Talk
Jump to: 2025 (29) | 2024 (62) | 2023 (88) | 2022 (81) | 2021 (60) | 2020 (50) | 2019 (92) | 2018 (83) | 2017 (83) | 2016 (50) | 2015 (83) | 2014 (83) | 2013 (69) | 2012 (99) | 2011 (86) | 2010 (45) | 2009 (49) | 2008 (28) | 2007 (23) | 2006 (11) | 2005 (10) | 2004 (6) | 2003 (7) | 2002 (1) | 2001 (4) | 1998 (1) 2025
Oct 10 -
C0c0n -
Talk -
Ghosts in Your GitHub Actions and AI’s Hunt for Hidden Exploits -
Suchith Narayan
Aug 07 -
Blackhat -
Talk -
Weaponizing Apple AI for Offensive Operations -
Hari Shanmugam
Aug 07 -
Blackhat -
Talk -
Kernel-Enforced DNS Exfiltration Security: Framework Built for Cloud Environments to Stop Data Breaches via DNS at Scale -
-
Vedang Parasnis
Aug 06 -
Blackhat -
Talk -
When ‘Changed Files’ Changed Everything: Uncovering and Responding to the tj-actions Supply Chain Breach -
-
Varun Sharma , Ashish Kurmi
Aug 06 -
Blackhat -
Talk -
The 5G Titanic -
-
Altaf Shaik
Aug 06 -
Blackhat -
Talk -
Adversarial Fuzzer for Teleoperation Commands: Evaluating Autonomous Vehicle Resilience -
-
Shanit Gupta , Zhisheng Hu , Cooper De Nicola
Apr 30 -
Rsac -
Talk -
Got Supply Pain? A Real-World Approach to Supply Chain SDL -
-
Mohit Arora , Richard Tonry
Apr 29 -
Rsac -
Talk -
XPIA Attacks—Rethinking Defense in Depth for an AI-Powered World -
-
Aanchal Gupta , Abhilasha Bhargav Spantzel , John Leo Jr , Stefano Zanero
Apr 29 -
Rsac -
Talk -
RAG-NAROK: What Poorly-Built RAGs Can Do to Data Security -
Akash Mukherjee , Saurabh Shintre
Apr 29 -
Rsac -
Talk -
It’s Always Risky in IT: Frontline Stories and Strategic Insights -
Gourav Nagar , Rohit Bansal
Apr 15 -
Stackx Cybersecurity -
Talk -
AI in Cybersecurity: Hype, Reality, and the Shift from Tools to Teammates -
-
Pawan Kinger
Apr 04 -
Blackhat -
Talk -
Standing on the Shoulders of Giants: De-Obfuscating WebAssembly Using LLVM -
-
Vikas Gupta , Peter Garba
Apr 03 -
Blackhat -
Talk -
ObfusQate: Where Quantum Magic Meets Code Security – Say Goodbye to Easy Cracking! -
-
Vivek Balachandran , Nikhil Bartake , Zi Jie See Toh , Michael Kasper
Apr 03 -
Blackhat -
Talk -
Determining Exploitability of Vulnerabilities with SBOM and VEX -
-
Anusha Penumacha , Srinija Kammari
Apr 03 -
Blackhat -
Talk -
Cloud Security: Building Connections in the Cloud -
Vandana Verma Sehgal , Lidia Giuliano
Mar 14 -
Insomnihack -
Talk -
The Art of Malware Smuggling (Unmasking SVG-Based Attack Techniques) -
Dhiraj Mishra
Mar 13 -
Insomnihack -
Talk -
Beyond LSASS: Cutting-Edge Techniques for Undetectable Threat Emulation -
-
Priyank Nigam
Mar 02 -
Nullcon -
Talk -
Securing the chains: Building defensive layers for software supply chains -
-
Yadhu Krishna M , Akhil Mahendra , Hritik Vijay
Mar 02 -
Nullcon -
Talk -
Satellite Communications: Analyzing and Protecting Space-Based Assets -
-
Drishti Jain
Mar 02 -
Nullcon -
Talk -
Kernel Conquest: Breaking Boundaries and Demystifying Kernel SU for Root Access in Azure Cloud Shell -
-
Alla Vamsi Krishna , Kandi Abhishek Reddy
Mar 02 -
Nullcon -
Talk -
Hidden in Plain Sight: Large-Scale Exposure of Orphaned Commits on Major Git Platforms -
-
Kumar Ashwin
Mar 02 -
Nullcon -
Talk -
eKYC Crisis: Securing the Lockers -
-
Kartik Lalan
Mar 02 -
Nullcon -
Talk -
Cyber Security from Telco lens -
Sanjeev Dhallam
Mar 02 -
Nullcon -
Talk -
Building Glitch-Resistant Firmware: Practical Software Countermeasures for Hardware glitch attacks -
-
Shyam Kumar Arshid , Chinmay Krishna
Mar 01 -
Nullcon -
Talk -
The Future is Trustless: How zkVMS and zkTLS Transform Bug Bounties -
-
Anto Joseph
Mar 01 -
Nullcon -
Talk -
Reversing Large Deep learning AI Models -
-
Yashodhan Vivek Mandke
Mar 01 -
Nullcon -
Talk -
MLOps Under Attack: Threat Modeling Modern AI Systems -
-
Sandeep Singh
Mar 01 -
Nullcon -
Talk -
MacOS Lockdown Mode: A Forensic Deep Dive -
-
Bhargav Rathod
Mar 01 -
Nullcon -
Talk -
Drawing parallels between iOS and macOS Pentesting with DVMA -
Vaibhav Lakhani 2024
Dec 11 -
Blackhat -
Talk -
The CVSS Deception: How We’ve Been Misled on Vulnerability Severity -
-
Ankur Sand
Nov 21 -
Securityfest -
Talk -
Wheels of Wonder -
-
Hrishikesh Somchatwar
Nov 21 -
Securityfest -
Talk -
UnRegister Me - Advanced Techniques for hunting and securing user registration vulnerabilities -
-
Priyank Nigam
Nov 21 -
Deepsec -
Talk -
Hacking with Physics v2.0 -
Hrishikesh Somchatwar
Nov 21 -
Securityfest -
Talk -
Breaking Container Boundary Using Side Channel Attack -
-
Adhokshaj Mishra
Nov 16 -
C0c0n -
Talk -
Who is holding the Marauders map? -
Maya R Nair
Nov 16 -
C0c0n -
Talk -
We got the Shiny SBoM; what next? -
-
Anant Shrivastava
Nov 16 -
C0c0n -
Talk -
The subtle art of checkmating CISOs -
Sunil Varkey
Nov 16 -
C0c0n -
Talk -
The Stealth Code Conspiracy: Unmasking Hidden Threats in CI/CD Pipelines -
Arpith Rajagopal , Suchith Narayan
Nov 16 -
C0c0n -
Talk -
Serverless Phishing Factory: Automate, Attack, Adapt -
Yash Bharadwaj , Manish Gupta
Nov 16 -
C0c0n -
Talk -
Ride on the House - Exploiting Public Transport Ticketing Systems for Free Rides -
Rakesh Seal , Diptisha Samanta
Nov 16 -
C0c0n -
Talk -
Old Bugs, New Tricks: How N-Day Vulnerabilities Are Fueling Today’s Threat Landscape -
Dharani Sanjaiy
Nov 16 -
C0c0n -
Talk -
KEY NOTE -
Navin Kumar Singh
Nov 16 -
C0c0n -
Talk -
Hacking the Non-Windows Frontier: Thick Client Pentesting on Linux & Mac -
Ajay Sk
Nov 16 -
C0c0n -
Talk -
Breach of the borderless: Cyber threat actors targeting India’s cyberspace -
Abhijith B R
Nov 16 -
C0c0n -
Talk -
Active Directory Deception Strategies -
Madhukar Raina , Sayan Mitra
Nov 16 -
C0c0n -
Talk -
Access for Sale: Inside the World of Ransomware Affiliates and Initial Access Brokers -
Nihar Sawant , Jaydev Joshi
Nov 16 -
C0c0n -
Talk -
Invisible Invaders: Bypassing Email Security with Legitimate Tools -
Dhruv Bisani
Nov 15 -
C0c0n -
Talk -
Remote Whispers of Mobile Sim -
Vipin Kumar
Nov 15 -
C0c0n -
Talk -
PCI 4.0, Javascript Security for product security teams -
Anand Kumar Ganesan , Mohammad Arif
Nov 15 -
C0c0n -
Talk -
Know your Enemies: Deep Dive into Ransomware Threat Groups -
Niranjan Jayanand
Nov 15 -
C0c0n -
Talk -
Hackers highway: Uncovering vulnerabilities hidden behind every car’s license plate -
Kartik Lalan
Nov 15 -
C0c0n -
Talk -
GenAI and Autonomous Security in the Age of Zero Trust -
Philip Varughese Vayarakunnil
Nov 15 -
C0c0n -
Talk -
CISO’s take on BYOAI -
Venugopal Parameswara
Nov 15 -
C0c0n -
Talk -
Breaking the Defences: In-Depth Analysis of EDR and AV Tampering Techniques -
Adrip Mukherjee , Vinay Kumar
Nov 15 -
C0c0n -
Talk -
Automated Security Engineer Co-Pilot: Leveraging Large Language Models for Enhanced Code Security -
Ashwath Kumar , Hariprasad Pujari
Nov 15 -
C0c0n -
Talk -
[Yodha] SCAGoat - Software Composition Analysis (SCA) Vulnerability Exploration Tool -
-
Gaurav Joshi , Hare Krishna Rai
Nov 15 -
C0c0n -
Talk -
[Yodha] RedCloud : A Multi-Cloud Hacking OS -
-
Yash Bharadwaj , Manish Gupta
Nov 15 -
C0c0n -
Talk -
[Yodha] Nightingale: Docker for Pentesters -
-
Raja Nagori
Nov 06 -
Blackalps -
Talk -
IDAT Loader: The Malware’s Camouflaged Weapon -
Niranjan Jayanand
Oct 29 -
Blackhat -
Talk -
Hacking Deepfake Image Detection System with White and Black Box Attacks -
-
Sagar Bhure
Oct 23 -
Blackhat -
Talk -
Guardians of the OAuth Galaxy: Defending Your Organization from OAuth Application Attacks -
-
Shruti Ranjit , Mangatas Tondang
Oct 02 -
Virus Bulletin -
Talk -
From code to crime: exploring threats in GitHub Codespaces -
-
Nitesh Surana , Jaromir Horejsi
Oct 02 -
Virus Bulletin -
Talk -
Arming WinRAR: deep dive into APTs exploiting WinRAR’s 0-day vulnerability - a SideCopy case study -
-
Sathwik RAM Prakki
Sep 26 -
Rootcon -
Talk -
How to have visibility and security OF CICD ecosystem -
-
Pramod Rana
Sep 20 -
44 Con -
Talk -
Unveiling the ghosts of mobile networks: When will old bugs die? -
Altaf Shaik
Aug 30 -
Hitb Sec Conf -
Talk -
Exploiting the In-Vehicle Browser: A Novel Attack Vector in Autonomous Vehicles -
-
Ravi Rajput
Aug 29 -
Hitb Sec Conf -
Talk -
COMMSEC: CoralRaider Targets Victims Data and Social Media Accounts -
-
Chetan Raghuprasad , Joey Chen
Aug 15 -
Usenix -
Talk -
TYGR: Type Inference on Stripped Binaries using Graph Neural Networks -
-
Aravind Machiry , Adam Doupe , Chang Zhu , Yibo Liu , Ruoyu Wang , Tiffany Bao , Yan Shoshitaishvili , Ati Bajaj , Wil Gibbs , Ziyang Li , Anton Xue , Rajeev Alur , Hanjun Dai , Mayur Naik
Aug 14 -
Usenix -
Talk -
Shesha: Multi-head Microarchitectural Leakage Discovery in new-generation Intel Processors -
-
Anirban Chakraborty , Nimish Mishra , Debdeep Mukhopadhyay
Aug 10 -
Defcon -
Talk -
Techniques for Creating Process Injection Attacks with Advanced Return-Oriented Programming -
-
Shiva Shashank , Bramwell Brizendine
Aug 10 -
Defcon (Adversary Village) -
Talk -
Sneaky Extensions: The MV3 Escape Artists -
Vivek Ramachandran , Shourya Pratap Singh
Aug 10 -
Defcon -
Talk -
Compromising an Electronic Logging Device and Creating a Truck2Truck Worm -
-
Rik Chatterjee , Jake Jepson
