| 2025-12-10 | Tool demo | Blackhat |
KubeShadow - Advanced Offensive Kubernetes Red-Team Framework
| Aashita Pandey, Binayak Choudhury | #kubernetes#red-teaming#cloud-pentesting+1 |
| 2025-10-01 | Tool demo | Sector |
KubeShadow - Advanced Offensive Kubernetes Red-Team Framework
| Aashita Pandey, Binayak Choudhury | #kubernetes#red-teaming#container-security |
| 2025-08-06 | Tool demo | Blackhat |
CloudLens
| Gaurav Joshi, Hare Krishna Rai, K v Prashant | #aws#cloud-pentesting#red-teaming+2 |
| 2025-08-06 | Tool demo | Blackhat |
ProcessInjection
| Chirag Savla | #security-assessment#red-teaming#reverse-engineering+1 |
| 2025-08-06 | Tool demo | Blackhat |
RedInfraCraft : Automate Complex Red Team Infra
| Yash Bharadwaj, Manish Gupta | #red-teaming#cloud-access-security-broker#cloud-compliance+4 |
| 2025-06-02 | Talk | Confidence |
Adversarial Phishing: Defeating Security Barriers and AI-Driven Countermeasures
| Himanshu Sharma, Rahul Vashista | #phishing#red-teaming#mfa+1 |
| 2025-04-29 | Talk | Rsac |
XPIA AttacksβRethinking Defense in Depth for an AI-Powered World
| Aanchal Gupta, Abhilasha Bhargav Spantzel, John Leo Jr, Stefano Zanero | #ai#ai-security#input-validation+3 |
| 2024-12-12 | Tool demo | Blackhat |
Halberd : Cloud Security Testing Tool
| Arpan Abani Sarkar | #cloud-pentesting#red-teaming#azure+1 |
| 2024-12-12 | Tool demo | Blackhat |
RedCloud OS : Cloud Adversary Simulation Operating System
| Yash Bharadwaj, Manish Gupta | #cloud-pentesting#red-teaming#aws+1 |
| 2024-08-09 | Panel | Defcon |
Formidable Adversaries: Responding to Breaches, Ransomware, and State-Sponsored Threat Actors
| Abhijith B R, Nikhil Mittal, Adam Pennington, Ken Kato, Ashley Stryker | #ransomware#apt#dfir+2 |
| 2024-08-08 | Tool demo | Blackhat |
Octopii v2
| Owais Shaikh | #red-teaming#ai-security#nlp+2 |
| 2024-08-07 | Tool demo | Blackhat |
DarkWidow: Dropper/PostExploitation Tool targeting Windows
| Soumyanil Biswas, Chirag Savla | #red-teaming#malware-research#post-exploitation+2 |
| 2024-05-24 | Talk | Auscert |
Mastering the art of Attacking and Defending a Kubernetes Cluster
| Sanjeev Mahajan | #kubernetes#cloud-pentesting#container-security+1 |
| 2024-04-18 | Tool demo | Blackhat |
DarkWidow: Dropper/PostExploitation Tool (or can be used in both situations) targeting Windows
| Soumyanil Biswas | #red-teaming#post-exploitation#windows |
| 2023-12-07 | Tool demo | Blackhat |
Mantis - Asset Discovery at Scale
| Prateek Thakare, Bharath Kumar, Praveen Kanniah | #red-teaming#asset-inventory#asset-management+2 |
| 2023-08-07 | Talk | C0c0n |
Enhancing Red Team OPSEC: Abusing Stealthy In-Memory Binary Execution Techniques in Linux
| Pranav Sivvam | #red-teaming#linux#memory-forensics+2 |
| 2023-06-05 | Talk | Confidence |
Evading modern day security defenses in corporate environments
| Himanshu Sharma, Rahul Vashista | #red-teaming#evasion#bypassing+4 |
| 2023-06-01 | Talk | Securityfest |
Beyond On-Premises: Exploring the Post-Domain Admin Landscape in the Cloud
| Sriraam Natarajan, Venkatraman Kumar | #red-teaming#azure#active-directory+2 |
| 2022-09-29 | Talk | Brucon |
0wn-premises: Bypassing Microsoft Defender for Identity
| Nikhil Mittal | #red-teaming#active-directory#threat-detection |
| 2022-09-07 | Talk | Nullcon |
ElectroVolt: Pwning Popular Desktop Apps While Uncovering New Attack Surface On Electron
| Mohan Sri Rama Krishna Pedhapati, Maxwell Garrett | #red-teaming#application-pentesting#dynamic-analysis+4 |
| 2022-08-11 | Talk | Blackhat |
ElectroVolt: Pwning Popular Desktop Apps While Uncovering New Attack Surface on Electron
| Mohan Sri Rama Krishna Pedhapati, Aaditya Purani, Max Garrett, William Bowling | #red-teaming#application-pentesting#code-review+4 |
| 2021-11-13 | Talk | C0c0n |
Painting Your Organizations with Shades of Red, Blue & Purple
| Hidayath Khan | #red-teaming#ethical-hacking#threat-modeling+2 |
| 2021-09-07 | Talk | Confidence |
Swapping Asprin formulas with MDMA while Red Teaming a Billion Dollar Pharmaceutical
| Aman Sachdev, Himanshu Sharma | #red-teaming#ethical-hacking#security-assessment+2 |
| 2021-08-07 | Tool demo | Defcon |
Red Team Credentials Reconnaissance (OLD with a TWIST)
| Shantanu Khandelwal | #reconnaissance#red-teaming#osint |
| 2021-08-06 | Panel | Defcon |
Adversary simulation, emulation or purple teaming - How would you define it?
| Anant Shrivastava, Vincent Yiu, Martin Ingesen, Jean Marie Bourbon, Samuel Kimmons, Joe Vest | #security-testing#incident-management#red-teaming+3 |
| 2021-08-06 | Talk | Defcon |
Adversary village Kick-off
| Abhijith B R | #red-teaming#ethical-hacking#vulnerability-assessment+2 |
| 2021-05-06 | Talk | Blackhat |
Threat Hunting in Active Directory Environment
| Anurag Khanna, Thirumalai Natarajan Muthiah | #blueteam#red-teaming#purpleteam |
| 2020-10-07 | Talk | Rootcon |
Automating Threat Hunting on the Dark Web and other nitty-gritty thingso
| Apurv Singh Gautam | #deep-web#red-teaming#threat-hunting+1 |
| 2020-10-07 | Talk | Rootcon |
How I Pwned the ICS data during my internship
| Shail Patel | #ics#red-teaming#ics-security+1 |
| 2020-10-07 | Talk | Rootcon |
Offensive Embedded Exploitation : Getting hands dirty with IOT/Embedded Device Security Testing
| Kaustubh Padwad | #red-teaming#security-assessment#reverse-engineering |
| 2020-10-07 | Talk | Rootcon |
ReconPal: Leveraging NLP for Infosec
| Nishant Sharma, Jeswin Mathai | #reconnaissance#red-teaming#nlp+1 |
| 2020-09-18 | Talk | C0c0n |
Kubernetes Goat - Vulnerable by Design Kubernetes Cluster Environment
| Madhu Akula | #kubernetes#red-teaming#cloud-workload-protection+3 |
| 2020-09-18 | Talk | C0c0n |
Offensive Embedded Exploitation : Getting hands dirty with IOT/Embedded Device Security Testing
| Kaustubh Padwad | #red-teaming#security-assessment#iot-device-management+4 |
| 2020-09-18 | Talk | C0c0n |
Supercharging your initial foothold in Red Team engagements
| Sachin S Kamath | #red-teaming#ethical-hacking#exploit-delivery+3 |
| 2020-08-22 | Talk | Thedianainitiative |
Internal Red Team Operations Framework - Building your practical internal Red Team
| Abhijith B R | #red-teaming#cyber-war#phishing+3 |
| 2020-07-26 | Talk | Hitbsecconf |
Swapping Asprin Formulas With MDMA While Red Teaming a Billion Dollar Company
| Himanshu Sharma, Aman Sachdev | #red-teaming#application-pentesting#incident-management+2 |
| 2020-03-18 | Talk | Cansecwest |
The ARM-X Firmware Emulation Framework
| Saumil Shah | #red-teaming#arm#firmware+4 |
| 2020-03-06 | Tool demo | Nullcon |
Callidus
| Chirag Savla | #red-teaming#azure#application-pentesting+2 |
| 2020-03-06 | Tool demo | Nullcon |
FRISPY
| Tejas Girme, Parmanand Mishra | #spyware#red-teaming#api-security+3 |
| 2020-03-06 | Tool demo | Nullcon |
PivotSuite
| Manish Gupta | #red-teaming#security-assessment#network-architecture+2 |
| 2020-03-06 | Talk | Nullcon |
Putting it all together: building an iOS jailbreak from scratch
| Umang Raghuvanshi | #ios#jailbreak#red-teaming |
| 2020-03-06 | Tool demo | Nullcon |
VyAPI
| Riddhi Shree | #secure-coding#aws#amazon-cognito+3 |
| 2020-03-06 | Tool demo | Nullcon |
Wolverine
| Furqan Khan, Siddharth Anbalahan | #linux#secure-coding#web-security+3 |
| 2019-12-04 | Talk | Blackhat |
ClusterFuzz: Fuzzing at Google Scale
| Abhishek Arya, Oliver Chang | #fuzzing#red-teaming#blueteam+1 |
| 2019-11-01 | Talk | Appsecdayaustralia |
A Purple Team View of Serverless and GraphQL Applications
| Abhay Bhargav | #red-teaming#blueteam#purpleteam+1 |
| 2019-10-14 | Talk | Hitbsecconf |
CALL OF DUTY: MODERN BROWSER WARFARE
| Dhiraj Mishra | #blueteam#red-teaming#purpleteam |
| 2019-10-14 | Talk | Hitbsecconf |
ON THE WINGS OF TIME: DEMYSTIFYING WIRELESS ETHICAL HACKING AND DEFENSES
| Harshit Agrawal, Himanshu Mehta | #wifi#red-teaming#blueteam+1 |
| 2019-09-27 | Talk | C0c0n |
Detection of TOR Sources using Artificial Intelligence
| Roshy John | #tor#ai#red-teaming |
| 2019-09-27 | Talk | C0c0n |
Golang for Pentesters / RedTeamers
| Anant Shrivastava | #security-assessment#red-teaming#secure-coding |
| 2019-09-27 | Talk | C0c0n |
Hacking ICS devices for Fun
| Arun Mane | #red-teaming#ics-security#exploit-delivery+1 |
| 2019-09-27 | Talk | C0c0n |
Offensive Machine Learning for Pentesters and Red Teams
| Tamaghna Basu | #machine-learning#security-assessment#red-teaming |
| 2019-09-27 | Talk | C0c0n |
VyAPI - The Vulnerable Hybrid Android App
| Riddhi Shree | #secure-coding#aws#amazon-cognito+3 |
| 2019-09-23 | Talk | Rootcon |
Hacking ICS devices/PLC’s for Fun - ICS and IOT Hacking
| Arun Mane | #red-teaming#ics#ics-security+3 |
| 2019-09-23 | Talk | Rootcon |
Making Anomaly Detection system(ADS) for Vehicles (Automotive Hacking)
| Arun Mane, Nikhil Bogam | #red-teaming#car-hacking#blueteam+1 |
| 2019-08-30 | Talk | Hitbsecconf |
COMMSEC: PErfidious: Make PE Backdooring Great Again!
