πŸ§ͺ Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Red Teaming

Focus Area: 🎯 Penetration Testing
420
Total Entries
222
Contributors

Top Contributors

Saumil Shah(31) Nikhil Mittal(25) Shreeraj Shah(16) Rahul Sasi(14) Aseem Jakhar(11)

All Entries (420 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-12-10Tool demoBlackhat KubeShadow - Advanced Offensive Kubernetes Red-Team Framework Source Code Aashita Pandey, Binayak Choudhury#kubernetes#red-teaming#cloud-pentesting+1
2025-10-01Tool demoSector KubeShadow - Advanced Offensive Kubernetes Red-Team Framework Source Code Aashita Pandey, Binayak Choudhury#kubernetes#red-teaming#container-security
2025-08-06Tool demoBlackhat CloudLens Gaurav Joshi, Hare Krishna Rai, K v Prashant#aws#cloud-pentesting#red-teaming+2
2025-08-06Tool demoBlackhat ProcessInjection Source Code Chirag Savla#security-assessment#red-teaming#reverse-engineering+1
2025-08-06Tool demoBlackhat RedInfraCraft : Automate Complex Red Team Infra Source Code Yash Bharadwaj, Manish Gupta#red-teaming#cloud-access-security-broker#cloud-compliance+4
2025-06-02TalkConfidence Adversarial Phishing: Defeating Security Barriers and AI-Driven Countermeasures Video Himanshu Sharma, Rahul Vashista#phishing#red-teaming#mfa+1
2025-04-29TalkRsac XPIA Attacksβ€”Rethinking Defense in Depth for an AI-Powered World Video Aanchal Gupta, Abhilasha Bhargav Spantzel, John Leo Jr, Stefano Zanero#ai#ai-security#input-validation+3
2024-12-12Tool demoBlackhat Halberd : Cloud Security Testing Tool Source Code Arpan Abani Sarkar#cloud-pentesting#red-teaming#azure+1
2024-12-12Tool demoBlackhat RedCloud OS : Cloud Adversary Simulation Operating System Source Code Yash Bharadwaj, Manish Gupta#cloud-pentesting#red-teaming#aws+1
2024-08-09PanelDefcon Formidable Adversaries: Responding to Breaches, Ransomware, and State-Sponsored Threat Actors Abhijith B R, Nikhil Mittal, Adam Pennington, Ken Kato, Ashley Stryker#ransomware#apt#dfir+2
2024-08-08Tool demoBlackhat Octopii v2 Source Code Owais Shaikh#red-teaming#ai-security#nlp+2
2024-08-07Tool demoBlackhat DarkWidow: Dropper/PostExploitation Tool targeting Windows Source Code Soumyanil Biswas, Chirag Savla#red-teaming#malware-research#post-exploitation+2
2024-05-24TalkAuscert Mastering the art of Attacking and Defending a Kubernetes Cluster Video Sanjeev Mahajan#kubernetes#cloud-pentesting#container-security+1
2024-04-18Tool demoBlackhat DarkWidow: Dropper/PostExploitation Tool (or can be used in both situations) targeting Windows Source Code Soumyanil Biswas#red-teaming#post-exploitation#windows
2023-12-07Tool demoBlackhat Mantis - Asset Discovery at Scale Source Code Prateek Thakare, Bharath Kumar, Praveen Kanniah#red-teaming#asset-inventory#asset-management+2
2023-08-07TalkC0c0n Enhancing Red Team OPSEC: Abusing Stealthy In-Memory Binary Execution Techniques in Linux Video Pranav Sivvam#red-teaming#linux#memory-forensics+2
2023-06-05TalkConfidence Evading modern day security defenses in corporate environments Himanshu Sharma, Rahul Vashista#red-teaming#evasion#bypassing+4
2023-06-01TalkSecurityfest Beyond On-Premises: Exploring the Post-Domain Admin Landscape in the Cloud Video Sriraam Natarajan, Venkatraman Kumar#red-teaming#azure#active-directory+2
2022-09-29TalkBrucon 0wn-premises: Bypassing Microsoft Defender for Identity Video Nikhil Mittal#red-teaming#active-directory#threat-detection
2022-09-07TalkNullcon ElectroVolt: Pwning Popular Desktop Apps While Uncovering New Attack Surface On Electron Video Mohan Sri Rama Krishna Pedhapati, Maxwell Garrett#red-teaming#application-pentesting#dynamic-analysis+4
2022-08-11TalkBlackhat ElectroVolt: Pwning Popular Desktop Apps While Uncovering New Attack Surface on Electron Presentation Mohan Sri Rama Krishna Pedhapati, Aaditya Purani, Max Garrett, William Bowling#red-teaming#application-pentesting#code-review+4
2021-11-13TalkC0c0n Painting Your Organizations with Shades of Red, Blue & Purple Video Hidayath Khan#red-teaming#ethical-hacking#threat-modeling+2
2021-09-07TalkConfidence Swapping Asprin formulas with MDMA while Red Teaming a Billion Dollar Pharmaceutical Aman Sachdev, Himanshu Sharma#red-teaming#ethical-hacking#security-assessment+2
2021-08-07Tool demoDefcon Red Team Credentials Reconnaissance (OLD with a TWIST) Video Shantanu Khandelwal#reconnaissance#red-teaming#osint
2021-08-06PanelDefcon Adversary simulation, emulation or purple teaming - How would you define it? Video Anant Shrivastava, Vincent Yiu, Martin Ingesen, Jean Marie Bourbon, Samuel Kimmons, Joe Vest#security-testing#incident-management#red-teaming+3
2021-08-06TalkDefcon Adversary village Kick-off Video Abhijith B R#red-teaming#ethical-hacking#vulnerability-assessment+2
2021-05-06TalkBlackhat Threat Hunting in Active Directory Environment Presentation Anurag Khanna, Thirumalai Natarajan Muthiah#blueteam#red-teaming#purpleteam
2020-10-07TalkRootcon Automating Threat Hunting on the Dark Web and other nitty-gritty thingso Presentation Video Apurv Singh Gautam#deep-web#red-teaming#threat-hunting+1
2020-10-07TalkRootcon How I Pwned the ICS data during my internship Presentation Shail Patel#ics#red-teaming#ics-security+1
2020-10-07TalkRootcon Offensive Embedded Exploitation : Getting hands dirty with IOT/Embedded Device Security Testing Presentation Video Kaustubh Padwad#red-teaming#security-assessment#reverse-engineering
2020-10-07TalkRootcon ReconPal: Leveraging NLP for Infosec Source Code Video Nishant Sharma, Jeswin Mathai#reconnaissance#red-teaming#nlp+1
2020-09-18TalkC0c0n Kubernetes Goat - Vulnerable by Design Kubernetes Cluster Environment Source Code Video Madhu Akula#kubernetes#red-teaming#cloud-workload-protection+3
2020-09-18TalkC0c0n Offensive Embedded Exploitation : Getting hands dirty with IOT/Embedded Device Security Testing Video Kaustubh Padwad#red-teaming#security-assessment#iot-device-management+4
2020-09-18TalkC0c0n Supercharging your initial foothold in Red Team engagements Sachin S Kamath#red-teaming#ethical-hacking#exploit-delivery+3
2020-08-22TalkThedianainitiative Internal Red Team Operations Framework - Building your practical internal Red Team Video Abhijith B R#red-teaming#cyber-war#phishing+3
2020-07-26TalkHitbsecconf Swapping Asprin Formulas With MDMA While Red Teaming a Billion Dollar Company Himanshu Sharma, Aman Sachdev#red-teaming#application-pentesting#incident-management+2
2020-03-18TalkCansecwest The ARM-X Firmware Emulation Framework Presentation Source Code Saumil Shah#red-teaming#arm#firmware+4
2020-03-06Tool demoNullcon Callidus Source Code Chirag Savla#red-teaming#azure#application-pentesting+2
2020-03-06Tool demoNullcon FRISPY Source Code Tejas Girme, Parmanand Mishra#spyware#red-teaming#api-security+3
2020-03-06Tool demoNullcon PivotSuite Source Code Manish Gupta#red-teaming#security-assessment#network-architecture+2
2020-03-06TalkNullcon Putting it all together: building an iOS jailbreak from scratch Presentation Video Umang Raghuvanshi#ios#jailbreak#red-teaming
2020-03-06Tool demoNullcon VyAPI Source Code Riddhi Shree#secure-coding#aws#amazon-cognito+3
2020-03-06Tool demoNullcon Wolverine Source Code Furqan Khan, Siddharth Anbalahan#linux#secure-coding#web-security+3
2019-12-04TalkBlackhat ClusterFuzz: Fuzzing at Google Scale Presentation Source Code Video Abhishek Arya, Oliver Chang#fuzzing#red-teaming#blueteam+1
2019-11-01TalkAppsecdayaustralia A Purple Team View of Serverless and GraphQL Applications Abhay Bhargav#red-teaming#blueteam#purpleteam+1