Aug 09 -
Defcon (Bug Bounty Village) -
Talk -
Reflections on a Decade in Bug Bounties: Experiences and Major Takeaways -
-
Nikhil Shrivastava , Charles Waterhouse
Aug 09 -
Defcon -
Talk -
Breaking Secure Web Gateways (SWG) for Fun and Profit -
-
Vivek Ramachandran , Jeswin Mathai
Aug 09 -
Defcon -
Talk -
Breaking Secure Web Gateways (SWG) for Fun and Profit -
Vivek Ramachandran , Jeswin Mathai
Aug 07 -
Blackhat -
Talk -
The Hack@DAC Story: Learnings from Organizing the World’s Largest Hardware Hacking Competition -
-
Arun Kanuparthi , Hareesh Khattri , Jeyavijayan Jv Rajendran , Jason Fung , Ahmad Reza Sadeghi
Jun 27 -
Troopers -
Talk -
The Hidden Dangers Lurking in Your Pocket – Pwning Apple Wallet ecosystem and its apps -
-
Priyank Nigam
May 09 -
Rsac -
Talk -
The Good, the Bad, and the Bounty: 10 Years of Buying Bugs at Microsoft -
-
Aanchal Gupta , Katie Moussouris
May 08 -
Rsac -
Talk -
How to CTF Infra - Beyond the Challenges and Flags -
-
Jayesh Chauhan , Max Gartman
May 08 -
Blackhat -
Talk -
Cloud and Platform Agnostic Security Posture Management (xSPM) -
-
Sunil Arora , Parthasarthi Chakraborty
May 07 -
Rsac -
Talk -
Anatomy of a Vulnerability Response - A View from the Inside -
-
Mohit Arora , Richard Tonry
May 07 -
Rsac -
Talk -
A Proven Approach on Automated Security Architectural Pattern Validation -
-
Sunil Arora , Parthasarathi Chakraborty
May 06 -
Rsac -
Talk -
Headspace’s Privacy Operations Center and Vault -
Shobhit Mehta , Puneet Thapliyal
Apr 19 -
Blackhat -
Talk -
Faults in Our Bus: Novel Bus Fault Attack to Break Trusted Execution Environments in Embedded Systems -
-
Anirban Chakraborty , Nimish Mishra , Debdeep Mukhopadhyay
Apr 19 -
Blackhat -
Talk -
China’s Military Cyber Operations: Has the Strategic Support Force Come of Age? -
-
Pukhraj Singh
Apr 18 -
Blackhat -
Talk -
The Hack@DAC Story: Learnings from Organizing the World’s Largest Hardware Hacking Competition -
-
Arun Kanuparthi , Hareesh Khattri , Jeyavijayan Jv Rajendran , Jason Fung , Ahmad Reza Sadeghi
Apr 18 -
Blackhat -
Talk -
Breaking Managed Identity Barriers In Azure Services -
-
Nitesh Surana , David Fiser
Mar 21 -
Can Sec West -
Talk -
Rolling in the Dough: How Microsoft Identified and Remidiated a Baker’s Dozen of Security Threats in the Windows DNS Server -
Arif Hussain , George Hughey
Mar 12 -
Nullcon -
Talk -
Secure Web Gateways are dead. What’s next? -
Vivek Ramachandran
Mar 11 -
Nullcon -
Talk -
Hacking Trains -
-
Jaden Furtado
Mar 11 -
Nullcon -
Talk -
Achilles Heel In Secure Boot: Breaking RSA Authentication And Bitstream Recovery From Zynq-7000 SoC -
-
Arpan Jati 2023
Dec 07 -
Blackhat -
Talk -
Unmasking APTs: An Automated Approach for Real-World Threat Attribution -
-
Aakansha Saha
Dec 06 -
Blackhat -
Talk -
AutoSpill: Zero Effort Credential Stealing from Mobile Password Managers -
-
Ankit Gangwal , Shubham Singh , Abhijeet Srivastava
Nov 17 -
Deepsec -
Talk -
Nostalgic Memory – Remembering All the Wins and Losses for Protecting Memory Corruption -
Shubham Dubey
Oct 13 -
Hackfest -
Talk -
Exploring RAM Forensic Analysis for Effective Digital Investigations -
-
Sneha Banerjee
Sep 29 -
Hackinparis -
Talk -
A Tale of Credential Leak of a Popular Cloud Threat Actor -
Nitesh Surana
Sep 28 -
Hackinparis -
Talk -
How to have visibility and security OF CICD ecosystem -
Pramod Rana
Sep 28 -
Rootcon -
Talk -
Azure Illuminati: Unveiling the Mysteries of Cloud Exploitation -
-
Raunak Parmar
Sep 23 -
Nullcon -
Talk -
Your App Is Probably A Spyware…Or Is It? -
-
Gaurav Gogia , Pandurang Patil
Sep 23 -
Nullcon -
Talk -
Uncovering Azure’s Silent Threats: A Journey Into Cloud Vulnerabilities -
-
Nitesh Surana
Sep 23 -
Nullcon -
Talk -
The Curious Case Of The Rogue SOAR -
-
Mukesh Sai Kumar , Jaden Furtado
Sep 23 -
Nullcon -
Talk -
The Convergence Of eBPF, Buildroot, And QEMU For Automated Linux Malware Analysis -
-
Nikhil Ashok Hegde
Sep 23 -
Nullcon -
Talk -
Secure Your Angular App Using JWT And GraphQL -
-
Ankit Sharma
Sep 23 -
Nullcon -
Talk -
Secure Coding: Fix From The Root -
-
Saddam Hussain , Gopika Subramanian
Sep 23 -
Nullcon -
Talk -
Reverse Engineering RGB Keyboard Backlights With Linux Kernel Drivers -
-
Rishit Bansal
Sep 23 -
Nullcon -
Talk -
Journey in setting up OT SOC -
-
Ramandeep Singh Walia
Sep 23 -
Nullcon -
Talk -
How I hacked your bank account: A detailed look at UPI Security -
-
Abhay Rana
Sep 23 -
Nullcon -
Talk -
Deconstructing The Beast: A Deep Dive Into JIT Compilation Attacks In iOS -
-
Shubham Sharma
Sep 23 -
Nullcon -
Talk -
Android-SigMorph: Covert Communication Exploiting Android Signing Schemes -
-
Ayan Saha , Achute Sharma
Sep 16 -
Romhack -
Talk -
Hacking into the iOS’s VOLTE implementation -
-
Hardik Mehta , Rajanish Pathak
Aug 25 -
Hitb Sec Conf -
Talk -
Hacking into iOS’s VOLTE implementation -
-
Hardik Mehta , Rajanish Pathak
Aug 25 -
Hitb Sec Conf -
Talk -
Breaking ML Services: Finding 0-days in Azure Machine Learning -
-
Nitesh Surana
Aug 24 -
Hitb Sec Conf -
Talk -
Hardware Backdooring an eScooter -
-
Arun Mane
Aug 12 -
Defcon (Appsec Village) -
Talk -
Getting More Bang for your Buck:Appsec on a Limited Budget -
Vandana Verma Sehgal , Viraj Gandhi
Aug 11 -
Defcon -
Talk -
Getting a Migraine - uncovering a unique SIP bypass on macOS -
-
Anurag Bohra , Jonathan Bar Or , Michael Pearse
Aug 11 -
Defcon (Appsec Village) -
Talk -
Generative Adversarial Network (GAN) based autonomous penetration testing for Web Applications -
Ankur Chowdhary
Aug 10 -
Defcon (Lockpick Village) -
Talk -
Wheels of Wonder: Unveiling Car Hacking Poetry -
-
Hrishikesh Somchatwar
Aug 10 -
Blackhat -
Talk -
Uncovering Azure’s Silent Threats: A Journey into Cloud Vulnerabilities -
-
Nitesh Surana , Magno Logan , David Fiser
Aug 10 -
Defcamp -
Talk -
Hardware Backdooring an e-Scooter -
-
Arun Mane
Aug 10 -
Blackhat -
Talk -
Does Public Disclosure of Vulnerabilities Affect Hacker Participation in Bug Bounty Programs? -
-
Amit Deokar , Ali Ahmed , Brian Lee
Aug 10 -
Defcon (Lockpick Village) -
Talk -
Attacking Vehicle Fleet Management Systems -
-
Yashin Mehaboobe
Aug 10 -
Blackhat -
Talk -
AI Assisted Decision Making of Security Review Needs for New Features -
-
Mrityunjay Gautam , Pavan Kolachoor
Aug 09 -
Blackhat -
Talk -
Identifying and Reducing Permission Explosion in AWS: A Graph-Based and Analytical Approach -
-
Pankaj Moolrajani
Aug 09 -
Blackhat -
Talk -
Diversity Microtalks: Perspectives on Creating Change -
-
Aastha Sahni , Andy Ellis , Meghan Jacquot , Sherri Davidoff
Aug 07 -
C0c0n -
Talk -
Uncovering the Hidden Dangers Lurking as Android Apps using ML Algos -
-
Nikhil Prabhakar
Aug 07 -
C0c0n -
Talk -
Uncovering Azure’s Silent Threats: A Story of Cloud Vulnerabilities -
-
Nitesh Surana
Aug 07 -
C0c0n -
Talk -
Trust Resiliency - A Lesson Learned from Russia Ukraine War -
-
Ajit Hatti
Aug 07 -
C0c0n -
Talk -
The DPDPA Effect: Jubilation, Twinge and Reticence that followed -
-
Rahul Sharma
Aug 07 -
C0c0n -
Talk -
Tackling Advanced Threat Landscape with MDR - Best Practices -
-
Vijayakumar K M
Aug 07 -
C0c0n -
Talk -
Start Left SDLC Security with Open-Source DevSecOps Tooling -
-
Aswin Raj , Shruti M G
Aug 07 -
C0c0n -
Talk -
Smart Contract Phishing : Attack & Defense -
-
Tejaswa Rastogi
Aug 07 -
C0c0n -
Talk -
Shifting left blockchain development for safer DApps -
-
Dhanith Krishna
Aug 07 -
C0c0n -
Talk -
Serverless Siege: AWS Lambda Pentesting -
-
Anjali Singh Shukla , Divyanshu Shukla
Aug 07 -
C0c0n -
Talk -
Putting a leash on AI -
-
Aditya Vasekar
Aug 07 -
C0c0n -
Talk -
Homomorphic Encryption - Myth to Reality -
-
Anish Koshy
Aug 07 -
C0c0n -
Talk -
Generative AI and Cyber Crimes -
-
Brijesh Singh
Aug 07 -
C0c0n -
Talk -
Exploring Threats in Operational Technology -
Manjunath Hiregange
Aug 07 -
C0c0n -
Talk -
Evasion Tactics of SideCopy & APT36: Persistently targeting Indian Defense Orgs -
-
Sathwik RAM Prakki
Aug 07 -
C0c0n -
Talk -
ESOC Trinetra Project -
Pankaj Kumar Dalela
Aug 07 -
C0c0n -
Talk -
Enhancing Red Team OPSEC: Abusing Stealthy In-Memory Binary Execution Techniques in Linux -
-
Pranav Sivvam
Aug 07 -
C0c0n -
Talk -
Darkweb Investigations -
Amit Dubey
Aug 07 -
C0c0n -
Talk -
Cyber Threats to Global Financial Systems -
-
Lince Lawrence
Aug 07 -
C0c0n -
Talk -
Citizen Mobile Security: Responsibilities, Accountability, and Impacts -
Satyendra Verma
Aug 07 -
C0c0n -
Talk -
Chinese APT against Government officials using G7 summit lure -
-
Niranjan Jayanand
Aug 07 -
C0c0n -
Talk -
Cellibrite Premium Mobile Forensic tool iPhone analysis -
Vaibhav Kumar
Aug 06 -
C0c0n -
Talk -
Time To Choose - Conventional CTI Or NextGen External Threat Landscape Management -
-
Kumar Ritesh
Aug 06 -
C0c0n -
Talk -
The new way to be secure -
-
Sakshi Bhutani
Aug 06 -
C0c0n -
Talk -
Taking a Closer Look at CI/CD Pipeline Logs: Extracting Security-Related Information with Build Inspector -
-
Anshu Kumar , Pavan Sorab
Aug 06 -
C0c0n -
Talk -
Surviving In Dependency Hell -
-
Kumar Ashwin
Aug 06 -
C0c0n -
Talk -
