🧪 Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Blueteam

Focus Area: 🛡️ Security Operations & Defense
298
Total Entries
237
Contributors

Top Contributors

Saumil Shah(14) Shreeraj Shah(11) Jayesh Chauhan(10) Ajin Abraham(9) Ankur Tyagi(9)

All Entries (298 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-03-02TalkNullcon Securing the chains: Building defensive layers for software supply chains Video Yadhu Krishna M, Akhil Mahendra, Hritik Vijay#blueteam#container-security#sbom+3
2024-12-11TalkBlackhat The CVSS Deception: How We’ve Been Misled on Vulnerability Severity Presentation Ankur Sand#blueteam#security-strategy#threat-modeling+1
2024-10-23Tool demoBlackhat eBPFShield: Unleashing the Power of eBPF for OS Kernel Exploitation and Security Source Code Sagar Bhure#blueteam#machine-learning#endpoint-protection+2
2024-10-23TalkBlackhat Guardians of the OAuth Galaxy: Defending Your Organization from OAuth Application Attacks Presentation Video Shruti Ranjit, Mangatas Tondang#blueteam#oauth#application-pentesting+4
2024-05-27TalkConfidence Beyond the Kernel: eBPF’s Trailblazing Role in Reinventing Cloud Security Dynamics Video Rohit Sehgal#cloud-monitoring#ebpf#linux+4
2024-04-18Tool demoBlackhat eBPFShield: Unleashing the Power of eBPF for OS Kernel Exploitation and Security Source Code Sagar Bhure#blueteam#machine-learning#security-analytics+3
2024-04-18Tool demoBlackhat Secure Local Vault - Git Based Secret Manager Source Code Sriram Krishnan, Shibly Meeran#blueteam#application-hardening#secure-coding+2
2023-09-24PanelNullcon INTELLIGENCE-LED DEFENSE: LEVERAGING THREAT INTELLIGENCE IN THE AGE OF AI Avkash Kathiriya, Mathan Babu Kasilingam, Sanjay Bahl, Krishna Pandey, Travis Carelock#threat-hunting#ai-security#blueteam
2023-09-23TalkNullcon Secure Your Angular App Using JWT And GraphQL Presentation Ankit Sharma#blueteam#api-security#secure-development+1
2023-09-23TalkNullcon The Curious Case Of The Rogue SOAR Presentation Video Mukesh Sai Kumar, Jaden Furtado#blueteam#application-pentesting#dynamic-analysis+3
2023-06-05TalkConfidence Evading modern day security defenses in corporate environments Himanshu Sharma, Rahul Vashista#red-teaming#evasion#bypassing+4
2022-09-08TalkNullcon Handling A Bug Bounty program From A Blue Team Perspective Presentation Video Ashwath Kumar, Ankit Anurag#blueteam#cloud-monitoring#cloud-pentesting+4
2021-11-11Tool demoBlackhat DejaVu ++ Source Code Bhadreshkumar Patel, Harish Ramadoss#blueteam#cloud-access-security-broker#cloud-compliance+4
2021-11-10Tool demoBlackhat RIoTPot: A Modular Hybrid-Interaction IoT/OT Honeypot Source Code Abhimanyu Rawat, Shreyas Srinivasa, Emmanouil Vasilomanolakis#blueteam#honeypot#network-defense+1
2021-05-06Tool demoBlackhat Demystifying the State of Kubernetes Cluster Security - The Cloud Native Way Source Code Vasant Kumar, Rupali Dash#kubernetes#audit#secure-coding+1
2021-05-06Tool demoBlackhat FalconEye: Windows Process Injection Techniques - Catch Them All Presentation Source Code Rajiv Kulkarni, Sushant Paithane#windows#process-injection#blueteam+1
2021-05-06TalkBlackhat Threat Hunting in Active Directory Environment Presentation Anurag Khanna, Thirumalai Natarajan Muthiah#blueteam#red-teaming#purpleteam
2020-12-09Tool demoBlackhat ArcherySec 2.0 - Open Source Vulnerability Assessment and Management Presentation Source Code Anand Tiwari#blueteam#security-assessment#ci-cd
2020-12-09Tool demoBlackhat HosTaGe: mobile honeypots for rapid deployment Source Code Shreyas Srinivasa, Emmanouil Vasilomanolakis, Eirini Lygerou#honeypot#blueteam#endpoint-protection+2
2020-12-09Tool demoBlackhat Strafer: A Tool to Detect Infections in Elasticsearch Instances Presentation Source Code Rohit Bansal, Aditya K Sood#blueteam#security-assessment#threat-intelligence-analysis
2020-11-21TalkAppsecindonesia Threat Defense: Defending the ATT&CK with TTP’s Avkash Kathiriya#blueteam#threat-hunting#security-analytics
2020-10-07TalkRootcon Blockchain Based OT Monitoring Solution (BBOTMS) Presentation Video Asif Hameed Khan, Gagan Jattana#ics#blueteam#decentralized-systems+4
2020-10-02Tool demoBlackhat MalViz.ai Source Code Vasu Sethia, Shivam Kataria#blueteam#machine-learning#deep-learning+3
2020-10-02Tool demoBlackhat Phishing Simulation Assessment Source Code Jyoti Raval#phishing#blueteam#social-engineering+3
2020-10-01Tool demoBlackhat Wi-Fi Access Point Rootkits Nishant Sharma, Jeswin Mathai#wifi#blueteam#iot-pentesting+1
2020-09-18TalkC0c0n Deep Learning for Intrusion Attempt Detection Varun Kohli#deep-learning#machine-learning#blueteam
2020-08-05TalkBlackhat Uncommon Sense: Detecting Exploits with Novel Hardware Performance Counters and ML Magic Presentation Video Harini Kannan, Nick Gregory#machine-learning#exploit-detection#blueteam
2020-08-05Tool demoBlackhat vPrioritizer: Learn to say NO to almost every vulnerability (art of risk prioritisation…) Source Code Pramod Rana#risk-analysis#blueteam#security-strategy+4
2020-07-05Tool demoBlackhat Mobile Security Framework - MobSF Source Code Ajin Abraham#blueteam#ios#android+1
2020-04-25TalkHitbsecconf THE STATE OF ICS SECURITY: THEN AND NOW Praveen Soni, Shivbihari Pandey, Ashish Kumar Gahlot#vulnerability-assessment#security-assessment#blueteam
2020-04-24TalkHitbsecconf COMMSEC: The State of ICS Security : Then and Now Praveen Soni, Shivbihari Pandey, Ashish Kumar Gahlot#scada#blueteam#security-assessment