2019-10-14TalkHitbsecconf CALL OF DUTY: MODERN BROWSER WARFARE Presentation Video Dhiraj Mishra#blueteam#red-teaming#purpleteam
2019-10-14TalkHitbsecconf ON THE WINGS OF TIME: DEMYSTIFYING WIRELESS ETHICAL HACKING AND DEFENSES Presentation Video Harshit Agrawal, Himanshu Mehta#wifi#red-teaming#blueteam+1
2019-09-27TalkC0c0n Detection of TOR Sources using Artificial Intelligence Roshy John#tor#ai#red-teaming
2019-09-27TalkC0c0n Golang for Pentesters / RedTeamers Presentation Anant Shrivastava#security-assessment#red-teaming#secure-coding
2019-09-27TalkC0c0n Hacking ICS devices for Fun Arun Mane#red-teaming#ics-security#exploit-delivery+1
2019-09-27TalkC0c0n Offensive Machine Learning for Pentesters and Red Teams Tamaghna Basu#machine-learning#security-assessment#red-teaming
2019-09-27TalkC0c0n VyAPI - The Vulnerable Hybrid Android App Presentation Source Code Riddhi Shree#secure-coding#aws#amazon-cognito+3
2019-09-23TalkRootcon Hacking ICS devices/PLC’s for Fun - ICS and IOT Hacking Video Arun Mane#red-teaming#ics#ics-security+3
2019-09-23TalkRootcon Making Anomaly Detection system(ADS) for Vehicles (Automotive Hacking) Presentation Video Arun Mane, Nikhil Bogam#red-teaming#car-hacking#blueteam+1
2019-08-30TalkHitbsecconf COMMSEC: PErfidious: Make PE Backdooring Great Again! Presentation Video Shreyans Doshi#secure-coding#red-teaming#blueteam+1
2019-08-29TalkHitbsecconf Understanding, Attacking & Securing Medical Devices Presentation Video Ajay Pratap Singh#red-teaming#blueteam#purpleteam
2019-08-10TalkDefcon RACE - Minimal Rights and ACE for Active Directory Dominance Presentation Video Nikhil Mittal#active-directory#red-teaming#windows
2019-08-09Tool demoDefcon EXPLIoT - IoT Security Testing and Exploitation Framework Source Code Aseem Jakhar, Murtuja Bharmal#security-assessment#red-teaming#blueteam+1
2019-08-09Tool demoDefcon PivotSuite: Hack The Hidden Network - A Network Pivoting Toolkit Source Code Manish Gupta#red-teaming#security-assessment#network-pentesting
2019-08-08Tool demoBlackhat EXPLIoT: IoT Security Testing and Exploitation Framework Source Code Aseem Jakhar, Murtuja Bharmal#security-assessment#red-teaming#blueteam+1
2019-08-07TalkBlackhat New Vulnerabilities in 5G Networks Presentation Whitepaper Video Ravishankar Borgaonkar, Altaf Shaik#5g#red-teaming#4g+1
2019-08-07Tool demoBlackhat PivotSuite: Hack The Hidden Network - A Network Pivoting Toolkit Source Code Manish Gupta#red-teaming#security-assessment#network-pentesting
2019-08-07Tool demoBlackhat RedHunt-OS v2: Virtual Machine for Adversary Emulation and Threat Hunting Source Code Sudhanshu Chauhan, Kunal Aggarwal#virtual-machine#blueteam#forensics+2
2019-05-21TalkPhdays GDALR: an efficient model duplication attack on black-box machine learning models Presentation Rewanth Tammana, Nikhil Joshi#red-teaming#machine-learning#api-security+3
2019-05-21TalkPhdays How to fail in hardware hacking Presentation Arun Magesh#red-teaming#embedded-systems#firmware-analysis+1
2019-05-21TalkPhdays Rapid hardware hacking 101 Arun Magesh#red-teaming#iot-pentesting#hardware-embedded+2
2019-05-10TalkHitbsecconf HAXPO: RF Exploitation: Demystifying IoT/OT Hacks with SDR Presentation Video Himanshu Mehta, Harshit Agrawal#rf#red-teaming#hardware-embedded+3
2019-05-09TalkHitbsecconf GDALR: Duplicating Black Box Machine Learning Models Presentation Video Rewanth Tammana, Nikhil Joshi#machine-learning#red-teaming#api-security+2
2019-05-09TalkHitbsecconf HAXPO: WiCy: Monitoring 802.11AC Networks at Scale Presentation Video Vivek Ramachandran#red-teaming#wifi#802.11ac
2019-03-29Tool demoBlackhat Halcyon IDE: Nmap Script Development IDE Source Code Sanoop Thomas#reconnaissance#red-teaming#nmap
2019-03-28Tool demoBlackhat pytm: A Pythonic Framework for Threat Modeling Source Code Rohit Shambhuni, Izar Tarandach#secure-coding#threat-modeling#red-teaming
2019-03-28Tool demoBlackhat VoIP Wireshark Attack-Defense Toolkit Source Code Nishant Sharma, Jeswin Mathai, Ashish Bhangale#voip#wireshark#network-defense+4
2019-03-21TalkTroopers Evolution of kernel fuzzers in NetBSD Presentation Video Siddharth M#red-teaming#fuzzing#security-development-lifecycle
2019-02-28TalkNullcon A Hacker Walks into a Co-working Space Video Rahul Binjve#red-teaming#application-pentesting#network-architecture+2
2019-02-28TalkNullcon Attacking & Securing HealthCare Standards & hospital secured systems Video Ajay Pratap Singh#red-teaming#blueteam#purpleteam
2019-02-28TalkNullcon Dirty use of USSD Codes Ravishankar Borgaonkar#ussd#red-teaming#social-engineering+3
2018-12-05TalkBlackhat The Undeniable Truth: How Remote Attestation Circumvents Deniability Guarantees in Secure Messaging Protocols Presentation Whitepaper Video N Asokan, Lachlan Gunn, Ricardo Vieitez Parra#red-teaming#encryption#threat-modeling+1
2018-11-29TalkDeepsec DNS Exfiltration and Out-of-Band Attacks Video Nitesh Shilpkar#dns#red-teaming#malware-detection
2018-11-27TalkHitbsecconf BSIDES: Creating Browser Extensions to Hunt for Low-Hanging Fruit Presentation Source Code Video Rewanth Tammana#red-teaming#application-pentesting#browser-security+2
2018-11-27TalkHitbsecconf COMMSEC: Taking Over Telecom Networks Presentation Video Hardik Mehta, Loay Hassan Abdelrazek#architecture#red-teaming#ss7+2
2018-11-27TalkHitbsecconf Somebody Answer the Phone: Hacking Telephone Systems for Fun & Profit Presentation Video Himanshu Mehta, Sachine Wagh#red-teaming
2018-11-02TalkHackfest Exploiting Connected Medical Devices: Lessons Learned & Data Earned Video Saurabh Harit#red-teaming#wearables#iot-device-management+4
2018-10-10TalkBrucon Forging Trusts for Deception in Active Directory Video Nikhil Mittal#windows#active-directory#red-teaming
2018-10-05TalkC0c0n DNS Exfiltration and Out of Band Attacks Nitesh Shilpkar#red-teaming#dns#network-pentesting
2018-10-05TalkC0c0n Unconventional vulnerabilities in Google Cloud Platform Pranav Venkat#gcp#red-teaming#cloud-pentesting+3
2018-09-27TalkRootcon Expl-iot: Hacking IoT like a boss Presentation Video Aseem Jakhar#red-teaming#iot-security-testing#firmware-analysis+2
2018-08-30TalkHitbsecconf Exploiting Automation in LTE Mobile Networks Presentation Whitepaper Video Ravishankar Borgaonkar, Altaf Shaik#4g#lte#red-teaming
2018-08-12Tool demoDefcon Expl-iotβ€”IoT Security Testing and Exploitation framework Source Code Aseem Jakhar#security-assessment#red-teaming#blueteam+1
2018-08-12TalkDefcon Last mile authentication problem: Exploiting the missing link in end-to-end secure communication Presentation Video Siddharth Rao, Thanh Bui#encryption#authentication#ipc+1
2018-08-11Tool demoDefcon ADRecon: Active Directory Recon Presentation Source Code Prashant Mahajan#active-directory#windows#reconnaissance+1
2018-08-11Tool demoDefcon BLEMystiqueβ€”Affordable custom BLE target Source Code Nishant Sharma, Jeswin Mathai#ble#red-teaming#wearables+1
2018-08-11Tool demoDefcon Halcyon IDE Source Code Sanoop Thomas#reconnaissance#red-teaming#nmap+1
2018-08-09TalkDefcon 4Gβ€”Who is paying your cellular phone bill? Presentation Video Isha Singh, Dr Silke Holtmanns#4g#ipx#red-teaming+2
2018-08-09Tool demoBlackhat OWASP Offensive Web Testing Framework Source Code Viyat Bhalodia#owasp#security-assessment#red-teaming
2018-08-08Tool demoBlackhat ADRecon: Active Directory Recon Presentation Source Code Prashant Mahajan#active-directory#windows#reconnaissance+1
