Hackers of India
Redteam
"talk"
"tool demo"
"Tool demo"
"Tool Demo"
"workshop"
-
2024/08/08
Tool Demo : Blackhat : Octopii v2 -
Owais Shaikh
-
2024/08/07
Tool Demo : Blackhat : DarkWidow: Dropper/PostExploitation Tool targeting Windows -
Soumyanil Biswas
Chirag Savla
-
2024/04/18
Tool Demo : Blackhat : DarkWidow: Dropper/PostExploitation Tool (or can be used in both situations) targeting Windows -
Soumyanil Biswas
-
2023/12/07
Tool Demo : Blackhat : Mantis - Asset Discovery at Scale -
Prateek Thakare
Bharath Kumar
Praveen Kanniah
-
2023/08/07
Talk : C0c0n : Enhancing Red Team OPSEC: Abusing Stealthy In-Memory Binary Execution Techniques in Linux -
Pranav Sivvam
-
2022/09/07
Talk : Nullcon : ElectroVolt: Pwning Popular Desktop Apps While Uncovering New Attack Surface On Electron -
Mohan Sri Rama Krishna Pedhapati
Maxwell Garrett
-
2022/08/11
Talk : Blackhat : ElectroVolt: Pwning Popular Desktop Apps While Uncovering New Attack Surface on Electron -
Mohan Sri Rama Krishna Pedhapati
Aaditya Purani
Max Garrett
William Bowling
-
2021/05/06
Talk : Blackhat : Threat Hunting in Active Directory Environment -
Anurag Khanna
Thirumalai Natarajan Muthiah
-
2020/10/07
Talk : Rootcon : Automating Threat Hunting on the Dark Web and other nitty-gritty thingso -
Apurv Singh Gautam
-
2020/10/07
Talk : Rootcon : How I Pwned the ICS data during my internship -
Shail Patel
-
2020/10/07
Talk : Rootcon : Offensive Embedded Exploitation : Getting hands dirty with IOT/Embedded Device Security Testing -
Kaustubh Padwad
-
2020/10/07
Talk : Rootcon : ReconPal: Leveraging NLP for Infosec -
Nishant Sharma
Jeswin Mathai
-
2020/09/18
Talk : C0c0n : Kubernetes Goat - Vulnerable by Design Kubernetes Cluster Environment -
Madhu Akula
-
2020/09/18
Talk : C0c0n : Offensive Embedded Exploitation : Getting hands dirty with IOT/Embedded Device Security Testing -
Kaustubh Padwad
-
2020/09/18
Talk : C0c0n : Supercharging your initial foothold in Red Team engagements -
Sachin S Kamath
-
2020/07/26
Talk : Hitb Sec Conf : Swapping Asprin Formulas With MDMA While Red Teaming a Billion Dollar Company -
Himanshu Sharma
Aman Sachdev
-
2020/03/18
Talk : Can Sec West : The ARM-X Firmware Emulation Framework -
Saumil Shah
-
2020/03/06
Tool Demo : Nullcon : Callidus -
Chirag Savla
-
2020/03/06
Tool Demo : Nullcon : FRISPY -
Tejas Girme
Parmanand Mishra
-
2020/03/06
Tool Demo : Nullcon : PivotSuite -
Manish Gupta
-
2020/03/06
Talk : Nullcon : Putting it all together: building an iOS jailbreak from scratch -
Umang Raghuvanshi
-
2020/03/06
Tool Demo : Nullcon : VyAPI -
Riddhi Shree
-
2020/03/06
Tool Demo : Nullcon : Wolverine -
Furqan Khan
Siddharth Anbalahan
-
2019/12/04
Talk : Blackhat : ClusterFuzz: Fuzzing at Google Scale -
Abhishek Arya
Oliver Chang
-
2019/11/01
Talk : App Sec Day Australia : A Purple Team View of Serverless and GraphQL Applications -
Abhay Bhargav
-
2019/10/15
Talk : Hitb Sec Conf : Car Hacking: Practical Guide to Automotive Security -
Yogesh Ojha
-
2019/10/14
Talk : Hitb Sec Conf : CALL OF DUTY: MODERN BROWSER WARFARE -
Dhiraj Mishra
-
2019/10/14
Talk : Hitb Sec Conf : ON THE WINGS OF TIME: DEMYSTIFYING WIRELESS ETHICAL HACKING AND DEFENSES -
Harshit Agrawal
Himanshu Mehta
-
2019/09/27
Talk : C0c0n : Detection of TOR Sources using Artificial Intelligence -
Roshy John
-
2019/09/27
Talk : C0c0n : Golang for Pentesters / RedTeamers -
Anant Shrivastava
-
2019/09/27
Talk : C0c0n : Hacking ICS devices for Fun -
Arun Mane
-
2019/09/27
Talk : C0c0n : Offensive Machine Learning for Pentesters and Red Teams -
Tamaghna Basu
-
2019/09/27
Talk : C0c0n : VyAPI - The Vulnerable Hybrid Android App -
Riddhi Shree
-
2019/09/23
Talk : Rootcon : Hacking ICS devices/PLC’s for Fun - ICS and IOT Hacking -
Arun Mane
-
2019/09/23
Talk : Rootcon : Making Anomaly Detection system(ADS) for Vehicles (Automotive Hacking) -
Arun Mane
Nikhil Bogam
-
2019/08/30
Talk : Hitb Sec Conf : COMMSEC: PErfidious: Make PE Backdooring Great Again! -
Shreyans Doshi
-
2019/08/29
Talk : Hitb Sec Conf : Understanding, Attacking & Securing Medical Devices -
Ajay Pratap Singh
-
2019/08/10
Talk : Defcon : RACE - Minimal Rights and ACE for Active Directory Dominance -
Nikhil Mittal
-
2019/08/09
Tool Demo : Defcon : EXPLIoT - IoT Security Testing and Exploitation Framework -
Aseem Jakhar
Murtuja Bharmal
-
2019/08/09
Tool Demo : Defcon : PivotSuite: Hack The Hidden Network - A Network Pivoting Toolkit -
Manish Gupta
-
2019/08/08
Tool Demo : Blackhat : EXPLIoT: IoT Security Testing and Exploitation Framework -
Aseem Jakhar
Murtuja Bharmal
-
2019/08/07
Talk : Blackhat : New Vulnerabilities in 5G Networks -
Ravishankar Borgaonkar
Altaf Shaik
-
2019/08/07
Tool Demo : Blackhat : PivotSuite: Hack The Hidden Network - A Network Pivoting Toolkit -
Manish Gupta
-
2019/08/07
Tool Demo : Blackhat : RedHunt-OS v2: Virtual Machine for Adversary Emulation and Threat Hunting -