| Shreyans Doshi | #secure-coding#red-teaming#blueteam+1 |
| 2019-08-29 | Talk | Hitbsecconf |
Understanding, Attacking & Securing Medical Devices
| Ajay Pratap Singh | #red-teaming#blueteam#purpleteam |
| 2019-08-10 | Talk | Defcon |
RACE - Minimal Rights and ACE for Active Directory Dominance
| Nikhil Mittal | #active-directory#red-teaming#windows |
| 2019-08-09 | Tool demo | Defcon |
EXPLIoT - IoT Security Testing and Exploitation Framework
| Aseem Jakhar, Murtuja Bharmal | #security-assessment#red-teaming#blueteam+1 |
| 2019-08-09 | Tool demo | Defcon |
PivotSuite: Hack The Hidden Network - A Network Pivoting Toolkit
| Manish Gupta | #red-teaming#security-assessment#network-pentesting |
| 2019-08-08 | Tool demo | Blackhat |
EXPLIoT: IoT Security Testing and Exploitation Framework
| Aseem Jakhar, Murtuja Bharmal | #security-assessment#red-teaming#blueteam+1 |
| 2019-08-07 | Talk | Blackhat |
New Vulnerabilities in 5G Networks
| Ravishankar Borgaonkar, Altaf Shaik | #5g#red-teaming#4g+1 |
| 2019-08-07 | Tool demo | Blackhat |
PivotSuite: Hack The Hidden Network - A Network Pivoting Toolkit
| Manish Gupta | #red-teaming#security-assessment#network-pentesting |
| 2019-08-07 | Tool demo | Blackhat |
RedHunt-OS v2: Virtual Machine for Adversary Emulation and Threat Hunting
| Sudhanshu Chauhan, Kunal Aggarwal | #virtual-machine#blueteam#forensics+2 |
| 2019-05-21 | Talk | Phdays |
GDALR: an efficient model duplication attack on black-box machine learning models
| Rewanth Tammana, Nikhil Joshi | #red-teaming#machine-learning#api-security+3 |
| 2019-05-21 | Talk | Phdays |
How to fail in hardware hacking
| Arun Magesh | #red-teaming#embedded-systems#firmware-analysis+1 |
| 2019-05-21 | Talk | Phdays |
Rapid hardware hacking 101
| Arun Magesh | #red-teaming#iot-pentesting#hardware-embedded+2 |
| 2019-05-10 | Talk | Hitbsecconf |
HAXPO: RF Exploitation: Demystifying IoT/OT Hacks with SDR
| Himanshu Mehta, Harshit Agrawal | #rf#red-teaming#hardware-embedded+3 |
| 2019-05-09 | Talk | Hitbsecconf |
GDALR: Duplicating Black Box Machine Learning Models
| Rewanth Tammana, Nikhil Joshi | #machine-learning#red-teaming#api-security+2 |
| 2019-05-09 | Talk | Hitbsecconf |
HAXPO: WiCy: Monitoring 802.11AC Networks at Scale
| Vivek Ramachandran | #red-teaming#wifi#802.11ac |
| 2019-03-29 | Tool demo | Blackhat |
Halcyon IDE: Nmap Script Development IDE
| Sanoop Thomas | #reconnaissance#red-teaming#nmap |
| 2019-03-28 | Tool demo | Blackhat |
pytm: A Pythonic Framework for Threat Modeling
| Rohit Shambhuni, Izar Tarandach | #secure-coding#threat-modeling#red-teaming |
| 2019-03-28 | Tool demo | Blackhat |
VoIP Wireshark Attack-Defense Toolkit
| Nishant Sharma, Jeswin Mathai, Ashish Bhangale | #voip#wireshark#network-defense+4 |
| 2019-03-21 | Talk | Troopers |
Evolution of kernel fuzzers in NetBSD
| Siddharth M | #red-teaming#fuzzing#security-development-lifecycle |
| 2019-02-28 | Talk | Nullcon |
A Hacker Walks into a Co-working Space
| Rahul Binjve | #red-teaming#application-pentesting#network-architecture+2 |
| 2019-02-28 | Talk | Nullcon |
Attacking & Securing HealthCare Standards & hospital secured systems
| Ajay Pratap Singh | #red-teaming#blueteam#purpleteam |
| 2019-02-28 | Talk | Nullcon |
Dirty use of USSD Codes
| Ravishankar Borgaonkar | #ussd#red-teaming#social-engineering+3 |
| 2018-12-05 | Talk | Blackhat |
The Undeniable Truth: How Remote Attestation Circumvents Deniability Guarantees in Secure Messaging Protocols
| N Asokan, Lachlan Gunn, Ricardo Vieitez Parra | #red-teaming#encryption#threat-modeling+1 |
| 2018-11-29 | Talk | Deepsec |
DNS Exfiltration and Out-of-Band Attacks
| Nitesh Shilpkar | #dns#red-teaming#malware-detection |
| 2018-11-27 | Talk | Hitbsecconf |
BSIDES: Creating Browser Extensions to Hunt for Low-Hanging Fruit
| Rewanth Tammana | #red-teaming#application-pentesting#browser-security+2 |
| 2018-11-27 | Talk | Hitbsecconf |
COMMSEC: Taking Over Telecom Networks
| Hardik Mehta, Loay Hassan Abdelrazek | #architecture#red-teaming#ss7+2 |
| 2018-11-27 | Talk | Hitbsecconf |
Somebody Answer the Phone: Hacking Telephone Systems for Fun & Profit
| Himanshu Mehta, Sachine Wagh | #red-teaming |
| 2018-11-02 | Talk | Hackfest |
Exploiting Connected Medical Devices: Lessons Learned & Data Earned
| Saurabh Harit | #red-teaming#wearables#iot-device-management+4 |
| 2018-10-10 | Talk | Brucon |
Forging Trusts for Deception in Active Directory
| Nikhil Mittal | #windows#active-directory#red-teaming |
| 2018-10-05 | Talk | C0c0n |
DNS Exfiltration and Out of Band Attacks
| Nitesh Shilpkar | #red-teaming#dns#network-pentesting |
| 2018-10-05 | Talk | C0c0n |
Unconventional vulnerabilities in Google Cloud Platform
| Pranav Venkat | #gcp#red-teaming#cloud-pentesting+3 |
| 2018-09-27 | Talk | Rootcon |
Expl-iot: Hacking IoT like a boss
| Aseem Jakhar | #red-teaming#iot-security-testing#firmware-analysis+2 |
| 2018-08-30 | Talk | Hitbsecconf |
Exploiting Automation in LTE Mobile Networks
| Ravishankar Borgaonkar, Altaf Shaik | #4g#lte#red-teaming |
| 2018-08-12 | Tool demo | Defcon |
Expl-iotβIoT Security Testing and Exploitation framework
| Aseem Jakhar | #security-assessment#red-teaming#blueteam+1 |
| 2018-08-12 | Talk | Defcon |
Last mile authentication problem: Exploiting the missing link in end-to-end secure communication
| Siddharth Rao, Thanh Bui | #encryption#authentication#ipc+1 |
| 2018-08-11 | Tool demo | Defcon |
ADRecon: Active Directory Recon
| Prashant Mahajan | #active-directory#windows#reconnaissance+1 |
| 2018-08-11 | Tool demo | Defcon |
BLEMystiqueβAffordable custom BLE target
| Nishant Sharma, Jeswin Mathai | #ble#red-teaming#wearables+1 |
| 2018-08-11 | Tool demo | Defcon |
Halcyon IDE
| Sanoop Thomas | #reconnaissance#red-teaming#nmap+1 |
| 2018-08-09 | Talk | Defcon |
4GβWho is paying your cellular phone bill?