2020-03-06Tool demoNullcon F.R.I.D.A.Y Source Code Shyam Sundar Ramaswami#blueteam#dynamic-analysis#sandbox+2
2020-03-06Tool demoNullcon Hachi Source Code Parmanand Mishra#att&ck#blueteam#rest-api+1
2020-03-06TalkNullcon InfoSec Deep Learning in Action Presentation Video Satnam Singh#ml#deep-learning#blueteam
2020-03-06Tool demoNullcon Omniscient Source Code Pramod Rana#reconnaissance#blueteam#network-monitoring+4
2020-03-06Tool demoNullcon Phishing Simulation Source Code Jyoti Raval#phishing#blueteam#security-training+2
2020-03-06Tool demoNullcon Providence Source Code Swapnil Kumbhar, Akshay Shah#incident-management#linux#macos+2
2020-03-06Tool demoNullcon Wolverine Source Code Furqan Khan, Siddharth Anbalahan#linux#secure-coding#web-security+3
2019-12-04TalkBlackhat Bring Your Own Token (BYOT) to Replace the Traditional Smartcards for Strong Authentication and Signing Presentation Whitepaper Video Karthik Ramasamy, Eric Hampshire#blueteam#smartcard#mfa+4
2019-12-04Tool demoBlackhat Cloud Security Suite: One Stop Tool for AWS/GCP/Azure/DigitalOcean Security Audit Source Code Jayesh Chauhan#aws#gcp#blueteam
2019-12-04TalkBlackhat ClusterFuzz: Fuzzing at Google Scale Presentation Source Code Video Abhishek Arya, Oliver Chang#fuzzing#red-teaming#blueteam+1
2019-12-04Tool demoBlackhat RTTM: Real Time Threat Monitoring Tool Source Code Naveen Rudrappa, Murali Krishna Segu#blueteam#network-monitoring#security-analytics+2
2019-11-01TalkAppsecdayaustralia A Purple Team View of Serverless and GraphQL Applications Abhay Bhargav#red-teaming#blueteam#purpleteam+1
2019-11-01TalkAppsecdayaustralia Protecting the Damned: Deploying Insecure Applications at Scale Video Vivek Ramachandran#blueteam#container-security#docker+3
2019-10-14TalkHitbsecconf CALL OF DUTY: MODERN BROWSER WARFARE Presentation Video Dhiraj Mishra#blueteam#red-teaming#purpleteam
2019-10-14TalkHitbsecconf ON THE WINGS OF TIME: DEMYSTIFYING WIRELESS ETHICAL HACKING AND DEFENSES Presentation Video Harshit Agrawal, Himanshu Mehta#wifi#red-teaming#blueteam+1
2019-09-27TalkC0c0n Advanced Persistent Threat and counter measures A a Gafoor#blueteam#apt#network-defense+4
2019-09-27TalkC0c0n Block Chain for Secured Automation Sanat Bhat#blueteam#smart-contracts#decentralised-security+1
2019-09-27TalkC0c0n Building a cloud security monitoring and auditing framework Nirali Shah, Prasoon Dwivedi#blueteam#cloud-monitoring#cloud-pentesting+4
2019-09-27TalkC0c0n Defense in Depth for Embedded Systems Presentation Jiggyasu Sharma#embedded-systems#blueteam#hardware-embedded+4
2019-09-27TalkC0c0n Demystifying HealthCare Security Ajay Pratap Singh#blueteam#data-protection#identity-theft+4
2019-09-27TalkC0c0n Doing SecOps for the Cloud using Cloud Native Services Akash Mahajan#blueteam#cloud-workload-protection#container-security+3
2019-09-27TalkC0c0n Securing Payment Data with PCI Security Standards and Programs Nitin Bhatnagar#blueteam#data-protection#secure-development+3
2019-09-23TalkRootcon Hunting Threats with Wireshark Plugins Presentation Video Nishant Sharma, Jeswin Mathai, Shivam Bathla#blueteam#network-monitoring#security-analytics+2
2019-09-23TalkRootcon Making Anomaly Detection system(ADS) for Vehicles (Automotive Hacking) Presentation Video Arun Mane, Nikhil Bogam#red-teaming#car-hacking#blueteam+1
2019-09-13Talk44con The CISO’s Dilemma Presentation Video Saumil Shah#blueteam#security-strategy#threat-modeling+4
2019-08-30TalkHitbsecconf COMMSEC: PErfidious: Make PE Backdooring Great Again! Presentation Video Shreyans Doshi#secure-coding#red-teaming#blueteam+1
2019-08-29KeynoteHitbsecconf The CISO’s Dilemma Presentation Video Saumil Shah#blueteam#compliance-governance#security-strategy+4
2019-08-29TalkHitbsecconf Understanding, Attacking & Securing Medical Devices Presentation Video Ajay Pratap Singh#red-teaming#blueteam#purpleteam
2019-08-10Tool demoDefcon Local Sheriff Source Code Konark Modi#reconnaissance#blueteam#data-leak+3
2019-08-09Tool demoDefcon EXPLIoT - IoT Security Testing and Exploitation Framework Source Code Aseem Jakhar, Murtuja Bharmal#security-assessment#red-teaming#blueteam+1
2019-08-08Tool demoBlackhat Cloud Security Suite: One-Stop Tool for AWS/GCP/Azure Security Audit Source Code Jayesh Chauhan#aws#gcp#blueteam
2019-08-08Tool demoBlackhat CSF: Container Security Framework Source Code Vaibhav Gupta#blueteam#container-security#docker+2
2019-08-08TalkBlackhat Death to the IOC: What’s Next in Threat Intelligence Presentation Video Bhavna Soman#threat-intelligence-analysis#machine-learning#blueteam
2019-08-08Tool demoBlackhat EXPLIoT: IoT Security Testing and Exploitation Framework Source Code Aseem Jakhar, Murtuja Bharmal#security-assessment#red-teaming#blueteam+1
2019-08-08Tool demoDefcon Hachi: An Intelligent threat mapper Source Code Parmanand Mishra#att&ck#blueteam#rest-api+1
2019-08-08Tool demoDefcon Let’s Map Your Network Source Code Pramod Rana#reconnaissance#blueteam#network-monitoring+4
2019-08-08Tool demoDefcon PcapXray Source Code Srinivas Piskala Ganesh Babu#forensics#wireshark#blueteam
2019-08-08Tool demoBlackhat RWDD: Remote Web Deface Detection Tool Source Code Video K v Prashant, Ade Yoseman Putra#blueteam#application-pentesting#security-monitoring+1
2019-08-07TalkBlackhat Defense Against Rapidly Morphing DDOS Presentation Video Mudit Tyagi, Mikhail Fedorov#ddos#blueteam#machine-learning
2019-08-07Tool demoBlackhat RedHunt-OS v2: Virtual Machine for Adversary Emulation and Threat Hunting Source Code Sudhanshu Chauhan, Kunal Aggarwal#virtual-machine#blueteam#forensics+2
