| 2025-08-06 | Talk | Blackhat |
The 5G Titanic
| Altaf Shaik | #network-pentesting#network-architecture#architecture |
| 2025-03-02 | Talk | Nullcon |
Satellite Communications: Analyzing and Protecting Space-Based Assets
| Drishti Jain | #network-pentesting#ics-security#encryption+4 |
| 2024-11-16 | Talk | C0c0n |
Ride on the House - Exploiting Public Transport Ticketing Systems for Free Rides
| Rakesh Seal, Diptisha Samanta | #exploitation#ethical-hacking#network-pentesting+1 |
| 2024-11-16 | Talk | C0c0n |
Who is holding the Marauders map?
| Maya R Nair | #network-pentesting#network-monitoring#network-traffic-analysis+1 |
| 2024-08-10 | Talk | Defcon |
Compromising an Electronic Logging Device and Creating a Truck2Truck Worm
| Rik Chatterjee, Jake Jepson | #eld#embedded-systems#ics-security+3 |
| 2023-08-10 | Talk | Defcon |
Attacking Vehicle Fleet Management Systems
| Yashin Mehaboobe | #automotive-cybersecurity#ics-security#embedded-systems+4 |
| 2023-08-06 | Talk | C0c0n |
Expanding capability horizons : Homelabs and beyond
| Anant Shrivastava | #security-assessment#network-pentesting#architecture |
| 2023-05-11 | Tool demo | Blackhat |
CANalyse 2.0 : A Vehicle Network Analysis and Attack Tool
| Kartheek Lade | #automobile#car-hacking#iot-device-management+4 |
| 2022-09-24 | Talk | C0c0n |
CANalyse: A Vehicle Network Analysis and Attack Tool
| Kartheek Lade | #network-pentesting#network-traffic-analysis#can-bus+1 |
| 2022-09-24 | Talk | C0c0n |
Towards an Effective Intrusion Detection System Framework for Multi-Channel Man-in-the-Middle attacks Against Protected Wi-Fi Networks
| Manesh Thankappan | #ids#network-monitoring#network-pentesting+3 |
| 2022-08-10 | Tool demo | Blackhat |
CANalyse (2.0): A vehicle network analysis and attack tool
| Kartheek Lade, Rahul Jeyasingh | #automobile#car-hacking#iot-device-management+4 |
| 2022-08-10 | Tool demo | Blackhat |
ParseAndC 2.0 β We Don’t Need No C Programs (for Parsing)
| Parbati Kumar Manna | #reverse-engineering#dynamic-analysis#network-pentesting+4 |
| 2022-03-24 | Talk | Insomnihack |
Practical exploitation of zigbee-class networks with USB-based RF transceivers & open source software
| Nitin Lakshmanan, Sunil Kumar 1 | #iot-pentesting#wireless-security#hardware-hacking+3 |
| 2021-11-13 | Talk | C0c0n |
Light Basin - Telecom roaming network attack case study
| Akib Sayyed | #network-pentesting#network-traffic-analysis#gtp+2 |
| 2021-05-07 | Tool demo | Blackhat |
CANalyse: A Vehicle Network Analysis and Attack Tool
| Kartheek Lade | #automobile#car-hacking#iot-device-management+4 |
| 2020-10-02 | Tool demo | Blackhat |
OWASP Nettacker
| Sri Harsha Gajavalli, Ali Razmjoo Qalaei, Sam Stepanyan | #security-assessment#vulnerability-assessment#network-pentesting+3 |
| 2019-08-09 | Tool demo | Defcon |
PivotSuite: Hack The Hidden Network - A Network Pivoting Toolkit
| Manish Gupta | #red-teaming#security-assessment#network-pentesting |
| 2019-08-07 | Tool demo | Blackhat |
PivotSuite: Hack The Hidden Network - A Network Pivoting Toolkit
| Manish Gupta | #red-teaming#security-assessment#network-pentesting |
| 2019-06-02 | Tool demo | Defcon |
VoIPShark: Open Source VoIP Analysis Platform
| Nishant Sharma, Jeswin Mathai, Ashish Bhangale | #voip#sip#network-pentesting+1 |
| 2019-03-28 | Tool demo | Blackhat |
OWASP Nettacker: Automated Penetration Testing Framework
| Sri Harsha Gajavalli, Ali Razmjoo Qalaei, Ehsan Nezami | #network-pentesting#vulnerability-assessment#firewall+3 |
| 2019-03-28 | Tool demo | Blackhat |
VoIP Wireshark Attack-Defense Toolkit
| Nishant Sharma, Jeswin Mathai, Ashish Bhangale | #voip#wireshark#network-defense+4 |
| 2018-10-05 | Talk | C0c0n |
DNS Exfiltration and Out of Band Attacks
| Nitesh Shilpkar | #red-teaming#dns#network-pentesting |
| 2018-09-27 | Talk | Rootcon |
Cyber Security Threats to Telecom Networks
| Hardik Mehta, Rosalia Dβ Alessandro, Loay Abdelrazek | #ss7#sip#gtp+2 |