| Isha Singh, Dr Silke Holtmanns | #4g#ipx#red-teaming+2 |
| 2018-08-09 | Tool demo | Blackhat |
OWASP Offensive Web Testing Framework
| Viyat Bhalodia | #owasp#security-assessment#red-teaming |
| 2018-08-08 | Tool demo | Blackhat |
ADRecon: Active Directory Recon
| Prashant Mahajan | #active-directory#windows#reconnaissance+1 |
| 2018-08-08 | Talk | Blackhat |
Back to the Future: A Radical Insecure Design of KVM on ARM
| Baibhav Singh, Rahul Kashyap | #red-teaming#linux#virtual-machine+1 |
| 2018-08-08 | Talk | Blackhat |
Compression Oracle Attacks on VPN Networks
| Ahamed Nafeez | #red-teaming#vpn#blueteam+1 |
| 2018-08-08 | Tool demo | Blackhat |
Damn Vulnerable iOS App: Swift Edition
| Prateek Gianchandani | #ios#security-assessment#red-teaming |
| 2018-08-08 | Tool demo | Blackhat |
Expl-iot: IoT Security Testing and Exploitation Framework
| Aseem Jakhar | #security-assessment#red-teaming#blueteam+1 |
| 2018-08-08 | Tool demo | Blackhat |
Halcyon IDE: For Nmap Script Developers
| Sanoop Thomas | #reconnaissance#red-teaming#nmap+1 |
| 2018-08-08 | Talk | Blackhat |
LTE Network Automation Under Threat
| Ravishankar Borgaonkar, Altaf Shaik | #lte#4g#red-teaming+2 |
| 2018-08-08 | Tool demo | Blackhat |
RedHunt OS (VM): A Virtual Machine for Adversary Emulation and Threat Hunting
| Sudhanshu Chauhan | #virtual-machine#blueteam#forensics+2 |
| 2018-08-08 | Tool demo | Blackhat |
V2X Validation Tool
| Raashid Ansari, Jonathan Petit | #security-assessment#automobile#red-teaming |
| 2018-06-29 | Talk | Hackinparis |
Hunting PBX for Vulnerabilities
| Himanshu Mehta, Sachin Wagh | #red-teaming |
| 2018-06-04 | Talk | Confidence |
From 123456 on a staging to compromising a multi-million dollar VC - The journey of us Red Teamers of a hack spanning over 200 days
| Himanshu Sharma, Aman Sachdev | #red-teaming#ethical-hacking#security-assessment+2 |
| 2018-03-22 | Tool demo | Blackhat |
ADRecon: Active Directory Recon
| Prashant Mahajan | #active-directory#windows#reconnaissance+1 |
| 2018-03-22 | Tool demo | Blackhat |
Archery - Open Source Vulnerability Assessment and Management
| Anand Tiwari | #security-assessment#red-teaming#blueteam+1 |
| 2018-03-22 | Tool demo | Blackhat |
Jackhammer - One Security Vulnerability Assessment/Management Tool
| Rajagopal Vr, Krishna Chaitanya Yarramsetty | #security-assessment#red-teaming#blueteam+4 |
| 2018-03-22 | Talk | Blackhat |
Securing Your In-Ear-Fitness Coach: Challenges in Hardening Next Generation Wearables
| Sumanth Naropanth, Kavya Racharla | #wearables#blueteam#red-teaming+1 |
| 2018-03-01 | Talk | Nullcon |
Abusing and Attacking Content Sharing Solutions
| Pratap Chandra Allena | #red-teaming#wifi#bluetooth+2 |
| 2018-03-01 | Talk | Nullcon |
Breaking Into Container Orchestrators
| Nadeem Hussain | #red-teaming#cloud-workload-protection#container-security+2 |
| 2018-03-01 | Talk | Nullcon |
DARWIN (A parasite covert wireless network)
| Rushikesh D Nandedkar | #wifi#red-teaming#network-architecture+1 |
| 2018-03-01 | Talk | Nullcon |
Looting your bank savings using Digital India
| Indrajeet Bhuyan | #red-teaming#application-pentesting#api-security+4 |
| 2018-03-01 | Talk | Nullcon |
Software Supply Chain Cyberattack
| Samiran Ghatak | #red-teaming#cyberattack#supply-chain-attack+1 |
| 2018-03-01 | Talk | Nullcon |
Unleashing D* on Android Kernel Drivers
| Aravind Machiry | #android#fuzzing#red-teaming+3 |
| 2017-12-06 | Talk | Blackhat |
BREAKING BAD: STEALING PATIENT DATA THROUGH MEDICAL DEVICES
| Saurabh Harit | #red-teaming#data-leak#identity-theft+1 |
| 2017-12-06 | Talk | Blackhat |
DIFUZZING ANDROID KERNEL DRIVERS
| Aravind Machiry, Chris Salls, Yan Shoshitaishvili, Jake Corina, Shuang Hao | #android#red-teaming#linux+2 |
| 2017-12-06 | Tool demo | Blackhat |
EXPLIOT - INTERNET OF THINGS SECURITY TESTING AND EXPLOITATION FRAMEWORK
| Aseem Jakhar | #security-assessment#red-teaming#blueteam+1 |
| 2017-11-17 | Talk | Deepsec |
Intel AMT: Using & Abusing The Ghost In The Machine
| Parth Shukla | #red-teaming#blueteam#purpleteam |
| 2017-10-19 | Talk | Hacklu |
Intel AMT: Using & Abusing the Ghost in the Machine
| Parth Shukla | #red-teaming#blueteam#purpleteam |
| 2017-09-13 | Talk | 44con |
Red Team Revenge : Attacking Microsoft ATA
| Nikhil Mittal | #windows#red-teaming#active-directory+4 |
| 2017-08-18 | Talk | C0c0n |
Anti-Virus Bypassing for Fun and Profit
| Vanshit Malhotra | #red-teaming#malware-research#bypassing+2 |
| 2017-08-18 | Talk | C0c0n |
Exploiting the smartness of BLE Stack
| Apoorva Gupta | #bluetooth#red-teaming#mobile-hacking+3 |
| 2017-08-18 | Talk | C0c0n |
Hacking Homes: A hardware insight for IoT [in]Security
| Jiggyasu Sharma | #red-teaming#hardware-embedded#firmware-analysis+2 |
| 2017-08-18 | Talk | C0c0n |
Hunting the Hunters β Fighting CyberCrime at the Source
| Valan Sivasubramanian | #red-teaming#cybersecurity-strategy#cyber-crime+2 |
| 2017-08-18 | Talk | C0c0n |
Mobile Banking (In)Security
| Sneha Rajguru | #appsec#purpleteam#red-teaming+1 |
| 2017-08-18 | Talk | C0c0n |
The card hack - Lessons from the Hitachi Payments Breach
| Saikat Datta | #red-teaming#blueteam#purpleteam |
| 2017-07-30 | Tool demo | Blackhat |
Yasuo
| Saurabh Harit | #secure-coding#red-teaming#blueteam+3 |
| 2017-07-29 | Tool demo | Defcon |
WIDY 2.0: WIFI 0WNAGE IN UNDER $5 RELOADED
| Vivek Ramachandran, Nishant Sharma, Ashish Bhangale | #wifi#red-teaming#blueteam+1 |
| 2017-07-29 | Tool demo | Defcon |
WiMonitor - an OpenWRT package for remote WiFi sniffing
| Vivek Ramachandran, Nishant Sharma, Ashish Bhangale | #openwrt#red-teaming#sniffing+1 |
| 2017-07-28 | Tool demo | Defcon |
Android Tamer
| Anant Shrivastava | #android#security-assessment#red-teaming+2 |
| 2017-07-28 | Tool demo | Defcon |
GibberSense
| Ajit Hatti | #encryption#red-teaming#security-assessment |
| 2017-07-27 | Tool demo | Blackhat |
Android Tamer
| Anant Shrivastava | #android#security-assessment#red-teaming+2 |
| 2017-07-27 | Talk | Blackhat |
Evading Microsoft ATA for Active Directory Domination
| Nikhil Mittal | #active-directory#red-teaming#security-assessment+1 |
| 2017-07-27 | Tool demo | Blackhat |
Gibber Sense
| Ajit Hatti | #secure-coding#reconnaissance#encryption+3 |
| 2017-07-26 | Talk | Blackhat |
New Adventures in Spying 3G and 4G Users: Locate, Track & Monitor
| Ravishankar Borgaonkar, Altaf Shaik, Shinjo Park, Lucca Hirschi, Andrew Martin, Jean Pierre Seifert | #red-teaming#spying#3g+3 |
| 2017-07-26 | Talk | Blackhat |
Wire Me Through Machine Learning
| Ankit Singh, Vijay Thaware | #machine-learning#red-teaming#ai-security+3 |
| 2017-05-23 | Talk | Phdays |
How we hacked distributed configuration management systems
| Bharadwaj Machiraju, Francis Alexander | #red-teaming#fingerprinting#configuration-management |
| 2017-05-23 | Talk | Phdays |
Practical machine learning in infosecurity
| Anto Joseph, Clarence Chio | #machine-learning#red-teaming#blueteam+1 |
| 2017-04-19 | Talk | Brucon |
Evading Microsoft ATA for Active Directory Domination
| Nikhil Mittal | #active-directory#red-teaming#windows |
| 2017-04-14 | Talk | Hitbsecconf |
COMMSEC: IoT Hacking Simplified
| Aseem Jakhar | #red-teaming#iot-pentesting#hardware-embedded+2 |
| 2017-04-14 | Talk | Hitbsecconf |
Is There a Doctor in The House? Hacking Medical Devices and Healthcare Infrastructure
| Anirudh Duggal | #red-teaming#application-pentesting#data-protection+3 |
| 2017-03-31 | Talk | Blackhat |
Mobile-Telephony Threats in Asia
| Payas Gupta, Marco Balduzzi, Lion Gu | #red-teaming#social-engineering#phishing+2 |
| 2017-03-31 | Talk | Blackhat |
The Seven Axioms of Security
| Saumil Shah | #blueteam#security-strategy#threat-modeling+2 |
| 2017-03-31 | Talk | Blackhat |
WHAT MALWARE AUTHORS DON’T WANT YOU TO KNOW - EVASIVE HOLLOW PROCESS INJECTION
| Monnappa K A | #code-injection#red-teaming#malware-research+4 |
| 2017-03-30 | Tool demo | Blackhat |
WiDy: WiFi 0wnage in Under $5
| Vivek Ramachandran, Nishant Sharma, Ashish Bhangale | #wifi#red-teaming#blueteam+1 |
| 2017-03-15 | Talk | Cansecwest |
Inside Stegosploit
| Saumil Shah | #steganography#red-teaming#exploit-delivery |
| 2017-03-03 | Talk | Nullcon |
Case study of SS7/Sigtran assessment
| Akib Sayyed | #ss7#security-assessment#blueteam+2 |
| 2017-03-03 | Talk | Nullcon |
Case Study on RFID (proximity cards) hacking
| Sarwar Jahan, Ashwath Kumar | #rfid#red-teaming#hardware-embedded+4 |
| 2017-03-03 | Talk | Nullcon |
Hacking medical devices and infrastructure
| Anirudh Duggal | #red-teaming#application-pentesting#security-testing |
| 2016-11-05 | Talk | Hackfest |
LockPicker: Leaking data from live LUKS partition
| Adhokshaj Mishra | #linux#red-teaming#data-leak |
| 2016-11-04 | Talk | Blackhat |
Detach Me Not - DoS Attacks Against 4G Cellular Users Worldwide from your Desk
| Siddharth Rao, Bhanu Kotte, Dr. Silke Holtmanns | #dos#red-teaming#ss7+4 |
| 2016-11-04 | Talk | Blackhat |
Randomization Can’t Stop BPF JIT Spray
| N Asokan, Filippo Bonazzi, Elena Reshetova | #linux#red-teaming#exploit-development |
| 2016-11-04 | Tool demo | Blackhat |
Yasuo
| Saurabh Harit | #secure-coding#red-teaming#blueteam+3 |
| 2016-09-23 | Talk | Rootcon |
Halcyon β A Faster Way to Build Custom Scripts for Nmap Scans
| Sanoop Thomas | #secure-coding#reconnaissance#red-teaming+1 |
| 2016-08-19 | Talk | C0c0n |
Abusing Digital Certificates : Malware Style
| Ajit Hatti | #red-teaming#exploit-delivery#threat-modeling |
| 2016-08-19 | Talk | C0c0n |
Attacking and crashing IOT devices via Bluetooth LE Protocol
| Pratap Chandra Allena, Ajay Pratap Singh | #bluetooth#red-teaming#iot-pentesting+2 |
| 2016-08-19 | Talk | C0c0n |
Backdooring my Enemies with a Proxy for Threat Intelligence
| Jovin Lobo, Aditya Vasekar | #purpleteam#red-teaming#blueteam |
| 2016-08-19 | Talk | C0c0n |
Breaking into Gas stations!