Sudhanshu Chauhan
Kunal Aggarwal
-
2019/05/21
Talk : Phdays : Fuzzing 101 -
Dhiraj Mishra
Zubin Devnani
-
2019/05/21
Talk : Phdays : GDALR: an efficient model duplication attack on black-box machine learning models -
Rewanth Tammana
Nikhil Joshi
-
2019/05/21
Talk : Phdays : How to fail in hardware hacking -
Arun Magesh
-
2019/05/21
Talk : Phdays : Rapid hardware hacking 101 -
Arun Magesh
-
2019/05/10
Talk : Hitb Sec Conf : HAXPO: RF Exploitation: Demystifying IoT/OT Hacks with SDR -
Himanshu Mehta
Harshit Agrawal
-
2019/05/09
Talk : Hitb Sec Conf : GDALR: Duplicating Black Box Machine Learning Models -
Rewanth Tammana
Nikhil Joshi
-
2019/05/09
Talk : Hitb Sec Conf : HAXPO: WiCy: Monitoring 802.11AC Networks at Scale -
Vivek Ramachandran
-
2019/03/29
Tool Demo : Blackhat : Halcyon IDE: Nmap Script Development IDE -
Sanoop Thomas
-
2019/03/28
Tool Demo : Blackhat : pytm: A Pythonic Framework for Threat Modeling -
Rohit Shambhuni
Izar Tarandach
-
2019/03/28
Tool Demo : Blackhat : VoIP Wireshark Attack-Defense Toolkit -
Nishant Sharma
Jeswin Mathai
Ashish Bhangale
-
2019/03/21
Talk : Troopers : Evolution of kernel fuzzers in NetBSD -
Siddharth M
-
2019/02/28
Talk : Nullcon : A Hacker Walks into a Co-working Space -
Rahul Binjve
-
2019/02/28
Talk : Nullcon : Attacking & Securing HealthCare Standards & hospital secured systems -
Ajay Pratap Singh
-
2019/02/28
Talk : Nullcon : Dirty use of USSD Codes -
Ravishankar Borgaonkar
-
2018/12/05
Talk : Blackhat : The Undeniable Truth: How Remote Attestation Circumvents Deniability Guarantees in Secure Messaging Protocols -
N Asokan
Lachlan Gunn
Ricardo Vieitez Parra
-
2018/11/29
Talk : Deepsec : DNS Exfiltration and Out-of-Band Attacks -
Nitesh Shilpkar
-
2018/11/27
Talk : Hitb Sec Conf : BSIDES: Creating Browser Extensions to Hunt for Low-Hanging Fruit -
Rewanth Tammana
-
2018/11/27
Talk : Hitb Sec Conf : COMMSEC: Taking Over Telecom Networks -
Hardik Mehta
Loay Hassan Abdelrazek
-
2018/11/27
Talk : Hitb Sec Conf : Somebody Answer the Phone: Hacking Telephone Systems for Fun & Profit -
Himanshu Mehta
Sachine Wagh
-
2018/11/02
Talk : Hackfest : Exploiting Connected Medical Devices: Lessons Learned & Data Earned -
Saurabh Harit
-
2018/10/10
Talk : Brucon : Forging Trusts for Deception in Active Directory -
Nikhil Mittal
-
2018/10/05
Talk : C0c0n : DNS Exfiltration and Out of Band Attacks -
Nitesh Shilpkar
-
2018/10/05
Talk : C0c0n : Unconventional vulnerabilities in Google Cloud Platform -
Pranav Venkat
-
2018/09/27
Talk : Rootcon : Expl-iot: Hacking IoT like a boss -
Aseem Jakhar
-
2018/08/30
Talk : Hitb Sec Conf : Exploiting Automation in LTE Mobile Networks -
Ravishankar Borgaonkar
Altaf Shaik
-
2018/08/12
Tool Demo : Defcon : Expl-iot—IoT Security Testing and Exploitation framework -
Aseem Jakhar
-
2018/08/12
Talk : Defcon : Last mile authentication problem: Exploiting the missing link in end-to-end secure communication -
Siddharth Rao
Thanh Bui
-
2018/08/11
Tool Demo : Defcon : ADRecon: Active Directory Recon -
Prashant Mahajan
-
2018/08/11
Tool Demo : Defcon : BLEMystique—Affordable custom BLE target -
Nishant Sharma
Jeswin Mathai
-
2018/08/11
Tool Demo : Defcon : Halcyon IDE -
Sanoop Thomas
-
2018/08/09
Talk : Defcon : 4G—Who is paying your cellular phone bill? -
Isha Singh
Dr Silke Holtmanns
-
2018/08/09
Tool Demo : Blackhat : OWASP Offensive Web Testing Framework -
Viyat Bhalodia
-
2018/08/08
Tool Demo : Blackhat : ADRecon: Active Directory Recon -
Prashant Mahajan
-
2018/08/08
Talk : Blackhat : Back to the Future: A Radical Insecure Design of KVM on ARM -
Baibhav Singh
Rahul Kashyap
-
2018/08/08
Talk : Blackhat : Compression Oracle Attacks on VPN Networks -
Ahamed Nafeez
-
2018/08/08
Tool Demo : Blackhat : Damn Vulnerable iOS App: Swift Edition -
Prateek Gianchandani
-
2018/08/08
Tool Demo : Blackhat : Expl-iot: IoT Security Testing and Exploitation Framework -
Aseem Jakhar
-
2018/08/08
Tool Demo : Blackhat : Halcyon IDE: For Nmap Script Developers -
Sanoop Thomas
-
2018/08/08
Talk : Blackhat : LTE Network Automation Under Threat -
Ravishankar Borgaonkar
Altaf Shaik
-
2018/08/08
Tool Demo : Blackhat : RedHunt OS (VM): A Virtual Machine for Adversary Emulation and Threat Hunting -
Sudhanshu Chauhan
-
2018/08/08
Tool Demo : Blackhat : V2X Validation Tool -
Raashid Ansari
Jonathan Petit
-
2018/06/29
Talk : Hackinparis : Hunting PBX for Vulnerabilities -
Himanshu Mehta
Sachin Wagh
-
2018/03/22
Tool Demo : Blackhat : ADRecon: Active Directory Recon -
Prashant Mahajan
-
2018/03/22
Tool Demo : Blackhat : Archery - Open Source Vulnerability Assessment and Management -
Anand Tiwari
-
2018/03/22
Tool Demo : Blackhat : Jackhammer - One Security Vulnerability Assessment/Management Tool -
Rajagopal Vr
Krishna Chaitanya Yarramsetty
-
2018/03/22
Talk : Blackhat : Securing Your In-Ear-Fitness Coach: Challenges in Hardening Next Generation Wearables -