2019-05-21TalkPhdays Active defense using Honeypots v2 Presentation Rahul Binjve#blueteam#honeypot#network-defense+4
2019-03-28Tool demoBlackhat Archery - Open Source Vulnerability Assessment and Management- 2.0 Source Code Anand Tiwari#security-assessment#blueteam#ci-cd
2019-03-28Tool demoBlackhat Cloud Security Suite: One-Stop Tool for AWS/GCP/Azure Security Audit Source Code Jayesh Chauhan#aws#azure#gcp+1
2019-03-28TalkBlackhat Investigating Malware Using Memory Forensics - A Practical Approach Presentation Video Monnappa K A#forensics#blueteam#malware-detection+1
2019-03-28Tool demoBlackhat Kurukshetra: Playground for Interactive Security Learning Source Code Anirudh Anand, Mohan Kallepalli, Ankur Bhargava#secure-coding#blueteam#application-pentesting+4
2019-03-28Tool demoBlackhat MLsploit: A Cloud-Based Framework for Adversarial Machine Learning Research Source Code Nilaksh Das, Evan Yang, Li Chen#machine-learning#blueteam#ai-security+4
2019-03-28Tool demoBlackhat RTS: Real Time Scrapper Source Code Naveen Rudrappa#blueteam#application-pentesting#security-monitoring+4
2019-03-28Tool demoBlackhat VoIP Wireshark Attack-Defense Toolkit Source Code Nishant Sharma, Jeswin Mathai, Ashish Bhangale#voip#wireshark#network-defense+4
2019-02-28TalkNullcon Attacking & Securing HealthCare Standards & hospital secured systems Video Ajay Pratap Singh#red-teaming#blueteam#purpleteam
2019-02-28TalkNullcon Building Hardened IoT Implementations with LangSec Video Prashant Anantharaman#blueteam#secure-development#input-validation+4
2018-12-06TalkBlackhat AI Gone Rogue: Exterminating Deep Fakes Before They Cause Menace Presentation Whitepaper Video Vijay Thaware, Niranjan Agnihotri#ai#blueteam#deepfake
2018-12-06Tool demoBlackhat Cloud Security Suite: One Stop Tool forAWS/GCP/Azure Security Audit Source Code Jayesh Chauhan#aws#gcp#blueteam
2018-12-05Tool demoBlackhat Kurukshetra: Playground for Interactive Security Learning Source Code Anirudh Anand, Mohan Kallepalli#secure-coding#blueteam#application-hardening+4
2018-11-27TalkHitbsecconf COMMSEC: Enhancing Deep Learning DGA Detection Models Using Separate Character Embedding Presentation Video Vikash Yadav#deep-learning#blueteam#ai-security+3
2018-11-02TalkHitbsecconf Defending The Enterprise in 2018 Saumil Shah#blueteam#security-strategy#threat-modeling+3
2018-10-19TalkAppsecdayaustralia Continuous Integration and Delivery with Docker Containers Video Vasant Kumar#docker#blueteam#container-security+4
2018-10-05TalkC0c0n Defending cloud Infrastructures with Cloud Security Suite Source Code Jayesh Chauhan, Shivankar Madaan#aws#gcp#azure+1
2018-10-05TalkC0c0n Defending Healthcare Base Jiggyasu Sharma#blueteam#incident-management#security-monitoring+4
2018-10-05TalkC0c0n How can we use machine learning to prevent Frauds and password breaches Tamaghna Basu#machine-learning#blueteam#ai-security+4
2018-10-05TalkC0c0n Predictive policing using Big Data analytics. Tarun Wig#blueteam#data-analytics#data-protection+3
2018-10-05TalkC0c0n Privacy And Data Protection: Stakeholders’ Perspectives Rahul Sharma#blueteam#data-protection#gdpr+4
2018-09-27TalkRootcon Defending cloud Infrastructures with Cloud Security Suite Presentation Source Code Video Shivankar Madaan#aws#secure-coding#web-security+2
2018-09-06TalkGrrcon Analyzing Multi-Dimensional Malware Dataset Video Ankur Tyagi#blueteam#machine-learning#dynamic-analysis+1
2018-09-06TalkGrrcon Angad: A Malware Detection Framework using Multi-Dimensional Visualization Presentation Whitepaper Source Code Video Ankur Tyagi#blueteam#security-assessment#forensics
2018-08-12Tool demoDefcon Expl-iot—IoT Security Testing and Exploitation framework Source Code Aseem Jakhar#security-assessment#red-teaming#blueteam+1
2018-08-11Tool demoDefcon Angad: A Malware Detection Framework using Multi-Dimensional Visualization Source Code Ankur Tyagi#blueteam#security-assessment#forensics
2018-08-11Tool demoDefcon Archery—Open Source Vulnerability Assessment and Management Source Code Anand Tiwari#security-assessment#blueteam#ci-cd
2018-08-11Tool demoDefcon Cloud Security Suite—One stop tool for AWS, GCP & Azure Security Audit Source Code Jayesh Chauhan#aws#gcp#blueteam
2018-08-11Tool demoDefcon DejaVU—An Open Source Deception Framework Source Code Harish Ramadoss, Bhadreshkumar Patel#blueteam#network-defense#honeypot+4
2018-08-11Tool demoDefcon Local Sheriff Source Code Konark Modi#reconnaissance#blueteam#data-leak+4
2018-08-09TalkBlackhat Follow the White Rabbit: Simplifying Fuzz Testing Using FuzzExMachina Presentation Source Code Video Bhargava Shastry, Vincent Ulitzsch, Dominik Maier#security-assessment#blueteam#linux+1
2018-08-09TalkDefcon 4G—Who is paying your cellular phone bill? Presentation Video Isha Singh, Dr Silke Holtmanns#4g#ipx#red-teaming+2
2018-08-09TalkBlackhat Protecting the Protector, Hardening Machine Learning Defenses Against Adversarial Attacks Presentation Video Jugal Parikh, Randy Treit, Holly Stewart#blueteam#ai-security#machine-learning+4
2018-08-08Tool demoBlackhat ANWI (All New Wireless IDS): The $5 WIDS Source Code Rishikesh Bhide, Sanket Karpe#intrusion-detection#blueteam#wifi
2018-08-08Tool demoBlackhat Archerysec Tool Demo Source Code Anand Tiwari#security-assessment#blueteam#ci-cd
2018-08-08Tool demoBlackhat Cloud Security Suite: One Stop Tool for AWS/GCP/Azure Security Audit Source Code Divya S John, Jayesh Chauhan, Shivankar Madaan#aws#azure#gcp+1