| Suraj Pratap | #red-teaming#ethical-hacking#exploit-delivery+2 |
| 2016-08-19 | Talk | C0c0n |
Esoteric XSS Payloads
| Riyaz Walikar | #xss#red-teaming#code-injection+3 |
| 2016-08-19 | Talk | C0c0n |
Evading Corporate Security β Youβre as secure as the weakest link
| Prajwal Panchmahalkar | #red-teaming#employee-education#social-engineering+3 |
| 2016-08-06 | Tool demo | Defcon |
Android-InsecureBank
| Dinesh Shetty | #android#red-teaming#application-pentesting+4 |
| 2016-08-04 | Tool demo | Blackhat |
Droid-FF: Android Fuzzing Framework
| Anto Joseph | #android#fuzzing#secure-coding+1 |
| 2016-08-03 | Tool demo | Blackhat |
Android Tamer
| Anant Shrivastava | #android#security-assessment#red-teaming+2 |
| 2016-08-03 | Tool demo | Blackhat |
Android-InsecureBankv2
| Dinesh Shetty | #android#red-teaming#application-pentesting+4 |
| 2016-08-03 | Talk | Blackhat |
AMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does It
| Nikhil Mittal | #windows#amsi#powershell+1 |
| 2016-08-03 | Tool demo | Blackhat |
Nishang: The Goodness of Offensive PowerShell
| Nikhil Mittal | #windows#red-teaming#powershell |
| 2016-05-26 | Talk | Hitbsecconf |
HITB Lab: Droid-FF: The First Android Fuzzing Framework
| Anto Joseph | #android#fuzzing#red-teaming |
| 2016-05-17 | Talk | Phdays |
Fingerprinting and Attacking a Healthcare Infrastructure
| Anirudh Duggal | #red-teaming#fingerprinting#ransomware+4 |
| 2016-04-01 | Tool demo | Blackhat |
Android Tamer
| Anant Shrivastava | #android#security-assessment#red-teaming+2 |
| 2016-04-01 | Tool demo | Blackhat |
HackSys Extreme Vulnerable Driver
| Ashfaq Ansari | #red-teaming#security-assessment#windows |
| 2016-04-01 | Tool demo | Blackhat |
Halcyon β A Faster Way to Build Custom Scripts for Nmap Scans
| Sanoop Thomas | #reconnaissance#red-teaming#nmap |
| 2016-03-11 | Talk | Nullcon |
Attacking and defending healthcare - EMR solutions
| Anirudh Duggal | #red-teaming#blueteam#application-pentesting+1 |
| 2016-03-11 | Talk | Nullcon |
Hitchhiker’s guide to hacking Industrial Control systems (ICS)
| Arun Mane | #red-teaming#ics#hid |
| 2016-03-11 | Talk | Nullcon |
Million Dollar Baby: Towards ANGRly conquering DARPA CGC
| Aravind Machiry | #red-teaming#security-assessment#application-pentesting+4 |
| 2016-03-11 | Talk | Nullcon |
Privacy leaks on 4G-LTE networks
| Altaf Shaik | #red-teaming#4g#lte+1 |
| 2015-11-19 | Talk | Deepsec |
Continuous Intrusion: Why CI Tools Are an Attacker’s Best Friends.
| Nikhil Mittal | #red-teaming#ci-cd#cicd-security+3 |
| 2015-11-13 | Talk | Blackhat |
LTE & IMSI Catcher Myths
| Ravishankar Borgaonkar, N Asokan, Altaf Shaik, Valtteri Niemi, Jean Pierre Seifert | #lte#red-teaming#imsi |
| 2015-11-13 | Talk | Blackhat |
Continuous Intrusion: Why CI tools are an Attacker’s Best Friends
| Nikhil Mittal | #red-teaming#ci-cd#application-pentesting+4 |
| 2015-11-12 | Tool demo | Blackhat |
Android InsecureBank
| Dinesh Shetty | #android#red-teaming#application-pentesting+4 |
| 2015-11-12 | Tool demo | Blackhat |
Android Tamer
| Anant Shrivastava | #android#security-assessment#red-teaming+2 |
| 2015-11-12 | Tool demo | Blackhat |
Kautilya: Fastest shells you will ever get
| Nikhil Mittal | #hid#red-teaming#windows |
| 2015-11-12 | Tool demo | Blackhat |
Nishang - Tracking A Windows User
| Nikhil Mittal | #windows#red-teaming#endpoint-protection+1 |
| 2015-11-12 | Talk | Blackhat |
Stegosploit - Exploit Delivery with Steganography and Polyglots
| Saumil Shah | #red-teaming#steganography#exploit-delivery |
| 2015-11-05 | Talk | Groundzerosummit |
Browser based Malware attacks
| Harsh Daftary | #red-teaming#keylogging#phishing |
| 2015-11-05 | Talk | Groundzerosummit |
Hacking RFIDs under 2000INR
| Jayesh Chauhan | #rfid#red-teaming#hardware-embedded+4 |
| 2015-11-05 | Talk | Groundzerosummit |
Thanks for the free cookies
| Anshul Saxena, Nishant Yadav | #red-teaming#application-pentesting#security-testing |
| 2015-10-21 | Talk | Hacklu |
Stegosploit - Delivering Drive-By Exploits With Only Images
| Saumil Shah | #red-teaming#steganography#application-pentesting+1 |
| 2015-09-11 | Talk | 44con |
Stegosploit β Drive-by Browser Exploits using only Images
| Saumil Shah | #steganography#red-teaming#web-security+1 |
| 2015-08-28 | Tool demo | Blackhat |
Damn Vulnerable iOS App (DVIA)
| Prateek Gianchandani | #ios#security-assessment#red-teaming |
| 2015-08-08 | Talk | Defcon |
Dissecting the Design of SCADA Web Human Machine Interfaces (HMIs) - Hunting Vulnerabilities
| Aditya K Sood | #scada#hmi#security-assessment+4 |
| 2015-08-08 | Talk | Defcon |
Powershell for Penetraton Testers
| Nikhil Mittal | #security-assessment#red-teaming#exploitation+3 |
| 2015-08-08 | Talk | Defcon |
QARK: Android App Exploit and SCA Tool
| Tushar Dalvi, Tony Trummer | #android#metasploit#red-teaming+3 |
| 2015-08-06 | Tool demo | Blackhat |
Kautilya
| Nikhil Mittal | #hid#red-teaming#windows |
| 2015-08-05 | Tool demo | Blackhat |
QARK - Android Application SCA and Exploit Tool
| Tushar Dalvi | #android#red-teaming#security-assessment+2 |
| 2015-08-01 | Talk | C0c0n |
A Pentester’s Methodology to Discover, Automate and Exploit Windows Privilege Escalation flaws.