Sumanth Naropanth
Kavya Racharla
-
2018/03/01
Talk : Nullcon : Abusing and Attacking Content Sharing Solutions -
Pratap Chandra Allena
-
2018/03/01
Talk : Nullcon : Breaking Into Container Orchestrators -
Nadeem Hussain
-
2018/03/01
Talk : Nullcon : DARWIN (A parasite covert wireless network) -
Rushikesh D Nandedkar
-
2018/03/01
Talk : Nullcon : Looting your bank savings using Digital India -
Indrajeet Bhuyan
-
2018/03/01
Talk : Nullcon : Software Supply Chain Cyberattack -
Samiran Ghatak
-
2018/03/01
Talk : Nullcon : Unleashing D* on Android Kernel Drivers -
Aravind Machiry
-
2017/12/06
Talk : Blackhat : BREAKING BAD: STEALING PATIENT DATA THROUGH MEDICAL DEVICES -
Saurabh Harit
-
2017/12/06
Talk : Blackhat : DIFUZZING ANDROID KERNEL DRIVERS -
Aravind Machiry
Chris Salls
Yan Shoshitaishvili
Jake Corina
Shuang Hao
-
2017/12/06
Tool Demo : Blackhat : EXPLIOT - INTERNET OF THINGS SECURITY TESTING AND EXPLOITATION FRAMEWORK -
Aseem Jakhar
-
2017/11/17
Talk : Deepsec : Intel AMT: Using & Abusing The Ghost In The Machine -
Parth Shukla
-
2017/10/19
Talk : Hacklu : Intel AMT: Using & Abusing the Ghost in the Machine -
Parth Shukla
-
2017/09/13
Talk : 44 Con : Red Team Revenge : Attacking Microsoft ATA -
Nikhil Mittal
-
2017/08/18
Talk : C0c0n : Anti-Virus Bypassing for Fun and Profit -
Vanshit Malhotra
-
2017/08/18
Talk : C0c0n : Exploiting the smartness of BLE Stack -
Apoorva Gupta
-
2017/08/18
Talk : C0c0n : Hacking Homes: A hardware insight for IoT [in]Security -
Jiggyasu Sharma
-
2017/08/18
Talk : C0c0n : Hunting the Hunters – Fighting CyberCrime at the Source -
Valan Sivasubramanian
-
2017/08/18
Talk : C0c0n : Mobile Banking (In)Security -
Sneha Rajguru
-
2017/08/18
Talk : C0c0n : The card hack - Lessons from the Hitachi Payments Breach -
Saikat Datta
-
2017/07/30
Tool Demo : Blackhat : Yasuo -
Saurabh Harit
-
2017/07/29
Tool Demo : Defcon : WIDY 2.0: WIFI 0WNAGE IN UNDER $5 RELOADED -
Vivek Ramachandran
Nishant Sharma
Ashish Bhangale
-
2017/07/29
Tool Demo : Defcon : WiMonitor - an OpenWRT package for remote WiFi sniffing -
Vivek Ramachandran
Nishant Sharma
Ashish Bhangale
-
2017/07/28
Tool Demo : Defcon : Android Tamer -
Anant Shrivastava
-
2017/07/28
Tool Demo : Defcon : GibberSense -
Ajit Hatti
-
2017/07/27
Workshop : Defcon : Attacking and Defending 802.11ac Networks -
Vivek Ramachandran
Thomas D' Otreppe
-
2017/07/27
Tool Demo : Blackhat : Android Tamer -
Anant Shrivastava
-
2017/07/27
Talk : Blackhat : Evading Microsoft ATA for Active Directory Domination -
Nikhil Mittal
-
2017/07/27
Tool Demo : Blackhat : Gibber Sense -
Ajit Hatti
-
2017/07/26
Talk : Blackhat : New Adventures in Spying 3G and 4G Users: Locate, Track & Monitor -
Ravishankar Borgaonkar
Altaf Shaik
Shinjo Park
Lucca Hirschi
Andrew Martin
Jean Pierre Seifert
-
2017/07/26
Talk : Blackhat : Wire Me Through Machine Learning -
Ankit Singh
Vijay Thaware
-
2017/05/23
Talk : Phdays : How we hacked distributed configuration management systems -
Bharadwaj Machiraju
Francis Alexander
-
2017/05/23
Talk : Phdays : Practical machine learning in infosecurity -
Anto Joseph
Clarence Chio
-
2017/04/19
Talk : Brucon : Evading Microsoft ATA for Active Directory Domination -
Nikhil Mittal
-
2017/04/14
Talk : Hitb Sec Conf : COMMSEC: IoT Hacking Simplified -
Aseem Jakhar
-
2017/04/14
Talk : Hitb Sec Conf : Is There a Doctor in The House? Hacking Medical Devices and Healthcare Infrastructure -
Anirudh Duggal
-
2017/03/31
Talk : Blackhat : Mobile-Telephony Threats in Asia -
Payas Gupta
Marco Balduzzi
Lion Gu
-
2017/03/31
Talk : Blackhat : WHAT MALWARE AUTHORS DON’T WANT YOU TO KNOW - EVASIVE HOLLOW PROCESS INJECTION -
Monnappa K A
-
2017/03/30
Tool Demo : Blackhat : WiDy: WiFi 0wnage in Under $5 -
Vivek Ramachandran
Nishant Sharma
Ashish Bhangale
-
2017/03/15
Talk : Can Sec West : Inside Stegosploit -
Saumil Shah
-
2017/03/03
Talk : Nullcon : Case study of SS7/Sigtran assessment -
Akib Sayyed
-
2017/03/03
Talk : Nullcon : Case Study on RFID (proximity cards) hacking -
Sarwar Jahan
Ashwath Kumar
-
2017/03/03
Talk : Nullcon : Hacking medical devices and infrastructure -
Anirudh Duggal
-
2016/11/05
Talk : Hackfest : LockPicker: Leaking data from live LUKS partition -
Adhokshaj Mishra
-
2016/11/04
Talk : Blackhat : Detach Me Not - DoS Attacks Against 4G Cellular Users Worldwide from your Desk -
Siddharth Rao
Bhanu Kotte
Dr. Silke Holtmanns
-
2016/11/04
Talk : Blackhat : Randomization Can’t Stop BPF JIT Spray -
N Asokan
Filippo Bonazzi
Elena Reshetova
-
2016/11/04
Tool Demo : Blackhat : Yasuo -
Saurabh Harit
-
2016/09/23
Talk : Rootcon : Halcyon – A Faster Way to Build Custom Scripts for Nmap Scans -
Sanoop Thomas
-
2016/08/19
Talk : C0c0n : Abusing Digital Certificates : Malware Style -
Ajit Hatti
-
2016/08/19
Talk : C0c0n : Attacking and crashing IOT devices via Bluetooth LE Protocol -
Pratap Chandra Allena
Ajay Pratap Singh