Survivability in the Cyber World -
-
Sunil Varkey
Aug 06 -
C0c0n -
Talk -
Subduing Adversaries with Information Superiority -
-
Antony K M
Aug 06 -
C0c0n -
Talk -
Securing the Future: Addressing Cybersecurity Challenges in the Age of 5G -
-
Altaf Shaik
Aug 06 -
C0c0n -
Talk -
Russia-Ukraine Warfare – A Shift in Cyber Threat Landscape -
-
Jaydev Joshi , Simran Kothari
Aug 06 -
C0c0n -
Talk -
Playing cat and mouse with the Adversary: Sometimes a breach is inevitable -
-
Abhijith B R
Aug 06 -
C0c0n -
Talk -
Mitigating SSRF at scale the right way with IMDSv2! -
-
Ayush Priya
Aug 06 -
C0c0n -
Talk -
Insider Threats - Best Practices and Common Pitfalls -
-
Georgie Kurien
Aug 06 -
C0c0n -
Talk -
Influence of Artificial Intelligence in GRC Space -
Mahesh Kalyanaraman
Aug 06 -
C0c0n -
Talk -
Expanding capability horizons : Homelabs and beyond -
-
Anant Shrivastava
Aug 06 -
C0c0n -
Talk -
Emerging crimes and threat landscape in cyber domain and the need for international cooperation -
-
Kiran Sivakumar
Aug 06 -
C0c0n -
Talk -
Digital Innovation and its Impact on CIOs, CISOs and DPOs -
Navaneethan M
Aug 06 -
C0c0n -
Talk -
Developments in Deep Fake detection -
Tapas Saini
Aug 06 -
C0c0n -
Talk -
Dark web for investigations -
Amit Lokhande
Aug 06 -
C0c0n -
Talk -
Cybersecurity in the Era of AI -
-
Suvin Mullaseril
Aug 06 -
C0c0n -
Talk -
Cybercrimes Victim Compensation : Legal Remedies and Process -
Nisheeth Dixit
Aug 06 -
C0c0n -
Talk -
Cryptocurrencies and challenges to Law Enforcement Agencies -
Bhushan Gulabrao Borase
Aug 06 -
C0c0n -
Talk -
CBDC and future of Finance -
-
Sunil Raveendran
Aug 06 -
C0c0n -
Talk -
AI in Cyber Security and Crime Prevention -
Vishal Salvi
Aug 06 -
C0c0n -
Talk -
A Secure Privacy-Preserving Lightweight Authentication Scheme for Internet of Medical Things -
-
Panchami V , Mahima Mary Mathews
Jun 01 -
Securityfest -
Talk -
Bypassing Anti-Cheats & Hacking Competitive Games -
-
Rohan Aggarwal
Jun 01 -
Securityfest -
Talk -
Beyond On-Premises: Exploring the Post-Domain Admin Landscape in the Cloud -
-
Sriraam Natarajan , Venkatraman Kumar
May 12 -
Blackhat -
Talk -
Engaging the Next Generation of Cybersecurity Professionals: The Power of Security Zines -
-
Rohit Sehgal
May 12 -
Blackhat -
Talk -
Abusing Azure Active Directory: From MFA Bypass to Listing Global Administrators -
-
Sravan Akkaram , Nestori Syynimaa
May 11 -
Blackhat -
Talk -
Bypassing Anti-Cheats & Hacking Competitive Games -
-
Rohan Aggarwal
Apr 26 -
Rsac -
Talk -
Is Increasing Security Maturity And Decreasing Operational Load Possible? -
-
Rohit Dhamankar
Apr 26 -
Rsac -
Talk -
Designing Product Security for a Brighter Smile and a Healthier Tomorrow -
-
Lokesh Pidawekar , Apoorva Phadke
Apr 21 -
Hitb Sec Conf -
Talk -
LOCKNOTE:THE HAND THAT STRIKES, ALSO BLOCKS -
-
Saumil Shah
Apr 20 -
Hitb Sec Conf -
Talk -
BYPASSING ANTI-CHEATS & HACKING COMPETITIVE GAMES -
-
Rohan Aggarwal
Mar 09 -
Nullcon -
Talk -
Not So Famous Attack Vectors In The World Of Smart Contract Security! -
-
Tejaswa Rastogi
Jan 26 -
Usenix -
Talk -
Building an Automated Machine for Discovering Privacy Violations at Scale -
-
Suchakra Sharma 2022
Dec 08 -
Blackhat -
Talk -
Exploring a New Class of Kernel Exploit Primitive -
-
Rohit Mothe , Andrew Ruddick
Dec 07 -
Blackhat -
Talk -
Cross-Contract Ricochet Attacks & Off-Chain-On-Chain Manipulation of Billion Dollar NFT Collections -
-
Nitesh Dhanjani
Sep 29 -
Brucon -
Talk -
0wn-premises: Bypassing Microsoft Defender for Identity -
-
Nikhil Mittal
Sep 28 -
Rootcon -
Talk -
Gazing into the Crystal Ball - The Fog of Cyberwarfare Escalations -
Harshit Agrawal
Sep 28 -
Rootcon -
Talk -
AWSGoat : A Damn Vulnerable AWS Infrastructure -
-
Jeswin Mathai , Shantanu Kale , Sanjeev Mahunta
Sep 24 -
C0c0n -
Talk -
Web3 Security - Security in MetaVerse, and the new world of web3 -
Rohit Srivastwa
Sep 24 -
C0c0n -
Talk -
Weaponising Social Media for Psychological Operations -
A a Gafoor
Sep 24 -
C0c0n -
Talk -
Towards an Effective Intrusion Detection System Framework for Multi-Channel Man-in-the-Middle attacks Against Protected Wi-Fi Networks -
Manesh Thankappan
Sep 24 -
C0c0n -
Talk -
Rationalizing Cyber Security Risk in Risk Language -
Anish Koshy
Sep 24 -
C0c0n -
Talk -
Raining CVEs on Wordpress plugins with Semgrep -
Shreya Pohekar , Syed Sheeraz Ali
Sep 24 -
C0c0n -
Talk -
Power of Narratives in Cyber Security -
Sunil Varkey
Sep 24 -
C0c0n -
Talk -
OSINT Tools and Techniques -
Brijesh Singh
Sep 24 -
C0c0n -
Talk -
Need for Advanced SOC -
Vijayakumar K M
Sep 24 -
C0c0n -
Talk -
Know Your Organization? : Mapping Entities in Google Workspace -
Manish Gupta , Yash Bharadwaj
Sep 24 -
C0c0n -
Talk -
Introduction to RFID/NFC Hacking -
Davis Sojan
Sep 24 -
C0c0n -
Talk -
In production with GRC for cloud -
Mahesh Kalyanaraman
Sep 24 -
C0c0n -
Talk -
Deep Learning to detect Network Attacks -
Varun Kohli
Sep 24 -
C0c0n -
Talk -
Cyber Defence and Role of private players - public private partnership -
Jasbir Singh Solanki
Sep 24 -
C0c0n -
Talk -
Cryptocurrency Forensics -
Bhushan Gulabrao Borase
Sep 24 -
C0c0n -
Talk -
Citizen Mobile Security (ICAMPS) -
Satyendra Verma
Sep 24 -
C0c0n -
Talk -
CANalyse: A Vehicle Network Analysis and Attack Tool -
Kartheek Lade
Sep 24 -
C0c0n -
Talk -
Building Smart, Resilient and Sustainable Cyber Eco System -
Navin Kumar Singh
Sep 24 -
C0c0n -
Talk -
BEC, still the sure shot trap -
Georgie Kurien
Sep 23 -
C0c0n -
Talk -
TropicTrooper : Targets high profile victims using newly discovered MQTT backdoor -
Saurabh Sharma , Noushin Shabab
Sep 23 -
C0c0n -
Talk -
Tracking the Bad guys. An interesting story of how the criminal underground operates -
Aarushi Koolwal , Anjana Sathyan
Sep 23 -
C0c0n -
Talk -
Threats Landscape and Intelligence of API & Shield to protect -
Navaneethan M
Sep 23 -
C0c0n -
Talk -
Technological Reliance for Resilience -
Tulika Pandey
Sep 23 -
C0c0n -
Talk -
Startup Ecosystem and Investments in Post Covid Era -
Sunil Kanchi
Sep 23 -
C0c0n -
Talk -
Securing your APIs for a cloud native future -
Navendu Pottekkat
Sep 23 -
C0c0n -
Talk -
Rolling out Central Bank Digital Currency - Technical Design Considerations -
Sunil Raveendran
Sep 23 -
C0c0n -
Talk -
Ransomware: Prevention, Early Detection and Response -
Babitha Bp
Sep 23 -
C0c0n -
Talk -
Pwning Android Apps at Scale -
Sparsh Kulshrestha , Shashank Barthwal
Sep 23 -
C0c0n -
Talk -
Maximizing ROI on cyber security investments: Do you think Adversary Simulation OR Purple teaming holds the key? -
-
Abhijith B R
Sep 23 -
C0c0n -
Talk -
Log4j vulnerability continuous to be favourite for APT groups through mid 2022 -
Niranjan Jayanand
Sep 23 -
C0c0n -
Talk -
Hyperledger Fabric & Ethereum Apps: Security Deep Dive -
Alex Devassy , Dhanith Krishna
Sep 23 -
C0c0n -
Talk -
Hacking SmartContracts -
Anto Joseph
Sep 23 -
C0c0n -
Talk -
Cybersecurity for Manufacturing -
Santhosh Srinivasan
Sep 23 -
C0c0n -
Talk -
Common Misconfigurations in your Kubernetes Cluster and What can you do about it? -
Kumar Ashwin
Sep 23 -
C0c0n -
Talk -
Collaborative efforts for safe digital banking -
Biju K
Sep 23 -
C0c0n -
Talk -
Building a Safer and Innovative Digital Ecosystem -
Vijay Pamarathi
Sep 23 -
C0c0n -
Talk -
Bridging the gap between Security and Operations -
Sujay Rajashekar Gundagatti
Sep 23 -
C0c0n -
Talk -
Battle of 300 Crore - how they lost it and got most of it back -
Prashant Choudhary
Sep 23 -
C0c0n -
Talk -
Attacking connected industries in 5G networks -
Altaf Shaik
Sep 23 -
C0c0n -
Talk -
A Tale of Credential Leak of a Popular Cloud Threat Actor -
Nitesh Surana
Sep 08 -
Nullcon -
Talk -
Web3.0 - Smart Contracts Could Be Leaky -
-
Riddhi Shree
Sep 08 -
Nullcon -
Talk -
vPrioritizer: Art of Risk Prioritization -
-
Pramod Rana
Sep 08 -
Nullcon -
Talk -
The Different Faces Of macOS Malware: Detecting Anomalies In A Poisoned Apple -
-
Amit Malik , Pratik Jeware
Sep 08 -
Nullcon -
Talk -
Raining CVEs On WordPress Plugins With Semgrep -
-
Shreya Pohekar , Syed Sheeraz Ali
Sep 08 -
Nullcon -
Talk -
Pushing Security Left By Mutating Byte Code -
-
Gaurav Gogia
Sep 08 -
Nullcon -
Talk -
Handling A Bug Bounty program From A Blue Team Perspective -
-
Ashwath Kumar , Ankit Anurag
Sep 08 -
Nullcon -
Talk -
Hack the Source: Securing Open Source Software – One bug at a time -
-
Sandeep Singh , Laurie Mercer
Sep 08 -
Nullcon -
Talk -
Automate Your Whatsapp Chats -
-
Aditi Bhatnagar
Sep 07 -
Nullcon -
Talk -
Unearthing Malicious And Other “Risky” Open-Source Packages Using Packj -
-
Devdutt Patnaik , Ashish Bijlani
Sep 07 -
Nullcon -
Talk -
Scale hacking to secure your cloud and beyond -
-
Anand Prakash
Sep 07 -
Nullcon -
Talk -
Honey, I Just Put The Hospital On A Ventilator! - DICOM And Its Pitfalls -
-
Shyam Sundar Ramaswami , Rakesh Mahanthi
Sep 07 -
Nullcon -
Talk -
Hacking Android Foreground Services Escalation Of Privileges -
-
Rony Das
Sep 07 -
Nullcon -
Talk -
Hacking 5G Is No Rocket Science -
-
Altaf Shaik , Matteo Strada
Sep 07 -
Nullcon -
Talk -