| Riyaz Walikar | #windows#red-teaming#security-assessment |
| 2015-08-01 | Talk | C0c0n |
Attack chaining for web exploitation- From Information leakage to gaining Root access
| Abhijeth Dugginapeddi | #red-teaming#application-pentesting#attack-surface+2 |
| 2015-07-06 | Talk | Blackhat |
DOM FLOW - UNTANGLING THE DOM FOR MORE EASY-JUICY BUGS
| Ahamed Nafeez | #red-teaming#xss#application-pentesting+2 |
| 2015-05-29 | Talk | Hitbsecconf |
Hacking Samsungβs Tizen: The OS of Everything
| Ajin Abraham | #os#wearables#red-teaming |
| 2015-05-29 | Talk | Hitbsecconf |
PowerShell for Penetration Testers
| Nikhil Mittal | #red-teaming#windows#powershell+1 |
| 2015-05-28 | Talk | Hitbsecconf |
Stegosploit: Hacking With Pictures
| Saumil Shah | #red-teaming#steganography#web-security |
| 2015-05-26 | Talk | Phdays |
iOS Application Exploitation
| Prateek Gianchandani, Egor Tolstoy | #ios#red-teaming#application-pentesting+4 |
| 2015-03-27 | Talk | Blackhat |
Security Content Metadata Model with an Efficient Search Methodology for Real Time Monitoring and Threat Intelligence
| Preeti Subramanian | #threat-intelligence-analysis#blueteam#red-teaming+1 |
| 2015-03-27 | Talk | Syscan |
Stegosploit - Hacking with Pictures
| Saumil Shah | #steganography#red-teaming#web-security+1 |
| 2015-03-26 | Tool demo | Blackhat |
OWASP Xenotix XSS Exploit Framework
| Ajin Abraham | #owasp#xss#blueteam+3 |
| 2015-03-26 | Talk | Blackhat |
The underground Ecosystem of Credit Card frauds
| Abhinav Singh | #red-teaming#data-leak#identity-theft+1 |
| 2015-02-06 | Talk | Nullcon |
Anatomy of a credit card stealing POS malware
| Amol Sarwate | #red-teaming#application-pentesting#data-protection+1 |
| 2015-02-06 | Talk | Nullcon |
Attack and Defence in Radio and Communication Warfare
| Akib Sayyed | #red-teaming#blueteam#purpleteam+2 |
| 2015-02-06 | Talk | Nullcon |
Drone Attacks: How I hijacked a drone
| Rahul Sasi | #red-teaming#drone#gps+2 |
| 2015-02-06 | Talk | Nullcon |
Hacking Tizen: The OS of Everything
| Ajin Abraham | #os#wearables#red-teaming |
| 2014-11-13 | Talk | Groundzerosummit |
Attacking Cryptography & PKI Implementations
| Ajit Hatti | #encryption#red-teaming#ssl+4 |
| 2014-11-13 | Talk | Groundzerosummit |
Security vulnerabilities in DVB-C networks: Hacking Cable TV network
| Rahul Sasi | #red-teaming#dvb-c#network-pentesting |
| 2014-11-13 | Talk | Groundzerosummit |
Attacking Web-Proxies like never before
| Ahamed Nafeez | #red-teaming#application-hardening#security-testing |
| 2014-11-13 | Talk | Groundzerosummit |
Evaluating WAF (Web Application Firewall) for Fun and Profit with WOF
| Bhaumik Merchant | #red-teaming#application-pentesting#security-testing+1 |
| 2014-11-13 | Talk | Groundzerosummit |
Fuzzing Asynchronous Protocols built over Websockets
| Lavakumar Kuppan | #fuzzing#red-teaming#application-pentesting+2 |
| 2014-11-13 | Talk | Groundzerosummit |
Hacking consumer electronics for Fun
| Atul Alex | #red-teaming#embedded-systems#firmware-analysis+1 |
| 2014-11-13 | Talk | Groundzerosummit |
How I won Browser Fuzzing
| Amol Naik | #fuzzing#red-teaming#security-testing+4 |
| 2014-11-13 | Talk | Groundzerosummit |
Making and Breaking Embedded Security
| Yashin Mehaboobe | #red-teaming#blueteam#purpleteam |
| 2014-11-13 | Talk | Groundzerosummit |
SCADA Exploitation through Firmware
| Ashish Saxena | #red-teaming#firmware-analysis#ics-security+3 |
| 2014-11-13 | Talk | Groundzerosummit |
Vulnerability Reproduction using Zest
| Deep Shah | #red-teaming#exploit-delivery#automated-scanning |
| 2014-10-29 | Talk | Ekoparty |
Security vulnerabilities in DVB-C networks: Hacking Cable tV network part 2
| Rahul Sasi | #red-teaming#dvb-c#firmware-analysis+1 |
| 2014-10-23 | Talk | Hacklu |
Hacking with Images - Evil Pictures
| Saumil Shah | #red-teaming#steganography#application-pentesting+3 |
| 2014-10-23 | Talk | Hacklu |
WiHawk - Router Vulnerability Scanner
| Anamika Singh | #wifi#red-teaming#csrf+1 |
| 2014-10-16 | Talk | Grrcon |
Socioware: Dissecting Online Social Network Worms β Insidious Analysis and Design
| Aditya K Sood, Dr. Richard J Enbody | #red-teaming#reverse-engineering#blueteam+1 |
| 2014-09-28 | Talk | Blackhat |
Understanding IMSI Privacy
| Swapnil Udar, Ravishankar Borgaonkar | #imsi#red-teaming#android+4 |
| 2014-09-16 | Talk | Deepsec |
Advanced Powershell Threat β Lethal Client Side Attacks
| Nikhil Mittal | #powershell#red-teaming#endpoint-protection+4 |
| 2014-08-22 | Talk | C0c0n |
APT: Case Study of attackers targeting public tendering
| Rahul Sasi | #red-teaming#apt#attack-surface+4 |
| 2014-08-22 | Talk | C0c0n |
Cryptographic Backdoors: Subverting the RSA
| Adhokshaj Mishra | #encryption#red-teaming#security-strategy+3 |
| 2014-08-22 | Talk | C0c0n |
Exploiting NoSQL Like Never Before
| Francis Alexander | #red-teaming#application-pentesting#security-testing |
| 2014-08-22 | Talk | C0c0n |
Hacking Communication
| Akib Sayyed | #red-teaming#network-architecture#social-engineering+1 |
| 2014-08-22 | Talk | C0c0n |
Idle Machines doing Bounty Hunting (Behind your Back)
| Mrityunjay Gautam | #bug-hunting#red-teaming#automated-scanning+3 |
| 2014-08-22 | Talk | C0c0n |
Lesser Known Attack - XML Injection
| Amol Naik | #red-teaming#application-pentesting#code-review+3 |
| 2014-08-22 | Talk | C0c0n |
Making and breaking security in embedded devices
| Yashin Mehaboobe | #purpleteam#red-teaming#blueteam |
| 2014-08-07 | Tool demo | Blackhat |
C-SCAD: Assessing Security flaws in clearscada Web_X client!
| Aditya K Sood | #red-teaming#security-assessment#ics-security+3 |
| 2014-08-06 | Talk | Blackhat |
What goes around comes back around - Exploiting fundamental weaknees in Botnet C&C Panels!
| Aditya K Sood | #botnet#red-teaming#blueteam+1 |
| 2014-05-29 | Talk | Hitbsecconf |
Hacking Your Cable TV Network: Die Hard Style
| Rahul Sasi | #red-teaming#iptv#reverse-engineering |
| 2014-05-29 | Talk | Hitbsecconf |
LOL (Layers On Layers) β Bypassing Endpoint Security for Fun and Profit
| Rahul Kashyap, Rafal Wojtzcuk | #red-teaming#windows#kernel |
| 2014-05-21 | Talk | Phdays |
Android Exploitation
| Aditya Gupta | #android#red-teaming#security-assessment+1 |
| 2014-03-27 | Talk | Blackhat |
JS Suicide: Using JavaScript Security Features to Kill JS Security
| Ahamed Nafeez | #web-security#red-teaming#csrfguard+1 |
| 2014-02-15 | Tool demo | Nullcon |
NoSQL Exploitation Framework
| Francis Alexander | #red-teaming#application-pentesting#security-tools+3 |
| 2014-02-15 | Tool demo | Nullcon |
OWASP Xenotix XSS Exploit Framerwork
| Ajin Abraham | #owasp#xss#blueteam+3 |
| 2014-02-14 | Talk | Nullcon |
Attack of the setuid bit - pt_chown and pwning root terminals
| Siddhesh Poyarekar | #glibc#red-teaming#blueteam+2 |
| 2014-02-14 | Talk | Nullcon |
Attacking WPA/WPA2 in the Cloud
| Vivek Ramachandran | #wifi#wpa2#red-teaming |
| 2014-02-14 | Talk | Nullcon |
Hacking YOu’r Cable TV Network.
| Rahul Sasi, Ahamed Nafeez | #red-teaming#network-pentesting#endpoint-protection+1 |
| 2014-02-14 | Talk | Nullcon |
Hardware Attack Vectors
| Yashin Mehaboobe | #red-teaming#hid#radio |
| 2014-02-14 | Talk | Nullcon |
phoneypdf: A Virtual PDF Analysis Framework
| Kiran Bandla | #pdf#web-security#red-teaming+2 |
| 2014-02-14 | Talk | Nullcon |
Wi-Hawk Password Auditing Tool
| Anamika Singh | #wifi#red-teaming#network-architecture |
| 2013-11-07 | Talk | Groundzerosummit |
Abusing Google Apps: Google is my command and control center
| Ajin Abraham | #android#red-teaming#cloud-pentesting+4 |
| 2013-11-07 | Talk | Groundzerosummit |
Setting the Data Center on fire
| Ajit Hatti | #red-teaming#incident-management#security-training+1 |
| 2013-09-27 | Talk | C0c0n |
Blur Captcha
| Anirudh Duggal, Abhinav Mohanty | #red-teaming#security-testing#application-pentesting+1 |
| 2013-09-27 | Talk | C0c0n |
Disclosing Vulnerabilities: The Bug Bounty Style
| Nikhil Prabhakar | #red-teaming#bug-bounty#ethical-hacking+3 |
| 2013-09-27 | Talk | C0c0n |
Infiltrating the Intranet with Skanda
| Jayesh Chauhan | #red-teaming#secure-coding#ethical-hacking+1 |
| 2013-09-27 | Talk | C0c0n |
Lets Play - Applanting on new Grounds
| Ajit Hatti | #android#red-teaming#csrf+1 |
| 2013-09-27 | Talk | C0c0n |
Pwning WiFi Devices!
| Swaroop Yermalkar | #wifi#red-teaming#network-pentesting+2 |
| 2013-09-27 | Talk | C0c0n |
SSRF / XSPA - Real World Attacks and Mitigations
| Riyaz Walikar | #ssrf#xspa#red-teaming |
| 2013-09-12 | Talk | Grrcon |
The Droid Exploitation Saga β All Over Again!