-
2016/08/19
Talk : C0c0n : Backdooring my Enemies with a Proxy for Threat Intelligence -
Jovin Lobo
Aditya Vasekar
-
2016/08/19
Talk : C0c0n : Breaking into Gas stations! -
Suraj Pratap
-
2016/08/19
Talk : C0c0n : Esoteric XSS Payloads -
Riyaz Walikar
-
2016/08/19
Talk : C0c0n : Evading Corporate Security – You’re as secure as the weakest link -
Prajwal Panchmahalkar
-
2016/08/06
Tool Demo : Defcon : Android-InsecureBank -
Dinesh Shetty
-
2016/08/04
Tool Demo : Blackhat : Droid-FF: Android Fuzzing Framework -
Anto Joseph
-
2016/08/03
Tool Demo : Blackhat : Android Tamer -
Anant Shrivastava
-
2016/08/03
Tool Demo : Blackhat : Android-InsecureBankv2 -
Dinesh Shetty
-
2016/08/03
Talk : Blackhat : AMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does It -
Nikhil Mittal
-
2016/08/03
Tool Demo : Blackhat : Nishang: The Goodness of Offensive PowerShell -
Nikhil Mittal
-
2016/05/26
Talk : Hitb Sec Conf : HITB Lab: Droid-FF: The First Android Fuzzing Framework -
Anto Joseph
-
2016/05/17
Talk : Phdays : Fingerprinting and Attacking a Healthcare Infrastructure -
Anirudh Duggal
-
2016/04/01
Tool Demo : Blackhat : Android Tamer -
Anant Shrivastava
-
2016/04/01
Tool Demo : Blackhat : HackSys Extreme Vulnerable Driver -
Ashfaq Ansari
-
2016/04/01
Tool Demo : Blackhat : Halcyon – A Faster Way to Build Custom Scripts for Nmap Scans -
Sanoop Thomas
-
2016/03/11
Talk : Nullcon : Attacking and defending healthcare - EMR solutions -
Anirudh Duggal
-
2016/03/11
Talk : Nullcon : Hitchhiker’s guide to hacking Industrial Control systems (ICS) -
Arun Mane
-
2016/03/11
Talk : Nullcon : Million Dollar Baby: Towards ANGRly conquering DARPA CGC -
Aravind Machiry
-
2016/03/11
Talk : Nullcon : Privacy leaks on 4G-LTE networks -
Altaf Shaik
-
2015/11/19
Talk : Deepsec : Continuous Intrusion: Why CI Tools Are an Attacker’s Best Friends. -
Nikhil Mittal
-
2015/11/13
Talk : Blackhat : LTE & IMSI Catcher Myths -
Ravishankar Borgaonkar
N Asokan
Altaf Shaik
Valtteri Niemi
Jean Pierre Seifert
-
2015/11/13
Talk : Blackhat : Continuous Intrusion: Why CI tools are an Attacker’s Best Friends -
Nikhil Mittal
-
2015/11/12
Tool Demo : Blackhat : Android InsecureBank -
Dinesh Shetty
-
2015/11/12
Tool Demo : Blackhat : Android Tamer -
Anant Shrivastava
-
2015/11/12
Tool Demo : Blackhat : Kautilya: Fastest shells you will ever get -
Nikhil Mittal
-
2015/11/12
Tool Demo : Blackhat : Nishang - Tracking A Windows User -
Nikhil Mittal
-
2015/11/12
Talk : Blackhat : Stegosploit - Exploit Delivery with Steganography and Polyglots -
Saumil Shah
-
2015/11/05
Talk : Ground Zero Summit : Browser based Malware attacks -
Harsh Daftary
-
2015/11/05
Talk : Ground Zero Summit : Hacking RFIDs under 2000INR -
Jayesh Chauhan
-
2015/11/05
Talk : Ground Zero Summit : Thanks for the free cookies -
Anshul Saxena
Nishant Yadav
-
2015/10/21
Talk : Hacklu : Stegosploit - Delivering Drive-By Exploits With Only Images -
Saumil Shah
-
2015/09/11
Talk : 44 Con : Stegosploit – Drive-by Browser Exploits using only Images -
Saumil Shah
-
2015/08/28
Tool Demo : Blackhat : Damn Vulnerable iOS App (DVIA) -
Prateek Gianchandani
-
2015/08/08
Talk : Defcon : Dissecting the Design of SCADA Web Human Machine Interfaces (HMIs) - Hunting Vulnerabilities -
Aditya K Sood
-
2015/08/08
Talk : Defcon : QARK: Android App Exploit and SCA Tool -
Tushar Dalvi
Tony Trummer
-
2015/08/06
Tool Demo : Blackhat : Kautilya -
Nikhil Mittal
-
2015/08/05
Tool Demo : Blackhat : QARK - Android Application SCA and Exploit Tool -
Tushar Dalvi
-
2015/08/01
Talk : C0c0n : A Pentester’s Methodology to Discover, Automate and Exploit Windows Privilege Escalation flaws. -
Riyaz Walikar
-
2015/08/01
Talk : C0c0n : Attack chaining for web exploitation- From Information leakage to gaining Root access -
Abhijeth Dugginapeddi
-
2015/07/06
Talk : Blackhat : DOM FLOW - UNTANGLING THE DOM FOR MORE EASY-JUICY BUGS -
Ahamed Nafeez
-
2015/05/29
Talk : Hitb Sec Conf : Hacking Samsung’s Tizen: The OS of Everything -
Ajin Abraham
-
2015/05/29
Talk : Hitb Sec Conf : PowerShell for Penetration Testers -
Nikhil Mittal
-
2015/05/28
Talk : Hitb Sec Conf : Stegosploit: Hacking With Pictures -
Saumil Shah
-
2015/05/26
Talk : Phdays : iOS Application Exploitation -
Prateek Gianchandani
Egor Tolstoy
-
2015/03/27
Talk : Blackhat : Security Content Metadata Model with an Efficient Search Methodology for Real Time Monitoring and Threat Intelligence -
Preeti Subramanian
-
2015/03/27
Talk : Syscan : Stegosploit - Hacking with Pictures -
Saumil Shah
-
2015/03/26
Tool Demo : Blackhat : OWASP Xenotix XSS Exploit Framework -
Ajin Abraham
-
2015/03/26
Talk : Blackhat : The underground Ecosystem of Credit Card frauds -
Abhinav Singh
-
2015/02/06
Talk : Nullcon : Anatomy of a credit card stealing POS malware -
Amol Sarwate
-
2015/02/06
Talk : Nullcon : Attack and Defence in Radio and Communication Warfare -
