🧪 Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Network Pentesting

19
Total Entries
19
Contributors

Top Contributors

Anamika Singh(2) Sri Harsha Gajavalli(2) Abhijeth Dugginapeddi(1) Akib Sayyed(1) Altaf Shaik(1)

All Entries (19 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-08-06TalkBlackhat The 5G Titanic Altaf Shaiknetwork-pentestingnetwork-architecturevulnerability-management+1
2025-03-02TalkNullcon Satellite Communications: Analyzing and Protecting Space-Based Assets Drishti Jainnetwork-pentestingvulnerability-managementindustrial-control-systems-security
2024-11-16TalkC0c0n Who is holding the Marauders map? Maya R Nairnetwork-pentestingnetwork-monitoringnetwork-traffic-analysis+1
2023-08-06TalkC0c0n Expanding capability horizons : Homelabs and beyond Video Anant Shrivastavapentestingnetwork-pentestingsecurity-architecture+1
2022-09-24TalkC0c0n CANalyse: A Vehicle Network Analysis and Attack Tool Kartheek Ladenetwork-pentestingnetwork-traffic-analysiscan-bus+1
2022-09-24TalkC0c0n Towards an Effective Intrusion Detection System Framework for Multi-Channel Man-in-the-Middle attacks Against Protected Wi-Fi Networks Manesh Thankappanidsnetwork-monitoringnetwork-pentesting+3
2021-11-13TalkC0c0n Light Basin - Telecom roaming network attack case study Video Akib Sayyednetwork-pentestingnetwork-traffic-analysisvulnerability-management
2020-10-02Tool demoBlackhat OWASP Nettacker Source Code Sri Harsha Gajavallipentestingvulnerability-assessmentnetwork-pentesting+3
2019-03-28Tool demoBlackhat OWASP Nettacker: Automated Penetration Testing Framework Source Code Sri Harsha Gajavallinetwork-pentestingvulnerability-assessmentfirewall+3
2019-03-28Tool demoBlackhat VoIP Wireshark Attack-Defense Toolkit Source Code Nishant Sharma, Jeswin Mathai, Ashish Bhangalevoipwiresharknetwork-security+4
2017-07-27TalkDefcon Recon and bug bounties what a great love story Video Abhijeth Dugginapeddivulnerability-assessmentbug-bountynetwork-pentesting+1
2015-11-05TalkGround Zero Summit Western Air Command B S Singh Deonetwork-defensenetwork-monitoringnetwork-pentesting+3
2015-03-15TalkHitb Sec Conf Sniffing the Airwaves with RTLSDR Presentation Yashin Mehaboobenetwork-pentestingpacket-analysisnetwork-monitoring+2
2015-03-15TalkDefcon TECHNICAL TALK-WIHAWK: ROUTER VULNERABILITY SCANNER Anamika Singhnetwork-pentestingvulnerability-assessmentvulnerability-management+2
2015-02-06TalkNullcon Building custom scans for real world enterprise network Presentation Source Code Video Sanoop Thomaspentestingnetwork-pentestingvulnerability-assessment+2
2014-11-13TalkGround Zero Summit Network Time Protocol in Amplification Inferno Sriram Krishnannetwork-pentestingnetwork-vulnerability-assessment
2014-11-13TalkGround Zero Summit Detecting Fake Cell Phone Towers Vijay Mukhinetwork-pentestingnetwork-forensicsmobile-security+2
2014-03-08TalkDefcon WI-Hawk Source Code Anamika Singhnetwork-pentestingvulnerability-assessmentnetwork-vulnerability-assessment+3
2011-08-03TalkBlackhat Femtocells: A poisonous needle in the operator’s hay stack Presentation Whitepaper Video Ravishankar Borgaonkarnetwork-pentestingmobile-securityvulnerability-management