| 2018-08-08 | Tool demo | Blackhat |
PA Toolkit: Wireshark Plugins for Pentesters
| Nishant Sharma, Jeswin Mathai | #wireshark#security-assessment#network-architecture+2 |
| 2017-09-13 | Talk | 44con |
Red Team Revenge : Attacking Microsoft ATA
| Nikhil Mittal | #windows#red-teaming#active-directory+4 |
| 2017-08-18 | Talk | C0c0n |
The Covert Cupid Under .11 Veil !!! /* Approach for Covert WIFI*/
| Rushikesh D Nandedkar | #wifi#network-pentesting#security-tools+1 |
| 2017-07-27 | Talk | Defcon |
Recon and bug bounties what a great love story
| Abhijeth Dugginapeddi | #vulnerability-assessment#bug-bounty#network-pentesting+1 |
| 2015-11-05 | Talk | Groundzerosummit |
Western Air Command
| B S Singh Deo | #network-defense#network-monitoring#network-pentesting+3 |
| 2015-11-05 | Talk | Groundzerosummit |
chellam β a Wi-Fi IDS/Firewall for Windows
| Vivek Ramachandran | #wifi#firewall#ids+3 |
| 2015-10-08 | Talk | Brucon |
The .11 Veil, Camouflage & Covert!!! Invisible Wifi, Revealed
| Rushikesh D Nandedkar, Amrita C Iyer | #wifi#network-pentesting#security-testing+2 |
| 2015-03-15 | Talk | Hitbsecconf |
Sniffing the Airwaves with RTLSDR
| Yashin Mehaboobe | #network-pentesting#packet-analysis#network-monitoring+2 |
| 2015-02-06 | Talk | Nullcon |
Building custom scans for real world enterprise network
| Sanoop Thomas | #security-assessment#network-pentesting#vulnerability-assessment+1 |
| 2014-11-13 | Talk | Groundzerosummit |
Network Time Protocol in Amplification Inferno
| Sriram Krishnan | #network-pentesting#network-vulnerability-assessment#network-architecture+2 |
| 2014-11-13 | Talk | Groundzerosummit |
Security vulnerabilities in DVB-C networks: Hacking Cable TV network
| Rahul Sasi | #red-teaming#dvb-c#network-pentesting |
| 2014-11-13 | Talk | Groundzerosummit |
Detecting Fake Cell Phone Towers
| Vijay Mukhi | #network-pentesting#network-forensics#network-traffic-analysis+1 |
| 2014-08-07 | Tool demo | Blackhat |
C-SCAD: Assessing Security flaws in clearscada Web_X client!
| Aditya K Sood | #red-teaming#security-assessment#ics-security+3 |
| 2014-02-14 | Talk | Nullcon |
Hacking YOu’r Cable TV Network.
| Rahul Sasi, Ahamed Nafeez | #red-teaming#network-pentesting#endpoint-protection+1 |
| 2013-09-27 | Talk | C0c0n |
Pwning WiFi Devices!
| Swaroop Yermalkar | #wifi#red-teaming#network-pentesting+2 |
| 2013-03-01 | Talk | Nullcon |
SMS to Meterpreter - Fuzzing USB Modems
| Rahul Sasi | #red-teaming#fuzzing#network-pentesting+2 |
| 2012-09-26 | Talk | Nullcon |
Highly Harmful Audio Waves aka DTMF Fuzzing
| Rahul Sasi | #dtmf#red-teaming#fuzzing+3 |
| 2012-03-16 | Talk | Blackhat |
IVR Security- Internal Network Attack via Phone Lines
| Rahul Sasi | #red-teaming#ivrs#network-pentesting+3 |
| 2011-10-07 | Talk | C0c0n |
Exploiting the TCP Simultaneous Connection to Provide a Low Cost DoS Mitigation Solution
| Ahamed Nafeez | #red-teaming#network-pentesting#network-architecture |
| 2011-10-07 | Talk | C0c0n |
Wi-Fi Malware for Fun and Profit
| Vivek Ramachandran | #red-teaming#network-pentesting#malware-distribution+2 |
| 2011-09-19 | Talk | Brucon |
Wifi malware for fun and profit
| Vivek Ramachandran | #wifi#red-teaming#endpoint-protection+3 |
| 2011-08-03 | Talk | Blackhat |
Femtocells: A poisonous needle in the operator’s hay stack
| Ravishankar Borgaonkar, Nico Golde, Kevin Redon | #network-pentesting#identity-theft#firmware-analysis |
| 2010-08-01 | Talk | C0c0n |
Wireless MITM
| Prashant Mahajan | #red-teaming#network-pentesting#security-tools |
| 2010-02-25 | Talk | Nullcon |
Software Fuzzing with Wireplay.
| Abhisek Datta | #fuzzing#red-teaming#network-pentesting+3 |
| 2010-02-25 | Talk | Nullcon |
Imposter ke karnamey: The Browser Phishing Tool.
| Lavakumar Kuppan | #phishing#red-teaming#security-testing+1 |
| 2006-08-05 | Talk | Defcon |
Zulu A Command Line Wireless Frame Generator
| Anmol Sheth, Damon Mccoy | #debugging#network-pentesting#linux+1 |