Akib Sayyed
-
2015/02/06
Talk : Nullcon : Drone Attacks: How I hijacked a drone -
Rahul Sasi
-
2015/02/06
Talk : Nullcon : Hacking Tizen: The OS of Everything -
Ajin Abraham
-
2014/11/13
Talk : Ground Zero Summit : Attacking Cryptography & PKI Implementations -
Ajit Hatti
-
2014/11/13
Talk : Ground Zero Summit : Security vulnerabilities in DVB-C networks: Hacking Cable TV network -
Rahul Sasi
-
2014/11/13
Talk : Ground Zero Summit : Attacking Web-Proxies like never before -
Ahamed Nafeez
-
2014/11/13
Talk : Ground Zero Summit : Evaluating WAF (Web Application Firewall) for Fun and Profit with WOF -
Bhaumik Merchant
-
2014/11/13
Talk : Ground Zero Summit : Fuzzing Asynchronous Protocols built over Websockets -
Lavakumar Kuppan
-
2014/11/13
Talk : Ground Zero Summit : Hacking consumer electronics for Fun -
Atul Alex
-
2014/11/13
Talk : Ground Zero Summit : How I won Browser Fuzzing -
Amol Naik
-
2014/11/13
Talk : Ground Zero Summit : Making and Breaking Embedded Security -
Yashin Mehaboobe
-
2014/11/13
Talk : Ground Zero Summit : SCADA Exploitation through Firmware -
Ashish Saxena
-
2014/11/13
Talk : Ground Zero Summit : Vulnerability Reproduction using Zest -
Deep Shah
-
2014/10/29
Talk : Ekoparty : Security vulnerabilities in DVB-C networks: Hacking Cable tV network part 2 -
Rahul Sasi
-
2014/10/23
Talk : Hacklu : Hacking with Images - Evil Pictures -
Saumil Shah
-
2014/10/23
Talk : Hacklu : WiHawk - Router Vulnerability Scanner -
Anamika Singh
-
2014/10/16
Talk : Grrcon : Socioware: Dissecting Online Social Network Worms – Insidious Analysis and Design -
Aditya K Sood
Dr. Richard J Enbody
-
2014/09/28
Talk : Blackhat : Understanding IMSI Privacy -
Swapnil Udar
Ravishankar Borgaonkar
-
2014/08/22
Talk : C0c0n : APT: Case Study of attackers targeting public tendering -
Rahul Sasi
-
2014/08/22
Talk : C0c0n : Cryptographic Backdoors: Subverting the RSA -
Adhokshaj Mishra
-
2014/08/22
Talk : C0c0n : Exploiting NoSQL Like Never Before -
Francis Alexander
-
2014/08/22
Talk : C0c0n : Hacking Communication -
Akib Sayyed
-
2014/08/22
Talk : C0c0n : Idle Machines doing Bounty Hunting (Behind your Back) -
Mrityunjay Gautam
-
2014/08/22
Talk : C0c0n : Lesser Known Attack - XML Injection -
Amol Naik
-
2014/08/22
Talk : C0c0n : Making and breaking security in embedded devices -
Yashin Mehaboobe
-
2014/08/07
Tool Demo : Blackhat : C-SCAD: Assessing Security flaws in clearscada Web_X client! -
Aditya K Sood
-
2014/08/06
Talk : Blackhat : What goes around comes back around - Exploiting fundamental weaknees in Botnet C&C Panels! -
Aditya K Sood
-
2014/05/29
Talk : Hitb Sec Conf : Hacking Your Cable TV Network: Die Hard Style -
Rahul Sasi
-
2014/05/29
Talk : Hitb Sec Conf : LOL (Layers On Layers) – Bypassing Endpoint Security for Fun and Profit -
Rahul Kashyap
Rafal Wojtzcuk
-
2014/05/21
Talk : Phdays : Android Exploitation -
Aditya Gupta
-
2014/03/27
Talk : Blackhat : JS Suicide: Using JavaScript Security Features to Kill JS Security -
Ahamed Nafeez
-
2014/02/15
Tool Demo : Nullcon : NoSQL Exploitation Framework -
Francis Alexander
-
2014/02/15
Tool Demo : Nullcon : OWASP Xenotix XSS Exploit Framerwork -
Ajin Abraham
-
2014/02/14
Talk : Nullcon : Attack of the setuid bit - pt_chown and pwning root terminals -
Siddhesh Poyarekar
-
2014/02/14
Talk : Nullcon : Attacking WPA/WPA2 in the Cloud -
Vivek Ramachandran
-
2014/02/14
Talk : Nullcon : Hacking YOu’r Cable TV Network. -
Rahul Sasi
Ahamed Nafeez
-
2014/02/14
Talk : Nullcon : Hardware Attack Vectors -
Yashin Mehaboobe
-
2014/02/14
Talk : Nullcon : phoneypdf: A Virtual PDF Analysis Framework -
Kiran Bandla
-
2014/02/14
Talk : Nullcon : Wi-Hawk Password Auditing Tool -
Anamika Singh
-
2013/11/07
Talk : Ground Zero Summit : Abusing Google Apps: Google is my command and control center -
Ajin Abraham
-
2013/11/07
Talk : Ground Zero Summit : Setting the Data Center on fire -
Ajit Hatti
-
2013/09/27
Talk : C0c0n : Blur Captcha -
Anirudh Duggal
Abhinav Mohanty
-
2013/09/27
Talk : C0c0n : Disclosing Vulnerabilities: The Bug Bounty Style -
Nikhil P Kulkarni
-
2013/09/27
Talk : C0c0n : Infiltrating the Intranet with Skanda -
Jayesh Chauhan
-
2013/09/27
Talk : C0c0n : Lets Play - Applanting on new Grounds -
Ajit Hatti
-
2013/09/27
Talk : C0c0n : Pwning WiFi Devices! -
Swaroop Yermalkar
-
2013/09/27
Talk : C0c0n : SSRF / XSPA - Real World Attacks and Mitigations -
Riyaz Walikar
-
2013/09/12
Talk : Grrcon : The Droid Exploitation Saga – All Over Again! -
Aditya Gupta
Subho Halder
-
2013/08/03
Talk : Defcon : PowerPreter: Post Exploitation Like a Boss -
Nikhil Mittal
-
2013/08/01
Talk : Blackhat : Hot knives through butter: Bypassing automated analysis systems -
Abhishek Singh
Zheng Bu
-
2013/08/01
Tool Demo : Blackhat : OWASP Xenotix XSS Exploit Framework -
Ajin Abraham
-
2013/07/31
Talk : Blackhat : Clickjacking revisited: A perceptual view of UI security -
