Sarwate#scada#ics-security#control-systems+1
2011-12-04TalkClubhack Exploit the Exploit Kits Presentation Dhruv Soi#red-teaming#exploit-kit#malware-distribution+4
2011-12-04TalkClubhack Wi-Fi malware for Fun and Profit Vivek Ramachandran#wifi#malware-distribution#exploit-delivery
2011-10-07TalkC0c0n Network Security- Modern Mechanism for Intrusion Detection and avoidance in a P2P Network Bala Kumar S, Mohamed Emraanullah#blueteam#intrusion-detection#ids+3
2011-10-07TalkC0c0n Exploiting the TCP Simultaneous Connection to Provide a Low Cost DoS Mitigation Solution Presentation Ahamed Nafeez#red-teaming#network-pentesting#network-architecture
2011-10-07TalkC0c0n Digital Evidence Sushanth Samudrala#forensics#digital-forensics#incident-management+2
2011-10-07TalkC0c0n Wi-Fi Malware for Fun and Profit Vivek Ramachandran#red-teaming#network-pentesting#malware-distribution+2
2011-09-19TalkBrucon Wifi malware for fun and profit Presentation Vivek Ramachandran#wifi#red-teaming#endpoint-protection+3
2011-09-07TalkSecuritybyte Enterprise Wi-Fi Worms, Backdoors and Botnets for Fun and Profit Presentation Vivek Ramachandran#wifi#worm#botnet+1
2011-09-06TalkSecuritybyte Private Internet Circuits - Towards A Next Generation Internet Presentation Sanjay Deshpande#network-architecture#encryption#network-defense
2011-09-06TalkSecuritybyte Using Data Analytics for Incident Response Presentation Samir Saklikar#incident-management#data-analytics#security-analytics+3
2011-08-03TalkBlackhat Killing the Myth of Cisco IOS Diversity: Towards Reliable, Large-Scale Exploitation of Cisco IOS Presentation Whitepaper Video Jatin Kataria, Ang Cui, Salvatore Stolfo#cisco-ios#hardware-embedded#firmware-analysis+4
2011-08-03TalkBlackhat Femtocells: A poisonous needle in the operator’s hay stack Presentation Whitepaper Video Ravishankar Borgaonkar, Nico Golde, Kevin Redon#network-pentesting#identity-theft#firmware-analysis
2011-02-15TalkNullcon Botnet Detection approach by DNS behavior and clustering analysis Presentation Nilesh Sharma, Pulkit Mehndiratta#botnet#dns#blueteam
2010-12-04TalkClubhack Ultimate Pen Test – Compromising a highly secure environment Presentation Nikhil Mittal#security-assessment#social-engineering#application-pentesting+4
2010-10-29TalkT2 Hacking Femtocells Presentation Ravishankar Borgaonkar, Kevin Redon#reverse-engineering#device-security#hardware-embedded+3
2010-08-01TalkC0c0n VoIP Security Mukund Krishnamurthy#purpleteam#voip#sip+4
2010-08-01TalkC0c0n Wireless MITM Prashant Mahajan#red-teaming#network-pentesting#security-tools
2010-07-31TalkDefcon WPA Too! Presentation Whitepaper Video Md Sohail Ahmad#wifi#red-teaming#blueteam+1
2010-02-25TalkNullcon Malware Detection Tool for Websites: A Proof-Of-Concept Presentation Anant Kochhar#blueteam#malware-detection#application-pentesting+3
2010-02-25TalkNullcon Botnet mitigation, monitoring and management. Presentation Harshad Patil#botnet#blueteam#malware-detection+4
2010-02-25TalkNullcon Software Fuzzing with Wireplay. Presentation Whitepaper Source Code Abhisek Datta#fuzzing#red-teaming#network-pentesting+3
2010-02-25TalkNullcon Imposter ke karnamey: The Browser Phishing Tool. Lavakumar Kuppan#phishing#red-teaming#security-testing+1
2009-12-05TalkClubhack Lust 2.0 – Desire for free WiFi and the threat of the Imposter Presentation Lavakumar Kuppan#wifi#red-teaming#phishing+1
2009-11-17TalkSecuritybyte Behind the scenes at the MSRC Presentation Suresh Venkateswaran, Dave Midturi#incident-management#forensics#memory-forensics+1