2018-08-08TalkBlackhat Compression Oracle Attacks on VPN Networks Presentation Video Ahamed Nafeez#red-teaming#vpn#blueteam+1
2018-08-08Tool demoBlackhat DejaVu: An Open Source Deception Framework Source Code Bhadreshkumar Patel, Harish Ramadoss#blueteam#network-defense#honeypot+4
2018-08-08Tool demoBlackhat Expl-iot: IoT Security Testing and Exploitation Framework Source Code Aseem Jakhar#security-assessment#red-teaming#blueteam+1
2018-08-08TalkBlackhat LTE Network Automation Under Threat Presentation Whitepaper Video Ravishankar Borgaonkar, Altaf Shaik#lte#4g#red-teaming+2
2018-08-08Tool demoBlackhat RedHunt OS (VM): A Virtual Machine for Adversary Emulation and Threat Hunting Source Code Sudhanshu Chauhan#virtual-machine#blueteam#forensics+2
2018-08-08Tool demoBlackhat SCoDA: Smart COntract Defender and Analyzer Ajit Hatti#blueteam#secure-coding#smart-contracts+4
2018-05-13TalkDefcon Androsia: Securing ‘Data in Process’ for your Android Apps Presentation Whitepaper Video Samit Anwer#android#blueteam#android-security+4
2018-03-23Tool demoBlackhat Cloud Security Suite - One Stop Tool for AWS/GCP Security Audit Source Code Jayesh Chauhan, Shivankar Madaan#aws#gcp#blueteam
2018-03-22Tool demoBlackhat Androsia - A Step Ahead in Securing Sensitive In-Memory Android Application Data Source Code Samit Anwer#android#blueteam#application-hardening+4
2018-03-22Tool demoBlackhat Archery - Open Source Vulnerability Assessment and Management Source Code Anand Tiwari#security-assessment#red-teaming#blueteam+1
2018-03-22Tool demoBlackhat Jackhammer - One Security Vulnerability Assessment/Management Tool Source Code Rajagopal Vr, Krishna Chaitanya Yarramsetty#security-assessment#red-teaming#blueteam+4
2018-03-22Tool demoBlackhat Mobile Security Framework - MobSF Presentation Source Code Ajin Abraham#blueteam#ios#android+1
2018-03-22TalkBlackhat Securing Your In-Ear-Fitness Coach: Challenges in Hardening Next Generation Wearables Presentation Video Sumanth Naropanth, Kavya Racharla#wearables#blueteam#red-teaming+1
2018-03-22TalkBlackhat XOM-switch: Hiding Your Code from Advanced Code Reuse Attacks In One Shot Presentation Video Ravi Sahita, Daiping Liu, Mingwei Zhang#blueteam#application-hardening#code-review+4
2018-03-15TalkTroopers Defending Microsoft Environments at Scale Presentation Vineet Bhatia#blueteam#windows#azure+4
2018-03-01TalkNullcon A Game between Adversary and AI Scientist Presentation Video Satnam Singh#ai#blueteam#ai-security+3
2018-03-01TalkNullcon SpotPhish: Zero-Hour Phishing Protection Source Code Video Ganesh Varadarajan#phishing#blueteam#anti-phishing+1
2018-03-01TalkNullcon Unleashing D* on Android Kernel Drivers Presentation Video Aravind Machiry#android#fuzzing#red-teaming+3
2017-12-30Tool demoBlackhat Cloud Security Suite - One Stop Tool for AWS Security Audit Source Code Shivankar Madaan, Prajal Kulkarni, Jayesh Chauhan#aws#azure#gcp+1
2017-12-06Tool demoBlackhat ANWI (All New Wireless IDS) - The £5 WIDS Source Code Sanket Karpe#intrusion-detection#blueteam#wifi
2017-12-06Tool demoBlackhat EXPLIOT - INTERNET OF THINGS SECURITY TESTING AND EXPLOITATION FRAMEWORK Source Code Aseem Jakhar#security-assessment#red-teaming#blueteam+1
2017-11-17TalkDeepsec Intel AMT: Using & Abusing The Ghost In The Machine Presentation Parth Shukla#red-teaming#blueteam#purpleteam
2017-10-19TalkHacklu Intel AMT: Using & Abusing the Ghost in the Machine Video Parth Shukla#red-teaming#blueteam#purpleteam
2017-08-18TalkC0c0n Hunting Botnets with Analytics Shomiron Das Gupta#botnet#blueteam#security-analytics+2
2017-08-18TalkC0c0n 10 Things I Hate About Your Honeypots or How to Setup Honeypots That Work Rahul Binjve#honeypot#blueteam#network-monitoring+3
2017-08-18TalkC0c0n Cloud_Security Suite - One stop tool for auditing cloud infrastructure Source Code Shivankar Madaan, Jayesh Chauhan#aws#blueteam#cloud-monitoring+4
2017-08-18TalkC0c0n Cyber Security Threat Management – Model it, Collect Intelligence and Hunt them! Illyas Kooliyankal#blueteam#cyber-crime#intelligence-sharing+3
2017-08-18TalkC0c0n iGoat – A Self Learning Tool for iOS App Pentesting and Security Source Code Swaroop Yermalkar#ios#security-assessment#blueteam+1
2017-08-18TalkC0c0n Mobile Banking (In)Security Sneha Rajguru#appsec#purpleteam#red-teaming+1
2017-08-18TalkC0c0n Prevent Dark Side of your Smart City - A Defensive Security model for Smart City and Critical Infrastructure Manas Pratim Sarma#blueteam#critical-infrastructure#cybersecurity-strategy+2
2017-08-18TalkC0c0n The card hack - Lessons from the Hitachi Payments Breach Saikat Datta#red-teaming#blueteam#purpleteam
2017-08-18TalkC0c0n The Internet Of Things: Essentials of Secur(IOT)y Arpit Bajpai, Ronald Michael#blueteam#iot-device-management#iot-pentesting+4
2017-08-18TalkC0c0n Yarafying Android Malware: A Missing Step Before Malware Analysis Shivang Desai#android#blueteam#android-security+3
2017-07-30Tool demoBlackhat Yasuo Source Code Saurabh Harit#secure-coding#red-teaming#blueteam+3
2017-07-29Tool demoDefcon WIDY 2.0: WIFI 0WNAGE IN UNDER $5 RELOADED Vivek Ramachandran, Nishant Sharma, Ashish Bhangale#wifi#red-teaming#blueteam+1
2017-07-28Tool demoDefcon Android Tamer Source Code Anant Shrivastava#android#security-assessment#red-teaming+2
2017-07-27Tool demoBlackhat Android Tamer Source Code Anant Shrivastava#android#security-assessment#red-teaming+2