Devdatta Akhawe
-
2013/07/31
Tool Demo : Blackhat : JMSDigger -
Gursev Singh Kalra
-
2013/03/15
Tool Demo : Blackhat : OWASP Xenotix XSS Exploit Framework -
Ajin Abraham
-
2013/03/15
Tool Demo : Blackhat : Prasadhak (And Offensive Powershell) -
Nikhil Mittal
-
2013/03/14
Talk : Blackhat : Lets play - Applanting -
Ajit Hatti
-
2013/03/12
Talk : Troopers : Dirty use of USSD Codes in Cellular Network -
Ravishankar Borgaonkar
-
2013/03/07
Talk : Can Sec West : SMS to Meterpreter - Fuzzing USB Modems -
Rahul Sasi
-
2013/03/01
Talk : Nullcon : Capturing Zero-Day Information -
Dinesh O Bareja
Sumit Sharma
-
2013/03/01
Talk : Nullcon : Detecting and Exploiting XSS Vulnerabilities and Xenotix XSS Exploitation Framework -
Ajin Abraham
-
2013/03/01
Talk : Nullcon : Pawing the Droid: Twisting the ARM -
Divyanshu Shekhar
Anshul Kumar
-
2013/03/01
Talk : Nullcon : Rest - A Real Stealth and Semi Stealth MITM Attack Tool for IPv4 Networks -
Naga Rohit Samineni
-
2013/03/01
Talk : Nullcon : SMS to Meterpreter - Fuzzing USB Modems -
Rahul Sasi
-
2013/03/01
Talk : Nullcon : Vulnerability research anyone? -
Omair
-
2012/12/06
Talk : Blackhat : Attacking ODATA -
Gursev Singh Kalra
-
2012/12/06
Talk : Blackhat : HTML5 top 10 threats – Stealth Attack and Silent Exploits -
Shreeraj Shah
-
2012/12/06
Talk : Blackhat : Poking servers with Facebook(and other web applications) -
Riyaz Walikar
-
2012/12/06
Talk : Blackhat : The art of exploiting logical flaws in web apps -
Sumit Siddharth
Richard Dean
-
2012/12/05
Talk : Blackhat : Droid Exploitation Saga -
Aditya Gupta
Subho Halder
-
2012/12/01
Talk : Clubhack : Content-Type attack -Dark hole in the secure environment -
Raman Gupta
-
2012/12/01
Talk : Clubhack : Detecting and Exploiting XSS with Xenotix XSS Exploit Framework -
Ajin Abraham
-
2012/12/01
Talk : Clubhack : FatCat Web Based SQL Injector -
Sandeep Kamble
-
2012/12/01
Talk : Clubhack : Hacking and Securing iOS applications -
Satish Bommisetty
-
2012/12/01
Talk : Clubhack : Stand Close to Me, & You’re pwned! : Owning SmartPhones using NFC -
Aditya Gupta
Subho Halder
-
2012/11/29
Talk : Deepsec : Bad Things in Good Packages - Creative Exploit Delivery -
Saumil Shah
-
2012/11/23
Talk : Malcon : Advanced Malware Engine -
Mohit Kumar
-
2012/11/23
Talk : Malcon : Advances in ROP attacks -
Raashid Bhat
-
2012/11/23
Talk : Malcon : Windows Phone 8 Malware Prototype -
Shantanu Gawde
-
2012/10/11
Talk : Hitb Sec Conf : XSS & CSRF strike back – Powered by HTML5 -
Shreeraj Shah
-
2012/10/10
Talk : Hitb Sec Conf : Innovative Approaches to Exploit Delivery -
Saumil Shah
-
2012/09/27
Talk : Grrcon : The Realm of Third Generation Botnet Attacks -
Aditya K Sood
Dr. Richard J Enbody
-
2012/09/26
Talk : Nullcon : Highly Harmful Audio Waves aka DTMF Fuzzing -
Rahul Sasi
-
2012/09/20
Talk : Ekoparty : Dirty use of USSD Codes in Cellular Network -
Ravishankar Borgaonkar
-
2012/09/20
Talk : Ekoparty : Fuzzing DTMF Input Processing Algorithms -
Rahul Sasi
-
2012/08/03
Talk : C0c0n : Evil JavaScript -
Bishan Singh
-
2012/08/03
Talk : C0c0n : WebApp Remote Code Execution using Server Side Scripting Engines -
Rahul Sasi
-
2012/07/26
Talk : Blackhat : HTML5 top 10 threats – Stealth Attack and Silent Exploits -
Shreeraj Shah
-
2012/03/21
Talk : Troopers : More Fun Using Kautilya or Is It a Thumb Drive? Is It a Toy? No, It’s a Keyboard -
Nikhil Mittal
-
2012/03/16
Talk : Blackhat : IVR Security- Internal Network Attack via Phone Lines -
Rahul Sasi
-
2012/03/16
Talk : Blackhat : The Pwnage Saga Continues -
Nikhil Mittal
-
2012/03/14
Talk : Blackhat : Hacking XPATH 2.0 -
Sumit Siddharth
Tom Forbes
-
2012/03/14
Talk : Blackhat : HTML5 top 10 threats – Stealth Attack and Silent Exploits -
Shreeraj Shah
-
2012/02/15
Talk : Nullcon : Attacking Backup Software -
Nibin Varghese
-
2012/02/15
Talk : Nullcon : Binary God -
Atul Alex
-
2012/02/15
Talk : Nullcon : CAPTCHAs for fun and Profit -
Gursev Singh Kalra
-
2012/02/15
Talk : Nullcon : Content sniffing Algorithm bypassing techniques and possible attack vectors -
Anil Aphale
Chaitany Kamble
-
2012/02/15
Talk : Nullcon : Friction in the machine -
Dinesh Shenoy
-
2012/02/15
Talk : Nullcon : Haxdroid: Empowering Android Handset -
Anant Shrivastava
Prashant Mahajan
Pardhasaradhi Ch
-
2012/02/15
Talk : Nullcon : IVR Security: Internal Network attacks via phone lines -
Rahul Sasi
-
2012/02/15
Talk : Nullcon : Node.js: The good, bad and ugly -
Bishan Singh
-
2012/02/15
Talk : Nullcon : Your phone is your phone but your calls are now my calls -
Akib Sayyed
Bipul Sahu
Dipesh Goyal
Nitin Agarwal
-
2011/12/15
Talk : Blackhat : Kautilya: Teensy Beyond Shell -
Nikhil Mittal
-
2011/12/04
Talk : Clubhack : Android Tamer -
Anant Shrivastava
-
2011/12/04
Talk : Clubhack : DOM XSS – Encounters of the 3rd Kind -
Bishan Singh
-
2011/12/04
Talk : Clubhack : Exploit the Exploit Kits -
Dhruv Soi
-
