🧪 Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Attack Surface

Focus Area: ⚖️ Governance, Risk & Compliance
66
Total Entries
105
Contributors

Top Contributors

Dinesh O Bareja(3) Rahul Sasi(3) Ravishankar Borgaonkar(3) Saikat Datta(3) Abhijith B R(2)

All Entries (66 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-08-07Tool demoBlackhat Frogy 2.0 - Automated external attack surface analysis toolkit Source Code Chintan Gurjar#attack-surface#vulnerability-assessment#asset-management+2
2025-04-29TalkRsac It’s Always Risky in IT: Frontline Stories and Strategic Insights Whitepaper Video Gourav Nagar, Rohit Bansal#risk-management#security-compliance#cyber-resilience+4
2025-03-02PanelNullcon Unlocking India’s Cyber Potential through Strategic Policies, R&D Support, and Robust Public-Private Partnerships Atul Kumar, Savita Utreja#cybersecurity-framework#cybersecurity-strategy#cyber-law+3
2024-12-12PanelBlackhat Locknote: Conclusions and Key Takeaways from Black Hat Europe 2024 Vandana Verma Sehgal, Jeff Moss, Stefano Zanero, James Forshaw, Meadow Ellis#security-strategy#cybersecurity-framework#cyber-resilience+2
2024-11-16TalkC0c0n Breach of the borderless: Cyber threat actors targeting India’s cyberspace Abhijith B R#threat-hunting#cybersecurity-strategy#cyber-war+2
2024-04-18Tool demoBlackhat Catching adversaries on Azure - Deception on Cloud Source Code Subhash Popuri#azure#cloud-workload-protection#cloud-pentesting+4
2023-12-07Tool demoBlackhat Mantis - Asset Discovery at Scale Source Code Prateek Thakare, Bharath Kumar, Praveen Kanniah#red-teaming#asset-inventory#asset-management+2
2023-09-23PanelNullcon CRITICAL INFORMATION INFRASTRUCTURE(CII) PROTECTION: CHALLENGES AND OPPORTUNITIES- HOW CAN THE NULLCON COMMUNITY CONTRIBUTE Video Saikat Datta, M v Sheshadri, Madhavi Purandare, Mathan Babu Kasilingam, Navin Kumar Singh#critical-infrastructure#cybersecurity-framework#security-strategy+4
2023-08-06PanelC0c0n Power of Control: Navigating the PDP Act Video Prem Kamath, K Kamaneesh, Swapnil Bangali, Rahul Sharma, Dinesh O Bareja#cyber-law#compliance-frameworks#cybersecurity-strategy+3
2023-08-06TalkC0c0n Securing the Future: Addressing Cybersecurity Challenges in the Age of 5G Video Altaf Shaik#zero-trust#supply-chain-security#attack-surface+4
2022-09-24TalkC0c0n Rationalizing Cyber Security Risk in Risk Language Anish Koshy#risk-management#security-governance#cybersecurity-strategy+3
2022-09-23PanelC0c0n What ails the Indian cybersecurity startup ecosystem? Sunil Varkey, Ajit Hatti, Akash Mahajan, Aseem Jakhar, Shubham Mittal#cybersecurity-strategy#business-resilience#cyber-law+3
2022-09-06PanelNullcon Securing India The CERTIn Way Video Saikat Datta, Sanjay Bahl, Ajit Menon, Anuprita Daga#security-strategy#cybersecurity-framework#incident-management+3
2022-09-06PanelNullcon Unlocking Security Collaboration With Cyber Threat Intelligence Video Avkash Kathiriya, Varun Singla, Mathan Babu Kasilingam, Amol Naik#intelligence-sharing#attack-surface#cybersecurity-strategy+1
2021-08-07Tool demoDefcon Tenacity- An Adversary Emulation Tool for Persistence Video Atul Nair, Harshal Tupsamudre#incident-management#security-testing#attack-surface
2021-08-04Tool demoBlackhat Attack Surface Framework Source Code Prajwal Panchmahalkar, Mauricio Espinosa#network-defense#application-pentesting#attack-surface+1
2021-05-07PanelBlackhat Insights and Predictions: What’s Next in InfoSec Vandana Verma Sehgal, Neil R. Wyler, Lidia Giuliano, Jeff Wilson, Vitaly Kamluk#security-strategy#cybersecurity-training#cybersecurity-framework+2
2020-09-18TalkC0c0n Offensive & Scope Based Recon Video Harsh Bothra#reconnaissance#network-architecture#security-strategy+1