2017-07-27Tool demoBlackhat Gibber Sense Source Code Ajit Hatti#secure-coding#reconnaissance#encryption+3
2017-07-26TalkBlackhat New Adventures in Spying 3G and 4G Users: Locate, Track & Monitor Presentation Video Ravishankar Borgaonkar, Altaf Shaik, Shinjo Park, Lucca Hirschi, Andrew Martin, Jean Pierre Seifert#red-teaming#spying#3g+3
2017-06-23TalkHackinparis Injecting Security into Web apps with Runtime Patching and Context Learning Presentation Video Ajin Abraham#blueteam#secure-development#sqli+4
2017-05-23TalkPhdays Injecting security into web apps in the runtime Presentation Ajin Abraham#blueteam#secure-development#sqli+4
2017-05-23TalkPhdays Practical machine learning in infosecurity Presentation Anto Joseph, Clarence Chio#machine-learning#red-teaming#blueteam+1
2017-04-13KeynoteHitbsecconf Redefining Defense Presentation Video Saumil Shah#blueteam#security-strategy#incident-management+2
2017-03-31TalkBlackhat The Seven Axioms of Security Presentation Video Saumil Shah#blueteam#security-strategy#threat-modeling+2
2017-03-30Tool demoBlackhat WiDy: WiFi 0wnage in Under $5 Vivek Ramachandran, Nishant Sharma, Ashish Bhangale#wifi#red-teaming#blueteam+1
2017-03-03TalkNullcon Agility with security mitigations in Windows 10 Presentation Swamy Shivaganga Nagaraju#windows#blueteam#security-development-lifecycle+2
2017-03-03TalkNullcon Case study of SS7/Sigtran assessment Presentation Video Akib Sayyed#ss7#security-assessment#blueteam+2
2017-03-03TalkNullcon Injecting Security into Web apps with Runtime Patching and Context Learning Presentation Video Ajin Abraham#blueteam#secure-development#sqli+4
2016-11-11TalkDeepsec AMSI: How Windows 10 Plans To Stop Script Based Attacks and How Good It Does That Video Nikhil Mittal#blueteam#amsi#endpoint-protection+1
2016-11-04Tool demoBlackhat Yasuo Source Code Saurabh Harit#secure-coding#red-teaming#blueteam+3
2016-09-14Talk44con 2016: The Infosec Crossroads Presentation Video Saumil Shah#blueteam#security-strategy#threat-modeling+4
2016-08-19TalkC0c0n Backdooring my Enemies with a Proxy for Threat Intelligence Jovin Lobo, Aditya Vasekar#purpleteam#red-teaming#blueteam
2016-08-06Tool demoDefcon Visual Network and File Forensics using Rudra Source Code Video Ankur Tyagi#blueteam#reconnaissance#forensics
2016-08-03Tool demoBlackhat Android Tamer Presentation Source Code Anant Shrivastava#android#security-assessment#red-teaming+2
2016-08-03Tool demoBlackhat Visual Network and File Forensics Using Rudra Source Code Ankur Tyagi#blueteam#forensics#network-forensics+2
2016-05-17TalkPhdays Security Automation Based on Artificial Intelligence Video Rahul Sasi#ai#blueteam#ai-security+4
2016-04-01Tool demoBlackhat Android Tamer Presentation Source Code Anant Shrivastava#android#security-assessment#red-teaming+2
2016-04-01Tool demoBlackhat Rudra: The Destroyer of Evil Source Code Ankur Tyagi#blueteam#reconnaissance#forensics
2016-03-11TalkNullcon Attacking and defending healthcare - EMR solutions Presentation Anirudh Duggal#red-teaming#blueteam#application-pentesting+1
2016-03-11TalkNullcon Making Machines think about security for fun and profit Presentation Rahul Sasi#blueteam#ml#application-pentesting+4
2016-03-11TalkNullcon Real-time Ingestion of security telemetry data into Hadoop distributed system to respond to 0-day Presentation Pallav Jakhotiya, Vipul Sawant#secure-development#blueteam#data-analytics+3
2015-11-13Tool demoBlackhat Rudra - The Destroyer of Evil Source Code Ankur Tyagi#blueteam#reconnaissance#forensics
2015-11-12Tool demoBlackhat Android Tamer Source Code Anant Shrivastava#android#security-assessment#red-teaming+2
2015-11-05TalkGroundzerosummit Wolves Among Sheep: Defeating Targeted Attacks With Deception Sahir Hidayatullah, Raviraj Doshi#blueteam#incident-detection#honeypot+2
2015-08-08TalkDefcon Chigula — a framework for Wi-Fi Intrusion Detection and Forensics Video Vivek Ramachandran#wifi#intrusion-detection#forensics+1
2015-08-08TalkDefcon Dissecting the Design of SCADA Web Human Machine Interfaces (HMIs) - Hunting Vulnerabilities Video Aditya K Sood#scada#hmi#security-assessment+4
2015-08-08TalkDefcon QARK: Android App Exploit and SCA Tool Presentation Source Code Video Tushar Dalvi, Tony Trummer#android#metasploit#red-teaming+3
2015-08-08Tool demoDefcon Rudra Source Code Ankur Tyagi#blueteam#reconnaissance#forensics
2015-08-06Tool demoBlackhat Chellam Vivek Ramachandran#wifi#firewall#blueteam+1
2015-08-06TalkBlackhat Harnessing Intelligence from Malware Repositories Presentation Video Arun Lakhotia, Vivek Notani#blueteam#security-analytics#malware-research+2
2015-08-05Tool demoBlackhat QARK - Android Application SCA and Exploit Tool Presentation Source Code Tushar Dalvi#android#red-teaming#security-assessment+2
2015-08-05Tool demoBlackhat Rudra - The Destroyer of Evil Source Code Ankur Tyagi#blueteam#reconnaissance#forensics
2015-08-01TalkC0c0n Understanding the known : A deep look at OWASP A9 : Using Components with Known Vulnerabilities Presentation Source Code Anant Shrivastava#owasp#blueteam#security-testing+4
2015-05-26TalkPhdays Invisible Backdoors In Your Code Debasis Mohanty#blueteam#code-review#secure-coding+4
2015-03-27TalkBlackhat Security Content Metadata Model with an Efficient Search Methodology for Real Time Monitoring and Threat Intelligence Presentation Whitepaper Video Preeti Subramanian#threat-intelligence-analysis#blueteam#red-teaming+1
2015-03-26Tool demoBlackhat OWASP Xenotix XSS Exploit Framework Presentation Source Code Ajin Abraham#owasp#xss#blueteam+3