Hack The Bridge -
-
Anto Joseph
Sep 07 -
Nullcon -
Talk -
ElectroVolt: Pwning Popular Desktop Apps While Uncovering New Attack Surface On Electron -
-
Mohan Sri Rama Krishna Pedhapati , Maxwell Garrett
Sep 07 -
Nullcon -
Talk -
Do PDF Tools Conform To The Specification? -
-
Prashant Anantharaman
Aug 26 -
Hitb Sec Conf -
Talk -
CAN A FUZZER MATCH A HUMAN -
-
Bhargava Shastry
Aug 25 -
Hitb Sec Conf -
Talk -
MPT: Pentest In Action -
-
Jyoti Raval
Aug 25 -
Hitb Sec Conf -
Talk -
Building An Army Of Bots By Hijacking A Unicorn’s Twitter Handle -
-
Rahul Sasi , Vishal Singh
Aug 14 -
Defcon (Ics Village) -
Talk -
Tales from the trenches - why organizations struggle to get even the basics of OT asset visibility & detection right -
Vivek Ponnada
Aug 12 -
Defcon (Ics Village) -
Talk -
Stop worrying about Nation-States and Zero-Days; let’s fix things that have been known for years -
-
Vivek Ponnada
Aug 11 -
The Diana Initiative -
Talk -
The Real Cost of Free: What you need to know before downloading a free app -
Ruchira Pokhriyal
Aug 11 -
Blackhat -
Talk -
RollBack - A New Time-Agnostic Replay Attack Against the Automotive Remote Keyless Entry Systems -
-
Soundarya Ramesh , Levente Csikor , Hoon Wei Lim , Jun Wen Wong , Rohini Poolat Parameswarath , Chan Mun Choon
Aug 11 -
Blackhat -
Talk -
Eliminating Triage Intermediaries for Zero-day Exploits Using a Decentralised Payout Protocol -
-
Subhechha Subudhi , Clara Maine , Akke Toeter , Victoria Bosch
Aug 11 -
Blackhat -
Talk -
ElectroVolt: Pwning Popular Desktop Apps While Uncovering New Attack Surface on Electron -
-
Mohan Sri Rama Krishna Pedhapati , Aaditya Purani , Max Garrett , William Bowling
Aug 11 -
The Diana Initiative -
Talk -
Connecting Dots Between Security Teams & Customer Expectations -
Shruthi Kamath
Aug 10 -
Blackhat -
Talk -
The Open Threat Hunting Framework: Enabling Organizations to Build, Operationalize, and Scale Threat Hunting -
-
Sameer Koranne , John Dwyer , Neil Wyler
Aug 10 -
Blackhat -
Talk -
Attacks From a New Front Door in 4G & 5G Mobile Networks -
-
Altaf Shaik , Shinjo Park , Matteo Strada
Jul 24 -
May Contain Hackers -
Talk -
No Permissions Needed! -
Aditi Bhatnagar
Jul 23 -
May Contain Hackers -
Talk -
How would a real life social media be like? -
Aditi Bhatnagar
Jul 23 -
Hope -
Talk -
Combating Ransom-War: Evolving Landscape of Ransomware Infections in Cloud Databases -
Aditya K Sood
Jun 07 -
Rsac -
Talk -
Continuous Security - Integrating Pipeline Security -
-
Vandana Verma Sehgal
Jun 01 -
Securityfest -
Talk -
Exploitation and automated detection of threats to modern cloud infrastructure -
-
Krishnaa Srinivasa , Maithri Nadig
May 18 -
Can Sec West -
Talk -
Launching EMUX - A framework for emulating ARM and MIPS IoT Devices -
-
Saumil Shah
May 12 -
Blackhat -
Talk -
Non-Intrusive Vulnerability Localization and Hotpatching for Industrial Control Systems -
-
Prashant Rajput , Michail Maniatakos
Apr 08 -
Nullcon -
Talk -
Bheem OS - A next-generation reasonably secure OS using Rust MicroVM -
-
Akram Ansari , Subash Sn
Apr 08 -
Nullcon -
Talk -
Attack Surfaces for 5G Networks -
-
Altaf Shaik 2021
Nov 19 -
Hackfest -
Talk -
Hacking with Physics -
Hrishikesh Somchatwar
Nov 18 -
Hackinparis -
Talk -
Is it really an intrusion if you get called in?: Mis-configuration based attacks in AWS -
Kavisha Sheth
Nov 18 -
Hackinparis -
Talk -
{Internet of Things or Threats}: Anatomizing the Structure of IoT Botnets -
-
Aditya K Sood
Nov 13 -
C0c0n -
Talk -
Zero Trust & Micro-segmentation -
Suresh Menon
Nov 13 -
C0c0n -
Talk -
Third Party Risk Management -
Mahesh Kalyanaraman
Nov 13 -
C0c0n -
Talk -
Server-side javascript Injection -
-
Kavisha Sheth
Nov 13 -
C0c0n -
Talk -
Securing OT in O&G Industry -
George Eapen
Nov 13 -
C0c0n -
Talk -
Post pandemic Transformation - A CISO’s perspective -
Sridhar Govardhan
Nov 13 -
C0c0n (Adversary Village) -
Talk -
Painting Your Organizations with Shades of Red, Blue & Purple -
-
Hidayath Khan
Nov 13 -
C0c0n -
Talk -
New way of looking at the hidden mysteries in the code -
Vandana Verma Sehgal
Nov 13 -
C0c0n -
Talk -
Need for Zero Trust in Banking -
Biju K
Nov 13 -
C0c0n -
Talk -
Mature Your Threat Hunting Program -
Neha Dhyani
Nov 13 -
C0c0n -
Talk -
Machine learning to detect Chia mining -
Varun Kohli
Nov 13 -
C0c0n (Adversary Village) -
Talk -
Light Basin - Telecom roaming network attack case study -
-
Akib Sayyed
Nov 13 -
C0c0n -
Talk -
Introducing Free & Open Elastic Limitless XDR -
Ravindra Ramnani
Nov 13 -
C0c0n -
Talk -
Exploiting 2A(Authentication and Authorization) Vulnerabilities of Web Application -
Gayatri Nayak
Nov 13 -
C0c0n -
Talk -
Enhancing An Multi-Factor Authentication (MFA) through Behavioural Biometrics -
Kiran Kumar Pg
Nov 13 -
C0c0n -
Talk -
Emerging trends in cyber crimes : Investigation tools & techniques -
Triveni Singh
Nov 13 -
C0c0n -
Talk -
Cybersecurity in the era of Resilience - A walk through people, process and technology -
Babitha B P
Nov 13 -
C0c0n -
Talk -
Cyber Warfare & Securing Critical Infrastructures -
Faruk Kazi
Nov 13 -
C0c0n -
Talk -
Crisis Capitalization in a Pandemic -
Greeshma M R
Nov 13 -
C0c0n -
Talk -
Connecting the dots between customers and security teams -
Shruthi Kamath
Nov 13 -
C0c0n -
Talk -
Cloud Threat landscape -
Gunjan Chhillar
Nov 13 -
C0c0n -
Talk -
Changing Cyber Security Paradigm & Cyber Tsunami -
Sunil Varkey
Nov 13 -
C0c0n -
Talk -
Case study - E-crime group targeting mobile users -
Rahul Sasi
Nov 13 -
C0c0n -
Talk -
Case Study - Cyber Heist in a Bank and Recovery of Systems and Money -
Prashant Choudhary
Nov 13 -
C0c0n -
Talk -
Building Global Cyber Security Company Out of India: Key Lessons Learnt During My Entrepreneurship Journey -
Bikash Barai
Nov 13 -
C0c0n -
Talk -
A look into cyber-espionage activities targeting critical infrastructure in India -
Saurabh Sharma , Kurt Baumgartner
Nov 13 -
C0c0n -
Talk -
Decoding new age hackers and Criminal Investigation -
Amit Dubey
Nov 12 -
C0c0n -
Talk -
Understanding the Psychology Behind Threats - adding Twists to your Turns -
Saman Fatima
Nov 12 -
C0c0n -
Talk -
The evolving nature of cyber community -
Aastha Sahni
Nov 12 -
C0c0n -
Talk -
Regulating Social Media Platforms : Should it be done in Democratic Societies ? -
J Sam Daniel Stalin , Apar Gupta , Dinesh O Bareja , Prashant Mali , Jiten Jain
Nov 12 -
C0c0n -
Talk -
Post Covid CISOs - Disappearing trusted boundaries and Innovative CyberSecurity Approaches -
Illyas Kooliyankal
Nov 12 -
C0c0n -
Talk -
IoT Security Guidelines & Standards -
Yashodhan Vivek Mandke
Nov 12 -
C0c0n -
Talk -
ICS Security —- A need, a challenge and a new change in Mindset -
Dhruv Gupta
Nov 12 -
C0c0n -
Talk -
Executive Presence….a cardinal of the cyber rostrum -
Bishakha Jain
Nov 12 -
C0c0n -
Talk -
Enterprise Governance and Risk Management -
Arathy Nair , Muskan Mangla
Nov 12 -
C0c0n -
Talk -
Dissecting Malicious Software and Analysis -
Shrutirupa Banerjiee
Nov 12 -
C0c0n -
Talk -
Data Security and Privacy -
Abhilasha Vyas
Nov 12 -
C0c0n -
Talk -
2021 Supply Chain Attacks Analysis -
Ajit Hatti
Nov 12 -
C0c0n -
Talk -
“Let’s Go Phishing”: Discerning the insidious nature of Social Engineering -
Ruchira Pokhriyal , Shashi Karhail
Nov 04 -
Ekoparty -
Talk -
DIAL: Did I just alert Lambda? A centralized security misconfiguration detection system -
-
Saransh Rana , Divyanshu Mehta , Harsh Varagiya
Oct 15 -
Rootcon -
Talk -
The Curious case of knowing the unknown -
-
Vandana Verma Sehgal
Oct 13 -
Rootcon -
Talk -
The Kill Chain: Future of Cyber in Defense -
-
Harshit Agrawal
Aug 27 -
Hitb Sec Conf -
Talk -
Securing Webviews and The Story Behind CVE-2021–21136 -
-
Shiv Sahni , Imdadullah Mohammed
Aug 26 -
Hitb Sec Conf -
Talk -
Gazing Ahead: What Modern RF Combat Looks Like in the Next Decade -
-
Harshit Agrawal
Aug 08 -
Defcon (Ics Village) -
Talk -
Top 20 Secure PLC Coding Practices -
-
Vivek Ponnada , Sarah Fluchs
Aug 08 -
Defcon (Appsec Village) -
Talk -
AppSec 101: A Journey from Engineer to Hacker -
-
Arjun Gopalakrishna
Aug 07 -
Defcon (Appsec Village) -
Talk -
The Curious Case of Knowing the Unknown -
-
Vandana Verma Sehgal
Aug 06 -
Defcon (Iot Village) -
Talk -
Defending IoT in the Future of High-Tech Warfare -
-
Harshit Agrawal
Aug 06 -
Defcon (Adversary Village) -
Talk -
Adversary village Kick-off -
-
Abhijith B R
Aug 05 -
Blackhat -
Talk -
The Devil is in the GAN: Defending Deep Generative Models Against Adversarial Attacks -
-
Ambrish Rawat , Killian Levacher , Mathieu Sinn
Aug 05 -
Defcon (Recon Village) -
Talk -
The Bug Hunter’s Recon Methodology -
-
Tushar Verma
Aug 05 -
Blackhat -
Talk -
PCIe Device Attacks: Beyond DMA. Exploiting PCIe Switches, Messages and Errors -
-
Hareesh Khattri , Nagaraju N Kodalapura , Nam N Nguyen
Aug 05 -
Blackhat -
Talk -
5G IMSI Catchers Mirage -
-
Ravishankar Borgaonkar , Altaf Shaik
Aug 04 -
Blackhat -
Talk -
Siamese Neural Networks for Detecting Brand Impersonation -
-
Jugal Parikh , Nitin Kumar Goel , Justin Grana , Yuchao Dai
May 06 -