2020-09-18TalkC0c0n Supercharging your initial foothold in Red Team engagements Sachin S Kamath#red-teaming#ethical-hacking#exploit-delivery+3
2020-08-22TalkThedianainitiative Deploying discreet infrastructure for targeted phishing campaigns Video Sreehari Haridas#phishing#application-pentesting#social-engineering+3
2020-08-22TalkThedianainitiative Internal Red Team Operations Framework - Building your practical internal Red Team Video Abhijith B R#red-teaming#cyber-war#phishing+3
2020-03-07PanelNullcon Economics Of Data Breach And Attack Video Bhaskar Medhi, Manu Zacharia, Suchit Mishra, Yash Kadakia#data-loss-prevention#data-protection#cybersecurity-strategy+4
2019-09-28PanelC0c0n Align security and risk management strategies with enterprise objectives Video Abdul Karim Vettiyanickal, George Eapen, Ranjeet Rai, Amit Dubey, Biju K, Kanu Pathania#security-strategy#cybersecurity-framework#cyber-resilience+4
2019-09-28TalkC0c0n Vulnerability Prioritization with Threat Intelligence Muslim Koser, Devesh Vatsa, Rohit Srivastwa, Dinesh O Bareja#threat-intelligence-analysis#automated-scanning#security-assessment+3
2019-09-27TalkC0c0n Advanced Persistent Threat and counter measures A a Gafoor#blueteam#apt#network-defense+4
2019-08-08Tool demoDefcon Let’s Map Your Network Source Code Pramod Rana#reconnaissance#blueteam#network-monitoring+4
2019-03-02PanelNullcon CISO Strategy for OT and IoT risk and Threat Management Video Gaurav Shukla, Gomeet Pant, Rakesh Viswanathan, Sudarshan Rajagopal#ics-security#iot-pentesting#cybersecurity-strategy+3
2019-03-02PanelNullcon Navigating Risk in the Changing Business and Technology Landscape Video Rahul Neel Mani, Burgess Cooper, Manish Tiwari, Mannan Godil#risk-management#cybersecurity-strategy#business-resilience+4
2018-10-05TalkC0c0n Defending Healthcare Base Jiggyasu Sharma#blueteam#incident-management#security-monitoring+4
2018-10-04TalkBrucon Disrupting the Kill Chain Video Vineet Bhatia#incident-management#architecture#windows+3
2018-03-15TalkTroopers Defending Microsoft Environments at Scale Presentation Vineet Bhatia#blueteam#windows#azure+4
2018-03-03PanelNullcon IoT : How long till D Day? Video Aseem Jakhar, Shobha Jagathpal, Rishikesh Kamat, Daniel Cisowski, Michael Pyle#iot-device-management#iot-pentesting#embedded-systems+3
2018-03-02PanelNullcon The complexity of regulation & cybersecurity Video Saikat Datta, Maya R Nair, Nandkumar Saravade, Sanjay Bahl#cybersecurity-framework#cyber-law#compliance-governance+3
2017-08-18TalkC0c0n Bank on Compliance for Cyber Security Dinesh O Bareja#cyber-law#compliance-frameworks#financial-institutions+4
2017-07-26Tool demoBlackhat Datasploit - Automated Open Source Intelligence (OSINT) Tool Source Code Kunal Aggarwal, Shubham Mittal, Sudhanshu Chauhan#osint#reconnaissance#social-engineering+4
2017-03-21TalkTroopers New attacks in 4G technologies Ravishankar Borgaonkar#4g#attack-surface#threat-modeling+1
2016-09-14Talk44con 2016: The Infosec Crossroads Presentation Video Saumil Shah#blueteam#security-strategy#threat-modeling+4
2016-08-19TalkC0c0n Breaking into Gas stations! Suraj Pratap#red-teaming#ethical-hacking#exploit-delivery+2
2016-08-19TalkC0c0n Esoteric XSS Payloads Presentation Riyaz Walikar#xss#red-teaming#code-injection+3
2016-05-17TalkPhdays Fingerprinting and Attacking a Healthcare Infrastructure Presentation Anirudh Duggal#red-teaming#fingerprinting#ransomware+4
2015-11-05TalkGroundzerosummit Hacking RFIDs under 2000INR Jayesh Chauhan#rfid#red-teaming#hardware-embedded+4