2018-08-08TalkBlackhat Back to the Future: A Radical Insecure Design of KVM on ARM Presentation Whitepaper Video Baibhav Singh, Rahul Kashyap#red-teaming#linux#virtual-machine+1
2018-08-08TalkBlackhat Compression Oracle Attacks on VPN Networks Presentation Video Ahamed Nafeez#red-teaming#vpn#blueteam+1
2018-08-08Tool demoBlackhat Damn Vulnerable iOS App: Swift Edition Source Code Prateek Gianchandani#ios#security-assessment#red-teaming
2018-08-08Tool demoBlackhat Expl-iot: IoT Security Testing and Exploitation Framework Source Code Aseem Jakhar#security-assessment#red-teaming#blueteam+1
2018-08-08Tool demoBlackhat Halcyon IDE: For Nmap Script Developers Source Code Sanoop Thomas#reconnaissance#red-teaming#nmap+1
2018-08-08TalkBlackhat LTE Network Automation Under Threat Presentation Whitepaper Video Ravishankar Borgaonkar, Altaf Shaik#lte#4g#red-teaming+2
2018-08-08Tool demoBlackhat RedHunt OS (VM): A Virtual Machine for Adversary Emulation and Threat Hunting Source Code Sudhanshu Chauhan#virtual-machine#blueteam#forensics+2
2018-08-08Tool demoBlackhat V2X Validation Tool Source Code Raashid Ansari, Jonathan Petit#security-assessment#automobile#red-teaming
2018-06-29TalkHackinparis Hunting PBX for Vulnerabilities Presentation Video Himanshu Mehta, Sachin Wagh#red-teaming
2018-06-04TalkConfidence From 123456 on a staging to compromising a multi-million dollar VC - The journey of us Red Teamers of a hack spanning over 200 days Himanshu Sharma, Aman Sachdev#red-teaming#ethical-hacking#security-assessment+2
2018-03-22Tool demoBlackhat ADRecon: Active Directory Recon Presentation Source Code Prashant Mahajan#active-directory#windows#reconnaissance+1
2018-03-22Tool demoBlackhat Archery - Open Source Vulnerability Assessment and Management Source Code Anand Tiwari#security-assessment#red-teaming#blueteam+1
2018-03-22Tool demoBlackhat Jackhammer - One Security Vulnerability Assessment/Management Tool Source Code Rajagopal Vr, Krishna Chaitanya Yarramsetty#security-assessment#red-teaming#blueteam+4
2018-03-22TalkBlackhat Securing Your In-Ear-Fitness Coach: Challenges in Hardening Next Generation Wearables Presentation Video Sumanth Naropanth, Kavya Racharla#wearables#blueteam#red-teaming+1
2018-03-01TalkNullcon Abusing and Attacking Content Sharing Solutions Presentation Pratap Chandra Allena#red-teaming#wifi#bluetooth+2
2018-03-01TalkNullcon Breaking Into Container Orchestrators Presentation Nadeem Hussain#red-teaming#cloud-workload-protection#container-security+2
2018-03-01TalkNullcon DARWIN (A parasite covert wireless network) Video Rushikesh D Nandedkar#wifi#red-teaming#network-architecture+1
2018-03-01TalkNullcon Looting your bank savings using Digital India Presentation Video Indrajeet Bhuyan#red-teaming#application-pentesting#api-security+4
2018-03-01TalkNullcon Software Supply Chain Cyberattack Presentation Samiran Ghatak#red-teaming#cyberattack#supply-chain-attack+1
2018-03-01TalkNullcon Unleashing D* on Android Kernel Drivers Presentation Video Aravind Machiry#android#fuzzing#red-teaming+3
2017-12-06TalkBlackhat BREAKING BAD: STEALING PATIENT DATA THROUGH MEDICAL DEVICES Presentation Video Saurabh Harit#red-teaming#data-leak#identity-theft+1
2017-12-06TalkBlackhat DIFUZZING ANDROID KERNEL DRIVERS Presentation Whitepaper Video Aravind Machiry, Chris Salls, Yan Shoshitaishvili, Jake Corina, Shuang Hao#android#red-teaming#linux+2
2017-12-06Tool demoBlackhat EXPLIOT - INTERNET OF THINGS SECURITY TESTING AND EXPLOITATION FRAMEWORK Source Code Aseem Jakhar#security-assessment#red-teaming#blueteam+1
2017-11-17TalkDeepsec Intel AMT: Using & Abusing The Ghost In The Machine Presentation Parth Shukla#red-teaming#blueteam#purpleteam
2017-10-19TalkHacklu Intel AMT: Using & Abusing the Ghost in the Machine Video Parth Shukla#red-teaming#blueteam#purpleteam
2017-09-13Talk44con Red Team Revenge : Attacking Microsoft ATA Presentation Video Nikhil Mittal#windows#red-teaming#active-directory+4
2017-08-18TalkC0c0n Anti-Virus Bypassing for Fun and Profit Vanshit Malhotra#red-teaming#malware-research#bypassing+2
2017-08-18TalkC0c0n Exploiting the smartness of BLE Stack Apoorva Gupta#bluetooth#red-teaming#mobile-hacking+3
2017-08-18TalkC0c0n Hacking Homes: A hardware insight for IoT [in]Security Jiggyasu Sharma#red-teaming#hardware-embedded#firmware-analysis+2
2017-08-18TalkC0c0n Hunting the Hunters – Fighting CyberCrime at the Source Valan Sivasubramanian#red-teaming#cybersecurity-strategy#cyber-crime+2
2017-08-18TalkC0c0n Mobile Banking (In)Security Sneha Rajguru#appsec#purpleteam#red-teaming+1
2017-08-18TalkC0c0n The card hack - Lessons from the Hitachi Payments Breach Saikat Datta#red-teaming#blueteam#purpleteam
2017-07-30Tool demoBlackhat Yasuo Source Code Saurabh Harit#secure-coding#red-teaming#blueteam+3
2017-07-29Tool demoDefcon WIDY 2.0: WIFI 0WNAGE IN UNDER $5 RELOADED Vivek Ramachandran, Nishant Sharma, Ashish Bhangale#wifi#red-teaming#blueteam+1
2017-07-29Tool demoDefcon WiMonitor - an OpenWRT package for remote WiFi sniffing Vivek Ramachandran, Nishant Sharma, Ashish Bhangale#openwrt#red-teaming#sniffing+1
2017-07-28Tool demoDefcon Android Tamer Source Code Anant Shrivastava#android#security-assessment#red-teaming+2
2017-07-28Tool demoDefcon GibberSense Source Code Ajit Hatti#encryption#red-teaming#security-assessment
2017-07-27Tool demoBlackhat Android Tamer Source Code Anant Shrivastava#android#security-assessment#red-teaming+2
2017-07-27TalkBlackhat Evading Microsoft ATA for Active Directory Domination Presentation Video Nikhil Mittal#active-directory#red-teaming#security-assessment+1
2017-07-27Tool demoBlackhat Gibber Sense Source Code Ajit Hatti#secure-coding#reconnaissance#encryption+3
2017-07-26TalkBlackhat New Adventures in Spying 3G and 4G Users: Locate, Track & Monitor Presentation Video Ravishankar Borgaonkar, Altaf Shaik, Shinjo Park, Lucca Hirschi, Andrew Martin, Jean Pierre Seifert#red-teaming#spying#3g+3
2017-07-26TalkBlackhat Wire Me Through Machine Learning Presentation Video Ankit Singh, Vijay Thaware#machine-learning#red-teaming#ai-security+3
2017-05-23TalkPhdays How we hacked distributed configuration management systems Presentation Bharadwaj Machiraju, Francis Alexander#red-teaming#fingerprinting#configuration-management
2017-05-23TalkPhdays Practical machine learning in infosecurity Presentation Anto Joseph, Clarence Chio#machine-learning#red-teaming#blueteam+1
2017-04-19TalkBrucon Evading Microsoft ATA for Active Directory Domination Presentation Video Nikhil Mittal#active-directory#red-teaming#windows
2017-04-14TalkHitbsecconf COMMSEC: IoT Hacking Simplified Presentation Source Code Video Aseem Jakhar#red-teaming#iot-pentesting#hardware-embedded+2
2017-04-14TalkHitbsecconf Is There a Doctor in The House? Hacking Medical Devices and Healthcare Infrastructure Presentation Video Anirudh Duggal#red-teaming#application-pentesting#data-protection+3
2017-03-31TalkBlackhat Mobile-Telephony Threats in Asia Presentation Whitepaper Video Payas Gupta, Marco Balduzzi, Lion Gu#red-teaming#social-engineering#phishing+2
2017-03-31TalkBlackhat The Seven Axioms of Security Presentation Video Saumil Shah#blueteam#security-strategy#threat-modeling+2
2017-03-31TalkBlackhat WHAT MALWARE AUTHORS DON’T WANT YOU TO KNOW - EVASIVE HOLLOW PROCESS INJECTION Presentation Whitepaper Video Monnappa K A#code-injection#red-teaming#malware-research+4
2017-03-30Tool demoBlackhat WiDy: WiFi 0wnage in Under $5 Vivek Ramachandran, Nishant Sharma, Ashish Bhangale#wifi#red-teaming#blueteam+1