Blackhat -
Talk -
Threat Hunting in Active Directory Environment -
-
Anurag Khanna , Thirumalai Natarajan Muthiah ,
Mar 06 -
Nullcon -
Talk -
Bug hunter adventures -
-
Shreyas Dighe , Yuvraj Dighe
Mar 05 -
Nullcon -
Talk -
Telecom Security Challenges in 5G -
-
Akib Sayyed
Mar 05 -
Nullcon -
Talk -
Arbitrary code execution on RISC-V using fault injection -
-
Praveen Vadnala , Nils Wiersma 2020
Dec 10 -
Blackhat -
Talk -
Effective Vulnerability Discovery with Machine Learning -
-
Asankhaya Sharma , Ming Yi Ang
Nov 21 -
App Sec Indonesia -
Talk -
Threat Defense: Defending the ATT&CK with TTP’s -
Avkash Kathiriya
Nov 21 -
App Sec Indonesia -
Talk -
The caveats of the unseen: Crouching exposure, Hidden Misconfiguration -
Ashwin Vamshi
Nov 21 -
App Sec Indonesia -
Talk -
Learn how to find and exploit race conditions in web apps with OWASP TimeGap Theory -
Abhi M Balakrishnan
Nov 20 -
Deepsec -
Talk -
What’s Up Doc? - Self Learning Sandboxes to Defeat Modern Malwares Using RSA: Rapid Static Analysis -
-
Shyam Sundar Ramaswami
Oct 09 -
Shell Con -
Talk -
How I Created My Clone Using AI - Next-Gen Social Engineering -
-
Tamaghna Basu
Oct 07 -
Rootcon -
Talk -
Zero Trust in the Era of Cloud -
-
Vandana Verma Sehgal
Oct 07 -
Rootcon -
Talk -
ReconPal: Leveraging NLP for Infosec -
-
Nishant Sharma , Jeswin Mathai
Oct 07 -
Rootcon -
Talk -
Offensive Embedded Exploitation : Getting hands dirty with IOT/Embedded Device Security Testing -
-
Kaustubh Padwad
Oct 07 -
Rootcon -
Talk -
How I Pwned the ICS data during my internship -
-
Shail Patel
Oct 07 -
Rootcon -
Talk -
Blockchain Based OT Monitoring Solution (BBOTMS) -
-
Asif Hameed Khan , Gagan Jattana
Oct 07 -
Rootcon -
Talk -
Automating Threat Hunting on the Dark Web and other nitty-gritty thingso -
-
Apurv Singh Gautam
Oct 02 -
Blackhat -
Talk -
Identifying Multi-Binary Vulnerabilities in Embedded Firmware at Scale -
-
Aravind Machiry , Nilo Redini , Andrea Continella , Ruoyu Wang , Yan Shoshitaishvili , Cristopher Kruegel , Giovanni Vigna , Chad Spensky
Oct 01 -
Blackhat -
Talk -
Making an Impact from India to the Rest of the World by Building and Nurturing Women Infosec Community -
-
Vandana Verma Sehgal ,
Sep 19 -
C0c0n -
Talk -
Automate your Recon with ReconNote -
-
Prasoon Gupta
Sep 18 -
C0c0n -
Talk -
Supercharging your initial foothold in Red Team engagements -
Sachin S Kamath
Sep 18 -
C0c0n -
Talk -
Reverse Engineering Bare-Metal IoT Firmwares - Moving beyond Linux -
Munawwar Hussain Shelia
Sep 18 -
C0c0n -
Talk -
Offensive Embedded Exploitation : Getting hands dirty with IOT/Embedded Device Security Testing -
-
Kaustubh Padwad
Sep 18 -
C0c0n -
Talk -
Offensive & Scope Based Recon -
-
Harsh Bothra
Sep 18 -
C0c0n -
Talk -
My top 3 findings in bug Bounty journey | Aiming for high impact issues -
Ankit Giri
Sep 18 -
C0c0n -
Talk -
Demystifying Zero Trust - A Real world -
-
Sandeep Variyam
Sep 18 -
C0c0n -
Talk -
Deep Learning for Intrusion Attempt Detection -
Varun Kohli
Sep 18 -
C0c0n -
Talk -
Cyber Security Shifts During COVID-19 -
-
Sunil Kanchi
Sep 18 -
C0c0n -
Talk -
COVID-19 Cyber impact on financial sector and remote employees -
-
Amit Dubey , Tal Catran , Yair Feldman
Sep 18 -
C0c0n -
Talk -
Coping with Digital Transformation - A CISO perspective -
-
Maya R Nair
Sep 18 -
C0c0n -
Talk -
Broken Cryptography & Account Takeover -
Harsh Bothra
Sep 18 -
C0c0n -
Talk -
Automation in Bug Bounties to Work Smarter -
Prerak Mittal
Sep 18 -
C0c0n -
Talk -
All about IOT Forensics -
Hima Bindu Vejella
Sep 18 -
C0c0n -
Talk -
Web Application hacking with WebZGround -
-
Parveen Yadav , Narendra Kumar
Sep 18 -
C0c0n -
Talk -
Kubernetes Goat - Vulnerable by Design Kubernetes Cluster Environment -
-
Madhu Akula
Sep 18 -
C0c0n -
Talk -
Introducing SniperPhish: A Web-Email Spear Phishing Toolkit -
-
Sreehari Haridas , Gem George
Sep 18 -
C0c0n -
Talk -
How I created my clone using AI - next-gen Social Engineering -
-
Tamaghna Basu
Sep 18 -
C0c0n -
Talk -
Herd Immunity, in the Cyber World -
Sunil Varkey
Aug 22 -
The Diana Initiative -
Talk -
Internal Red Team Operations Framework - Building your practical internal Red Team -
-
Abhijith B R
Aug 22 -
The Diana Initiative -
Talk -
Hacking into Android Ecosystem -
-
Aditi Bhatnagar
Aug 22 -
The Diana Initiative -
Talk -
Deploying discreet infrastructure for targeted phishing campaigns -
-
Sreehari Haridas
Aug 22 -
The Diana Initiative -
Talk -
Automating Threat Hunting on the Dark Web and other nitty-gritty things -
-
Apurv Singh Gautam
Aug 21 -
The Diana Initiative -
Talk -
Trust, No Trust or Zero Trust - Myth Demystifying -
Vandana Verma Sehgal
Aug 09 -
Defcon (Appsec Village) -
Talk -
Running an appsec program with open source projects -
-
Vandana Verma Sehgal
Aug 06 -
Blackhat -
Talk -
Making an Impact from India to the Rest of the World by Building and Nurturing Women Infosec Community -
-
Vandana Verma Sehgal ,
Aug 06 -
Blackhat -
Talk -
How I Created My Clone Using AI - Next-Gen Social Engineering -
-
Tamaghna Basu ,
Aug 05 -
Blackhat -
Talk -
Uncommon Sense: Detecting Exploits with Novel Hardware Performance Counters and ML Magic -
-
Harini Kannan , Nick Gregory
Jul 26 -
Hitb Sec Conf -
Talk -
Swapping Asprin Formulas With MDMA While Red Teaming a Billion Dollar Company -
Himanshu Sharma , Aman Sachdev ,
Apr 25 -
Hitb Sec Conf -
Talk -
THE STATE OF ICS SECURITY: THEN AND NOW -
Praveen Soni , Shivbihari Pandey , Ashish Kumar Gahlot ,
Apr 24 -
Hitb Sec Conf -
Talk -
COMMSEC: The State of ICS Security : Then and Now -
Praveen Soni , Shivbihari Pandey , Ashish Kumar Gahlot ,
Mar 18 -
Can Sec West -
Talk -
The ARM-X Firmware Emulation Framework -
-
Saumil Shah
Mar 06 -
Nullcon -
Talk -
Putting it all together: building an iOS jailbreak from scratch -
-
Umang Raghuvanshi
Mar 06 -
Nullcon -
Talk -
InfoSec Deep Learning in Action -
-
Satnam Singh
Mar 06 -
Nullcon -
Talk -
Cloud As an Attack vector -
-
Ashwin Vamshi , Rushikesh Vishwakarma
Mar 06 -
Nullcon -
Talk -
Automated Classification of Web-Application Attacks for Intrusion Detection -
Aneet Kumar Dutta 2019
Dec 04 -
Blackhat -
Talk -
ClusterFuzz: Fuzzing at Google Scale -
-
Abhishek Arya , Oliver Chang
Dec 04 -
Blackhat -
Talk -
Bring Your Own Token (BYOT) to Replace the Traditional Smartcards for Strong Authentication and Signing -
-
Karthik Ramasamy , Eric Hampshire
Nov 28 -
Deepsec -
Talk -
Mastering AWS Pentesting and Methodology -
-
Ankit Giri
Nov 09 -
Toor Con -
Talk -
100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans -
-
Jatin Kataria , Ang Cui
Nov 01 -
Hackfest -
Talk -
The Mechanics of Malware’s Darkside -
-
Yagnesh Waran P , Laura Harris
Nov 01 -
App Sec Day Australia -
Talk -
Protecting the Damned: Deploying Insecure Applications at Scale -
-
Vivek Ramachandran
Nov 01 -
App Sec Day Australia -
Talk -
A Purple Team View of Serverless and GraphQL Applications -
Abhay Bhargav
Oct 22 -
Hacklu -
Talk -
Intro to Dark Arts: Getting Started with CTFs -
Geethna T K , Shruti Dixit , Sowmya Potluri
Oct 17 -
Hitb Sec Conf -
Talk -
Advances in the Trinity of AI: Data, Algorithms & Compute Infrastructure -
-
Anima Anandkumar ,
Oct 15 -
Hitb Sec Conf -
Talk -
Car Hacking: Practical Guide to Automotive Security -
-
Yogesh Ojha
Oct 14 -
Hitb Sec Conf -
Talk -
ON THE WINGS OF TIME: DEMYSTIFYING WIRELESS ETHICAL HACKING AND DEFENSES -
-
Harshit Agrawal , Himanshu Mehta ,
Oct 14 -
Hitb Sec Conf -
Talk -
IoT Pentesting The Right Way -
-
Yogesh Ojha ,
Oct 14 -
Hitb Sec Conf -
Talk -
CALL OF DUTY: MODERN BROWSER WARFARE -
-
Dhiraj Mishra ,
Oct 12 -
Texas Cyber Summit -
Talk -
TH-2020 Rastrea2r: Collecting & Hunting for IOCs with Gusto and Style -
Sudheendra Bhat
Oct 12 -
Texas Cyber Summit -
Talk -
HX-3012 PErfidious: Make PE Backdooring Great Again! -
Shreyans Doshi
Oct 11 -
Texas Cyber Summit -
Talk -
Exploit The State of Embedded Web Security in IoT Devices ! -
Aditya K Sood
Oct 10 -
Brucon -
Talk -
Security transition from 4G to 5G: are we secure enough? -
-
Altaf Shaik , Ravishankar Borgaonkar
Oct 03 -
Virus Bulletin -
Talk -
Curious tale of 8.t used by multiple campaigns against South Asia -
Niranjan Jayanand , Ivan Macalintal , Debalina Ghosh
Sep 28 -
C0c0n -
Talk -
Vulnerability Prioritization with Threat Intelligence -
Muslim Koser , Devesh Vatsa , Rohit Srivastwa , Dinesh O Bareja
Sep 28 -
ROM Hack -
Talk -
Oh! Auth: Implementation pitfalls of OAuth 2.0 & the Auth Providers who have fell in it -
-
Samit Anwer
Sep 27 -
C0c0n -
Talk -
VyAPI - The Vulnerable Hybrid Android App -
-
Riddhi Shree
Sep 27 -
C0c0n -
Talk -
Stepping into Password Less Economy -
Ajit Hatti
Sep 27 -
C0c0n -
Talk -
Serverless SOAR -
-
Sabyasachi Dhal , Suresh Sharma
Sep 27 -
C0c0n -
Talk -
Security @scale for startups -
Shivanath Somanathan
Sep 27 -
C0c0n -
Talk -
Securing Payment Data with PCI Security Standards and Programs -
Nitin Bhatnagar
Sep 27 -
C0c0n -
Talk -
RANSOMWARE - to pay or not to pay -
Seshaprakash Kusuma Sreenivasa
Sep 27 -
C0c0n -
Talk -