2011/12/04
Talk : Clubhack : Hacking your Droid -
Aditya Gupta
-
2011/12/04
Talk : Clubhack : Handle Exploitation of Remote System From Email Account -
Bhaumik Merchant
-
2011/12/04
Talk : Clubhack : Mere paas Teensy hai -
Nikhil Mittal
-
2011/12/04
Talk : Clubhack : One Link Facebook -
Anand Pandey
-
2011/11/25
Talk : Malcon : Advanced Malware for Apple Products -
Atul Alex
-
2011/11/25
Talk : Malcon : Mareech : Look it’s a HID made up of gold -
Nikhil Mittal
-
2011/11/04
Talk : Hackfest : Here are your keystrokes -
Nikhil Mittal
-
2011/10/13
Talk : Hitb Sec Conf : Femtocells: A Poisonous Needle in the Operator’s Hay Stack -
Ravishankar Borgaonkar
Kevin Redon
Nico Golde
-
2011/10/07
Talk : C0c0n : Deep(er) Penetration: Reaching the Internal Network using Exposed Web Applications -
Riyaz Walikar
-
2011/10/07
Talk : C0c0n : Exploiting the TCP Simultaneous Connection to Provide a Low Cost DoS Mitigation Solution -
Ahamed Nafeez
-
2011/10/07
Talk : C0c0n : Runtime thread injection and execution in Linux processes -
Aseem Jakhar
-
2011/10/07
Talk : C0c0n : Wi-Fi Malware for Fun and Profit -
Vivek Ramachandran
-
2011/09/19
Talk : Brucon : Botnets and Browsers, Brothers in a Ghost Shell -
Aditya K Sood
-
2011/09/19
Talk : Hacklu : Linux thread injection - The jugaad way -
Aseem Jakhar
-
2011/09/19
Talk : Hacklu : The travelling hacksmith -
Saumil Shah
-
2011/09/19
Talk : Brucon : Wifi malware for fun and profit -
Vivek Ramachandran
-
2011/09/07
Talk : Securitybyte : Enterprise Wi-Fi Worms, Backdoors and Botnets for Fun and Profit -
Vivek Ramachandran
-
2011/09/06
Talk : Securitybyte : Botnets at Application+ layer -
Raj Shastrakar
-
2011/08/05
Talk : Defcon : Jugaad – Linux Thread Injection Kit -
Aseem Jakhar
-
2011/05/20
Talk : Hitb Sec Conf : Next Generation Web Attacks – HTML 5, DOM(L3) and XHR(L2) -
Shreeraj Shah
-
2011/03/30
Talk : Troopers : Femtocell: Femtostep to the Holy Grail -
Ravishankar Borgaonkar
Kevin Redon
-
2011/02/25
Talk : Nullcon : Buffer Under Run Exploits -
Saurabh Sharma
Chinmaya Kamal
-
2011/02/25
Talk : Nullcon : Chupa Rustam -
Abhijeet Hatekar
-
2011/02/25
Talk : Nullcon : Future of cyber crimes: Limitations and Challenges -
Pratap Reddy
-
2011/02/25
Talk : Nullcon : Fuzzing with complexities -
Vishwas Sharma
-
2011/02/25
Talk : Nullcon : JSON Fuzzing: New approach to old problems -
K v Prashant
Tamaghna Basu
-
2011/02/25
Talk : Nullcon : Jugaad Beta: Linux Thread Injection malware PoC -
Aseem Jakhar
-
2011/02/25
Talk : Nullcon : Lessons Learned From 2010 -
Saumil Shah
-
2011/02/25
Talk : Nullcon : Penetration Testing a Biometric System -
Rahul Sasi
-
2011/02/25
Talk : Nullcon : Security Analysis of India’s Electronic Voting Machines: Memoirs of a whistleblower -
Hari Krishna Prasad Vemuru
-
2010/12/04
Talk : Clubhack : Attacking with HTML5 -
Lavakumar Kuppan
-
2010/12/04
Talk : Clubhack : Data theft in India -
K K Mookhey
-
2010/10/27
Talk : Hacklu : Exploit Delivery - Tricks and Techniques -
Saumil Shah
-
2010/10/14
Talk : Hitb Sec Conf : Exploit Delivery -
Saumil Shah
-
2010/10/13
Talk : Hitb Sec Conf : Hacking a Browser’s DOM – Exploiting Ajax and RIA -
Shreeraj Shah
-
2010/08/01
Talk : C0c0n : Client Side Exploits using PDF -
Ankur Bhargava
Tamaghna Basu
-
2010/08/01
Talk : C0c0n : Code Disclosure over HTTP -
Anant Kochhar
-
2010/08/01
Talk : C0c0n : Wireless MITM -
Prashant Mahajan
-
2010/08/01
Talk : C0c0n : Writing x86 ShellCode & Secure Self Modifying code and Cross Platform Programming - A Security Angle -
Praseed Pai
-
2010/07/31
Talk : Defcon : WPA Too! -
Md Sohail Ahmad
-
2010/07/29
Talk : Blackhat : Hacking Browser’s DOM - Exploiting Ajax and RIA -
Shreeraj Shah
-
2010/07/29
Talk : Blackhat : Hacking Oracle From Web Apps -
Sumit Siddharth
-
2010/07/01
Talk : Hitb Sec Conf : The Travelling Hacksmith 2009 – 2010 -
Saumil Shah
-
2010/07/01
Talk : Hitb Sec Conf : Top 10 Web 2.0 Attacks and Exploits -
Shreeraj Shah
-
2010/04/21
Talk : Hitb Sec Conf : Web Security – Going Nowhere? -
Saumil Shah
-
2010/04/14
Talk : Blackhat : Attacking JAVA Serialized Communication -
Manish Saindane
-
2010/02/25
Talk : Nullcon : Software Fuzzing with Wireplay. -
Abhisek Datta
-
2010/02/25
Talk : Nullcon : Imposter ke karnamey: The Browser Phishing Tool. -
Lavakumar Kuppan
-
2010/02/25
Talk : Nullcon : Intelligent debugging and in memory fuzzing. -
Vishwas Sharma
Amandeep Bharti
-
2010/02/25
Talk : Nullcon : Steganography & Stegananalysis: A Technical & Psychological Perspective -
Prince Komal Boonlia
Reena Bhansali
-
2010/02/03
Talk : Blackhat : Beware of Serialized GUI Objects Bearing Data -
Rohini Sulatycki
David Byrne
-
2009/12/05
Talk : Clubhack : Lust 2.0 – Desire for free WiFi and the threat of the Imposter -
Lavakumar Kuppan
-
2009/11/19
Talk : Deepsec : Ownage 2.0 -
Saumil Shah
-
2009/11/18
Talk : Securitybyte : Cloud Hacking – Distributed Attack & Exploit Platform -