2017-03-15TalkCansecwest Inside Stegosploit Presentation Saumil Shah#steganography#red-teaming#exploit-delivery
2017-03-03TalkNullcon Case study of SS7/Sigtran assessment Presentation Video Akib Sayyed#ss7#security-assessment#blueteam+2
2017-03-03TalkNullcon Case Study on RFID (proximity cards) hacking Presentation Sarwar Jahan, Ashwath Kumar#rfid#red-teaming#hardware-embedded+4
2017-03-03TalkNullcon Hacking medical devices and infrastructure Presentation Video Anirudh Duggal#red-teaming#application-pentesting#security-testing
2016-11-05TalkHackfest LockPicker: Leaking data from live LUKS partition Adhokshaj Mishra#linux#red-teaming#data-leak
2016-11-04TalkBlackhat Detach Me Not - DoS Attacks Against 4G Cellular Users Worldwide from your Desk Presentation Video Siddharth Rao, Bhanu Kotte, Dr. Silke Holtmanns#dos#red-teaming#ss7+4
2016-11-04TalkBlackhat Randomization Can’t Stop BPF JIT Spray Presentation Whitepaper Video N Asokan, Filippo Bonazzi, Elena Reshetova#linux#red-teaming#exploit-development
2016-11-04Tool demoBlackhat Yasuo Source Code Saurabh Harit#secure-coding#red-teaming#blueteam+3
2016-09-23TalkRootcon Halcyon – A Faster Way to Build Custom Scripts for Nmap Scans Presentation Source Code Video Sanoop Thomas#secure-coding#reconnaissance#red-teaming+1
2016-08-19TalkC0c0n Abusing Digital Certificates : Malware Style Ajit Hatti#red-teaming#exploit-delivery#threat-modeling
2016-08-19TalkC0c0n Attacking and crashing IOT devices via Bluetooth LE Protocol Presentation Pratap Chandra Allena, Ajay Pratap Singh#bluetooth#red-teaming#iot-pentesting+2
2016-08-19TalkC0c0n Backdooring my Enemies with a Proxy for Threat Intelligence Jovin Lobo, Aditya Vasekar#purpleteam#red-teaming#blueteam
2016-08-19TalkC0c0n Breaking into Gas stations! Suraj Pratap#red-teaming#ethical-hacking#exploit-delivery+2
2016-08-19TalkC0c0n Esoteric XSS Payloads Presentation Riyaz Walikar#xss#red-teaming#code-injection+3
2016-08-19TalkC0c0n Evading Corporate Security – You’re as secure as the weakest link Prajwal Panchmahalkar#red-teaming#employee-education#social-engineering+3
2016-08-06Tool demoDefcon Android-InsecureBank Source Code Dinesh Shetty#android#red-teaming#application-pentesting+4
2016-08-04Tool demoBlackhat Droid-FF: Android Fuzzing Framework Source Code Anto Joseph#android#fuzzing#secure-coding+1
2016-08-03Tool demoBlackhat Android Tamer Presentation Source Code Anant Shrivastava#android#security-assessment#red-teaming+2
2016-08-03Tool demoBlackhat Android-InsecureBankv2 Source Code Dinesh Shetty#android#red-teaming#application-pentesting+4
2016-08-03TalkBlackhat AMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does It Presentation Nikhil Mittal#windows#amsi#powershell+1
2016-08-03Tool demoBlackhat Nishang: The Goodness of Offensive PowerShell Source Code Nikhil Mittal#windows#red-teaming#powershell
2016-05-26TalkHitbsecconf HITB Lab: Droid-FF: The First Android Fuzzing Framework Presentation Source Code Anto Joseph#android#fuzzing#red-teaming
2016-05-17TalkPhdays Fingerprinting and Attacking a Healthcare Infrastructure Presentation Anirudh Duggal#red-teaming#fingerprinting#ransomware+4
2016-04-01Tool demoBlackhat Android Tamer Presentation Source Code Anant Shrivastava#android#security-assessment#red-teaming+2
2016-04-01Tool demoBlackhat HackSys Extreme Vulnerable Driver Presentation Whitepaper Source Code Ashfaq Ansari#red-teaming#security-assessment#windows
2016-04-01Tool demoBlackhat Halcyon – A Faster Way to Build Custom Scripts for Nmap Scans Presentation Source Code Sanoop Thomas#reconnaissance#red-teaming#nmap
2016-03-11TalkNullcon Attacking and defending healthcare - EMR solutions Presentation Anirudh Duggal#red-teaming#blueteam#application-pentesting+1
2016-03-11TalkNullcon Hitchhiker’s guide to hacking Industrial Control systems (ICS) Arun Mane#red-teaming#ics#hid
2016-03-11TalkNullcon Million Dollar Baby: Towards ANGRly conquering DARPA CGC Aravind Machiry#red-teaming#security-assessment#application-pentesting+4
2016-03-11TalkNullcon Privacy leaks on 4G-LTE networks Presentation Altaf Shaik#red-teaming#4g#lte+1
2015-11-19TalkDeepsec Continuous Intrusion: Why CI Tools Are an Attacker’s Best Friends. Video Nikhil Mittal#red-teaming#ci-cd#cicd-security+3
2015-11-13TalkBlackhat LTE & IMSI Catcher Myths Presentation Whitepaper Video Ravishankar Borgaonkar, N Asokan, Altaf Shaik, Valtteri Niemi, Jean Pierre Seifert#lte#red-teaming#imsi
2015-11-13TalkBlackhat Continuous Intrusion: Why CI tools are an Attacker’s Best Friends Presentation Video Nikhil Mittal#red-teaming#ci-cd#application-pentesting+4
2015-11-12Tool demoBlackhat Android InsecureBank Source Code Dinesh Shetty#android#red-teaming#application-pentesting+4
2015-11-12Tool demoBlackhat Android Tamer Source Code Anant Shrivastava#android#security-assessment#red-teaming+2
2015-11-12Tool demoBlackhat Kautilya: Fastest shells you will ever get Source Code Nikhil Mittal#hid#red-teaming#windows
2015-11-12Tool demoBlackhat Nishang - Tracking A Windows User Source Code Nikhil Mittal#windows#red-teaming#endpoint-protection+1
2015-11-12TalkBlackhat Stegosploit - Exploit Delivery with Steganography and Polyglots Presentation Source Code Video Saumil Shah#red-teaming#steganography#exploit-delivery
2015-11-05TalkGroundzerosummit Browser based Malware attacks Harsh Daftary#red-teaming#keylogging#phishing
2015-11-05TalkGroundzerosummit Hacking RFIDs under 2000INR Jayesh Chauhan#rfid#red-teaming#hardware-embedded+4
2015-11-05TalkGroundzerosummit Thanks for the free cookies Anshul Saxena, Nishant Yadav#red-teaming#application-pentesting#security-testing
2015-10-21TalkHacklu Stegosploit - Delivering Drive-By Exploits With Only Images Presentation Saumil Shah#red-teaming#steganography#application-pentesting+1
2015-09-11Talk44con Stegosploit – Drive-by Browser Exploits using only Images Presentation Source Code Video Saumil Shah#steganography#red-teaming#web-security+1
2015-08-28Tool demoBlackhat Damn Vulnerable iOS App (DVIA) Source Code Prateek Gianchandani#ios#security-assessment#red-teaming
2015-08-08TalkDefcon Dissecting the Design of SCADA Web Human Machine Interfaces (HMIs) - Hunting Vulnerabilities Video Aditya K Sood#scada#hmi#security-assessment+4
2015-08-08TalkDefcon Powershell for Penetraton Testers Video Nikhil Mittal#security-assessment#red-teaming#exploitation+3
2015-08-08TalkDefcon QARK: Android App Exploit and SCA Tool Presentation Source Code Video Tushar Dalvi, Tony Trummer#android#metasploit#red-teaming+3
2015-08-06Tool demoBlackhat Kautilya Source Code Nikhil Mittal#hid#red-teaming#windows
2015-08-05Tool demoBlackhat QARK - Android Application SCA and Exploit Tool Presentation Source Code Tushar Dalvi#android#red-teaming#security-assessment+2
2015-08-01TalkC0c0n A Pentester’s Methodology to Discover, Automate and Exploit Windows Privilege Escalation flaws. Riyaz Walikar#windows#red-teaming#security-assessment
2015-08-01TalkC0c0n Attack chaining for web exploitation- From Information leakage to gaining Root access Abhijeth Dugginapeddi#red-teaming#application-pentesting#attack-surface+2
2015-07-06TalkBlackhat DOM FLOW - UNTANGLING THE DOM FOR MORE EASY-JUICY BUGS Presentation Video Ahamed Nafeez#red-teaming#xss#application-pentesting+2
2015-05-29TalkHitbsecconf Hacking Samsung’s Tizen: The OS of Everything Presentation Whitepaper Ajin Abraham#os#wearables#red-teaming
2015-05-29TalkHitbsecconf PowerShell for Penetration Testers Presentation Nikhil Mittal#red-teaming#windows#powershell+1
