πŸ§ͺ Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Network Forensics

Focus Areas: 🚨 Incident Response 🌐 Network Security
32
Total Entries
27
Contributors

Top Contributors

Rohyt Belani(3) Amol Sarwate(2) Rohan Durve(2) Shubham Mittal(2) Aashish Kunte(1)

All Entries (32 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2024-12-11Tool demoBlackhat Active Directory Cyber Deception using Huginn Source Code Rohan Durve, Paul Laine#active-directory#incident-management#network-forensics+1
2024-08-08Tool demoBlackhat Active Directory Cyber Deception using Huginn Source Code Rohan Durve, Paul Laine#active-directory#incident-management#identity-governance+3
2024-03-11TalkNullcon Hacking Trains Presentation Jaden Furtado#hacking#ics-security#network-forensics+2
2023-08-07TalkC0c0n Darkweb Investigations Amit Dubey#threat-hunting#digital-forensics#incident-management+1
2023-08-06TalkC0c0n Dark web for investigations Amit Lokhande#threat-hunting#digital-forensics#network-forensics+3
2021-11-19TalkHackfest Hacking with Physics Hrishikesh Somchatwar#ics-security#automotive-cybersecurity#embedded-systems+4
2021-11-13TalkC0c0n Emerging trends in cyber crimes : Investigation tools & techniques Triveni Singh#incident-management#digital-forensics#forensics+3
2021-11-10Tool demoBlackhat Wireshark Forensics Toolkit Source Code Rishikesh Bhide#forensics#network-forensics#data-protection
2020-09-18TalkC0c0n All about IOT Forensics Hima Bindu Vejella#forensics#iot-device-management#iot-pentesting+4
2018-10-05TalkC0c0n Using Fault Injection for Forensics Yashin Mehaboobe#forensics#digital-forensics#security-testing+2
2017-03-30Tool demoBlackhat Datasploit - Automated Open Source Intelligence (OSINT) Tool Source Code Shubham Mittal#osint#reconnaissance#security-tools+3
2016-10-05TalkVirusbulletin One-Click Fileless Infection Presentation Whitepaper Video Himanshu Anand, Chastine Menrige#reverse-engineering#incident-management#endpoint-protection+3
2016-08-06Tool demoDefcon Datasploit Source Code Shubham Mittal#osint#reconnaissance#data-leak+4
2016-08-03Tool demoBlackhat Visual Network and File Forensics Using Rudra Source Code Ankur Tyagi#blueteam#forensics#network-forensics+2
2015-08-09TalkDefcon 802.11 Monitoring with PCAP2XML/SQLite Video Vivek Ramachandran#network-forensics#packet-analysis#network-monitoring+3
2015-02-06TalkNullcon Hunting and Decrypting Ghost communications using Memory Forensics Presentation Monnappa K A#forensics#blueteam#memory-forensics+2
2014-11-13TalkGroundzerosummit Detecting Fake Cell Phone Towers Vijay Mukhi#network-pentesting#network-forensics#network-traffic-analysis+1
2014-02-15Tool demoNullcon NoSQL Exploitation Framework Source Code Francis Alexander#red-teaming#application-pentesting#security-tools+3
2014-02-14TalkNullcon 2014 The year in which we cannot ignore SCADA Presentation Video Amol Sarwate#scada#blueteam#ics-security+4
2013-11-20TalkAppsecusa Why is SCADA Security an Uphill Battle? Video Amol Sarwate#scada#application-pentesting#application-hardening+4
2012-12-01TalkClubhack Real Time Event Recording System, the tool for Digital Forensics Investigation Presentation Video Madhav Limaye#digital-forensics#endpoint-protection#endpoint-hardening+4
2012-09-29TalkNullcon Next-gen Forensics K K Mookhey#forensics#digital-forensics#incident-management+2
2012-09-27TalkGrrcon The Realm of Third Generation Botnet Attacks Video Aditya K Sood, Dr. Richard J Enbody#red-teaming#botnet#dynamic-analysis+1
2012-09-26TalkNullcon Forensics Timeline Analysis Video Aashish Kunte#forensics#blueteam#digital-forensics+3
2011-10-07TalkC0c0n Digital Evidence Sushanth Samudrala#forensics#digital-forensics#incident-management+2
2011-09-06TalkSecuritybyte Using Data Analytics for Incident Response Presentation Samir Saklikar#incident-management#data-analytics#security-analytics+3
2009-11-17TalkSecuritybyte Behind the scenes at the MSRC Presentation Suresh Venkateswaran, Dave Midturi#incident-management#forensics#memory-forensics+1
2008-08-06TalkBlackhat Bad Sushi: Beating Phishers at Their Own Game Presentation Video Nitesh Dhanjani#phishing#blueteam#network-forensics+2
2007-08-02TalkBlackhat Smoke ’em Out! Presentation Whitepaper Rohyt Belani#forensics#incident-management#digital-forensics+4
2006-09-21TalkHitbsecconf Smashing the Stack for Profit - Period Presentation Video Rohyt Belani#red-teaming#application-pentesting#code-review+3
2005-09-29TalkHitbsecconf Trends in Real World Attacks: A Compilation of Case Studies Video Rohyt Belani#red-teaming#application-pentesting#application-hardening+4
2004-04-21TalkCansecwest Cisco PSIRT TCP/BGP Sharad Ahlawat#incident-management#forensics#network-forensics