Shreeraj Shah
-
2009/11/18
Talk : Securitybyte : Hacking Oracle From Web -
Sumit Siddharth
-
2009/11/17
Talk : Securitybyte : Vbootkit 2.0: Attacking Windows 7 Via Boot Sectors -
Nitin Kumar
Vipin Kumar
-
2009/10/28
Talk : Hacklu : Ownage 2.0 -
Saumil Shah
-
2009/10/07
Talk : Hitb Sec Conf : How to Own the World – One Desktop at a Time -
Saumil Shah
-
2009/08/02
Talk : Defcon : Wi-Fish Finder: Who Will Bite the Bait -
Md Sohail Ahmad
Prabhash Dhyani
-
2009/08/01
Talk : Defcon : The Making of the second SQL injection Worm -
Sumit Siddharth
-
2009/07/31
Talk : Defcon : Advancing Video Application Attacks with Video Interception, Recording, and Replay -
Arjun Sambamoorthy
Jason Ostrom
-
2009/04/22
Talk : Troopers : Browser Design Flaws – Hacking by Breaking in Architectures -
Aditya K Sood
-
2009/04/22
Talk : Hitb Sec Conf : Pwnage 2.0 -
Saumil Shah
-
2009/04/22
Talk : Troopers : SQL Injections: More Fun and Profit -
Sumit Siddharth
-
2009/04/22
Talk : Hitb Sec Conf : Vbootkit 2.0: Attacking Windows 7 via Boot Sectors -
Nitin Kumar
Vipin Kumar
-
2008/12/06
Talk : Clubhack : Hacking Client Side Insecurities -
Aditya K Sood
-
2008/12/06
Talk : Clubhack : Insecure Implementation of Security Best Practices: of hashing, CAPTCHA’s and Caching -
Karmendra Kohli
-
2008/12/06
Talk : Clubhack : Reverse Engineering for exploit writers -
Nibin Varghese
-
2008/12/06
Talk : Clubhack : Reverse Engineering v/s Secure Coding -
Atul Alex
-
2008/11/13
Talk : Deepsec : Game of Web 2.0 Security - Attacking Next Generation Apps -
Shreeraj Shah
-
2008/10/29
Talk : Hitb Sec Conf : Browser Exploits - A New Model for Browser Security -
Saumil Shah
-
2008/10/22
Talk : Hacklu : Browser Exploits - A new model for Browser security -
Saumil Shah
-
2008/08/20
Talk : Owasp App Sec India : Web 2.0 Attacks - Next Generation Threats on the Rise -
Shreeraj Shah
-
2008/08/09
Talk : Defcon : Autoimmunity Disorder in Wireless LAN -
Jvr Murthy
Amit Vartak
Md Sohail Ahmad
-
2008/08/07
Talk : Blackhat : Got Citrix, Hack It! -
Shanit Gupta
-
2008/03/26
Talk : Can Sec West : Vulnerabilities Die Hard -
Kowsik Guruswamy
-
2008/02/20
Talk : Blackhat : Hacking VoIP through IPSec Tunnels -
Sachin Joglekar
Sudeep Patwardhan
-
2008/02/20
Talk : Blackhat : Scanning Applications 2.0 - Next Generation Scan, Attacks and Tools -
Shreeraj Shah
-
2007/12/19
Talk : Clubhack : Backdoor 2.0: Hacking Firefox to steal his web secrets -
Sunil Arora
-
2007/12/09
Talk : Clubhack : Analysis of Adversarial Code: The Role of Malware Kits! -
Rahul Mohandas
-
2007/12/09
Talk : Clubhack : Hacking Web 2.0 Art and Science of Vulnerability Detection -
Shreeraj Shah
-
2007/12/09
Talk : Clubhack : Legiment Techniques of IPS/IDS Evasion -
Ajit Hatti
-
2007/12/09
Talk : Clubhack : Vulnerabilities in VoIP Products and Services -
Gaurav Saha
-
2007/09/06
Talk : Hitb Sec Conf : Hacking Ajax and Web Services – Next Generation Web Attacks on the Rise -
Shreeraj Shah
-
2007/08/04
Talk : Defcon : The Emperor Has No Cloak - WEP Cloaking Exposed -
Vivek Ramachandran
-
2007/08/01
Talk : Blackhat : Vulnerabilities in Wi-Fi/Dual-Mode VoIP Phones -
Krishna Kurapati
-
2007/04/18
Talk : Can Sec West : Low-Rate Denial-of-Service attacks -
Anil Kumar
-
2007/04/05
Talk : Hitb Sec Conf : WEB 2.0 Hacking – Defending Ajax and Web Services -
Shreeraj Shah
-
2007/03/29
Talk : Blackhat : Vboot Kit: Compromising Windows Vista Security -
Nitin Kumar
Vipin Kumar
-
2006/11/29
Talk : Pac Sec : Smashing Heap by Free Simulation -
Sandip Chaudhari
-
2006/10/19
Talk : Hacklu : Smashing Heap by Free Simulation: -
Sandip Chaudhari
-
2006/10/19
Talk : Hacklu : Writing Metasploit plugins - from vulnerability to exploit -
Saumil Shah
-
2006/09/21
Talk : Hitb Sec Conf : Smashing the Stack for Profit - Period -
Rohyt Belani
-
2006/04/13
Talk : Hitb Sec Conf : Writing Metasploit Plugins - From Vulnerability to Exploit -
Saumil Shah
-
2005/09/29
Talk : Hitb Sec Conf : Trends in Real World Attacks: A Compilation of Case Studies -
Rohyt Belani
-
2005/07/28
Talk : Blackhat : Rapid Threat Modeling -
Akshay Aggarwal
-
2005/04/10
Talk : Hitb Sec Conf : Whispers On The Wire - Network Based Covert Channels, Exploitation and Detection -
Pukhraj Singh
-
2005/03/31
Talk : Blackhat : Defeating Automated Web Assessment Tools -
Saumil Shah
-
2004/10/06
Talk : Hitb Sec Conf : Web Services - Attacks and Defense Strategies, Methods and Tools -
Shreeraj Shah
-
2004/07/28
Talk : Blackhat : Defeating Automated Web Assessment Tools -
Saumil Shah
-
2003/12/12
Talk : Hitb Sec Conf : New Generation Frauds -
Yerra Ravi Kiran Raju
-
2002/10/03
Talk : Blackhat : Top Ten Web Attacks -
Saumil Shah
-
2001/11/21
Talk : Blackhat : One-Way SQL Hacking : Futility of Firewalls in Web Hacking -
Saumil Shah
-
2001/04/26
Talk : Blackhat : Web Hacking -
Saumil Shah
-
2001/02/14
Talk : Blackhat : Web Hacking -
Saumil Shah