| Aditya Gupta, Subho Halder | #android#red-teaming#android-security+4 |
| 2013-08-03 | Talk | Defcon |
PowerPreter: Post Exploitation Like a Boss
| Nikhil Mittal | #red-teaming#powershell#windows |
| 2013-08-01 | Talk | Blackhat |
Hot knives through butter: Bypassing automated analysis systems
| Abhishek Singh, Zheng Bu | #red-teaming#dynamic-analysis#malware-research+1 |
| 2013-08-01 | Tool demo | Blackhat |
OWASP Xenotix XSS Exploit Framework
| Ajin Abraham | #owasp#xss#blueteam+3 |
| 2013-07-31 | Talk | Blackhat |
Clickjacking revisited: A perceptual view of UI security
| Devdatta Akhawe | #clickjacking#blueteam#red-teaming |
| 2013-07-31 | Tool demo | Blackhat |
JMSDigger
| Gursev Singh Kalra | #security-assessment#red-teaming#blueteam+1 |
| 2013-03-15 | Tool demo | Blackhat |
OWASP Xenotix XSS Exploit Framework
| Ajin Abraham | #owasp#xss#blueteam+3 |
| 2013-03-15 | Tool demo | Blackhat |
Prasadhak (And Offensive Powershell)
| Nikhil Mittal | #powershell#windows#red-teaming |
| 2013-03-14 | Talk | Blackhat |
Lets play - Applanting
| Ajit Hatti | #red-teaming#csrf#clickjacking+1 |
| 2013-03-12 | Talk | Troopers |
Dirty use of USSD Codes in Cellular Network
| Ravishankar Borgaonkar | #red-teaming#android-security#ios-security |
| 2013-03-07 | Talk | Cansecwest |
SMS to Meterpreter - Fuzzing USB Modems
| Rahul Sasi | #red-teaming#fuzzing#hardware-embedded |
| 2013-03-01 | Talk | Nullcon |
Capturing Zero-Day Information
| Dinesh O Bareja, Sumit Sharma | #zero-day#red-teaming#honeypot |
| 2013-03-01 | Talk | Nullcon |
Detecting and Exploiting XSS Vulnerabilities and Xenotix XSS Exploitation Framework
| Ajin Abraham | #xss#red-teaming#application-pentesting+3 |
| 2013-03-01 | Talk | Nullcon |
Pawing the Droid: Twisting the ARM
| Divyanshu Shekhar, Anshul Kumar | #android#arm#linux+4 |
| 2013-03-01 | Talk | Nullcon |
Rest - A Real Stealth and Semi Stealth MITM Attack Tool for IPv4 Networks
| Naga Rohit Samineni | #ipv4#mitm#blueteam+2 |
| 2013-03-01 | Talk | Nullcon |
SMS to Meterpreter - Fuzzing USB Modems
| Rahul Sasi | #red-teaming#fuzzing#network-pentesting+2 |
| 2013-03-01 | Talk | Nullcon |
Vulnerability research anyone?
| Omair | #red-teaming#blueteam#purpleteam |
| 2012-12-06 | Talk | Blackhat |
Attacking ODATA
| Gursev Singh Kalra | #red-teaming#api-security#application-pentesting+2 |
| 2012-12-06 | Talk | Blackhat |
HTML5 top 10 threats β Stealth Attack and Silent Exploits
| Shreeraj Shah | #red-teaming#application-pentesting#dynamic-analysis+4 |
| 2012-12-06 | Talk | Blackhat |
Poking servers with Facebook(and other web applications)
| Riyaz Walikar | #xspa#red-teaming#application-pentesting+2 |
| 2012-12-06 | Talk | Blackhat |
The art of exploiting logical flaws in web apps
| Sumit Siddharth, Richard Dean | #red-teaming#secure-coding#application-pentesting+1 |
| 2012-12-05 | Talk | Blackhat |
Droid Exploitation Saga
| Aditya Gupta, Subho Halder | #android#red-teaming#android-security+3 |
| 2012-12-01 | Talk | Clubhack |
Content-Type attack -Dark hole in the secure environment
| Raman Gupta | #red-teaming#application-pentesting#pdf+3 |
| 2012-12-01 | Talk | Clubhack |
Detecting and Exploiting XSS with Xenotix XSS Exploit Framework
| Ajin Abraham | #xss#red-teaming#application-pentesting+4 |
| 2012-12-01 | Talk | Clubhack |
FatCat Web Based SQL Injector
| Sandeep Kamble | #sqli#red-teaming#input-validation+4 |
| 2012-12-01 | Talk | Clubhack |
Hacking and Securing iOS applications
| Satish Bommisetty | #red-teaming#blueteam#purpleteam+1 |
| 2012-12-01 | Talk | Clubhack |
Stand Close to Me, & Youβre pwned! : Owning SmartPhones using NFC
| Aditya Gupta, Subho Halder | #nfc#red-teaming#android-security+4 |
| 2012-11-29 | Talk | Deepsec |
Bad Things in Good Packages - Creative Exploit Delivery
| Saumil Shah | #red-teaming#exploit-delivery#security-testing |
| 2012-11-23 | Talk | Malcon |
Advanced Malware Engine
| Mohit Kumar | #android#red-teaming#malware-research+3 |
| 2012-11-23 | Talk | Malcon |
Advances in ROP attacks
| Raashid Bhat | #red-teaming#bypassing#exploit-delivery+3 |
| 2012-11-23 | Talk | Malcon |
Windows Phone 8 Malware Prototype
| Shantanu Gawde | #windows-phone#red-teaming#mobile-device-management+3 |
| 2012-10-11 | Talk | Hitbsecconf |
XSS & CSRF strike back β Powered by HTML5
| Shreeraj Shah | #red-teaming#csrf#cors+1 |
| 2012-10-10 | Talk | Hitbsecconf |
Innovative Approaches to Exploit Delivery
| Saumil Shah | #red-teaming#exploit-delivery#browser-security |
| 2012-09-27 | Talk | Grrcon |
The Realm of Third Generation Botnet Attacks
| Aditya K Sood, Dr. Richard J Enbody | #red-teaming#botnet#dynamic-analysis+1 |
| 2012-09-26 | Talk | Nullcon |
Highly Harmful Audio Waves aka DTMF Fuzzing
| Rahul Sasi | #dtmf#red-teaming#fuzzing+3 |
| 2012-09-20 | Talk | Ekoparty |
Dirty use of USSD Codes in Cellular Network
| Ravishankar Borgaonkar | #red-teaming#android-security#endpoint-protection+1 |
| 2012-09-20 | Talk | Ekoparty |
Fuzzing DTMF Input Processing Algorithms
| Rahul Sasi | #fuzzing#red-teaming#dtmf |
| 2012-08-03 | Talk | C0c0n |
Evil JavaScript
| Bishan Singh | #red-teaming#web-security#application-pentesting+4 |
| 2012-08-03 | Talk | C0c0n |
WebApp Remote Code Execution using Server Side Scripting Engines
| Rahul Sasi | #red-teaming#security-assessment#application-pentesting+4 |
| 2012-07-26 | Talk | Blackhat |
HTML5 top 10 threats β Stealth Attack and Silent Exploits
| Shreeraj Shah | #red-teaming#cors#csrf+3 |
| 2012-03-21 | Talk | Troopers |
More Fun Using Kautilya or Is It a Thumb Drive? Is It a Toy? No, Itβs a Keyboard
| Nikhil Mittal | #security-assessment#red-teaming#keylogging |
| 2012-03-16 | Talk | Blackhat |
IVR Security- Internal Network Attack via Phone Lines
| Rahul Sasi | #red-teaming#ivrs#network-pentesting+3 |
| 2012-03-16 | Talk | Blackhat |
The Pwnage Saga Continues
| Nikhil Mittal | #hid#red-teaming#buffer-underflow+2 |
| 2012-03-14 | Talk | Blackhat |
Hacking XPATH 2.0
| Sumit Siddharth, Tom Forbes | #red-teaming#application-pentesting#input-validation+1 |
| 2012-03-14 | Talk | Blackhat |
HTML5 top 10 threats β Stealth Attack and Silent Exploits
| Shreeraj Shah | #red-teaming#cors#csrf+3 |
| 2012-02-15 | Talk | Nullcon |
Attacking Backup Software
| Nibin Varghese | #red-teaming#application-pentesting#security-testing |
| 2012-02-15 | Talk | Nullcon |
Binary God
| Atul Alex | #red-teaming#emulator#assembler+2 |
| 2012-02-15 | Talk | Nullcon |
CAPTCHAs for fun and Profit
| Gursev Singh Kalra | #red-teaming#application-pentesting#input-validation+2 |
| 2012-02-15 | Talk | Nullcon |
Content sniffing Algorithm bypassing techniques and possible attack vectors
| Anil Aphale, Chaitany Kamble | #red-teaming#xss#web-security+2 |
| 2012-02-15 | Talk | Nullcon |
Friction in the machine
| Dinesh Shenoy | #red-teaming#blueteam#purpleteam |
| 2012-02-15 | Talk | Nullcon |
Haxdroid: Empowering Android Handset
| Anant Shrivastava, Prashant Mahajan, Pardhasaradhi Ch | #android#security-assessment#red-teaming |
| 2012-02-15 | Talk | Nullcon |
IVR Security: Internal Network attacks via phone lines
| Rahul Sasi | #ivrs#red-teaming#application-pentesting+1 |
| 2012-02-15 | Talk | Nullcon |
Node.js: The good, bad and ugly
| Bishan Singh | #web-security#red-teaming#blueteam+1 |