2015-03-26Tool demoBlackhat SecPod Saner Source Code Preeti Subramanian#blueteam#security-tools#automated-scanning+2
2015-02-06TalkNullcon Analyzing Chrome crash reports at scale Presentation Video Abhishek Arya#fuzzing#bug-hunting#blueteam
2015-02-06TalkNullcon Attack and Defence in Radio and Communication Warfare Presentation Akib Sayyed#red-teaming#blueteam#purpleteam+2
2015-02-06PanelNullcon Defender’s Diary: Who’s attacking? What are my options? Sastry Tumuluri, Amit Sharma, Venkatesh Subramaniam, Sachin Burman, Deepak Singla#blueteam#threat-hunting#cybersecurity-strategy
2015-02-06TalkNullcon Generic Executable Unpacking using Dynamic Binary Instrumentation Presentation Shubham Bansal#blueteam#dynamic-binary-instrumentation#executable-analysis+1
2015-02-06TalkNullcon Hunting and Decrypting Ghost communications using Memory Forensics Presentation Monnappa K A#forensics#blueteam#memory-forensics+2
2014-11-13TalkGroundzerosummit APT protection for the Enterprise Deepak Singla#blueteam#apt#security-strategy
2014-11-13TalkGroundzerosummit Making and Breaking Embedded Security Presentation Yashin Mehaboobe#red-teaming#blueteam#purpleteam
2014-10-16TalkGrrcon Socioware: Dissecting Online Social Network Worms – Insidious Analysis and Design Aditya K Sood, Dr. Richard J Enbody#red-teaming#reverse-engineering#blueteam+1
2014-08-22TalkC0c0n Making and breaking security in embedded devices Presentation Yashin Mehaboobe#purpleteam#red-teaming#blueteam
2014-08-22TalkC0c0n Piracy Tracker Vargheese Babu#blueteam#network-monitoring#security-analytics+3
2014-08-07TalkBlackhat Lifecycle of a phone fraudster: Exposing fraud activity from reconnaissance to takeover using graph analysis and acoustical anomalies Presentation Whitepaper Video Vijay Balasubramaniyan, Raj Bandyopadhyay, Telvis Calhoun#reconnaissance#social-engineering#blueteam
2014-08-06TalkBlackhat What goes around comes back around - Exploiting fundamental weaknees in Botnet C&C Panels! Presentation Whitepaper Video Aditya K Sood#botnet#red-teaming#blueteam+1
2014-02-15Tool demoNullcon OWASP Xenotix XSS Exploit Framerwork Source Code Ajin Abraham#owasp#xss#blueteam+3
2014-02-14TalkNullcon 2014 The year in which we cannot ignore SCADA Presentation Video Amol Sarwate#scada#blueteam#ics-security+4
2014-02-14TalkNullcon Attack of the setuid bit - pt_chown and pwning root terminals Presentation Siddhesh Poyarekar#glibc#red-teaming#blueteam+2
2014-02-14TalkNullcon Chrome - OS Security 2014: New and future hotness Presentation Video Sumit Gwalani#blueteam#application-hardening#application-pentesting+4
2014-02-14TalkNullcon In air they wander, we exist to blow their cover!!! {Approaches to Evil Twin Detection from a normal user’s perspective} Presentation Video Rushikesh D Nandedkar, Amrita C Iyer#wifi#evil-twin-attack#phishing+1
2014-02-14TalkNullcon Multi-value W-Fi What the Heck is it Video Abhijeet Ghosh#wifi#blueteam#network-defense+1
2014-02-14TalkNullcon phoneypdf: A Virtual PDF Analysis Framework Presentation Video Kiran Bandla#pdf#web-security#red-teaming+2
2014-02-14TalkNullcon The Security Challenge Presentation Video Shantanu Ghosh#blueteam
2013-11-07TalkGroundzerosummit Advanced security for advanced threats Kartik Shahani#blueteam#security-strategy#threat-modeling+4
2013-10-17TalkHitbsecconf Static Analysis and Dynamic Instrumentation for Intelligent Exploit Analysis Presentation Rahul Sasi#blueteam#static-analysis#automated-exploit-detection
2013-09-27TalkC0c0n The Art and Science of Anamoly based Vulnerability Detection Lavakumar Kuppan#blueteam#security-analytics#automated-scanning+2
2013-08-01Tool demoBlackhat OWASP Xenotix XSS Exploit Framework Source Code Ajin Abraham#owasp#xss#blueteam+3
2013-08-01Tool demoBlackhat Sparty Presentation Source Code Aditya K Sood#secure-coding#audit#blueteam
2013-07-31TalkBlackhat Clickjacking revisited: A perceptual view of UI security Presentation Video Devdatta Akhawe#clickjacking#blueteam#red-teaming
2013-07-31TalkBlackhat Javascript static security analysis made easy with JSPrime Presentation Whitepaper Source Code Video Nishant Das Patnaik, Sarathi Sabyasachi Sahoo#web-security#blueteam#application-hardening+4
2013-07-31Tool demoBlackhat JMSDigger Presentation Source Code Gursev Singh Kalra#security-assessment#red-teaming#blueteam+1
2013-03-15Tool demoBlackhat OWASP Xenotix XSS Exploit Framework Source Code Ajin Abraham#owasp#xss#blueteam+3
2013-03-15TalkBlackhat The Sandbox Roulette- Are you ready for the gamble? Presentation Whitepaper Video Rahul Kashyap, Rafal Wojtczuk#blueteam#application-pentesting#dynamic-analysis+3
2013-03-01TalkNullcon Automating JavaScript Static Analysis Lavakumar Kuppan#web-security#security-assessment#blueteam
2013-03-01TalkNullcon BYOD: How will it shape your wireless network security in future? Video Kiran Deshpande#wifi#dos#mac-spoofing+2
2013-03-01TalkNullcon CSRF Finder as a Mozilla Addon Video Piyush Pattanayak#csrf#blueteam#application-pentesting+4
2013-03-01TalkNullcon Mobile Code mining for discovery and exploits Presentation Video Hemil Shah#code-analysis#secure-development#blueteam+4
2013-03-01TalkNullcon Rest - A Real Stealth and Semi Stealth MITM Attack Tool for IPv4 Networks Source Code Video Naga Rohit Samineni#ipv4#mitm#blueteam+2
2013-03-01TalkNullcon Sensitive Campus Security with Network Video Aravind Sitaraman#blueteam#network-monitoring#security-strategy+4
