| 2025-08-06 | Talk | Blackhat |
The 5G Titanic
| Altaf Shaik | #network-pentesting#network-architecture#architecture |
| 2025-03-02 | Talk | Nullcon |
Cyber Security from Telco lens
| Sanjeev Dhallam | #network-architecture#network-hardening#network-monitoring+2 |
| 2025-03-02 | Panel | Nullcon |
Modernizing Security Architecture: Platforms or Best-of-Breed, What Works Best?
| Ketan Vyas, Prajal Kulkarni, Satyavathi Divadari, Srihari Kotni | #security-strategy#threat-modeling#zero-trust+3 |
| 2025-03-02 | Talk | Nullcon |
Satellite Communications: Analyzing and Protecting Space-Based Assets
| Drishti Jain | #network-pentesting#ics-security#encryption+4 |
| 2024-11-21 | Talk | Securityfest |
Wheels of Wonder
| Hrishikesh Somchatwar | #automotive-cybersecurity#car-hacking#embedded-systems+4 |
| 2024-08-09 | Talk | Defcon |
Breaking Secure Web Gateways (SWG) for Fun and Profit
| Vivek Ramachandran, Jeswin Mathai | #swg#cloud-access-security-broker#application-pentesting+4 |
| 2024-08-09 | Talk | Defcon |
Breaking Secure Web Gateways (SWG) for Fun and Profit
| Vivek Ramachandran, Jeswin Mathai | #ssl#application-pentesting#secure-coding+3 |
| 2024-08-07 | Tool demo | Blackhat |
TrafficWardenX: OpenWRT Security & Monitoring
| Sampad Adhikary, Tripti Sharma | #openwrt#network-monitoring#security-tools+3 |
| 2024-05-08 | Talk | Rsac |
How to CTF Infra - Beyond the Challenges and Flags
| Jayesh Chauhan, Max Gartman | #ctf#cloud-workload-protection#security-strategy+2 |
| 2021-11-13 | Talk | C0c0n |
Zero Trust & Micro-segmentation
| Suresh Menon | #segmentation#zero-trust#network-architecture+1 |
| 2020-09-18 | Talk | C0c0n |
Offensive & Scope Based Recon
| Harsh Bothra | #reconnaissance#network-architecture#security-strategy+1 |
| 2020-03-06 | Tool demo | Nullcon |
Omniscient
| Pramod Rana | #reconnaissance#blueteam#network-monitoring+4 |
| 2020-03-06 | Tool demo | Nullcon |
PivotSuite
| Manish Gupta | #red-teaming#security-assessment#network-architecture+2 |
| 2019-10-10 | Talk | Brucon |
Security transition from 4G to 5G: are we secure enough?
| Altaf Shaik, Ravishankar Borgaonkar | #5g#4g#network-architecture+3 |
| 2019-08-08 | Tool demo | Defcon |
Let’s Map Your Network
| Pramod Rana | #reconnaissance#blueteam#network-monitoring+4 |
| 2019-08-07 | Tool demo | Blackhat |
Medaudit: Auditing Medical Devices and Healthcare Infrastructure
| Anirudh Duggal | #security-assessment#application-pentesting#network-architecture+1 |
| 2019-05-10 | Talk | Hitbsecconf |
HAXPO: RF Exploitation: Demystifying IoT/OT Hacks with SDR
| Himanshu Mehta, Harshit Agrawal | #rf#red-teaming#hardware-embedded+3 |
| 2019-02-28 | Talk | Nullcon |
A Hacker Walks into a Co-working Space
| Rahul Binjve | #red-teaming#application-pentesting#network-architecture+2 |
| 2019-02-28 | Talk | Nullcon |
Dirty use of USSD Codes
| Ravishankar Borgaonkar | #ussd#red-teaming#social-engineering+3 |
| 2018-11-02 | Talk | Hackfest |
Exploiting Connected Medical Devices: Lessons Learned & Data Earned
| Saurabh Harit | #red-teaming#wearables#iot-device-management+4 |
| 2018-08-11 | Talk | Defcon |
Compression Oracle Attacks on VPN Networks
| Ahamed Nafeez | #vpn#network-architecture#application-pentesting+3 |
| 2018-08-08 | Tool demo | Blackhat |
DataSploit 2.0
| Kunal Aggarwal, Shubham Mittal | #osint#reconnaissance#data-governance+4 |
| 2018-08-08 | Tool demo | Blackhat |
PA Toolkit: Wireshark Plugins for Pentesters
| Nishant Sharma, Jeswin Mathai | #wireshark#security-assessment#network-architecture+2 |
| 2018-03-01 | Talk | Nullcon |
DARWIN (A parasite covert wireless network)
| Rushikesh D Nandedkar | #wifi#red-teaming#network-architecture+1 |
| 2018-03-01 | Talk | Nullcon |
Looting your bank savings using Digital India
| Indrajeet Bhuyan | #red-teaming#application-pentesting#api-security+4 |
| 2017-11-17 | Talk | Deepsec |
How Secure Are Your VoLTE And VoWiFi Calls?
