🧪 Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Network Defense

Focus Areas: 🛡️ Security Operations & Defense 🌐 Network Security
28
Total Entries
34
Contributors

Top Contributors

Bhadreshkumar Patel(3) Harish Ramadoss(3) Saumil Shah(2) A a Gafoor(1) Abhijeet Ghosh(1)

All Entries (28 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-03-02PanelNullcon Cyber Fusion Center: The Command Center for Integrated Cyber Defense Avkash Kathiriya, Mathan Babu Kasilingam, Yogi Kapur#security-monitoring#network-defense#threat-modeling+3
2023-05-12Tool demoBlackhat eBPFShield: Advanced IP-Intelligence & DNS Monitoring using eBPF Source Code Sagar Bhure#dns#machine-learning#network-monitoring+2
2022-12-07Tool demoBlackhat h0neytr4p - How to catch the external threat actors with an easy to configure Honeypot. Source Code Subhash Popuri#honeypot#ids#ips+3
2022-09-24TalkC0c0n Deep Learning to detect Network Attacks Varun Kohli#ids#network-monitoring#threat-detection+2
2022-09-24TalkC0c0n Towards an Effective Intrusion Detection System Framework for Multi-Channel Man-in-the-Middle attacks Against Protected Wi-Fi Networks Manesh Thankappan#ids#network-monitoring#network-pentesting+3
2021-11-11Tool demoBlackhat DejaVu ++ Source Code Bhadreshkumar Patel, Harish Ramadoss#blueteam#cloud-access-security-broker#cloud-compliance+4
2021-11-10Tool demoBlackhat RIoTPot: A Modular Hybrid-Interaction IoT/OT Honeypot Source Code Abhimanyu Rawat, Shreyas Srinivasa, Emmanouil Vasilomanolakis#blueteam#honeypot#network-defense+1
2021-08-04Tool demoBlackhat Attack Surface Framework Source Code Prajwal Panchmahalkar, Mauricio Espinosa#network-defense#application-pentesting#attack-surface+1
2019-09-27TalkC0c0n Advanced Persistent Threat and counter measures A a Gafoor#blueteam#apt#network-defense+4
2019-08-08Tool demoBlackhat RWDD: Remote Web Deface Detection Tool Source Code Video K v Prashant, Ade Yoseman Putra#blueteam#application-pentesting#security-monitoring+1
2019-05-21TalkPhdays Active defense using Honeypots v2 Presentation Rahul Binjve#blueteam#honeypot#network-defense+4
2019-03-28Tool demoBlackhat RTS: Real Time Scrapper Source Code Naveen Rudrappa#blueteam#application-pentesting#security-monitoring+4
2019-03-28Tool demoBlackhat VoIP Wireshark Attack-Defense Toolkit Source Code Nishant Sharma, Jeswin Mathai, Ashish Bhangale#voip#wireshark#network-defense+4
2018-11-02TalkHitbsecconf Defending The Enterprise in 2018 Saumil Shah#blueteam#security-strategy#threat-modeling+3
2018-10-05TalkC0c0n Defending Healthcare Base Jiggyasu Sharma#blueteam#incident-management#security-monitoring+4
2018-08-11Tool demoDefcon DejaVU—An Open Source Deception Framework Source Code Harish Ramadoss, Bhadreshkumar Patel#blueteam#network-defense#honeypot+4
2018-08-08Tool demoBlackhat DejaVu: An Open Source Deception Framework Source Code Bhadreshkumar Patel, Harish Ramadoss#blueteam#network-defense#honeypot+4
2016-08-03Tool demoBlackhat DataSploit Source Code Sudhanshu Chauhan, Shubham Mittal, Nutan Kumar Panda#security-assessment#threat-hunting#osint+1
2015-11-05TalkGroundzerosummit Western Air Command B S Singh Deo#network-defense#network-monitoring#network-pentesting+3
2014-08-22TalkC0c0n Idle Machines doing Bounty Hunting (Behind your Back) Mrityunjay Gautam#bug-hunting#red-teaming#automated-scanning+3
2014-02-14TalkNullcon Multi-value W-Fi What the Heck is it Video Abhijeet Ghosh#wifi#blueteam#network-defense+1
2013-11-07TalkGroundzerosummit Advanced security for advanced threats Kartik Shahani#blueteam#security-strategy#threat-modeling+4
2011-10-07TalkC0c0n Network Security- Modern Mechanism for Intrusion Detection and avoidance in a P2P Network Bala Kumar S, Mohamed Emraanullah#blueteam#intrusion-detection#ids+3
2011-09-06TalkSecuritybyte Private Internet Circuits - Towards A Next Generation Internet Presentation Sanjay Deshpande#network-architecture#encryption#network-defense
2010-02-25TalkNullcon Malware Detection Tool for Websites: A Proof-Of-Concept Presentation Anant Kochhar#blueteam#malware-detection#application-pentesting+3
2007-08-01TalkBlackhat PISA: Protocol Identification via Statistical Analysis Presentation Whitepaper Rohit Dhamankar, Rob King#blueteam#network-defense#intrusion-detection
2007-04-18TalkCansecwest Low-Rate Denial-of-Service attacks Anil Kumar#red-teaming#dos#network-defense+2
2003-12-16TalkBlackhat HTTP Fingerprinting & Advanced Assessment Techniques Presentation Whitepaper Saumil Shah#fingerprinting#blueteam#network-defense+3