Practical Approach to Cyber Security for financial institutions -
Georgie Kurien
Sep 27 -
C0c0n -
Talk -
Offensive Machine Learning for Pentesters and Red Teams -
Tamaghna Basu
Sep 27 -
C0c0n -
Talk -
Looking a decade ahead: Big data, drones , Robots and cyber security. -
Rahul Sasi
Sep 27 -
C0c0n -
Talk -
Lessons learned form data breaches in the cloud -
Ajay Agrawal
Sep 27 -
C0c0n -
Talk -
Industry 4.0 - Security and Compliance -
Santhosh Srinivasan
Sep 27 -
C0c0n -
Talk -
Hacking ICS devices for Fun -
Arun Mane
Sep 27 -
C0c0n -
Talk -
Golang for Pentesters / RedTeamers -
-
Anant Shrivastava
Sep 27 -
C0c0n -
Talk -
Doing SecOps for the Cloud using Cloud Native Services -
Akash Mahajan
Sep 27 -
C0c0n -
Talk -
Detection of TOR Sources using Artificial Intelligence -
Roshy John
Sep 27 -
C0c0n -
Talk -
Demystifying HealthCare Security -
Ajay Pratap Singh
Sep 27 -
C0c0n -
Talk -
Defense in Depth for Embedded Systems -
-
Jiggyasu Sharma
Sep 27 -
C0c0n -
Talk -
Cyber Hygiene from Enterprise point of view -
Noorul Haq
Sep 27 -
C0c0n -
Talk -
CISO Mind Set -
Lopa Mudraa Basuu
Sep 27 -
C0c0n -
Talk -
Building a cloud security monitoring and auditing framework -
Nirali Shah , Prasoon Dwivedi
Sep 27 -
C0c0n -
Talk -
Block Chain for Secured Automation -
Sanat Bhat
Sep 27 -
C0c0n -
Talk -
autoSource an automated framework for Source Code Review -
-
Malkit Singh
Sep 27 -
C0c0n -
Talk -
AI, ML and Security -
Varun Kohli
Sep 27 -
C0c0n -
Talk -
Advanced Persistent Threat and counter measures -
A a Gafoor
Sep 27 -
C0c0n -
Talk -
A Day in the Life of a CISO -
Sridhar Govardhan
Sep 23 -
Rootcon -
Talk -
Making Anomaly Detection system(ADS) for Vehicles (Automotive Hacking) -
-
Arun Mane , Nikhil Bogam
Sep 23 -
Rootcon -
Talk -
Identity crisis: war stories from authentication failures -
-
Vishal Chauhan
Sep 23 -
Rootcon -
Talk -
Hunting Threats with Wireshark Plugins -
-
Nishant Sharma , Jeswin Mathai , Shivam Bathla
Sep 23 -
Rootcon -
Talk -
Hacking ICS devices/PLC’s for Fun - ICS and IOT Hacking -
-
Arun Mane
Sep 23 -
Rootcon -
Talk -
APAD: An EDR Grade Agent for Wi-Fi Access Points -
-
Vivek Ramachandran
Sep 13 -
44 Con -
Talk -
The CISO’s Dilemma -
-
Saumil Shah
Sep 13 -
Global App Sec -
Talk -
Real Time Vulnerability Alerting by Using Principles from the United States Tsunami Warning Center -
Amol Sarwate
Sep 13 -
44 Con -
Talk -
One Person Army – Playbook on how to be the first Security Engineer at a company -
-
Kashish Mittal
Sep 13 -
Global App Sec -
Talk -
A Purple Team View of Serverless and GraphQL Applications -
Abhay Bhargav
Aug 30 -
Hitb Sec Conf -
Talk -
COMMSEC: PErfidious: Make PE Backdooring Great Again! -
-
Shreyans Doshi ,
Aug 29 -
Hitb Sec Conf -
Talk -
Understanding, Attacking & Securing Medical Devices -
-
Ajay Pratap Singh ,
Aug 11 -
Defcon (Appsec Village) -
Talk -
Shifting the DevSecOps Culture, Taking away the sugar piece and giving the pile to ants -
-
Vandana Verma Sehgal
Aug 11 -
Defcon (Appsec Village) -
Talk -
Exploiting and Securing iOS Apps using OWASP iGoat -
Swaroop Yermalkar
Aug 10 -
Defcon -
Talk -
RACE - Minimal Rights and ACE for Active Directory Dominance -
-
Nikhil Mittal
Aug 09 -
Defcon -
Talk -
100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans -
-
Jatin Kataria , Rick Housley , Ang Cui
Aug 08 -
Defcon (Packethacking Village) -
Talk -
YOUR PHONE IS USING TOR AND LEAKING YOUR PII -
-
Milind Bhargava , Adam Podgorski
Aug 08 -
Blackhat -
Talk -
Preventing Authentication Bypass: A Tale of Two Researchers -
-
Ravi Jaiswal , Terry Zhang , Ron Chan
Aug 08 -
Defcon (Cloud Village) -
Talk -
Phishing in the cloud era -
-
Ashwin Vamshi , Abhinav Singh
Aug 08 -
Defcon (Lockpick Village) -
Talk -
Hacking ICS devices for Fun Penetration Testing of Vehicle Components -
-
Arun Mane
Aug 08 -
Blackhat -
Talk -
DevSecOps : What, Why and How -
-
Anant Shrivastava
Aug 08 -
Blackhat -
Talk -
Death to the IOC: What’s Next in Threat Intelligence -
-
Bhavna Soman ,
Aug 08 -
Defcon (Cloud Village) -
Talk -
Anatomy of cloud hacking -
Pratik Shah
Aug 08 -
Blackhat -
Talk -
100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans -
Jatin Kataria , Richard Housley , Ang Cui
Aug 07 -
Blackhat -
Talk -
New Vulnerabilities in 5G Networks -
-
Ravishankar Borgaonkar , Altaf Shaik
Aug 07 -
Blackhat -
Talk -
Defense Against Rapidly Morphing DDOS -
-
Mudit Tyagi , Mikhail Fedorov
May 28 -
Securityfest -
Talk -
RF Exploitation: Demystifying IoT/OT hacks with SDR -
-
Himanshu Mehta , Harshit Agrawal
May 28 -
Securityfest -
Talk -
Oh! Auth: Implementation pitfalls of OAuth 2.0 & the Auth Providers who have fell in it -
-
Samit Anwer
May 21 -
Phdays -
Talk -
Rapid hardware hacking 101 -
Arun Magesh
May 21 -
Phdays -
Talk -
How to fail in hardware hacking -
-
Arun Magesh
May 21 -
Phdays -
Talk -
GDALR: an efficient model duplication attack on black-box machine learning models -
-
Rewanth Tammana , Nikhil Joshi
May 21 -
Phdays -
Talk -
Fuzzing 101 -
Dhiraj Mishra , Zubin Devnani
May 21 -
Phdays -
Talk -
Breaking Microsoft Edge extensions security policies -
-
Nikhil Mittal
May 21 -
Phdays -
Talk -
Active defense using Honeypots v2 -
-
Rahul Binjve
May 10 -
Hitb Sec Conf -
Talk -
HAXPO: RF Exploitation: Demystifying IoT/OT Hacks with SDR -
-
Himanshu Mehta , Harshit Agrawal
May 09 -
Hitb Sec Conf -
Talk -
Make ARM Shellcode Great Again -
-
Saumil Shah
May 09 -
Hitb Sec Conf -
Talk -
HAXPO: WiCy: Monitoring 802.11AC Networks at Scale -
-
Vivek Ramachandran
May 09 -
Hitb Sec Conf -
Talk -
GDALR: Duplicating Black Box Machine Learning Models -
-
Rewanth Tammana , Nikhil Joshi
May 04 -
Thot Con -
Talk -
What The Frida Gave Me: A Novel Take on E-Ticket Forging and E-Ticket Stealing -
Priyank Nigam
Mar 28 -
Blackhat -
Talk -
Investigating Malware Using Memory Forensics - A Practical Approach -
-
Monnappa K A ,
Mar 28 -
Blackhat -
Talk -
DevSecOps : What, Why and How -
-
Anant Shrivastava
Mar 21 -
Troopers -
Talk -
Evolution of kernel fuzzers in NetBSD -
-
Siddharth M
Feb 28 -
Nullcon -
Talk -
Pentesting without Pentesters - Automating Security Testing with Functional Testing Test Cases -
-
Lavakumar Kuppan , Ankit Gupta
Feb 28 -
Nullcon -
Talk -
Dirty use of USSD Codes -
Ravishankar Borgaonkar
Feb 28 -
Nullcon -
Talk -
Building Hardened IoT Implementations with LangSec -
-
Prashant Anantharaman
Feb 28 -
Nullcon -
Talk -
Attacking & Securing HealthCare Standards & hospital secured systems -
-
Ajay Pratap Singh
Feb 28 -
Nullcon -
Talk -
Andromeda - GUI based Dynamic Instrumentation Toolkit powered by Frida -
-
Shivang Desai
Feb 28 -
Nullcon -
Talk -
A Hacker Walks into a Co-working Space -
-
Rahul Binjve 2018
Dec 06 -
Blackhat -
Talk -
AI Gone Rogue: Exterminating Deep Fakes Before They Cause Menace -
-
Vijay Thaware , Niranjan Agnihotri
Dec 05 -
Blackhat -
Talk -
The Undeniable Truth: How Remote Attestation Circumvents Deniability Guarantees in Secure Messaging Protocols -
-
N Asokan , Lachlan Gunn , Ricardo Vieitez Parra
Nov 29 -
Deepsec -
Talk -
DNS Exfiltration and Out-of-Band Attacks -
-
Nitesh Shilpkar
Nov 27 -
Hitb Sec Conf -
Talk -
Somebody Answer the Phone: Hacking Telephone Systems for Fun & Profit -
-
Himanshu Mehta , Sachine Wagh ,
Nov 27 -
Hitb Sec Conf -
Talk -
COMMSEC: Taking Over Telecom Networks -
-
Hardik Mehta , Loay Hassan Abdelrazek
Nov 27 -
Hitb Sec Conf -
Talk -
COMMSEC: Enhancing Deep Learning DGA Detection Models Using Separate Character Embedding -
-
Vikash Yadav ,
Nov 27 -
Hitb Sec Conf -
Talk -
BSIDES: Creating Browser Extensions to Hunt for Low-Hanging Fruit -
-
Rewanth Tammana ,
Nov 02 -
Hackfest -
Talk -
Exploiting Connected Medical Devices: Lessons Learned & Data Earned -
-
Saurabh Harit
Nov 02 -
Hitb Sec Conf -
Talk -
Defending The Enterprise in 2018 -
Saumil Shah
Oct 19 -
App Sec Day Australia -
Talk -
Threat Modeling-as-Code & Automation for DevSecOps wins -
-
Abhay Bhargav
Oct 19 -
App Sec Day Australia -
Talk -
Continuous Integration and Delivery with Docker Containers -
-
Vasant Kumar
Oct 15 -
Hacklu -
Talk -
Make ARM Shellcode Great Again -
-
Saumil Shah
Oct 15 -
Hacklu -
Talk -
Come to the dark side! We have radical insurance groups & ransomware -
-
Ankit Gangwal , Eireann Leverett
Oct 10 -
Brucon -
Talk -
Simplifying the art of instrumentation -
Krishnakant Patil , Rushikesh D Nandedkar
Oct 10 -
Brucon -
Talk -
Forging Trusts for Deception in Active Directory -
-
Nikhil Mittal
Oct 05 -
C0c0n -
Talk -
Will Artificial Intelligence And Machine Learning Bring More Threats On Cyber Security? -
Roshy John
Oct 05 -
C0c0n -
Talk -
Using Fault Injection for Forensics -
Yashin Mehaboobe
Oct 05 -
C0c0n -
Talk -
Unconventional vulnerabilities in Google Cloud Platform -
Pranav Venkat
Oct 05 -
C0c0n -
Talk -
Taking cyber security to the board room -
Amit Pradhan
Oct 05 -
C0c0n -
Talk -
SCANDA: To Unbosom Malware Behavior -
Rajesh Nikam , Parmanand Mishra
Oct 05 -
C0c0n -
Talk -
Resiliency Focus alongside Digital Disruption -
Lince Lawrence
Oct 05 -
C0c0n -
Talk -
Privacy And Data Protection: Stakeholders’ Perspectives -