2009-11-17TalkSecuritybyte Lust 2.0 – Desire for free WiFi and the threat of the Imposter Presentation Lavakumar Kuppan#wifi#phishing#social-engineering
2009-10-07TalkHitbsecconf How to Own the World – One Desktop at a Time Presentation Video Saumil Shah#social-engineering#red-teaming#firewall
2009-08-02TalkDefcon Wi-Fish Finder: Who Will Bite the Bait Presentation Video Md Sohail Ahmad, Prabhash Dhyani#wifi#honeypot#phishing+1
2009-05-19TalkSyscan Securing Applications at Gateway with Web Application Firewalls Shreeraj Shah#blueteam#footprinting#firewall+1
2009-04-22TalkHitbsecconf Application Defense Tactics & Strategies - WAF at the Gateway Presentation Shreeraj Shah#blueteam#footprinting#firewall+1
2008-08-09TalkDefcon Autoimmunity Disorder in Wireless LAN Presentation Video Jvr Murthy, Amit Vartak, Md Sohail Ahmad#wifi#wireless-security#red-teaming
2008-08-07TalkBlackhat Got Citrix, Hack It! Presentation Video Shanit Gupta#red-teaming#rdp#application-pentesting+1
2008-08-06TalkBlackhat Bad Sushi: Beating Phishers at Their Own Game Presentation Video Nitesh Dhanjani#phishing#blueteam#network-forensics+2
2007-12-09TalkClubhack Vulnerabilities in VoIP Products and Services Whitepaper Gaurav Saha#voip#red-teaming#sip+3
2007-12-09TalkClubhack Legiment Techniques of IPS/IDS Evasion Presentation Ajit Hatti#red-teaming#network-monitoring#ids+2
2007-08-04TalkDefcon The Emperor Has No Cloak - WEP Cloaking Exposed Presentation Whitepaper Video Vivek Ramachandran#wifi#red-teaming#aircrack
2007-08-02TalkBlackhat Smoke ’em Out! Presentation Whitepaper Rohyt Belani#forensics#incident-management#digital-forensics+4
2007-08-01TalkBlackhat PISA: Protocol Identification via Statistical Analysis Presentation Whitepaper Rohit Dhamankar, Rob King#blueteam#network-defense#intrusion-detection
2007-08-01TalkBlackhat Vulnerabilities in Wi-Fi/Dual-Mode VoIP Phones Whitepaper Video Krishna Kurapati#wifi#voip#red-teaming
2007-04-18TalkCansecwest Low-Rate Denial-of-Service attacks Anil Kumar#red-teaming#dos#network-defense+2
2006-09-21TalkHitbsecconf Smashing the Stack for Profit - Period Presentation Video Rohyt Belani#red-teaming#application-pentesting#code-review+3
2006-08-05TalkDefcon Zulu A Command Line Wireless Frame Generator Whitepaper Source Code Video Anmol Sheth, Damon Mccoy#debugging#network-pentesting#linux+1
2005-09-29TalkHitbsecconf Trends in Real World Attacks: A Compilation of Case Studies Video Rohyt Belani#red-teaming#application-pentesting#application-hardening+4
2005-07-27TalkBlackhat iSCSI Security (Insecure SCSI) Presentation Himanshu Dwivedi#red-teaming#iscsi#network-storage
2004-04-21TalkCansecwest Cisco PSIRT TCP/BGP Sharad Ahlawat#incident-management#forensics#network-forensics
2003-12-16TalkBlackhat HTTP Fingerprinting & Advanced Assessment Techniques Presentation Whitepaper Saumil Shah#fingerprinting#blueteam#network-defense+3
2003-12-12TalkHitbsecconf Defending Web Applications: Strategies, methods and practices Video Shreeraj Shah#blueteam#secure-coding#firewall+1
2003-12-12TalkHitbsecconf Threats to Wireless Networks - War Driving Video Anurana Saluja#wifi#network-architecture#threat-modeling+1
2003-02-26TalkBlackhat HTTP: Advanced Assessment Techniques Presentation Video Saumil Shah#fingerprinting#blueteam#application-pentesting+4
2001-11-21TalkBlackhat One-Way SQL Hacking : Futility of Firewalls in Web Hacking Presentation Video Saumil Shah#firewall#red-teaming#sql-injection+2