| Sreepriya Chalakkal | #volte#vowifi#sip+1 |
| 2017-04-14 | Talk | Hitbsecconf |
COMMSEC: IoT Hacking Simplified
| Aseem Jakhar | #red-teaming#iot-pentesting#hardware-embedded+2 |
| 2016-11-04 | Talk | Blackhat |
Detach Me Not - DoS Attacks Against 4G Cellular Users Worldwide from your Desk
| Siddharth Rao, Bhanu Kotte, Dr. Silke Holtmanns | #dos#red-teaming#ss7+4 |
| 2016-10-13 | Talk | Appsecusa |
When encryption is not enough: Attacking Wearable - Mobile Application communication over BLE
| Sumanth Naropanth, Kavya Racharla, Chandra Prakash Gopalaiah | #reverse-engineering#secure-development#ble+4 |
| 2016-08-19 | Talk | C0c0n |
How (in)secure are Indian GSM networks?
| Ajay Fuloria | #gsm#gtp#imsi+4 |
| 2015-11-05 | Talk | Groundzerosummit |
Western Air Command
| B S Singh Deo | #network-defense#network-monitoring#network-pentesting+3 |
| 2014-11-13 | Talk | Groundzerosummit |
Network Time Protocol in Amplification Inferno
| Sriram Krishnan | #network-pentesting#network-vulnerability-assessment#network-architecture+2 |
| 2014-09-28 | Talk | Blackhat |
Understanding IMSI Privacy
| Swapnil Udar, Ravishankar Borgaonkar | #imsi#red-teaming#android+4 |
| 2014-08-22 | Talk | C0c0n |
Hacking Communication
| Akib Sayyed | #red-teaming#network-architecture#social-engineering+1 |
| 2014-02-14 | Talk | Nullcon |
User Privacy in Cellular Networks
| Ravishankar Borgaonkar | #data-protection#network-architecture#data-governance+2 |
| 2014-02-14 | Talk | Nullcon |
Wi-Hawk Password Auditing Tool
| Anamika Singh | #wifi#red-teaming#network-architecture |
| 2013-11-21 | Talk | Deepsec |
Europe In The Carna Botnet: Telnet’s Threat To The Largest Economy
| Parth Shukla | #botnet#telnet#network-architecture+3 |
| 2013-11-07 | Talk | Groundzerosummit |
The seven sins of Wi-Fi security
| Vivek Ramachandran | #wifi#network-architecture#phishing+1 |
| 2013-07-31 | Talk | Blackhat |
LTE booms with vulnerabilities
| Ankit Gupta | #lte#ddos#network-architecture+2 |
| 2011-12-04 | Talk | Clubhack |
Exploit the Exploit Kits
| Dhruv Soi | #red-teaming#exploit-kit#malware-distribution+4 |
| 2011-10-07 | Talk | C0c0n |
Exploiting the TCP Simultaneous Connection to Provide a Low Cost DoS Mitigation Solution
| Ahamed Nafeez | #red-teaming#network-pentesting#network-architecture |
| 2011-09-06 | Talk | Securitybyte |
Private Internet Circuits - Towards A Next Generation Internet
| Sanjay Deshpande | #network-architecture#encryption#network-defense |
| 2010-12-04 | Talk | Clubhack |
Ultimate Pen Test β Compromising a highly secure environment
| Nikhil Mittal | #security-assessment#social-engineering#application-pentesting+4 |
| 2010-10-29 | Talk | T2 |
Hacking Femtocells
| Ravishankar Borgaonkar, Kevin Redon | #reverse-engineering#device-security#hardware-embedded+3 |
| 2007-12-09 | Talk | Clubhack |
Vulnerabilities in VoIP Products and Services
| Gaurav Saha | #voip#red-teaming#sip+3 |
| 2003-12-12 | Talk | Hitbsecconf |
Threats to Wireless Networks - War Driving
| Anurana Saluja | #wifi#network-architecture#threat-modeling+1 |
| 2003-02-26 | Talk | Blackhat |
HTTP: Advanced Assessment Techniques
| Saumil Shah | #fingerprinting#blueteam#application-pentesting+4 |