Rahul Sharma
Oct 05 -
C0c0n -
Talk -
Predictive policing using Big Data analytics. -
Tarun Wig
Oct 05 -
C0c0n -
Talk -
OSINT : Indian Citizen Edition -
Anant Shrivastava
Oct 05 -
C0c0n -
Talk -
How can we use machine learning to prevent Frauds and password breaches -
Tamaghna Basu
Oct 05 -
C0c0n -
Talk -
Future of Mobility & Cyber Security -
Suja Chandy
Oct 05 -
C0c0n -
Talk -
DomGoat - the DOM Security Playground -
-
Lavakumar Kuppan
Oct 05 -
C0c0n -
Talk -
Digital Innovation revolution in Kerala Government -
Sunil Varkey
Oct 05 -
C0c0n -
Talk -
Defending Healthcare Base -
Jiggyasu Sharma
Oct 05 -
C0c0n -
Talk -
Dealing with Changing Threat Landscape -
Vijendra Katiyar
Oct 05 -
C0c0n -
Talk -
Data management challenge for Privacy compliance -
Maria Bellarmine
Oct 05 -
C0c0n -
Talk -
Cybersecurity Embedded Digital Transformation - The Future -
Sunil Kanchi
Oct 05 -
C0c0n -
Talk -
Cyber security in Health Care Industry -
Noorul Haq
Oct 05 -
C0c0n -
Talk -
Blockchains as techno-power structures: towards emergence of P2P Politics -
Sunil Aggarwal
Oct 05 -
C0c0n -
Talk -
Artificial Intelligence and Social Media Analytics in Criminal Investigation -
Amit Dubey
Oct 05 -
C0c0n -
Talk -
Adaptive GRC -
Mahesh Kalyanaraman
Oct 05 -
C0c0n -
Talk -
Pentesting GraphQL Applications -
-
Neelu Tripathy
Oct 05 -
C0c0n -
Talk -
DNS Exfiltration and Out of Band Attacks -
Nitesh Shilpkar
Oct 05 -
C0c0n -
Talk -
Defending cloud Infrastructures with Cloud Security Suite -
-
Jayesh Chauhan , Shivankar Madaan
Oct 04 -
Brucon -
Talk -
Disrupting the Kill Chain -
-
Vineet Bhatia
Sep 27 -
Rootcon -
Talk -
Expl-iot: Hacking IoT like a boss -
-
Aseem Jakhar
Sep 27 -
Rootcon -
Talk -
Defending cloud Infrastructures with Cloud Security Suite -
-
Shivankar Madaan
Sep 27 -
Rootcon -
Talk -
Cyber Security Threats to Telecom Networks -
-
Hardik Mehta , Rosalia D’ Alessandro , Loay Abdelrazek
Sep 27 -
Rootcon -
Talk -
Bug Bounty Hunting on Steroids -
-
Anshuman Bhartiya ,
Sep 12 -
44 Con -
Talk -
Make ARM Shellcode Great Again -
-
Saumil Shah
Sep 06 -
Grrcon -
Talk -
Crypto Gone Rogue: A Tale of Ransomware, Key Management and the CryptoAPI -
-
Pranshu Bajpai , Richard Enbody
Sep 06 -
Grrcon -
Talk -
Angad: A Malware Detection Framework using Multi-Dimensional Visualization -
-
Ankur Tyagi
Sep 06 -
Grrcon -
Talk -
Analyzing Multi-Dimensional Malware Dataset -
-
Ankur Tyagi
Aug 30 -
Hitb Sec Conf -
Talk -
Exploiting Automation in LTE Mobile Networks -
-
Ravishankar Borgaonkar , Altaf Shaik
Aug 16 -
Usenix -
Talk -
Man-in-the-Machine: Exploiting Ill-Secured Communication Inside the Computer -
-
Siddharth Rao , Thanh Bui , Markku Antikainen , Viswanathan Manihatty Bojan , Tuomas Aura
Aug 16 -
Usenix -
Talk -
Chipmunk or Pepe? Using Acoustical Analysis to Detect Voice-Channel Fraud at Scale -
-
Vijay Balasubramaniyan
Aug 12 -
Defcon -
Talk -
Last mile authentication problem: Exploiting the missing link in end-to-end secure communication -
-
Siddharth Rao , Thanh Bui
Aug 11 -
Defcon -
Talk -
Compression Oracle Attacks on VPN Networks -
-
Ahamed Nafeez
Aug 10 -
Defcon (Recon Village) -
Talk -
Building visualisation platforms for OSINT data using open source solutions -
-
Bharath Kumar , Madhu Akula
Aug 10 -
Defcon (Packethacking Village) -
Talk -
AN OSINT APPROACH TO THIRD PARTY CLOUD SERVICE PROVIDER EVALUATION -
-
Lokesh Pidawekar
Aug 09 -
Blackhat -
Talk -
Follow the White Rabbit: Simplifying Fuzz Testing Using FuzzExMachina -
-
Bhargava Shastry , Vincent Ulitzsch , Dominik Maier
Aug 09 -
Blackhat -
Talk -
Two-Factor Authentication, Usable or Not? A Two-Phase Usability Study of the FIDO U2F Security Key -
-
Sanchari Das , Andrew C Dingman , Gianpaolo Russo , L Jean Camp
Aug 09 -
Blackhat -
Talk -
Protecting the Protector, Hardening Machine Learning Defenses Against Adversarial Attacks -
-
Jugal Parikh , Randy Treit , Holly Stewart
Aug 09 -
Defcon (Lockpick Village) -
Talk -
Backdooring DVR/NVR devices -
Arun Mane
Aug 09 -
Defcon (Crypto&privacy Village) -
Talk -
Anonymous rate-limiting in services with Direct Anonymous Attestation -
-
Konark Modi , Alex Catarineu
Aug 09 -
Defcon -
Talk -
4G—Who is paying your cellular phone bill? -
-
Isha Singh , Dr Silke Holtmanns
Aug 08 -
Blackhat -
Talk -
LTE Network Automation Under Threat -
-
Ravishankar Borgaonkar , Altaf Shaik
Aug 08 -
Blackhat -
Talk -
Compression Oracle Attacks on VPN Networks -
-
Ahamed Nafeez
Aug 08 -
Blackhat -
Talk -
Back to the Future: A Radical Insecure Design of KVM on ARM -
-
Baibhav Singh , Rahul Kashyap ,
Jul 21 -
Hope -
Talk -
Evidential Study of IoT Botnets - The Bad and The Ugly! -
-
Aditya K Sood
Jun 29 -
Hackinparis -
Talk -
Hunting PBX for Vulnerabilities -
-
Himanshu Mehta , Sachin Wagh
Jun 27 -
First -
Talk -
Securing your in-ear fitness coach: Challenges in hardening next generation wearables -
-
Sumanth Naropanth , Sunil Kumar
May 13 -
Defcon -
Talk -
Androsia: Securing ‘Data in Process’ for your Android Apps -
-
Samit Anwer
Mar 22 -
Blackhat -
Talk -
XOM-switch: Hiding Your Code from Advanced Code Reuse Attacks In One Shot -
-
Ravi Sahita , Daiping Liu , Mingwei Zhang
Mar 22 -
Blackhat -
Talk -
Securing Your In-Ear-Fitness Coach: Challenges in Hardening Next Generation Wearables -
-
Sumanth Naropanth , Kavya Racharla
Mar 15 -
Troopers -
Talk -
Defending Microsoft Environments at Scale -
-
Vineet Bhatia
Mar 13 -
Troopers -
Talk -
Securing your in-ear fitness coach: Challenges in hardening next generation wearables -
-
Sumanth Naropanth , Kavya Racharla
Mar 01 -
Nullcon -
Talk -
White-Stingray: Bypassing stingray detectors -
-
Altaf Shaik
Mar 01 -
Nullcon -
Talk -
Unleashing D* on Android Kernel Drivers -
-
Aravind Machiry
Mar 01 -
Nullcon -
Talk -
SpotPhish: Zero-Hour Phishing Protection -
-
Ganesh Varadarajan
Mar 01 -
Nullcon -
Talk -
Software Supply Chain Cyberattack -
-
Samiran Ghatak
Mar 01 -
Nullcon -
Talk -
Security through obscurity and fear -
-
Abhinav Srivastava
Mar 01 -
Nullcon -
Talk -
Looting your bank savings using Digital India -
-
Indrajeet Bhuyan
Mar 01 -
Nullcon -
Talk -
DARWIN (A parasite covert wireless network) -
-
Rushikesh D Nandedkar
Mar 01 -
Nullcon -
Talk -
Breaking Into Container Orchestrators -
-
Nadeem Hussain
Mar 01 -
Nullcon -
Talk -
Abusing and Attacking Content Sharing Solutions -
-
Pratap Chandra Allena
Mar 01 -
Nullcon -
Talk -
A Game between Adversary and AI Scientist -
-
Satnam Singh
Jan 31 -
Owasp App Sec California -
Talk -
Hunter – Optimize your Pentesters time -
-
Kiran Shirali 2017
Dec 06 -
Blackhat -
Talk -
DIFUZZING ANDROID KERNEL DRIVERS -
-
Aravind Machiry , Chris Salls , Yan Shoshitaishvili , Jake Corina , Shuang Hao
Dec 06 -
Blackhat -
Talk -
BREAKING BAD: STEALING PATIENT DATA THROUGH MEDICAL DEVICES -
-
Saurabh Harit ,
Nov 20 -
Hackfest -
Talk -
How my SV Machine nailed your Malware -
Nikhil P Kulkarni
Nov 17 -
Deepsec -
Talk -
Intel AMT: Using & Abusing The Ghost In The Machine -
-
Parth Shukla
Nov 17 -
Deepsec -
Talk -
How Secure Are Your VoLTE And VoWiFi Calls? -
-
Sreepriya Chalakkal
Nov 14 -
Blackhat -
Talk -
Pwning a Smart Home in Under 10 Minutes -
-
Aditya Gupta
Oct 19 -
Hacklu -
Talk -
Intel AMT: Using & Abusing the Ghost in the Machine -
-
Parth Shukla
Oct 19 -
Hacklu -
Talk -
Bug hunting using symbolic virtual machines! -
-
Anto Joseph
Oct 19 -
Hacklu -
Talk -
Are your VoLTE and VoWiFi calls secure? -
-
Sreepriya Chalakkal
Oct 05 -
Virus Bulletin -
Talk -
The router of all evil: more than just default passwords and silly scripts -
-
Himanshu Anand , Chastine Menrige
Oct 05 -
Brucon -
Talk -
Races, Reaches and Rescues!!! (Race condition vulnerabilities revisited) -
Rushikesh D Nandedkar , Sampada Nandedkar
Sep 21 -
App Sec Usa -
Talk -
iGoat – A Self Learning Tool for iOS App Pentesting and Security -
-
Swaroop Yermalkar
Sep 21 -
App Sec Usa -
Talk -
Androsia: A tool for securing in memory sensitive data -
-
Samit Anwer
Sep 13 -
44 Con -
Talk -
Red Team Revenge : Attacking Microsoft ATA -
-
Nikhil Mittal
Aug 19 -
C0c0n -
Talk -
Trust, the foundation of Digital Mastery -
Sunil Varkey
Aug 19 -
C0c0n -
Talk -
The Public Private Partnership - Navigating the Govt -
Saikat Datta
Aug 19 -
C0c0n -
Talk -
Building Trust for Digital Transactions in India’s COD Culture -
Parry Aftab , Betsy Broder , Sridhara R Sidhu , Mirza Faizan
Aug 18 -
C0c0n -
Talk -
Your friendly neighbourhood exploit -
Aseem Jakhar
Aug 18 -
C0c0n -
Talk -
Yarafying Android Malware: A Missing Step Before Malware Analysis -
Shivang Desai
Aug 18 -
C0c0n -
Talk -
What Security Managers can learn from story tellers? -
Anup Narayanan
Aug 18 -
C0c0n -
Talk -
The Internet Of Things: Essentials of Secur(IOT)y -
Arpit Bajpai , Ronald Michael
Aug 18 -
C0c0n -
Talk -
The Covert Cupid Under .11 Veil !!! /* Approach for Covert WIFI*/ -
Rushikesh D Nandedkar
Aug 18 -
C0c0n -
Talk -
The card hack - Lessons from the Hitachi Payments Breach -
Saikat Datta
Aug 18 -
C0c0n -
Talk -
Prevent Dark Side of your Smart City - A Defensive Security model for Smart City and Critical Infrastructure -
