🧪 Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Network Monitoring

Focus Areas: 🛡️ Security Operations & Defense 🌐 Network Security
43
Total Entries
50
Contributors

Top Contributors

Rahul Binjve(3) Ankur Tyagi(2) Bhadreshkumar Patel(2) Harish Ramadoss(2) Pramod Rana(2)

All Entries (43 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-04-04Tool demoBlackhat SHIVA Spampot: Actionable Spam and Phishing Intelligence Source Code Rahul Binjve, Viren Kapadia#honeypot#network-monitoring#incident-management+1
2025-04-03Tool demoBlackhat Mantis - Asset Discovery at Scale Source Code Hitesh Thakur, Praveen Kanniah, Prateek Thakare#asset-inventory#cloud-workload-protection#security-tools+4
2025-03-02TalkNullcon Cyber Security from Telco lens Sanjeev Dhallam#network-architecture#network-hardening#network-monitoring+2
2024-11-16TalkC0c0n Who is holding the Marauders map? Maya R Nair#network-pentesting#network-monitoring#network-traffic-analysis+1
2024-08-29Tool demoHitbsecconf eBPFShield Source Code Sagar Bhure#ids#incident-management#network-monitoring+1
2024-08-07Tool demoBlackhat TrafficWardenX: OpenWRT Security & Monitoring Sampad Adhikary, Tripti Sharma#openwrt#network-monitoring#security-tools+3
2023-08-07TalkC0c0n Enhancing Red Team OPSEC: Abusing Stealthy In-Memory Binary Execution Techniques in Linux Video Pranav Sivvam#red-teaming#linux#memory-forensics+2
2023-05-12Tool demoBlackhat eBPFShield: Advanced IP-Intelligence & DNS Monitoring using eBPF Source Code Sagar Bhure#dns#machine-learning#network-monitoring+2
2022-09-24TalkC0c0n Deep Learning to detect Network Attacks Varun Kohli#ids#network-monitoring#threat-detection+2
2022-09-24TalkC0c0n Towards an Effective Intrusion Detection System Framework for Multi-Channel Man-in-the-Middle attacks Against Protected Wi-Fi Networks Manesh Thankappan#ids#network-monitoring#network-pentesting+3
2020-12-09Tool demoBlackhat HosTaGe: mobile honeypots for rapid deployment Source Code Shreyas Srinivasa, Emmanouil Vasilomanolakis, Eirini Lygerou#honeypot#blueteam#endpoint-protection+2
2020-09-18TalkC0c0n COVID-19 Cyber impact on financial sector and remote employees Video Amit Dubey, Tal Catran, Yair Feldman#incident-management#risk-management#cybersecurity-strategy+4
2020-03-06Tool demoNullcon Omniscient Source Code Pramod Rana#reconnaissance#blueteam#network-monitoring+4
2019-12-04Tool demoBlackhat RTTM: Real Time Threat Monitoring Tool Source Code Naveen Rudrappa, Murali Krishna Segu#blueteam#network-monitoring#security-analytics+2
2019-09-23TalkRootcon Hunting Threats with Wireshark Plugins Presentation Video Nishant Sharma, Jeswin Mathai, Shivam Bathla#blueteam#network-monitoring#security-analytics+2
2019-08-10Tool demoDefcon Local Sheriff Source Code Konark Modi#reconnaissance#blueteam#data-leak+3
2019-08-08Tool demoDefcon Let’s Map Your Network Source Code Pramod Rana#reconnaissance#blueteam#network-monitoring+4
2019-08-08TalkDefcon YOUR PHONE IS USING TOR AND LEAKING YOUR PII Presentation Milind Bhargava, Adam Podgorski#data-protection#security-assessment#tor+1
2019-05-21TalkPhdays Active defense using Honeypots v2 Presentation Rahul Binjve#blueteam#honeypot#network-defense+4
2018-08-11Tool demoDefcon DejaVU—An Open Source Deception Framework Source Code Harish Ramadoss, Bhadreshkumar Patel#blueteam#network-defense#honeypot+4