2015-08-01TalkC0c0n Attack chaining for web exploitation- From Information leakage to gaining Root access Abhijeth Dugginapeddi#red-teaming#application-pentesting#attack-surface+2
2015-02-06PanelNullcon 2015: The Global Threat Defense Landscape - A discussion on the challenges faced by enterprises in engaging the bad guys Shomiron Das Gupta, K S Narayanan, Shantanu Ghosh, Subrahmanya Gupta Boda, Vishal Salvi, Benjamin Rivera#cyber-crime#incident-management#attack-surface+1
2014-11-13TalkGroundzerosummit Attacking Cryptography & PKI Implementations Ajit Hatti#encryption#red-teaming#ssl+4
2014-10-23TalkT2 Darshak: how to turn your phone into a low cost IMSI catcher device Video Ravishankar Borgaonkar, Swapnil Udar#android#endpoint-protection#android-security+2
2014-08-22TalkC0c0n APT: Case Study of attackers targeting public tendering Rahul Sasi#red-teaming#apt#attack-surface+4
2014-02-14TalkNullcon User Privacy in Cellular Networks Ravishankar Borgaonkar#data-protection#network-architecture#data-governance+2
2013-11-07TalkGroundzerosummit Central Monitoring System and IT Act 2000 – Balance between rights of citizens and state Vaishali Bhagwat#cyber-law#cybersecurity-strategy#cyber-resilience+2
2013-11-07TalkGroundzerosummit Understanding the anatomy of advanced targeted attacks – The Trend Micro approach Tarun Gupta#forensics#malware-research#attack-surface
2013-09-27TalkC0c0n Risk and challenges in virtual currencies. Harsh Patel, Swatantra Kumar Gupta#digital-currency#cryptocurrency#decentralized-systems+4
2013-07-31TalkBlackhat LTE booms with vulnerabilities Whitepaper Ankit Gupta#lte#ddos#network-architecture+2
2013-03-15TalkBlackhat Vulnerability analysis of 2013 SCADA issues Presentation Video Amol Sarwate#scada#ics-security#attack-surface+2
2012-09-26TalkNullcon Highly Harmful Audio Waves aka DTMF Fuzzing Video Rahul Sasi#dtmf#red-teaming#fuzzing+3
2012-03-16TalkBlackhat IVR Security- Internal Network Attack via Phone Lines Presentation Source Code Video Rahul Sasi#red-teaming#ivrs#network-pentesting+3
2012-02-15TalkNullcon Shall we dust Beep? The Geo-strategic realities of Cyberwar Presentation Pukhraj Singh#cyber-war#security-strategy#attack-surface
2011-02-25TalkNullcon Chupa Rustam Presentation Abhijeet Hatekar#surveillance#red-teaming#application-pentesting+2
2011-02-25TalkNullcon Cyber Crime 101 - Cost of cybercrime, trends & analysis Presentation Simran Gambhir, Cn Shashidhar#cyber-crime#financial-institutions#attack-surface+2
2011-02-25TalkNullcon Security Analysis of India’s Electronic Voting Machines: Memoirs of a whistleblower Presentation Video Hari Krishna Prasad Vemuru#evm#red-teaming#hardware-embedded+3
2010-08-01TalkC0c0n Overview of Cyber Legal Systems in India Sagar Rahurkar#cyber-law#cyber-resilience#cybersecurity-strategy+4
2010-04-21TalkHitbsecconf Web Security – Going Nowhere? Presentation Saumil Shah#red-teaming#application-hardening#application-pentesting+4
2010-03-15TalkBlackhat 400 Apps in 40 Days Presentation Video Nish Bhalla, Sahba Kazerooni#risk-management#application-pentesting#attack-surface+1
2009-12-05TalkClubhack Risk Based Penetration Testing Presentation Nikhil Wagholikar, K K Mookhey#security-assessment#incident-management#cybersecurity-strategy+1
2009-11-17TalkSecuritybyte Threat Modeling Presentation Varun Sharma#threat-modeling#blueteam#security-strategy+4
2009-08-06TalkC0c0n Cyber Forensics Krishna Sastry Pendyal#forensics#digital-forensics#data-leak+4
2008-12-06TalkClubhack State of Cyber Law in India Presentation Rohas Nagpal#cyber-law#cyber-resilience#cybersecurity-framework+4
2008-02-20TalkBlackhat Hacking VoIP through IPSec Tunnels Whitepaper Sachin Joglekar, Sudeep Patwardhan#voip#red-teaming#gsm+2