2015-05-28TalkHitbsecconf Stegosploit: Hacking With Pictures Presentation Saumil Shah#red-teaming#steganography#web-security
2015-05-26TalkPhdays iOS Application Exploitation Presentation Prateek Gianchandani, Egor Tolstoy#ios#red-teaming#application-pentesting+4
2015-03-27TalkBlackhat Security Content Metadata Model with an Efficient Search Methodology for Real Time Monitoring and Threat Intelligence Presentation Whitepaper Video Preeti Subramanian#threat-intelligence-analysis#blueteam#red-teaming+1
2015-03-27TalkSyscan Stegosploit - Hacking with Pictures Presentation Video Saumil Shah#steganography#red-teaming#web-security+1
2015-03-26Tool demoBlackhat OWASP Xenotix XSS Exploit Framework Presentation Source Code Ajin Abraham#owasp#xss#blueteam+3
2015-03-26TalkBlackhat The underground Ecosystem of Credit Card frauds Presentation Whitepaper Video Abhinav Singh#red-teaming#data-leak#identity-theft+1
2015-02-06TalkNullcon Anatomy of a credit card stealing POS malware Presentation Video Amol Sarwate#red-teaming#application-pentesting#data-protection+1
2015-02-06TalkNullcon Attack and Defence in Radio and Communication Warfare Presentation Akib Sayyed#red-teaming#blueteam#purpleteam+2
2015-02-06TalkNullcon Drone Attacks: How I hijacked a drone Presentation Video Rahul Sasi#red-teaming#drone#gps+2
2015-02-06TalkNullcon Hacking Tizen: The OS of Everything Presentation Video Ajin Abraham#os#wearables#red-teaming
2014-11-13TalkGroundzerosummit Attacking Cryptography & PKI Implementations Ajit Hatti#encryption#red-teaming#ssl+4
2014-11-13TalkGroundzerosummit Security vulnerabilities in DVB-C networks: Hacking Cable TV network Rahul Sasi#red-teaming#dvb-c#network-pentesting
2014-11-13TalkGroundzerosummit Attacking Web-Proxies like never before Ahamed Nafeez#red-teaming#application-hardening#security-testing
2014-11-13TalkGroundzerosummit Evaluating WAF (Web Application Firewall) for Fun and Profit with WOF Bhaumik Merchant#red-teaming#application-pentesting#security-testing+1
2014-11-13TalkGroundzerosummit Fuzzing Asynchronous Protocols built over Websockets Lavakumar Kuppan#fuzzing#red-teaming#application-pentesting+2
2014-11-13TalkGroundzerosummit Hacking consumer electronics for Fun Atul Alex#red-teaming#embedded-systems#firmware-analysis+1
2014-11-13TalkGroundzerosummit How I won Browser Fuzzing Amol Naik#fuzzing#red-teaming#security-testing+4
2014-11-13TalkGroundzerosummit Making and Breaking Embedded Security Presentation Yashin Mehaboobe#red-teaming#blueteam#purpleteam
2014-11-13TalkGroundzerosummit SCADA Exploitation through Firmware Ashish Saxena#red-teaming#firmware-analysis#ics-security+3
2014-11-13TalkGroundzerosummit Vulnerability Reproduction using Zest Deep Shah#red-teaming#exploit-delivery#automated-scanning
2014-10-29TalkEkoparty Security vulnerabilities in DVB-C networks: Hacking Cable tV network part 2 Presentation Video Rahul Sasi#red-teaming#dvb-c#firmware-analysis+1
2014-10-23TalkHacklu Hacking with Images - Evil Pictures Presentation Saumil Shah#red-teaming#steganography#application-pentesting+3
2014-10-23TalkHacklu WiHawk - Router Vulnerability Scanner Presentation Source Code Anamika Singh#wifi#red-teaming#csrf+1
2014-10-16TalkGrrcon Socioware: Dissecting Online Social Network Worms – Insidious Analysis and Design Aditya K Sood, Dr. Richard J Enbody#red-teaming#reverse-engineering#blueteam+1
2014-09-28TalkBlackhat Understanding IMSI Privacy Presentation Video Swapnil Udar, Ravishankar Borgaonkar#imsi#red-teaming#android+4
2014-09-16TalkDeepsec Advanced Powershell Threat – Lethal Client Side Attacks Presentation Video Nikhil Mittal#powershell#red-teaming#endpoint-protection+4
2014-08-22TalkC0c0n APT: Case Study of attackers targeting public tendering Rahul Sasi#red-teaming#apt#attack-surface+4
2014-08-22TalkC0c0n Cryptographic Backdoors: Subverting the RSA Adhokshaj Mishra#encryption#red-teaming#security-strategy+3
2014-08-22TalkC0c0n Exploiting NoSQL Like Never Before Francis Alexander#red-teaming#application-pentesting#security-testing
2014-08-22TalkC0c0n Hacking Communication Akib Sayyed#red-teaming#network-architecture#social-engineering+1
2014-08-22TalkC0c0n Idle Machines doing Bounty Hunting (Behind your Back) Mrityunjay Gautam#bug-hunting#red-teaming#automated-scanning+3
2014-08-22TalkC0c0n Lesser Known Attack - XML Injection Amol Naik#red-teaming#application-pentesting#code-review+3
2014-08-22TalkC0c0n Making and breaking security in embedded devices Presentation Yashin Mehaboobe#purpleteam#red-teaming#blueteam
2014-08-07Tool demoBlackhat C-SCAD: Assessing Security flaws in clearscada Web_X client! Presentation Source Code Aditya K Sood#red-teaming#security-assessment#ics-security+3
2014-08-06TalkBlackhat What goes around comes back around - Exploiting fundamental weaknees in Botnet C&C Panels! Presentation Whitepaper Video Aditya K Sood#botnet#red-teaming#blueteam+1
2014-05-29TalkHitbsecconf Hacking Your Cable TV Network: Die Hard Style Presentation Rahul Sasi#red-teaming#iptv#reverse-engineering
2014-05-29TalkHitbsecconf LOL (Layers On Layers) – Bypassing Endpoint Security for Fun and Profit Presentation Rahul Kashyap, Rafal Wojtzcuk#red-teaming#windows#kernel
2014-05-21TalkPhdays Android Exploitation Video Aditya Gupta#android#red-teaming#security-assessment+1
2014-03-27TalkBlackhat JS Suicide: Using JavaScript Security Features to Kill JS Security Presentation Video Ahamed Nafeez#web-security#red-teaming#csrfguard+1
2014-02-15Tool demoNullcon NoSQL Exploitation Framework Source Code Francis Alexander#red-teaming#application-pentesting#security-tools+3
2014-02-15Tool demoNullcon OWASP Xenotix XSS Exploit Framerwork Source Code Ajin Abraham#owasp#xss#blueteam+3
2014-02-14TalkNullcon Attack of the setuid bit - pt_chown and pwning root terminals Presentation Siddhesh Poyarekar#glibc#red-teaming#blueteam+2
2014-02-14TalkNullcon Attacking WPA/WPA2 in the Cloud Presentation Video Vivek Ramachandran#wifi#wpa2#red-teaming
2014-02-14TalkNullcon Hacking YOu’r Cable TV Network. Video Rahul Sasi, Ahamed Nafeez#red-teaming#network-pentesting#endpoint-protection+1
2014-02-14TalkNullcon Hardware Attack Vectors Presentation Video Yashin Mehaboobe#red-teaming#hid#radio
2014-02-14TalkNullcon phoneypdf: A Virtual PDF Analysis Framework Presentation Video Kiran Bandla#pdf#web-security#red-teaming+2
2014-02-14TalkNullcon Wi-Hawk Password Auditing Tool Presentation Source Code Anamika Singh#wifi#red-teaming#network-architecture
2013-11-07TalkGroundzerosummit Abusing Google Apps: Google is my command and control center Presentation Ajin Abraham#android#red-teaming#cloud-pentesting+4
2013-11-07TalkGroundzerosummit Setting the Data Center on fire Ajit Hatti#red-teaming#incident-management#security-training+1
2013-09-27TalkC0c0n Blur Captcha Anirudh Duggal, Abhinav Mohanty#red-teaming#security-testing#application-pentesting+1
2013-09-27TalkC0c0n Disclosing Vulnerabilities: The Bug Bounty Style Nikhil Prabhakar#red-teaming#bug-bounty#ethical-hacking+3
2013-09-27TalkC0c0n Infiltrating the Intranet with Skanda Source Code Jayesh Chauhan#red-teaming#secure-coding#ethical-hacking+1
2013-09-27TalkC0c0n Lets Play - Applanting on new Grounds Ajit Hatti#android#red-teaming#csrf+1
2013-09-27TalkC0c0n Pwning WiFi Devices! Swaroop Yermalkar#wifi#red-teaming#network-pentesting+2
2013-09-27TalkC0c0n SSRF / XSPA - Real World Attacks and Mitigations Riyaz Walikar#ssrf#xspa#red-teaming
2013-09-12TalkGrrcon The Droid Exploitation Saga – All Over Again! Aditya Gupta, Subho Halder#android#red-teaming#android-security+4