| 2012-02-15 | Talk | Nullcon |
Your phone is your phone but your calls are now my calls
| Akib Sayyed, Bipul Sahu, Dipesh Goyal, Nitin Agarwal | #red-teaming#gsm#exploit-delivery+1 |
| 2011-12-15 | Talk | Blackhat |
Kautilya: Teensy Beyond Shell
| Nikhil Mittal | #hid#red-teaming#endpoint-protection+3 |
| 2011-12-04 | Talk | Clubhack |
Android Tamer
| Anant Shrivastava | #android#security-assessment#red-teaming+2 |
| 2011-12-04 | Talk | Clubhack |
DOM XSS β Encounters of the 3rd Kind
| Bishan Singh | #xss#red-teaming#secure-coding+4 |
| 2011-12-04 | Talk | Clubhack |
Exploit the Exploit Kits
| Dhruv Soi | #red-teaming#exploit-kit#malware-distribution+4 |
| 2011-12-04 | Talk | Clubhack |
Hacking your Droid
| Aditya Gupta | #red-teaming#android#mobile-hacking+4 |
| 2011-12-04 | Talk | Clubhack |
Handle Exploitation of Remote System From Email Account
| Bhaumik Merchant | #red-teaming#phishing#social-engineering |
| 2011-12-04 | Talk | Clubhack |
Mere paas Teensy hai
| Nikhil Mittal | #hid#red-teaming#security-assessment |
| 2011-12-04 | Talk | Clubhack |
One Link Facebook
| Anand Pandey | #red-teaming#application-pentesting#phishing+1 |
| 2011-11-25 | Talk | Malcon |
Advanced Malware for Apple Products
| Atul Alex | #red-teaming#macos#ios |
| 2011-11-25 | Talk | Malcon |
Mareech : Look itβs a HID made up of gold
| Nikhil Mittal | #hid#red-teaming#keylogging+2 |
| 2011-11-04 | Talk | Hackfest |
Here are your keystrokes
| Nikhil Mittal | #red-teaming#keylogging#security-assessment+1 |
| 2011-10-13 | Talk | Hitbsecconf |
Femtocells: A Poisonous Needle in the Operatorβs Hay Stack
| Ravishankar Borgaonkar, Kevin Redon, Nico Golde | #3g#red-teaming#application-pentesting |
| 2011-10-07 | Talk | C0c0n |
Deep(er) Penetration: Reaching the Internal Network using Exposed Web Applications
| Riyaz Walikar | #red-teaming#application-pentesting#application-hardening+1 |
| 2011-10-07 | Talk | C0c0n |
Exploiting the TCP Simultaneous Connection to Provide a Low Cost DoS Mitigation Solution
| Ahamed Nafeez | #red-teaming#network-pentesting#network-architecture |
| 2011-10-07 | Talk | C0c0n |
Runtime thread injection and execution in Linux processes
| Aseem Jakhar | #linux#red-teaming#code-injection+1 |
| 2011-10-07 | Talk | C0c0n |
Wi-Fi Malware for Fun and Profit
| Vivek Ramachandran | #red-teaming#network-pentesting#malware-distribution+2 |
| 2011-09-19 | Talk | Brucon |
Botnets and Browsers, Brothers in a Ghost Shell
| Aditya K Sood | #botnet#red-teaming#dynamic-analysis+1 |
| 2011-09-19 | Talk | Hacklu |
Linux thread injection - The jugaad way
| Aseem Jakhar | #linux#thread-injection#red-teaming |
| 2011-09-19 | Talk | Hacklu |
The travelling hacksmith
| Saumil Shah | #red-teaming#ethical-hacking#exploit-delivery+2 |
| 2011-09-19 | Talk | Brucon |
Wifi malware for fun and profit
| Vivek Ramachandran | #wifi#red-teaming#endpoint-protection+3 |
| 2011-09-07 | Talk | Securitybyte |
Enterprise Wi-Fi Worms, Backdoors and Botnets for Fun and Profit
| Vivek Ramachandran | #wifi#worm#botnet+1 |
| 2011-09-06 | Talk | Securitybyte |
Botnets at Application+ layer
| Raj Shastrakar | #bot#red-teaming#application-pentesting+4 |
| 2011-08-05 | Talk | Defcon |
Jugaad β Linux Thread Injection Kit
| Aseem Jakhar | #linux#thread-injection#red-teaming |
| 2011-05-20 | Talk | Hitbsecconf |
Next Generation Web Attacks β HTML 5, DOM(L3) and XHR(L2)
| Shreeraj Shah | #red-teaming#cors#csrf+3 |
| 2011-03-30 | Talk | Troopers |
Femtocell: Femtostep to the Holy Grail
| Ravishankar Borgaonkar, Kevin Redon | #red-teaming#application-pentesting#mobile-hacking+1 |
| 2011-02-25 | Talk | Nullcon |
Buffer Under Run Exploits
| Saurabh Sharma, Chinmaya Kamal | #buffer-underrun#buffer-underflow#red-teaming |
| 2011-02-25 | Talk | Nullcon |
Chupa Rustam
| Abhijeet Hatekar | #surveillance#red-teaming#application-pentesting+2 |
| 2011-02-25 | Talk | Nullcon |
Future of cyber crimes: Limitations and Challenges
| Pratap Reddy | #blueteam#red-teaming#purpleteam+1 |
| 2011-02-25 | Talk | Nullcon |
Fuzzing with complexities
| Vishwas Sharma | #fuzzing#red-teaming#application-pentesting+4 |
| 2011-02-25 | Talk | Nullcon |
JSON Fuzzing: New approach to old problems
| K v Prashant, Tamaghna Basu | #fuzzing#red-teaming#application-pentesting+4 |
| 2011-02-25 | Talk | Nullcon |
Jugaad Beta: Linux Thread Injection malware PoC
| Aseem Jakhar | #linux#red-teaming#malware-research+2 |
| 2011-02-25 | Talk | Nullcon |
Lessons Learned From 2010
| Saumil Shah | #red-teaming#exploit-delivery#social-engineering+2 |
| 2011-02-25 | Talk | Nullcon |
Penetration Testing a Biometric System
| Rahul Sasi | #security-assessment#biometric#hid+1 |
| 2011-02-25 | Talk | Nullcon |
Security Analysis of Indiaβs Electronic Voting Machines: Memoirs of a whistleblower
| Hari Krishna Prasad Vemuru | #evm#red-teaming#hardware-embedded+3 |
| 2010-12-04 | Talk | Clubhack |
Attacking with HTML5
| Lavakumar Kuppan | #red-teaming#application-pentesting#security-testing |
| 2010-12-04 | Talk | Clubhack |
Data theft in India
| K K Mookhey | #data-leak#red-teaming#cyber-crime |
| 2010-10-27 | Talk | Hacklu |
Exploit Delivery - Tricks and Techniques
| Saumil Shah | #red-teaming#exploit#exploit-delivery+4 |
| 2010-10-14 | Talk | Hitbsecconf |
Exploit Delivery
| Saumil Shah | #red-teaming#exploit#exploit-delivery+2 |
| 2010-10-13 | Talk | Hitbsecconf |
Hacking a Browserβs DOM β Exploiting Ajax and RIA
| Shreeraj Shah | #red-teaming#web-security#ajax+3 |
| 2010-08-01 | Talk | C0c0n |
Client Side Exploits using PDF
| Ankur Bhargava, Tamaghna Basu | #red-teaming#pdf#data-leak+2 |
| 2010-08-01 | Talk | C0c0n |
Code Disclosure over HTTP
| Anant Kochhar | #red-teaming#application-hardening#code-review+4 |
| 2010-08-01 | Talk | C0c0n |
Wireless MITM
| Prashant Mahajan | #red-teaming#network-pentesting#security-tools |
| 2010-08-01 | Talk | C0c0n |
Writing x86 ShellCode & Secure Self Modifying code and Cross Platform Programming - A Security Angle
| Praseed Pai | #windows#red-teaming#secure-coding |
| 2010-07-31 | Talk | Defcon |
WPA Too!
| Md Sohail Ahmad | #wifi#red-teaming#blueteam+1 |
| 2010-07-29 | Talk | Blackhat |
Hacking Browser’s DOM - Exploiting Ajax and RIA
| Shreeraj Shah | #red-teaming#ajax#application-pentesting+4 |
| 2010-07-29 | Talk | Blackhat |
Hacking Oracle From Web Apps
| Sumit Siddharth | #red-teaming#sql-injection#application-pentesting+3 |
| 2010-07-01 | Talk | Hitbsecconf |
The Travelling Hacksmith 2009 β 2010
| Saumil Shah | #red-teaming#application-pentesting#phishing+2 |
| 2010-07-01 | Talk | Hitbsecconf |
Top 10 Web 2.0 Attacks and Exploits
| Shreeraj Shah | #red-teaming#cors#csrf+3 |
| 2010-04-21 | Talk | Hitbsecconf |
Web Security β Going Nowhere?
| Saumil Shah | #red-teaming#application-hardening#application-pentesting+4 |
| 2010-04-14 | Talk | Blackhat |
Attacking JAVA Serialized Communication
| Manish Saindane | #secure-coding#red-teaming#security-assessment |
| 2010-02-25 | Talk | Nullcon |
Software Fuzzing with Wireplay.
| Abhisek Datta | #fuzzing#red-teaming#network-pentesting+3 |
| 2010-02-25 | Talk | Nullcon |
Imposter ke karnamey: The Browser Phishing Tool.
| Lavakumar Kuppan | #phishing#red-teaming#security-testing+1 |
| 2010-02-25 | Talk | Nullcon |
Intelligent debugging and in memory fuzzing.