2013-03-01TalkNullcon Vulnerability research anyone? Omair#red-teaming#blueteam#purpleteam
2012-12-01TalkClubhack Hacking and Securing iOS applications Presentation Video Satish Bommisetty#red-teaming#blueteam#purpleteam+1
2012-12-01TalkClubhack Infrastructure Security Presentation Video Sivamurthy Hiremath#blueteam#security-strategy#threat-modeling+1
2012-12-01TalkClubhack Smart Grid Security Presentation Video Falgun Rathod#blueteam#critical-infrastructure#cyber-physical-systems+2
2012-09-26TalkNullcon Forensics Timeline Analysis Video Aashish Kunte#forensics#blueteam#digital-forensics+3
2012-08-03TalkC0c0n Building Security Incident Detection & Handling Capabilities in Enterprises Sunil Varkey#blueteam#incident-detection#security-strategy+4
2012-08-03TalkC0c0n Enterprise server security Raghav Shandilya#blueteam#security-tools#network-monitoring+2
2012-08-03TalkC0c0n Security Incidents – Avoiding the Apocalypse in 2012 Ashish Chandra Mishra#blueteam#phishing#social-engineering+1
2012-07-28TalkDefcon Botnets Die Hard - Owned and Operated Presentation Video Aditya K Sood, Richard J Enbody#botnet#blueteam#malware-detection+2
2012-02-15TalkNullcon Application security cost management Video Ketan Vyas#blueteam#application-pentesting#secure-development+2
2012-02-15TalkNullcon Best practices to improve the security grading of your project Video Hemant Khandelwal#blueteam#threat-modeling#secure-development
2012-02-15TalkNullcon Content sniffing Algorithm bypassing techniques and possible attack vectors Video Anil Aphale, Chaitany Kamble#red-teaming#xss#web-security+2
2012-02-15TalkNullcon Friction in the machine Dinesh Shenoy#red-teaming#blueteam#purpleteam
2012-02-15TalkNullcon Javascript static analysis with IronWASP Presentation Video Lavakumar Kuppan#web-security#security-assessment#blueteam
2012-02-15TalkNullcon Node.js: The good, bad and ugly Video Bishan Singh#web-security#red-teaming#blueteam+1
2012-02-15TalkNullcon Ra.2 Blackbox DOM-based XSS scanner Presentation Source Code Video Nishant Das Patnaik, Sarathi Sabyasachi Sahoo#xss#blueteam#security-assessment
2012-02-15TalkNullcon Sandboxing The deep truth Video Disha Agarwal, Manish Pali#fuzzing#sandbox#blueteam
2011-12-04TalkClubhack Android Tamer Presentation Source Code Anant Shrivastava#android#security-assessment#red-teaming+2
2011-11-25TalkMalcon Exploit the Exploit kits Dhruv Soi#blueteam#exploit-kit#malware-detection+3
2011-10-08TalkC0c0n Stratagemizing Security Against Perpetrators In Cloud Infrastructure K S Abhiraj#blueteam#cloud-security-posture-management#cloud-pentesting+4
2011-10-07TalkC0c0n Network Security- Modern Mechanism for Intrusion Detection and avoidance in a P2P Network Bala Kumar S, Mohamed Emraanullah#blueteam#intrusion-detection#ids+3
2011-09-07TalkSecuritybyte Data Protection Dipankar Roy#blueteam#data-loss-prevention#data-protection+1
2011-09-07TalkSecuritybyte Web Application Defender Presentation K v Prashant, Mohammed Imran#blueteam#application-pentesting#secure-development+4
2011-08-07TalkDefcon VDLDS — All Your Voice Are Belong To Us Presentation Video Ganesh Devarajan, Don Le Bert#blueteam#data-leak#cyber-crime
2011-05-19TalkHitbsecconf Spying on SpyEye – What Lies Beneath? Presentation Aditya K Sood#blueteam#botnet#endpoint-protection+4
2011-02-25TalkNullcon (secure) SiteHoster – Disable XSS & SQL Injection Presentation Whitepaper Source Code Abhishek Kumar#xss#sqli#blueteam+1
2011-02-25TalkNullcon Enterprise Paradigm for Controlling Data Leakage Presentation Deepak Rout#data-leak#blueteam#data-loss-prevention+3
2011-02-25TalkNullcon Future of cyber crimes: Limitations and Challenges Pratap Reddy#blueteam#red-teaming#purpleteam+1
2011-02-25TalkNullcon Protect infrastructure or protect information – Lessons from Wikileaks Presentation Vishal Gupta#data-leak#blueteam#data-protection+2
2011-02-15TalkNullcon Botnet Detection approach by DNS behavior and clustering analysis Presentation Nilesh Sharma, Pulkit Mehndiratta#botnet#dns#blueteam
2010-12-04TalkClubhack Mantra – Free and Open Source security framework based on browser platform Presentation Abhi M Balakrishnan#blueteam#endpoint-protection#application-pentesting+3
2010-10-13TalkHitbsecconf Hacking a Browser’s DOM – Exploiting Ajax and RIA Presentation Video Shreeraj Shah#red-teaming#web-security#ajax+3
2010-08-01TalkC0c0n End-point Security Laxi Eshwari#blueteam#endpoint-protection#endpoint-hardening+3
2010-08-01TalkC0c0n Last line of defense - Host Intrusion Prevention and Secure application development. Avinash Shenoi#blueteam#application-hardening#secure-coding+3
2010-07-31TalkDefcon WPA Too! Presentation Whitepaper Video Md Sohail Ahmad#wifi#red-teaming#blueteam+1
2010-02-25TalkNullcon Botnet mitigation, monitoring and management. Presentation Harshad Patil#botnet#blueteam#malware-detection+4
2010-02-25TalkNullcon Malware Detection Tool for Websites: A Proof-Of-Concept Presentation Anant Kochhar#blueteam#malware-detection#application-pentesting+3
2009-12-05TalkClubhack Open source for securing data with advanced Crypto-Steganography technology Presentation Suhas Desai#encryption#steganography#blueteam
2009-11-18TalkSecuritybyte Introduction to Web Protection Library Presentation Source Code Anil Chintala#blueteam#application-pentesting#secure-development+4
2009-11-17TalkSecuritybyte Threat Modeling Presentation Varun Sharma#threat-modeling#blueteam#security-strategy+4