2013-08-03TalkDefcon PowerPreter: Post Exploitation Like a Boss Presentation Source Code Video Nikhil Mittal#red-teaming#powershell#windows
2013-08-01TalkBlackhat Hot knives through butter: Bypassing automated analysis systems Presentation Whitepaper Video Abhishek Singh, Zheng Bu#red-teaming#dynamic-analysis#malware-research+1
2013-08-01Tool demoBlackhat OWASP Xenotix XSS Exploit Framework Source Code Ajin Abraham#owasp#xss#blueteam+3
2013-07-31TalkBlackhat Clickjacking revisited: A perceptual view of UI security Presentation Video Devdatta Akhawe#clickjacking#blueteam#red-teaming
2013-07-31Tool demoBlackhat JMSDigger Presentation Source Code Gursev Singh Kalra#security-assessment#red-teaming#blueteam+1
2013-03-15Tool demoBlackhat OWASP Xenotix XSS Exploit Framework Source Code Ajin Abraham#owasp#xss#blueteam+3
2013-03-15Tool demoBlackhat Prasadhak (And Offensive Powershell) Source Code Nikhil Mittal#powershell#windows#red-teaming
2013-03-14TalkBlackhat Lets play - Applanting Presentation Whitepaper Video Ajit Hatti#red-teaming#csrf#clickjacking+1
2013-03-12TalkTroopers Dirty use of USSD Codes in Cellular Network Presentation Ravishankar Borgaonkar#red-teaming#android-security#ios-security
2013-03-07TalkCansecwest SMS to Meterpreter - Fuzzing USB Modems Presentation Whitepaper Rahul Sasi#red-teaming#fuzzing#hardware-embedded
2013-03-01TalkNullcon Capturing Zero-Day Information Video Dinesh O Bareja, Sumit Sharma#zero-day#red-teaming#honeypot
2013-03-01TalkNullcon Detecting and Exploiting XSS Vulnerabilities and Xenotix XSS Exploitation Framework Presentation Video Ajin Abraham#xss#red-teaming#application-pentesting+3
2013-03-01TalkNullcon Pawing the Droid: Twisting the ARM Divyanshu Shekhar, Anshul Kumar#android#arm#linux+4
2013-03-01TalkNullcon Rest - A Real Stealth and Semi Stealth MITM Attack Tool for IPv4 Networks Source Code Video Naga Rohit Samineni#ipv4#mitm#blueteam+2
2013-03-01TalkNullcon SMS to Meterpreter - Fuzzing USB Modems Video Rahul Sasi#red-teaming#fuzzing#network-pentesting+2
2013-03-01TalkNullcon Vulnerability research anyone? Omair#red-teaming#blueteam#purpleteam
2012-12-06TalkBlackhat Attacking ODATA Presentation Whitepaper Source Code Gursev Singh Kalra#red-teaming#api-security#application-pentesting+2
2012-12-06TalkBlackhat HTML5 top 10 threats – Stealth Attack and Silent Exploits Presentation Whitepaper Shreeraj Shah#red-teaming#application-pentesting#dynamic-analysis+4
2012-12-06TalkBlackhat Poking servers with Facebook(and other web applications) Presentation Whitepaper Source Code Riyaz Walikar#xspa#red-teaming#application-pentesting+2
2012-12-06TalkBlackhat The art of exploiting logical flaws in web apps Presentation Whitepaper Sumit Siddharth, Richard Dean#red-teaming#secure-coding#application-pentesting+1
2012-12-05TalkBlackhat Droid Exploitation Saga Presentation Whitepaper Source Code Aditya Gupta, Subho Halder#android#red-teaming#android-security+3
2012-12-01TalkClubhack Content-Type attack -Dark hole in the secure environment Presentation Video Raman Gupta#red-teaming#application-pentesting#pdf+3
2012-12-01TalkClubhack Detecting and Exploiting XSS with Xenotix XSS Exploit Framework Presentation Video Ajin Abraham#xss#red-teaming#application-pentesting+4
2012-12-01TalkClubhack FatCat Web Based SQL Injector Presentation Source Code Video Sandeep Kamble#sqli#red-teaming#input-validation+4
2012-12-01TalkClubhack Hacking and Securing iOS applications Presentation Video Satish Bommisetty#red-teaming#blueteam#purpleteam+1
2012-12-01TalkClubhack Stand Close to Me, & You’re pwned! : Owning SmartPhones using NFC Presentation Video Aditya Gupta, Subho Halder#nfc#red-teaming#android-security+4
2012-11-29TalkDeepsec Bad Things in Good Packages - Creative Exploit Delivery Presentation Saumil Shah#red-teaming#exploit-delivery#security-testing
2012-11-23TalkMalcon Advanced Malware Engine Whitepaper Mohit Kumar#android#red-teaming#malware-research+3
2012-11-23TalkMalcon Advances in ROP attacks Presentation Raashid Bhat#red-teaming#bypassing#exploit-delivery+3
2012-11-23TalkMalcon Windows Phone 8 Malware Prototype Shantanu Gawde#windows-phone#red-teaming#mobile-device-management+3
2012-10-11TalkHitbsecconf XSS & CSRF strike back – Powered by HTML5 Presentation Shreeraj Shah#red-teaming#csrf#cors+1
2012-10-10TalkHitbsecconf Innovative Approaches to Exploit Delivery Video Saumil Shah#red-teaming#exploit-delivery#browser-security
2012-09-27TalkGrrcon The Realm of Third Generation Botnet Attacks Video Aditya K Sood, Dr. Richard J Enbody#red-teaming#botnet#dynamic-analysis+1
2012-09-26TalkNullcon Highly Harmful Audio Waves aka DTMF Fuzzing Video Rahul Sasi#dtmf#red-teaming#fuzzing+3
2012-09-20TalkEkoparty Dirty use of USSD Codes in Cellular Network Whitepaper Video Ravishankar Borgaonkar#red-teaming#android-security#endpoint-protection+1
2012-09-20TalkEkoparty Fuzzing DTMF Input Processing Algorithms Source Code Rahul Sasi#fuzzing#red-teaming#dtmf
2012-08-03TalkC0c0n Evil JavaScript Bishan Singh#red-teaming#web-security#application-pentesting+4
2012-08-03TalkC0c0n WebApp Remote Code Execution using Server Side Scripting Engines Presentation Rahul Sasi#red-teaming#security-assessment#application-pentesting+4
2012-07-26TalkBlackhat HTML5 top 10 threats – Stealth Attack and Silent Exploits Presentation Whitepaper Video Shreeraj Shah#red-teaming#cors#csrf+3
2012-03-21TalkTroopers More Fun Using Kautilya or Is It a Thumb Drive? Is It a Toy? No, It’s a Keyboard Presentation Source Code Nikhil Mittal#security-assessment#red-teaming#keylogging
2012-03-16TalkBlackhat IVR Security- Internal Network Attack via Phone Lines Presentation Source Code Video Rahul Sasi#red-teaming#ivrs#network-pentesting+3
2012-03-16TalkBlackhat The Pwnage Saga Continues Presentation Video Nikhil Mittal#hid#red-teaming#buffer-underflow+2
2012-03-14TalkBlackhat Hacking XPATH 2.0 Presentation Whitepaper Video Sumit Siddharth, Tom Forbes#red-teaming#application-pentesting#input-validation+1
2012-03-14TalkBlackhat HTML5 top 10 threats – Stealth Attack and Silent Exploits Presentation Whitepaper Video Shreeraj Shah#red-teaming#cors#csrf+3
2012-02-15TalkNullcon Attacking Backup Software Video Nibin Varghese#red-teaming#application-pentesting#security-testing
2012-02-15TalkNullcon Binary God Presentation Video Atul Alex#red-teaming#emulator#assembler+2
2012-02-15TalkNullcon CAPTCHAs for fun and Profit Video Gursev Singh Kalra#red-teaming#application-pentesting#input-validation+2
2012-02-15TalkNullcon Content sniffing Algorithm bypassing techniques and possible attack vectors Video Anil Aphale, Chaitany Kamble#red-teaming#xss#web-security+2
2012-02-15TalkNullcon Friction in the machine Dinesh Shenoy#red-teaming#blueteam#purpleteam
2012-02-15TalkNullcon Haxdroid: Empowering Android Handset Video Anant Shrivastava, Prashant Mahajan, Pardhasaradhi Ch#android#security-assessment#red-teaming
2012-02-15TalkNullcon IVR Security: Internal Network attacks via phone lines Video Rahul Sasi#ivrs#red-teaming#application-pentesting+1
2012-02-15TalkNullcon Node.js: The good, bad and ugly Video Bishan Singh#web-security#red-teaming#blueteam+1
2012-02-15TalkNullcon Your phone is your phone but your calls are now my calls Akib Sayyed, Bipul Sahu, Dipesh Goyal, Nitin Agarwal#red-teaming#gsm#exploit-delivery+1
2011-12-15TalkBlackhat Kautilya: Teensy Beyond Shell Presentation Whitepaper Source Code Nikhil Mittal#hid#red-teaming#endpoint-protection+3