| Vishwas Sharma, Amandeep Bharti | #fuzzing#debugging#red-teaming |
| 2010-02-25 | Talk | Nullcon |
Steganography & Stegananalysis: A Technical & Psychological Perspective
| Prince Komal Boonlia, Reena Bhansali | #steganography#steganalysis#red-teaming |
| 2010-02-03 | Talk | Blackhat |
Beware of Serialized GUI Objects Bearing Data
| Rohini Sulatycki, David Byrne | #apache-myfaces#sun-mojarra#red-teaming+1 |
| 2009-12-05 | Talk | Clubhack |
Lust 2.0 β Desire for free WiFi and the threat of the Imposter
| Lavakumar Kuppan | #wifi#red-teaming#phishing+1 |
| 2009-11-19 | Talk | Deepsec |
Ownage 2.0
| Saumil Shah | #red-teaming#ethical-hacking#exploit-delivery+1 |
| 2009-11-18 | Talk | Securitybyte |
Cloud Hacking β Distributed Attack & Exploit Platform
| Shreeraj Shah | #red-teaming#cloud-pentesting#cloud-workload-protection+1 |
| 2009-11-18 | Talk | Securitybyte |
Hacking Oracle From Web
| Sumit Siddharth | #red-teaming#sql-injection#application-hardening+1 |
| 2009-11-17 | Talk | Securitybyte |
Vbootkit 2.0: Attacking Windows 7 Via Boot Sectors
| Nitin Kumar, Vipin Kumar | #windows#red-teaming#boot-sector+1 |
| 2009-10-28 | Talk | Hacklu |
Ownage 2.0
| Saumil Shah | #red-teaming#ethical-hacking#exploit-delivery+2 |
| 2009-10-07 | Talk | Hitbsecconf |
How to Own the World β One Desktop at a Time
| Saumil Shah | #social-engineering#red-teaming#firewall |
| 2009-08-02 | Talk | Defcon |
Wi-Fish Finder: Who Will Bite the Bait
| Md Sohail Ahmad, Prabhash Dhyani | #wifi#honeypot#phishing+1 |
| 2009-08-01 | Talk | Defcon |
The Making of the second SQL injection Worm
| Sumit Siddharth | #sqli#red-teaming#worm |
| 2009-07-31 | Talk | Defcon |
Advancing Video Application Attacks with Video Interception, Recording, and Replay
| Arjun Sambamoorthy, Jason Ostrom | #red-teaming#security-tools#application-hardening |
| 2009-07-29 | Talk | Blackhat |
Psychotronica: Exposure, Control, and Deceit
| Nitesh Dhanjani | #red-teaming#reconnaissance#social-engineering+3 |
| 2009-04-22 | Talk | Troopers |
Browser Design Flaws β Hacking by Breaking in Architectures
| Aditya K Sood | #red-teaming#application-pentesting#secure-development+1 |
| 2009-04-22 | Talk | Hitbsecconf |
Pwnage 2.0
| Saumil Shah | #hid#red-teaming#exploit-delivery |
| 2009-04-22 | Talk | Troopers |
SQL Injections: More Fun and Profit
| Sumit Siddharth | #red-teaming#application-pentesting#code-review+4 |
| 2009-04-22 | Talk | Hitbsecconf |
Vbootkit 2.0: Attacking Windows 7 via Boot Sectors
| Nitin Kumar, Vipin Kumar | #windows#red-teaming#boot-sector |
| 2008-12-06 | Talk | Clubhack |
Hacking Client Side Insecurities
| Aditya K Sood | #red-teaming#application-pentesting#input-validation+1 |
| 2008-12-06 | Talk | Clubhack |
Insecure Implementation of Security Best Practices: of hashing, CAPTCHA’s and Caching
| Karmendra Kohli | #secure-development#secure-coding#blueteam+1 |
| 2008-12-06 | Talk | Clubhack |
Reverse Engineering for exploit writers
| Nibin Varghese | #red-teaming#reverse-engineering#exploit-development |
| 2008-12-06 | Talk | Clubhack |
Reverse Engineering v/s Secure Coding
| Atul Alex | #secure-coding#reverse-engineering#red-teaming+2 |
| 2008-11-13 | Talk | Deepsec |
Game of Web 2.0 Security - Attacking Next Generation Apps
| Shreeraj Shah | #red-teaming#application-pentesting#dynamic-analysis+2 |
| 2008-10-29 | Talk | Hitbsecconf |
Browser Exploits - A New Model for Browser Security
| Saumil Shah | #red-teaming#application-pentesting#code-review+3 |
| 2008-10-22 | Talk | Hacklu |
Browser Exploits - A new model for Browser security
| Saumil Shah | #red-teaming#application-hardening#browser-security+4 |
| 2008-08-20 | Talk | Owaspappsecindia |
Web 2.0 Attacks - Next Generation Threats on the Rise
| Shreeraj Shah | #red-teaming#blueteam#purpleteam+3 |
| 2008-08-09 | Talk | Defcon |
Autoimmunity Disorder in Wireless LAN
| Jvr Murthy, Amit Vartak, Md Sohail Ahmad | #wifi#wireless-security#red-teaming |
| 2008-08-07 | Talk | Blackhat |
Got Citrix, Hack It!
| Shanit Gupta | #red-teaming#rdp#application-pentesting+1 |
| 2008-03-26 | Talk | Cansecwest |
Vulnerabilities Die Hard
| Kowsik Guruswamy | #red-teaming#ethical-hacking#exploit-delivery+2 |
| 2008-02-20 | Talk | Blackhat |
Hacking VoIP through IPSec Tunnels
| Sachin Joglekar, Sudeep Patwardhan | #voip#red-teaming#gsm+2 |
| 2008-02-20 | Talk | Blackhat |
Scanning Applications 2.0 - Next Generation Scan, Attacks and Tools
| Shreeraj Shah | #red-teaming#blueteam#purpleteam+3 |
| 2007-12-19 | Talk | Clubhack |
Backdoor 2.0: Hacking Firefox to steal his web secrets
| Sunil Arora | #red-teaming#application-pentesting#browser-security+2 |
| 2007-12-09 | Talk | Clubhack |
Analysis of Adversarial Code: The Role of Malware Kits!
| Rahul Mohandas | #red-teaming#malware-research#dynamic-analysis+1 |
| 2007-12-09 | Talk | Clubhack |
Hacking Web 2.0 Art and Science of Vulnerability Detection
| Shreeraj Shah | #red-teaming#application-pentesting#dynamic-analysis+4 |
| 2007-12-09 | Talk | Clubhack |
Legiment Techniques of IPS/IDS Evasion
| Ajit Hatti | #red-teaming#network-monitoring#ids+2 |
| 2007-12-09 | Talk | Clubhack |
Vulnerabilities in VoIP Products and Services
| Gaurav Saha | #voip#red-teaming#sip+3 |
| 2007-09-06 | Talk | Hitbsecconf |
Hacking Ajax and Web Services Γ’β¬β Next Generation Web Attacks on the Rise
| Shreeraj Shah | #red-teaming#ajax#web-security |
| 2007-08-04 | Talk | Defcon |
The Emperor Has No Cloak - WEP Cloaking Exposed
| Vivek Ramachandran | #wifi#red-teaming#aircrack |
| 2007-08-01 | Talk | Blackhat |
Vulnerabilities in Wi-Fi/Dual-Mode VoIP Phones
| Krishna Kurapati | #wifi#voip#red-teaming |
| 2007-04-18 | Talk | Cansecwest |
Low-Rate Denial-of-Service attacks
| Anil Kumar | #red-teaming#dos#network-defense+2 |
| 2007-04-05 | Talk | Hitbsecconf |
WEB 2.0 Hacking β Defending Ajax and Web Services
| Shreeraj Shah | #red-teaming#blueteam#purpleteam+2 |
| 2007-03-29 | Talk | Blackhat |
Vboot Kit: Compromising Windows Vista Security
| Nitin Kumar, Vipin Kumar | #windows#red-teaming#kernel |
| 2006-11-29 | Talk | Pacsec |
Smashing Heap by Free Simulation
| Sandip Chaudhari | #heap#red-teaming#exploit-delivery+4 |
| 2006-10-19 | Talk | Hacklu |
Smashing Heap by Free Simulation:
| Sandip Chaudhari | #heap#red-teaming#exploit-development+2 |
| 2006-10-19 | Talk | Hacklu |
Writing Metasploit plugins - from vulnerability to exploit
| Saumil Shah | #metasploit#red-teaming#exploit-development+3 |
| 2006-09-21 | Talk | Hitbsecconf |
Smashing the Stack for Profit - Period
| Rohyt Belani | #red-teaming#application-pentesting#code-review+3 |
| 2006-04-13 | Talk | Hitbsecconf |
Writing Metasploit Plugins - From Vulnerability to Exploit
| Saumil Shah | #metasploit#red-teaming#exploit-development+3 |
| 2005-09-29 | Talk | Hitbsecconf |
Trends in Real World Attacks: A Compilation of Case Studies
| Rohyt Belani | #red-teaming#application-pentesting#application-hardening+4 |
| 2005-07-28 | Talk | Blackhat |
Rapid Threat Modeling
| Akshay Aggarwal | #threat-modeling#red-teaming#security-strategy+4 |
| 2005-07-27 | Talk | Blackhat |
iSCSI Security (Insecure SCSI)
| Himanshu Dwivedi | #red-teaming#iscsi#network-storage |
| 2005-04-10 | Talk | Hitbsecconf |
Whispers On The Wire - Network Based Covert Channels, Exploitation and Detection
| Pukhraj Singh | #red-teaming#blueteam#purpleteam+1 |
| 2005-03-31 | Talk | Blackhat |
Defeating Automated Web Assessment Tools
| Saumil Shah | #red-teaming#security-testing#application-pentesting+1 |
| 2004-10-06 | Talk | Hitbsecconf |
Web Services - Attacks and Defense Strategies, Methods and Tools
| Shreeraj Shah | #red-teaming#blueteam#purpleteam |
| 2004-07-28 | Talk | Blackhat |
Defeating Automated Web Assessment Tools
| Saumil Shah | #red-teaming#application-pentesting#application-hardening+2 |
| 2003-12-12 | Talk | Hitbsecconf |
New Generation Frauds
| Yerra Ravi Kiran Raju | #fraud#red-teaming#money-laundering |
| 2002-10-03 | Talk | Blackhat |
Top Ten Web Attacks
| Saumil Shah | #red-teaming#blueteam#purpleteam |
| 2001-11-21 | Talk | Blackhat |
One-Way SQL Hacking : Futility of Firewalls in Web Hacking
| Saumil Shah | #firewall#red-teaming#sql-injection+2 |
| 2001-04-26 | Talk | Blackhat |
Web Hacking
| Saumil Shah | #red-teaming#application-pentesting#security-testing+4 |
| 2001-02-14 | Talk | Blackhat |
Web Hacking
| Saumil Shah | #red-teaming#application-pentesting#dynamic-analysis+3 |