2009-08-06TalkC0c0n Know Your Enemy, and Yourself: Demystifying Threat Modelin Meera Subbarao#blueteam#security-strategy#threat-modeling+4
2009-08-06TalkC0c0n Management & Security of Large Scale Storage Devices Prashant Dinde#blueteam#data-protection#security-strategy+2
2009-08-06TalkC0c0n Microsoft Security Strategies Binoy VC#blueteam#security-strategy#azure+4
2009-05-19TalkSyscan Securing Applications at Gateway with Web Application Firewalls Shreeraj Shah#blueteam#footprinting#firewall+1
2009-04-22TalkHitbsecconf Application Defense Tactics & Strategies - WAF at the Gateway Presentation Shreeraj Shah#blueteam#footprinting#firewall+1
2009-03-16TalkCansecwest On Approaches and Tools for Automated Vulnerability Analysis Presentation Tanmay Ganacharya, Abhishek Singh, Swapnil Bhalode, Nikola Livic, Scott Lambert#security-assessment#blueteam#automated-scanning+4
2009-02-19TalkBlackhat Blinded by Flash: Widespread Security Risks Flash Developers Don’t See Presentation Video Prajakta Jagdale#flash#blueteam#application-pentesting+2
2008-12-06TalkClubhack AntiSpam - Understanding the good, the bad and the ugly Presentation Aseem Jakhar#blueteam#phishing#anti-phishing+1
2008-12-06TalkClubhack Immune IT: Moving from Security to Immunity Presentation Ajit Hatti#blueteam#security-strategy#security-monitoring+4
2008-12-06TalkClubhack Insecure Implementation of Security Best Practices: of hashing, CAPTCHA’s and Caching Presentation Karmendra Kohli#secure-development#secure-coding#blueteam+1
2008-12-06TalkClubhack Reverse Engineering v/s Secure Coding Presentation Atul Alex#secure-coding#reverse-engineering#red-teaming+2
2008-08-21TalkOwaspappsecindia AppSec For Managers Nish Bhalla#appsec#owasp#blueteam
2008-08-20TalkOwaspappsecindia Web 2.0 Attacks - Next Generation Threats on the Rise Presentation Shreeraj Shah#red-teaming#blueteam#purpleteam+3
2008-08-20TalkOwaspappsecindia Web Application Security: Too Costly To Ignore Presentation Rajesh Nayak#appsec#blueteam#application-hardening+4
2008-08-06TalkBlackhat Bad Sushi: Beating Phishers at Their Own Game Presentation Video Nitesh Dhanjani#phishing#blueteam#network-forensics+2
2008-02-20TalkBlackhat Scanning Applications 2.0 - Next Generation Scan, Attacks and Tools Presentation Shreeraj Shah#red-teaming#blueteam#purpleteam+3
2007-12-09TalkClubhack Subtle Security flaws: Why you must follow the basic principles of software security Presentation Varun Sharma#blueteam#software-security#secure-coding+4
2007-11-20TalkDeepsec Web 2.0 Application Kung-Fu - Securing Ajax & Web Services Presentation Video Shreeraj Shah#ajax#web-security#blueteam
2007-08-01TalkBlackhat PISA: Protocol Identification via Statistical Analysis Presentation Whitepaper Rohit Dhamankar, Rob King#blueteam#network-defense#intrusion-detection
2007-04-05TalkHitbsecconf WEB 2.0 Hacking – Defending Ajax and Web Services Presentation Shreeraj Shah#red-teaming#blueteam#purpleteam+2
2007-03-30TalkBlackhat Web Service Vulnerabilities Whitepaper Nish Bhalla#blueteam#purpleteam#application-pentesting+4
2006-01-26TalkBlackhat Analysis of Adversarial Code: Problem, Challenges, Results Presentation Arun Lakhotia#secure-coding#blueteam#static-analysis+1
2005-10-18TalkBlackhat Adware/Spyware Presentation Saumil Shah, Dave Cole#blueteam#adware#spyware
2005-09-29TalkHitbsecconf Analyzing Code for Security Defects Presentation Nish Bhalla#code-analysis#blueteam#secure-coding
2005-09-26TalkHitbsecconf Web hacking Kung-Fu and Art of Defense Presentation Shreeraj Shah#blueteam#application-pentesting#code-review+4
2005-04-12TalkHitbsecconf Web Application Kung-Fu, The Art of Defense Presentation Shreeraj Shah#blueteam#application-hardening#secure-coding+4
2005-04-10TalkHitbsecconf Whispers On The Wire - Network Based Covert Channels, Exploitation and Detection Pukhraj Singh#red-teaming#blueteam#purpleteam+1
2004-10-06TalkHitbsecconf Web Services - Attacks and Defense Strategies, Methods and Tools Presentation Shreeraj Shah#red-teaming#blueteam#purpleteam
2004-07-29TalkBlackhat Evasion and Detection of Web Application Attacks Presentation Whitepaper Video K K Mookhey#blueteam#intrusion-detection#application-pentesting+3
2004-05-19TalkBlackhat HTTP Fingerprinting and Advanced Assessment Techniques Presentation Whitepaper Saumil Shah#fingerprinting#blueteam#automated-scanning+2
2004-01-29TalkBlackhat HTTP Fingerprinting and Advanced Assessment Techniques Presentation Whitepaper Saumil Shah#fingerprinting#blueteam#application-pentesting+3
2003-12-16TalkBlackhat HTTP Fingerprinting & Advanced Assessment Techniques Presentation Whitepaper Saumil Shah#fingerprinting#blueteam#network-defense+3
2003-12-12TalkHitbsecconf Defending Web Applications: Strategies, methods and practices Video Shreeraj Shah#blueteam#secure-coding#firewall+1
2003-10-01TalkBlackhat HTTP Fingerprinting & Advanced Assessment Techniques Presentation Saumil Shah#fingerprinting#blueteam#application-pentesting+2
2003-07-31TalkBlackhat HTTP Fingerprinting & Advanced Assessment Techniques Presentation Video Saumil Shah#fingerprinting#blueteam#application-pentesting+2
2003-02-26TalkBlackhat HTTP: Advanced Assessment Techniques Presentation Video Saumil Shah#fingerprinting#blueteam#application-pentesting+4
2002-10-03TalkBlackhat Top Ten Web Attacks Presentation Saumil Shah#red-teaming#blueteam#purpleteam
2001-07-13TalkDefcon Security & Privacy are Critically Important Issues in Todays Digitally Connected Age Video Sharad Popli#security-assessment#data-protection#blueteam