2011-12-04TalkClubhack Android Tamer Presentation Source Code Anant Shrivastava#android#security-assessment#red-teaming+2
2011-12-04TalkClubhack DOM XSS – Encounters of the 3rd Kind Presentation Video Bishan Singh#xss#red-teaming#secure-coding+4
2011-12-04TalkClubhack Exploit the Exploit Kits Presentation Dhruv Soi#red-teaming#exploit-kit#malware-distribution+4
2011-12-04TalkClubhack Hacking your Droid Presentation Aditya Gupta#red-teaming#android#mobile-hacking+4
2011-12-04TalkClubhack Handle Exploitation of Remote System From Email Account Presentation Bhaumik Merchant#red-teaming#phishing#social-engineering
2011-12-04TalkClubhack Mere paas Teensy hai Presentation Nikhil Mittal#hid#red-teaming#security-assessment
2011-12-04TalkClubhack One Link Facebook Presentation Anand Pandey#red-teaming#application-pentesting#phishing+1
2011-11-25TalkMalcon Advanced Malware for Apple Products Atul Alex#red-teaming#macos#ios
2011-11-25TalkMalcon Mareech : Look it’s a HID made up of gold Nikhil Mittal#hid#red-teaming#keylogging+2
2011-11-04TalkHackfest Here are your keystrokes Nikhil Mittal#red-teaming#keylogging#security-assessment+1
2011-10-13TalkHitbsecconf Femtocells: A Poisonous Needle in the Operator’s Hay Stack Presentation Video Ravishankar Borgaonkar, Kevin Redon, Nico Golde#3g#red-teaming#application-pentesting
2011-10-07TalkC0c0n Deep(er) Penetration: Reaching the Internal Network using Exposed Web Applications Riyaz Walikar#red-teaming#application-pentesting#application-hardening+1
2011-10-07TalkC0c0n Exploiting the TCP Simultaneous Connection to Provide a Low Cost DoS Mitigation Solution Presentation Ahamed Nafeez#red-teaming#network-pentesting#network-architecture
2011-10-07TalkC0c0n Runtime thread injection and execution in Linux processes Aseem Jakhar#linux#red-teaming#code-injection+1
2011-10-07TalkC0c0n Wi-Fi Malware for Fun and Profit Vivek Ramachandran#red-teaming#network-pentesting#malware-distribution+2
2011-09-19TalkBrucon Botnets and Browsers, Brothers in a Ghost Shell Presentation Aditya K Sood#botnet#red-teaming#dynamic-analysis+1
2011-09-19TalkHacklu Linux thread injection - The jugaad way Source Code Aseem Jakhar#linux#thread-injection#red-teaming
2011-09-19TalkHacklu The travelling hacksmith Saumil Shah#red-teaming#ethical-hacking#exploit-delivery+2
2011-09-19TalkBrucon Wifi malware for fun and profit Presentation Vivek Ramachandran#wifi#red-teaming#endpoint-protection+3
2011-09-07TalkSecuritybyte Enterprise Wi-Fi Worms, Backdoors and Botnets for Fun and Profit Presentation Vivek Ramachandran#wifi#worm#botnet+1
2011-09-06TalkSecuritybyte Botnets at Application+ layer Presentation Raj Shastrakar#bot#red-teaming#application-pentesting+4
2011-08-05TalkDefcon Jugaad – Linux Thread Injection Kit Presentation Source Code Video Aseem Jakhar#linux#thread-injection#red-teaming
2011-05-20TalkHitbsecconf Next Generation Web Attacks – HTML 5, DOM(L3) and XHR(L2) Presentation Shreeraj Shah#red-teaming#cors#csrf+3
2011-03-30TalkTroopers Femtocell: Femtostep to the Holy Grail Presentation Ravishankar Borgaonkar, Kevin Redon#red-teaming#application-pentesting#mobile-hacking+1
2011-02-25TalkNullcon Buffer Under Run Exploits Presentation Saurabh Sharma, Chinmaya Kamal#buffer-underrun#buffer-underflow#red-teaming
2011-02-25TalkNullcon Chupa Rustam Presentation Abhijeet Hatekar#surveillance#red-teaming#application-pentesting+2
2011-02-25TalkNullcon Future of cyber crimes: Limitations and Challenges Pratap Reddy#blueteam#red-teaming#purpleteam+1
2011-02-25TalkNullcon Fuzzing with complexities Presentation Whitepaper Video Vishwas Sharma#fuzzing#red-teaming#application-pentesting+4
2011-02-25TalkNullcon JSON Fuzzing: New approach to old problems Presentation Whitepaper K v Prashant, Tamaghna Basu#fuzzing#red-teaming#application-pentesting+4
2011-02-25TalkNullcon Jugaad Beta: Linux Thread Injection malware PoC Source Code Aseem Jakhar#linux#red-teaming#malware-research+2
2011-02-25TalkNullcon Lessons Learned From 2010 Presentation Video Saumil Shah#red-teaming#exploit-delivery#social-engineering+2
2011-02-25TalkNullcon Penetration Testing a Biometric System Presentation Whitepaper Video Rahul Sasi#security-assessment#biometric#hid+1
2011-02-25TalkNullcon Security Analysis of India’s Electronic Voting Machines: Memoirs of a whistleblower Presentation Video Hari Krishna Prasad Vemuru#evm#red-teaming#hardware-embedded+3
2010-12-04TalkClubhack Attacking with HTML5 Presentation Lavakumar Kuppan#red-teaming#application-pentesting#security-testing
2010-12-04TalkClubhack Data theft in India Presentation K K Mookhey#data-leak#red-teaming#cyber-crime
2010-10-27TalkHacklu Exploit Delivery - Tricks and Techniques Presentation Saumil Shah#red-teaming#exploit#exploit-delivery+4
2010-10-14TalkHitbsecconf Exploit Delivery Presentation Saumil Shah#red-teaming#exploit#exploit-delivery+2
2010-10-13TalkHitbsecconf Hacking a Browser’s DOM – Exploiting Ajax and RIA Presentation Video Shreeraj Shah#red-teaming#web-security#ajax+3
2010-08-01TalkC0c0n Client Side Exploits using PDF Presentation Ankur Bhargava, Tamaghna Basu#red-teaming#pdf#data-leak+2
2010-08-01TalkC0c0n Code Disclosure over HTTP Anant Kochhar#red-teaming#application-hardening#code-review+4
2010-08-01TalkC0c0n Wireless MITM Prashant Mahajan#red-teaming#network-pentesting#security-tools
2010-08-01TalkC0c0n Writing x86 ShellCode & Secure Self Modifying code and Cross Platform Programming - A Security Angle Praseed Pai#windows#red-teaming#secure-coding
2010-07-31TalkDefcon WPA Too! Presentation Whitepaper Video Md Sohail Ahmad#wifi#red-teaming#blueteam+1
2010-07-29TalkBlackhat Hacking Browser’s DOM - Exploiting Ajax and RIA Presentation Whitepaper Shreeraj Shah#red-teaming#ajax#application-pentesting+4
2010-07-29TalkBlackhat Hacking Oracle From Web Apps Presentation Whitepaper Video Sumit Siddharth#red-teaming#sql-injection#application-pentesting+3
2010-07-01TalkHitbsecconf The Travelling Hacksmith 2009 – 2010 Saumil Shah#red-teaming#application-pentesting#phishing+2
2010-07-01TalkHitbsecconf Top 10 Web 2.0 Attacks and Exploits Presentation Shreeraj Shah#red-teaming#cors#csrf+3
2010-04-21TalkHitbsecconf Web Security – Going Nowhere? Presentation Saumil Shah#red-teaming#application-hardening#application-pentesting+4
2010-04-14TalkBlackhat Attacking JAVA Serialized Communication Presentation Whitepaper Source Code Manish Saindane#secure-coding#red-teaming#security-assessment
2010-02-25TalkNullcon Software Fuzzing with Wireplay. Presentation Whitepaper Source Code Abhisek Datta#fuzzing#red-teaming#network-pentesting+3
2010-02-25TalkNullcon Imposter ke karnamey: The Browser Phishing Tool. Lavakumar Kuppan#phishing#red-teaming#security-testing+1
2010-02-25TalkNullcon Intelligent debugging and in memory fuzzing. Presentation Vishwas Sharma, Amandeep Bharti#fuzzing#debugging#red-teaming
2010-02-25TalkNullcon Steganography & Stegananalysis: A Technical & Psychological Perspective Presentation Prince Komal Boonlia, Reena Bhansali#steganography#steganalysis#red-teaming
2010-02-03TalkBlackhat Beware of Serialized GUI Objects Bearing Data Presentation Rohini Sulatycki, David Byrne#apache-myfaces#sun-mojarra#red-teaming+1
2009-12-05TalkClubhack Lust 2.0 – Desire for free WiFi and the threat of the Imposter Presentation Lavakumar Kuppan#wifi#red-teaming#phishing+1
2009-11-19TalkDeepsec Ownage 2.0 Presentation Saumil Shah#red-teaming#ethical-hacking#exploit-delivery+1