2018-08-08Tool demoBlackhat DejaVu: An Open Source Deception Framework Source Code Bhadreshkumar Patel, Harish Ramadoss#blueteam#network-defense#honeypot+4
2018-03-03PanelNullcon Managing Cyber Risk in the Connected Environment Video Gaurav Shukla, Ramachandra Hegde, Sudarshan Rajagopal, Kabir Mulchandani#security-strategy#threat-modeling#network-monitoring+1
2017-08-18TalkC0c0n Hunting Botnets with Analytics Shomiron Das Gupta#botnet#blueteam#security-analytics+2
2017-08-18TalkC0c0n 10 Things I Hate About Your Honeypots or How to Setup Honeypots That Work Rahul Binjve#honeypot#blueteam#network-monitoring+3
2017-08-18TalkC0c0n Are TOR Hidden Services really hidden? Demystifying HS Directory surveillance by injecting Decoys inside TOR! Presentation Abhinav Biswas#tor#network-monitoring#incident-detection+1
2017-08-18TalkC0c0n Cyber Security Threat Management – Model it, Collect Intelligence and Hunt them! Illyas Kooliyankal#blueteam#cyber-crime#intelligence-sharing+3
2016-10-27TalkBrucon Decepticon The Rise and Evolution of an Intelligent Evil Twin…!!! Video Rushikesh D Nandedkar, Amrita C Iyer, Krishnakant Patil#reverse-engineering#evil-twin-attack#network-monitoring+3
2016-03-11TalkNullcon Real-time Ingestion of security telemetry data into Hadoop distributed system to respond to 0-day Presentation Pallav Jakhotiya, Vipul Sawant#secure-development#blueteam#data-analytics+3
2015-11-05TalkGroundzerosummit Western Air Command B S Singh Deo#network-defense#network-monitoring#network-pentesting+3
2015-11-05TalkGroundzerosummit Wolves Among Sheep: Defeating Targeted Attacks With Deception Sahir Hidayatullah, Raviraj Doshi#blueteam#incident-detection#honeypot+2
2015-08-09TalkDefcon 802.11 Monitoring with PCAP2XML/SQLite Video Vivek Ramachandran#network-forensics#packet-analysis#network-monitoring+3
2015-08-07TalkDefcon Chellam – a Wi-Fi IDS/Firewall for Windows Presentation Video Vivek Ramachandran#wifi#firewall#ids+4
2015-03-15TalkHitbsecconf Sniffing the Airwaves with RTLSDR Presentation Yashin Mehaboobe#network-pentesting#packet-analysis#network-monitoring+2
2014-08-22TalkC0c0n Piracy Tracker Vargheese Babu#blueteam#network-monitoring#security-analytics+3
2014-08-06Tool demoBlackhat Flowinspect: Yet another network inspection tool Source Code Ankur Tyagi#security-assessment#network-monitoring#ids+2
2014-02-14TalkNullcon Flowinspect - A Network Inspection Tool Presentation Video Ankur Tyagi#security-assessment#malware-detection#network-monitoring+2
2013-03-01TalkNullcon CSRF Finder as a Mozilla Addon Video Piyush Pattanayak#csrf#blueteam#application-pentesting+4
2013-03-01TalkNullcon Sensitive Campus Security with Network Video Aravind Sitaraman#blueteam#network-monitoring#security-strategy+4
2012-08-03TalkC0c0n Contemporary Transcription and Resource Parasitism Arpit Patel#exploitation#firewall#network-monitoring+1
2012-08-03TalkC0c0n Enterprise server security Raghav Shandilya#blueteam#security-tools#network-monitoring+2
2011-08-03TalkBlackhat Killing the Myth of Cisco IOS Diversity: Towards Reliable, Large-Scale Exploitation of Cisco IOS Presentation Whitepaper Video Jatin Kataria, Ang Cui, Salvatore Stolfo#cisco-ios#hardware-embedded#firmware-analysis+4
2010-02-25TalkNullcon Botnet mitigation, monitoring and management. Presentation Harshad Patil#botnet#blueteam#malware-detection+4
2007-12-09TalkClubhack Legiment Techniques of IPS/IDS Evasion Presentation Ajit Hatti#red-teaming#network-monitoring#ids+2