| 2019-08-07 | Talk | Blackhat |
New Vulnerabilities in 5G Networks
| Ravishankar Borgaonkar, Altaf Shaik | 5gredteam4g+3 |
| 2019-06-02 | Tool demo | Defcon |
VoIPShark: Open Source VoIP Analysis Platform
| Nishant Sharma, Jeswin Mathai, Ashish Bhangale | voipopensourcenetwork+1 |
| 2019-03-28 | Tool demo | Blackhat |
VoIP Wireshark Attack-Defense Toolkit
| Nishant Sharma, Jeswin Mathai, Ashish Bhangale | voipwiresharknetwork-security+4 |
| 2019-02-28 | Talk | Nullcon |
Dirty use of USSD Codes
| Ravishankar Borgaonkar | ussdredteammobile |
| 2018-11-27 | Talk | Hitb Sec Conf |
COMMSEC: Taking Over Telecom Networks
| Hardik Mehta | networkarchitectureredteam+3 |
| 2018-08-30 | Talk | Hitb Sec Conf |
Exploiting Automation in LTE Mobile Networks
| Ravishankar Borgaonkar | mobilenework4g+3 |
| 2018-08-11 | Tool demo | Defcon |
PA Toolkit—Wireshark plugins for Pentesters
| Nishant Sharma, Jeswin Mathai | wiresharkpentestreconnaissance+6 |
| 2018-08-09 | Talk | Defcon |
4G—Who is paying your cellular phone bill?
| Isha Singh | 4gipxnetwork+3 |
| 2018-08-08 | Talk | Blackhat |
LTE Network Automation Under Threat
| Ravishankar Borgaonkar, Altaf Shaik | ltenetworkAutomation+4 |
| 2018-03-01 | Talk | Nullcon |
White-Stingray: Bypassing stingray detectors
| Altaf Shaik | imsimobilenetwork+5 |
| 2017-11-17 | Talk | Deepsec |
How Secure Are Your VoLTE And VoWiFi Calls?
| Sreepriya Chalakkal | voltenetworkvowifi+1 |
| 2017-10-19 | Talk | Hacklu |
Are your VoLTE and VoWiFi calls secure?
| Sreepriya Chalakkal | voltenetworkvowifi+1 |
| 2017-07-26 | Talk | Blackhat |
New Adventures in Spying 3G and 4G Users: Locate, Track & Monitor
| Ravishankar Borgaonkar, Altaf Shaik | networkredteamspying+5 |
| 2017-03-21 | Talk | Troopers |
New attacks in 4G technologies
| Ravishankar Borgaonkar | 4g |
| 2017-03-03 | Talk | Nullcon |
Case study of SS7/Sigtran assessment
| Akib Sayyed | ss7pentestblueteam+2 |
| 2016-08-19 | Talk | C0c0n |
How (in)secure are Indian GSM networks?
| Ajay Fuloria | networkgsm |
| 2016-03-11 | Talk | Nullcon |
Privacy leaks on 4G-LTE networks
| Altaf Shaik | redteam4glte+2 |
| 2015-11-13 | Talk | Blackhat |
LTE & IMSI Catcher Myths
| Ravishankar Borgaonkar, N Asokan, Altaf Shaik | networklteredteam+1 |
| 2015-10-30 | Talk | T2 |
LTE (in) Security
| Ravishankar Borgaonkar, Altaf Shaik | ltemobile |
| 2015-02-06 | Talk | Nullcon |
Attack and Defence in Radio and Communication Warfare
| Akib Sayyed | redteamblueteampurpleteam+3 |
| 2014-09-28 | Talk | Blackhat |
Understanding IMSI Privacy
| Swapnil Udar, Ravishankar Borgaonkar | imsimobilenetwork+1 |
| 2014-09-11 | Talk | 44 Con |
Darshak: how to turn your phone into a low cost IMSI catcher device
| Ravishankar Borgaonkar, Swapnil Udar | imsi |
| 2014-02-14 | Talk | Nullcon |
Hardware Attack Vectors
| Yashin Mehaboobe | hardwareredteamhid+3 |
| 2013-07-31 | Talk | Blackhat |
LTE booms with vulnerabilities
| Ankit Gupta | ltenetworkmobile |
| 2013-04-21 | Talk | Defcon |
LTE boom in vulnerabilities
| Ankit Gupta | lte |
| 2012-09-26 | Talk | Nullcon |
Highly Harmful Audio Waves aka DTMF Fuzzing
| Rahul Sasi | dtmfredteam |
| 2012-09-20 | Talk | Ekoparty |
Fuzzing DTMF Input Processing Algorithms
| Rahul Sasi | fuzzingredteamdtmf+2 |
| 2012-05-24 | Talk | Hitb Sec Conf |
CXML/VXML Auditing for IVR Pentesters and PCI/DSS Consultants
| Rahul Sasi | pentestivrnetwork+3 |
| 2012-03-16 | Talk | Blackhat |
IVR Security- Internal Network Attack via Phone Lines
| Rahul Sasi | networkredteamivrs |
| 2012-02-15 | Talk | Nullcon |
IVR Security: Internal Network attacks via phone lines
| Rahul Sasi | networkivrsredteam |
| 2011-10-13 | Talk | Hitb Sec Conf |
Femtocells: A Poisonous Needle in the Operator’s Hay Stack
| Ravishankar Borgaonkar | network3gredteam |
| 2010-08-01 | Talk | C0c0n |
VoIP Security
| Mukund Krishnamurthy | purpleteamvoip |
| 2008-02-20 | Talk | Blackhat |
Hacking VoIP through IPSec Tunnels
| Sachin Joglekar, Sudeep Patwardhan | voipnetworkredteam |
| 2007-12-09 | Talk | Clubhack |
Vulnerabilities in VoIP Products and Services
| Gaurav Saha | voipnetworkredteam |
| 2007-08-01 | Talk | Blackhat |
Vulnerabilities in Wi-Fi/Dual-Mode VoIP Phones
| Krishna Kurapati | wifinetworkvoip+2 |