2009-11-18TalkSecuritybyte Cloud Hacking – Distributed Attack & Exploit Platform Shreeraj Shah#red-teaming#cloud-pentesting#cloud-workload-protection+1
2009-11-18TalkSecuritybyte Hacking Oracle From Web Presentation Sumit Siddharth#red-teaming#sql-injection#application-hardening+1
2009-11-17TalkSecuritybyte Vbootkit 2.0: Attacking Windows 7 Via Boot Sectors Presentation Source Code Nitin Kumar, Vipin Kumar#windows#red-teaming#boot-sector+1
2009-10-28TalkHacklu Ownage 2.0 Saumil Shah#red-teaming#ethical-hacking#exploit-delivery+2
2009-10-07TalkHitbsecconf How to Own the World – One Desktop at a Time Presentation Video Saumil Shah#social-engineering#red-teaming#firewall
2009-08-02TalkDefcon Wi-Fish Finder: Who Will Bite the Bait Presentation Video Md Sohail Ahmad, Prabhash Dhyani#wifi#honeypot#phishing+1
2009-08-01TalkDefcon The Making of the second SQL injection Worm Presentation Source Code Video Sumit Siddharth#sqli#red-teaming#worm
2009-07-31TalkDefcon Advancing Video Application Attacks with Video Interception, Recording, and Replay Presentation Video Arjun Sambamoorthy, Jason Ostrom#red-teaming#security-tools#application-hardening
2009-07-29TalkBlackhat Psychotronica: Exposure, Control, and Deceit Presentation Nitesh Dhanjani#red-teaming#reconnaissance#social-engineering+3
2009-04-22TalkTroopers Browser Design Flaws – Hacking by Breaking in Architectures Presentation Aditya K Sood#red-teaming#application-pentesting#secure-development+1
2009-04-22TalkHitbsecconf Pwnage 2.0 Presentation Saumil Shah#hid#red-teaming#exploit-delivery
2009-04-22TalkTroopers SQL Injections: More Fun and Profit Presentation Sumit Siddharth#red-teaming#application-pentesting#code-review+4
2009-04-22TalkHitbsecconf Vbootkit 2.0: Attacking Windows 7 via Boot Sectors Presentation Source Code Nitin Kumar, Vipin Kumar#windows#red-teaming#boot-sector
2008-12-06TalkClubhack Hacking Client Side Insecurities Presentation Aditya K Sood#red-teaming#application-pentesting#input-validation+1
2008-12-06TalkClubhack Insecure Implementation of Security Best Practices: of hashing, CAPTCHA’s and Caching Presentation Karmendra Kohli#secure-development#secure-coding#blueteam+1
2008-12-06TalkClubhack Reverse Engineering for exploit writers Presentation Nibin Varghese#red-teaming#reverse-engineering#exploit-development
2008-12-06TalkClubhack Reverse Engineering v/s Secure Coding Presentation Atul Alex#secure-coding#reverse-engineering#red-teaming+2
2008-11-13TalkDeepsec Game of Web 2.0 Security - Attacking Next Generation Apps Shreeraj Shah#red-teaming#application-pentesting#dynamic-analysis+2
2008-10-29TalkHitbsecconf Browser Exploits - A New Model for Browser Security Video Saumil Shah#red-teaming#application-pentesting#code-review+3
2008-10-22TalkHacklu Browser Exploits - A new model for Browser security Presentation Saumil Shah#red-teaming#application-hardening#browser-security+4
2008-08-20TalkOwaspappsecindia Web 2.0 Attacks - Next Generation Threats on the Rise Presentation Shreeraj Shah#red-teaming#blueteam#purpleteam+3
2008-08-09TalkDefcon Autoimmunity Disorder in Wireless LAN Presentation Video Jvr Murthy, Amit Vartak, Md Sohail Ahmad#wifi#wireless-security#red-teaming
2008-08-07TalkBlackhat Got Citrix, Hack It! Presentation Video Shanit Gupta#red-teaming#rdp#application-pentesting+1
2008-03-26TalkCansecwest Vulnerabilities Die Hard Kowsik Guruswamy#red-teaming#ethical-hacking#exploit-delivery+2
2008-02-20TalkBlackhat Hacking VoIP through IPSec Tunnels Whitepaper Sachin Joglekar, Sudeep Patwardhan#voip#red-teaming#gsm+2
2008-02-20TalkBlackhat Scanning Applications 2.0 - Next Generation Scan, Attacks and Tools Presentation Shreeraj Shah#red-teaming#blueteam#purpleteam+3
2007-12-19TalkClubhack Backdoor 2.0: Hacking Firefox to steal his web secrets Presentation Sunil Arora#red-teaming#application-pentesting#browser-security+2
2007-12-09TalkClubhack Analysis of Adversarial Code: The Role of Malware Kits! Presentation Rahul Mohandas#red-teaming#malware-research#dynamic-analysis+1
2007-12-09TalkClubhack Hacking Web 2.0 Art and Science of Vulnerability Detection Presentation Shreeraj Shah#red-teaming#application-pentesting#dynamic-analysis+4
2007-12-09TalkClubhack Legiment Techniques of IPS/IDS Evasion Presentation Ajit Hatti#red-teaming#network-monitoring#ids+2
2007-12-09TalkClubhack Vulnerabilities in VoIP Products and Services Whitepaper Gaurav Saha#voip#red-teaming#sip+3
2007-09-06TalkHitbsecconf Hacking Ajax and Web Services Γ’β‚¬β€œ Next Generation Web Attacks on the Rise Presentation Video Shreeraj Shah#red-teaming#ajax#web-security
2007-08-04TalkDefcon The Emperor Has No Cloak - WEP Cloaking Exposed Presentation Whitepaper Video Vivek Ramachandran#wifi#red-teaming#aircrack
2007-08-01TalkBlackhat Vulnerabilities in Wi-Fi/Dual-Mode VoIP Phones Whitepaper Video Krishna Kurapati#wifi#voip#red-teaming
2007-04-18TalkCansecwest Low-Rate Denial-of-Service attacks Anil Kumar#red-teaming#dos#network-defense+2
2007-04-05TalkHitbsecconf WEB 2.0 Hacking – Defending Ajax and Web Services Presentation Shreeraj Shah#red-teaming#blueteam#purpleteam+2
2007-03-29TalkBlackhat Vboot Kit: Compromising Windows Vista Security Presentation Whitepaper Nitin Kumar, Vipin Kumar#windows#red-teaming#kernel
2006-11-29TalkPacsec Smashing Heap by Free Simulation Presentation Sandip Chaudhari#heap#red-teaming#exploit-delivery+4
2006-10-19TalkHacklu Smashing Heap by Free Simulation: Presentation Sandip Chaudhari#heap#red-teaming#exploit-development+2
2006-10-19TalkHacklu Writing Metasploit plugins - from vulnerability to exploit Presentation Saumil Shah#metasploit#red-teaming#exploit-development+3
2006-09-21TalkHitbsecconf Smashing the Stack for Profit - Period Presentation Video Rohyt Belani#red-teaming#application-pentesting#code-review+3
2006-04-13TalkHitbsecconf Writing Metasploit Plugins - From Vulnerability to Exploit Presentation Video Saumil Shah#metasploit#red-teaming#exploit-development+3
2005-09-29TalkHitbsecconf Trends in Real World Attacks: A Compilation of Case Studies Video Rohyt Belani#red-teaming#application-pentesting#application-hardening+4
2005-07-28TalkBlackhat Rapid Threat Modeling Presentation Video Akshay Aggarwal#threat-modeling#red-teaming#security-strategy+4
2005-07-27TalkBlackhat iSCSI Security (Insecure SCSI) Presentation Himanshu Dwivedi#red-teaming#iscsi#network-storage
2005-04-10TalkHitbsecconf Whispers On The Wire - Network Based Covert Channels, Exploitation and Detection Pukhraj Singh#red-teaming#blueteam#purpleteam+1
2005-03-31TalkBlackhat Defeating Automated Web Assessment Tools Presentation Saumil Shah#red-teaming#security-testing#application-pentesting+1
2004-10-06TalkHitbsecconf Web Services - Attacks and Defense Strategies, Methods and Tools Presentation Shreeraj Shah#red-teaming#blueteam#purpleteam
2004-07-28TalkBlackhat Defeating Automated Web Assessment Tools Video Saumil Shah#red-teaming#application-pentesting#application-hardening+2
2003-12-12TalkHitbsecconf New Generation Frauds Video Yerra Ravi Kiran Raju#fraud#red-teaming#money-laundering
2002-10-03TalkBlackhat Top Ten Web Attacks Presentation Saumil Shah#red-teaming#blueteam#purpleteam
2001-11-21TalkBlackhat One-Way SQL Hacking : Futility of Firewalls in Web Hacking Presentation Video Saumil Shah#firewall#red-teaming#sql-injection+2
2001-04-26TalkBlackhat Web Hacking Presentation Saumil Shah#red-teaming#application-pentesting#security-testing+4
2001-02-14TalkBlackhat Web Hacking Presentation Video Saumil Shah#red-teaming#application-pentesting#dynamic-analysis+3