πŸ§ͺ Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Ethical Hacking

Focus Area: 🎯 Penetration Testing
45
Total Entries
42
Contributors

Top Contributors

Himanshu Sharma(4) Saumil Shah(4) Aman Sachdev(3) Amol Naik(2) Nikhil Mittal(2)

All Entries (45 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-03-01PanelNullcon Bug Bounties 2.0 : AI, Automation, and the Future of Ethical Hacking Krishna Pandey#ai-security#ai#ml+1
2024-12-12Tool demoBlackhat MPT: Pentest In Action! Source Code Jyoti Raval#penetration-testing-tools#security-assessment#ethical-hacking
2024-11-16TalkC0c0n Ride on the House - Exploiting Public Transport Ticketing Systems for Free Rides Rakesh Seal, Diptisha Samanta#exploitation#ethical-hacking#network-pentesting+1
2024-11-15TalkC0c0n [Yodha] Nightingale: Docker for Pentesters Source Code Raja Nagori#docker#security-assessment#container-security+3
2024-08-07Tool demoBlackhat DarkWidow: Dropper/PostExploitation Tool targeting Windows Source Code Soumyanil Biswas, Chirag Savla#red-teaming#malware-research#post-exploitation+2
2024-05-27TalkConfidence Hacker’s Story from Reader to Global Admin in Azure Video Raunak Parmar#cloud-pentesting#azure#ethical-hacking+4
2023-06-05TalkConfidence Evading modern day security defenses in corporate environments Himanshu Sharma, Rahul Vashista#red-teaming#evasion#bypassing+4
2021-11-13TalkC0c0n Painting Your Organizations with Shades of Red, Blue & Purple Video Hidayath Khan#red-teaming#ethical-hacking#threat-modeling+2
2021-09-07TalkConfidence Swapping Asprin formulas with MDMA while Red Teaming a Billion Dollar Pharmaceutical Aman Sachdev, Himanshu Sharma#red-teaming#ethical-hacking#security-assessment+2
2021-08-08TalkDefcon AppSec 101: A Journey from Engineer to Hacker Video Arjun Gopalakrishna#secure-coding#security-assessment#ethical-hacking+2
2021-08-06TalkDefcon Adversary village Kick-off Video Abhijith B R#red-teaming#ethical-hacking#vulnerability-assessment+2
2021-08-04Tool demoBlackhat Automated Attack Path Planning and Validation (A2P2V) Source Code Subir Das, Fukutomo Nakanishi, Jason Youzwak, Michael Hylkema, Santoshi Aoki#ethical-hacking#exploitation#cyber-physical-systems
2020-09-18TalkC0c0n My top 3 findings in bug Bounty journey | Aiming for high impact issues Ankit Giri#bug-hunting#bug-bounty#security-testing+3
2020-09-18TalkC0c0n Supercharging your initial foothold in Red Team engagements Sachin S Kamath#red-teaming#ethical-hacking#exploit-delivery+3
2020-08-22TalkThedianainitiative Deploying discreet infrastructure for targeted phishing campaigns Video Sreehari Haridas#phishing#application-pentesting#social-engineering+3
2020-03-06Tool demoNullcon PivotSuite Source Code Manish Gupta#red-teaming#security-assessment#network-architecture+2
2019-09-27TalkC0c0n Hacking ICS devices for Fun Arun Mane#red-teaming#ics-security#exploit-delivery+1
2019-03-01PanelNullcon Clash of the Titans; who will survive? Video Burgess Cooper, Durga Dube, Vasanthika Srinath, Jaya Baloo, Shan Lee#ethical-hacking#exploit-delivery#data-leak+1
2018-10-04TalkConfidence Hacking 50 Million users using 123456 Aman Sachdev, Himanshu Sharma#web-security#authentication#ethical-hacking+2
