| 2024-12-11 | Tool demo | Blackhat |
Active Directory Cyber Deception using Huginn
| Rohan Durve, Paul Laine | #active-directory#incident-management#network-forensics+1 |
| 2024-08-08 | Tool demo | Blackhat |
Active Directory Cyber Deception using Huginn
| Rohan Durve, Paul Laine | #active-directory#incident-management#identity-governance+3 |
| 2024-03-11 | Talk | Nullcon |
Hacking Trains
| Jaden Furtado | #hacking#ics-security#network-forensics+2 |
| 2023-08-07 | Talk | C0c0n |
Darkweb Investigations
| Amit Dubey | #threat-hunting#digital-forensics#incident-management+1 |
| 2023-08-06 | Talk | C0c0n |
Dark web for investigations
| Amit Lokhande | #threat-hunting#digital-forensics#network-forensics+3 |
| 2021-11-19 | Talk | Hackfest |
Hacking with Physics
| Hrishikesh Somchatwar | #ics-security#automotive-cybersecurity#embedded-systems+4 |
| 2021-11-13 | Talk | C0c0n |
Emerging trends in cyber crimes : Investigation tools & techniques
| Triveni Singh | #incident-management#digital-forensics#forensics+3 |
| 2021-11-10 | Tool demo | Blackhat |
Wireshark Forensics Toolkit
| Rishikesh Bhide | #forensics#network-forensics#data-protection |
| 2020-09-18 | Talk | C0c0n |
All about IOT Forensics
| Hima Bindu Vejella | #forensics#iot-device-management#iot-pentesting+4 |
| 2018-10-05 | Talk | C0c0n |
Using Fault Injection for Forensics
| Yashin Mehaboobe | #forensics#digital-forensics#security-testing+2 |
| 2017-03-30 | Tool demo | Blackhat |
Datasploit - Automated Open Source Intelligence (OSINT) Tool
| Shubham Mittal | #osint#reconnaissance#security-tools+3 |
| 2016-10-05 | Talk | Virusbulletin |
One-Click Fileless Infection
| Himanshu Anand, Chastine Menrige | #reverse-engineering#incident-management#endpoint-protection+3 |
| 2016-08-06 | Tool demo | Defcon |
Datasploit
| Shubham Mittal | #osint#reconnaissance#data-leak+4 |
| 2016-08-03 | Tool demo | Blackhat |
Visual Network and File Forensics Using Rudra
| Ankur Tyagi | #blueteam#forensics#network-forensics+2 |
| 2015-08-09 | Talk | Defcon |
802.11 Monitoring with PCAP2XML/SQLite
| Vivek Ramachandran | #network-forensics#packet-analysis#network-monitoring+3 |
| 2015-02-06 | Talk | Nullcon |
Hunting and Decrypting Ghost communications using Memory Forensics
| Monnappa K A | #forensics#blueteam#memory-forensics+2 |
| 2014-11-13 | Talk | Groundzerosummit |
Detecting Fake Cell Phone Towers
| Vijay Mukhi | #network-pentesting#network-forensics#network-traffic-analysis+1 |
| 2014-02-15 | Tool demo | Nullcon |
NoSQL Exploitation Framework
| Francis Alexander | #red-teaming#application-pentesting#security-tools+3 |
| 2014-02-14 | Talk | Nullcon |
2014 The year in which we cannot ignore SCADA
| Amol Sarwate | #scada#blueteam#ics-security+4 |
| 2013-11-20 | Talk | Appsecusa |
Why is SCADA Security an Uphill Battle?
| Amol Sarwate | #scada#application-pentesting#application-hardening+4 |
| 2012-12-01 | Talk | Clubhack |
Real Time Event Recording System, the tool for Digital Forensics Investigation
| Madhav Limaye | #digital-forensics#endpoint-protection#endpoint-hardening+4 |
| 2012-09-29 | Talk | Nullcon |
Next-gen Forensics
| K K Mookhey | #forensics#digital-forensics#incident-management+2 |
| 2012-09-27 | Talk | Grrcon |
The Realm of Third Generation Botnet Attacks
| Aditya K Sood, Dr. Richard J Enbody | #red-teaming#botnet#dynamic-analysis+1 |
| 2012-09-26 | Talk | Nullcon |
Forensics Timeline Analysis
| Aashish Kunte | #forensics#blueteam#digital-forensics+3 |
| 2011-10-07 | Talk | C0c0n |
Digital Evidence
| Sushanth Samudrala | #forensics#digital-forensics#incident-management+2 |
| 2011-09-06 | Talk | Securitybyte |
Using Data Analytics for Incident Response
| Samir Saklikar | #incident-management#data-analytics#security-analytics+3 |
| 2009-11-17 | Talk | Securitybyte |
Behind the scenes at the MSRC
| Suresh Venkateswaran, Dave Midturi | #incident-management#forensics#memory-forensics+1 |
| 2008-08-06 | Talk | Blackhat |
Bad Sushi: Beating Phishers at Their Own Game
| Nitesh Dhanjani | #phishing#blueteam#network-forensics+2 |
| 2007-08-02 | Talk | Blackhat |
Smoke ’em Out!
| Rohyt Belani | #forensics#incident-management#digital-forensics+4 |
| 2006-09-21 | Talk | Hitbsecconf |
Smashing the Stack for Profit - Period
| Rohyt Belani | #red-teaming#application-pentesting#code-review+3 |
| 2005-09-29 | Talk | Hitbsecconf |
Trends in Real World Attacks: A Compilation of Case Studies
| Rohyt Belani | #red-teaming#application-pentesting#application-hardening+4 |
| 2004-04-21 | Talk | Cansecwest |
Cisco PSIRT TCP/BGP
| Sharad Ahlawat | #incident-management#forensics#network-forensics |