2018-06-04TalkConfidence From 123456 on a staging to compromising a multi-million dollar VC - The journey of us Red Teamers of a hack spanning over 200 days Himanshu Sharma, Aman Sachdev#red-teaming#ethical-hacking#security-assessment+2
2018-03-01TalkNullcon DARWIN (A parasite covert wireless network) Video Rushikesh D Nandedkar#wifi#red-teaming#network-architecture+1
2017-08-18TalkC0c0n The Covert Cupid Under .11 Veil !!! /* Approach for Covert WIFI*/ Rushikesh D Nandedkar#wifi#network-pentesting#security-tools+1
2016-08-19TalkC0c0n Breaking into Gas stations! Suraj Pratap#red-teaming#ethical-hacking#exploit-delivery+2
2016-03-15TalkGroundzerosummit r00tKidz and Hacking Triveni Singh, Lea Paul#security-assessment#ethical-hacking#privilege-escalation+2
2015-08-07TalkDefcon Hacker’s Practice Ground Video Lokesh Pidawekar#security-assessment#ethical-hacking#vulnerability-assessment+2
2014-11-13TalkGroundzerosummit Attacking Cryptography & PKI Implementations Ajit Hatti#encryption#red-teaming#ssl+4
2014-11-13TalkGroundzerosummit How I won Browser Fuzzing Amol Naik#fuzzing#red-teaming#security-testing+4
2014-08-22TalkC0c0n Cryptographic Backdoors: Subverting the RSA Adhokshaj Mishra#encryption#red-teaming#security-strategy+3
2013-11-07TalkGroundzerosummit How I built a pentest lab in under 70 USD Swaroop Yermalkar#security-assessment#ethical-hacking#bug-bounty+1
2013-09-27TalkC0c0n Disclosing Vulnerabilities: The Bug Bounty Style Nikhil Prabhakar#red-teaming#bug-bounty#ethical-hacking+3
2013-09-27TalkC0c0n Infiltrating the Intranet with Skanda Source Code Jayesh Chauhan#red-teaming#secure-coding#ethical-hacking+1
2013-09-13TalkRootcon My Experiments with truth: a different route to bug hunting Presentation Devesh Bhatt#bug-hunting#bug-bounty#security-testing+3
2013-03-01TalkNullcon Bug Bounty Hunter’s confession Presentation Amol Naik#bug-hunting#security-training#ethical-hacking+3
2012-09-26TalkNullcon Nullcon_delhi_2012 Presentation Source Code Prasanna Kanagasabai#ethical-hacking#social-engineering#security-training+1
2012-07-22Tool demoBlackhat Kautilya and Nishang Source Code Nikhil Mittal#post-exploitation#ethical-hacking#security-assessment+1
2012-03-16TalkBlackhat The Pwnage Saga Continues Presentation Video Nikhil Mittal#hid#red-teaming#buffer-underflow+2
2011-09-19TalkHacklu The travelling hacksmith Saumil Shah#red-teaming#ethical-hacking#exploit-delivery+2
2010-10-27TalkHacklu Exploit Delivery - Tricks and Techniques Presentation Saumil Shah#red-teaming#exploit#exploit-delivery+4
2009-11-19TalkDeepsec Ownage 2.0 Presentation Saumil Shah#red-teaming#ethical-hacking#exploit-delivery+1
2009-11-18TalkSecuritybyte Risk based Penetration Testing Presentation K K Mookhey#security-assessment#risk-management#ethical-hacking+3
2009-10-28TalkHacklu Ownage 2.0 Saumil Shah#red-teaming#ethical-hacking#exploit-delivery+2
2008-12-06TalkClubhack Introduction to backtrack Presentation Kunal Sehgal#security-assessment#linux#ethical-hacking+1
2008-03-27TalkBlackhat Iron Chef Black Hat: John Henry Challenge Presentation Pravir Chandra, Jacob West, Brian Chess, Sean Fay#ethical-hacking#secure-development#devsecops
2008-03-26TalkCansecwest Vulnerabilities Die Hard Kowsik Guruswamy#red-teaming#ethical-hacking#exploit-delivery+2
2003-12-12TalkHitbsecconf Threats to Wireless Networks - War Driving Video Anurana Saluja#wifi#network-architecture#threat-modeling+1