Manas Pratim Sarma
Aug 18 -
C0c0n -
Talk -
Penetration Testing Orchestrator: A Framework that leverages multi-tool penetration testing approach combined with Machine Learning-NLP for faster result analysis -
Furqan Khan , Siddharth Anbalahan
Aug 18 -
C0c0n -
Talk -
OSINT and Privacy -
Rohit Srivastwa
Aug 18 -
C0c0n -
Talk -
Moving from Cybersecurity Awareness to Cybersecurity Competence -
Anup Narayanan
Aug 18 -
C0c0n -
Talk -
Mobile Banking (In)Security -
Sneha Rajguru
Aug 18 -
C0c0n -
Talk -
iGoat – A Self Learning Tool for iOS App Pentesting and Security -
-
Swaroop Yermalkar
Aug 18 -
C0c0n -
Talk -
Hunting the Hunters – Fighting CyberCrime at the Source -
Valan Sivasubramanian
Aug 18 -
C0c0n -
Talk -
Hacking Homes: A hardware insight for IoT [in]Security -
Jiggyasu Sharma
Aug 18 -
C0c0n -
Talk -
Exploiting the smartness of BLE Stack -
Apoorva Gupta
Aug 18 -
C0c0n -
Talk -
Dynamic Binary Instrumentation -
Vivek Arora , Bhaskar Rastogi
Aug 18 -
Usenix -
Talk -
DR. CHECKER: A Soundy Analysis for Linux Kernel Drivers -
-
Aravind Machiry , Chad Spensky , Jake Corina , Nick Stephens , Christopher Kruegel , Giovanni Vigna
Aug 18 -
C0c0n -
Talk -
Cyber Threat Intelligence - Are We There , Yet…? -
A Shiju Rawther
Aug 18 -
C0c0n -
Talk -
Cyber Security Threat Management – Model it, Collect Intelligence and Hunt them! -
Illyas Kooliyankal
Aug 18 -
C0c0n -
Talk -
CoAP versus MQTT: IoT Protocol Vulnerability analysis -
Rajiv Pandey
Aug 18 -
C0c0n -
Talk -
Cloud_Security Suite - One stop tool for auditing cloud infrastructure -
-
Shivankar Madaan , Jayesh Chauhan
Aug 18 -
C0c0n -
Talk -
Challenges in Digital Banking -
Biju K
Aug 18 -
C0c0n -
Talk -
Catching Network anomalies using Deep learning -
Aditya Vasekar
Aug 18 -
C0c0n -
Talk -
Case study: Security of Digital Wallet apps in India -
Ashwath Kumar , Sandesh Mysore Anand
Aug 18 -
C0c0n -
Talk -
Call Centre Frauds -
Parry Aftab , Betsy Broder
Aug 18 -
C0c0n -
Talk -
Blockchain for Information security -
Shobha Jagathpal
Aug 18 -
C0c0n -
Talk -
Big Data Analytics with pattern matching for smarter analytics -
Tarun Wig
Aug 18 -
C0c0n -
Talk -
Bank on Compliance for Cyber Security -
Dinesh O Bareja
Aug 18 -
C0c0n -
Talk -
Are TOR Hidden Services really hidden? Demystifying HS Directory surveillance by injecting Decoys inside TOR! -
-
Abhinav Biswas
Aug 18 -
C0c0n -
Talk -
Anti-Virus Bypassing for Fun and Profit -
Vanshit Malhotra
Aug 18 -
C0c0n -
Talk -
Androsia: A tool for securing in memory sensitive data -
-
Samit Anwer
Aug 18 -
C0c0n -
Talk -
10 Things I Hate About Your Honeypots or How to Setup Honeypots That Work -
Rahul Binjve
Aug 18 -
C0c0n -
Talk -
Phishing threats to customers and mitigation -
Bhavin Bhansali
Aug 18 -
C0c0n -
Talk -
Hunting Botnets with Analytics -
Shomiron Das Gupta
Aug 17 -
Usenix -
Talk -
BootStomp: On the Security of Bootloaders in Mobile Devices -
-
Aravind Machiry , Dipanjan Das , Nilo Redini , Yanick Fratantonio , Antonio Bianchi , Eric Gustafson , Yan Shoshitaishvali , Christopher Kruegel , Giovanni Vigna
Aug 04 -
Sha -
Talk -
Attacking OpenSSL using Side-channel Attacks: The RSA case study -
-
Praveen Vadnala , Lukasz Chmielewski
Jul 27 -
Defcon (Recon Village) -
Talk -
Recon and bug bounties what a great love story -
-
Abhijeth Dugginapeddi
Jul 27 -
Defcon (Lockpick Village) -
Talk -
ICS Humla -
-
Sneha Rajguru , Arun Mane
Jul 27 -
Blackhat -
Talk -
Evading Microsoft ATA for Active Directory Domination -
-
Nikhil Mittal
Jul 26 -
Blackhat -
Talk -
Wire Me Through Machine Learning -
-
Ankit Singh , Vijay Thaware ,
Jul 26 -
Blackhat -
Talk -
New Adventures in Spying 3G and 4G Users: Locate, Track & Monitor -
-
Ravishankar Borgaonkar , Altaf Shaik , Shinjo Park , Lucca Hirschi , Andrew Martin , Jean Pierre Seifert
Jun 23 -
Hackinparis -
Talk -
Injecting Security into Web apps with Runtime Patching and Context Learning -
-
Ajin Abraham
May 23 -
Phdays -
Talk -
Practical machine learning in infosecurity -
-
Anto Joseph , Clarence Chio
May 23 -
Phdays -
Talk -
Injecting security into web apps in the runtime -
-
Ajin Abraham
May 23 -
Phdays -
Talk -
How we hacked distributed configuration management systems -
-
Bharadwaj Machiraju , Francis Alexander
Apr 19 -
Brucon -
Talk -
Evading Microsoft ATA for Active Directory Domination -
-
Nikhil Mittal
Apr 14 -
Hitb Sec Conf -
Talk -
Is There a Doctor in The House? Hacking Medical Devices and Healthcare Infrastructure -
-
Anirudh Duggal
Apr 14 -
Hitb Sec Conf -
Talk -
COMMSEC: IoT Hacking Simplified -
-
Aseem Jakhar
Mar 31 -
Blackhat -
Talk -
WHAT MALWARE AUTHORS DON’T WANT YOU TO KNOW - EVASIVE HOLLOW PROCESS INJECTION -
-
Monnappa K A ,
Mar 31 -
Blackhat -
Talk -
The Seven Axioms of Security -
-
Saumil Shah
Mar 31 -
Blackhat -
Talk -
Mobile-Telephony Threats in Asia -
-
Payas Gupta , Marco Balduzzi , Lion Gu
Mar 23 -
Troopers -
Talk -
How we hacked Distributed Configuration Management Systems -
Francis Alexander
Mar 23 -
Troopers -
Talk -
How we hacked Distributed Configuration Management Systems -
Bharadwaj Machiraju , Francis Alexander
Mar 21 -
Troopers -
Talk -
New attacks in 4G technologies -
Ravishankar Borgaonkar
Mar 15 -
Can Sec West -
Talk -
Inside Stegosploit -
-
Saumil Shah
Mar 03 -
Nullcon -
Talk -
Tale of training a Web Terminator! -
-
Bharadwaj Machiraju
Mar 03 -
Nullcon -
Talk -
Securing Critical National Infrastructure -
-
Shailendra Fuloria , R Sarangapani , Rahul Tongia , Michael Pyle , Justin Searle
Mar 03 -
Nullcon -
Talk -
Injecting Security into Web apps with Runtime Patching and Context Learning -
-
Ajin Abraham
Mar 03 -
Nullcon -
Talk -
Hacking medical devices and infrastructure -
-
Anirudh Duggal
Mar 03 -
Nullcon -
Talk -
DevOpSec: Rapid Security in the Cloud with AWS and CIS -
-
Mikhail Advani , Rajesh Tamhane
Mar 03 -
Nullcon -
Talk -
Case Study on RFID (proximity cards) hacking -
-
Sarwar Jahan , Ashwath Kumar
Mar 03 -
Nullcon -
Talk -
Case study of SS7/Sigtran assessment -
-
Akib Sayyed
Mar 03 -
Nullcon -
Talk -
Breach Response - Time to shake up the status quo -
-
K K Mookhey , Pranesh Prakash , Sahir Hidayatullah , Shobha Jagathpal
Mar 03 -
Nullcon -
Talk -
Agility with security mitigations in Windows 10 -
Swamy Shivaganga Nagaraju
Jan 25 -
Owasp App Sec California -
Talk -
OCSP Stapling in the Wild -
Devdatta Akhawe , Emily Stark
Jan 25 -
Owasp App Sec California -
Talk -
DASTProxy: Don’t let your automated security testing program stall on crawlInstead focus on business context -
-
Kiran Shirali , Srinivasa Rao Chirathanagandla 2016
Nov 11 -
Deepsec -
Talk -
Human vs Artificial intelligence – Battle of Trust -
Hemil Shah
Nov 11 -
Deepsec -
Talk -
AMSI: How Windows 10 Plans To Stop Script Based Attacks and How Good It Does That -
-
Nikhil Mittal
Nov 06 -
Ground Zero Summit -
Talk -
Hacking The Droids -
Anto Joseph
Nov 05 -
Hackfest -
Talk -
LockPicker: Leaking data from live LUKS partition -
Adhokshaj Mishra
Nov 04 -
Blackhat -
Talk -
Randomization Can’t Stop BPF JIT Spray -
-
N Asokan , Filippo Bonazzi , Elena Reshetova
Nov 04 -
Blackhat -
Talk -
Detach Me Not - DoS Attacks Against 4G Cellular Users Worldwide from your Desk -
-
Siddharth Rao , Bhanu Kotte , Dr. Silke Holtmanns
Nov 03 -
Blackhat -
Talk -
WiFi-Based IMSI Catcher -
-
Ravishankar Borgaonkar , Piers O Hanlon
Oct 27 -
Brucon -
Talk -
Decepticon The Rise and Evolution of an Intelligent Evil Twin…!!! -
-
Rushikesh D Nandedkar , Amrita C Iyer , Krishnakant Patil
Oct 19 -
Hacklu -
Talk -
2016: The Infosec Crossroads -
-
Saumil Shah
Oct 14 -
App Sec Usa -
Talk -
DevOps to DevSecOps: a 2-dimensional view of security for DevOps -
Sanjeev Sharma
Oct 14 -
App Sec Usa -
Talk -
Automating API Penetration Testing using fuzzapi -
-
Abhijeth Dugginapeddi , Lalith Rallabhandi
Oct 13 -
App Sec Usa -
Talk -
When encryption is not enough: Attacking Wearable - Mobile Application communication over BLE -
-
Sumanth Naropanth , Kavya Racharla , Chandra Prakash Gopalaiah
Oct 13 -
App Sec Usa -
Talk -
Lightning Talk - Demystifying Windows Application -
Rupali Dash
Oct 07 -
Deepsec -
Talk -
Inside Stegosploit -
-
Saumil Shah
Oct 05 -
Virus Bulletin -
Talk -
One-Click Fileless Infection -
-
Himanshu Anand , Chastine Menrige
Sep 23 -
Rootcon -
Talk -
Halcyon – A Faster Way to Build Custom Scripts for Nmap Scans -
-
Sanoop Thomas
Sep 14 -
44 Con -
Talk -
2016: The Infosec Crossroads -
-
Saumil Shah
Aug 19 -
C0c0n -
Talk -
Threats in Connected World -
-
Bhavin Gandhi
Aug 19 -
C0c0n -
Talk -
The Art of Social Hacking -
Gaurav Trivedi , Rugved Mehta
Aug 19 -
C0c0n -
Talk -
SSD Forensics : A Nightmare for Forensic Investigators -
Santosh Khadsare
Aug 19 -
C0c0n -
Talk -
Kill the password - A new era of authentication -
Tamaghna Basu
Aug 19 -
C0c0n -
Talk -
How (in)secure are Indian GSM networks? -
Ajay Fuloria
Aug 19 -
C0c0n -
Talk -
Evading Corporate Security – You’re as secure as the weakest link -
Prajwal Panchmahalkar
Aug 19 -
C0c0n -
Talk -
Esoteric XSS Payloads -
-
Riyaz Walikar
Aug 19 -
C0c0n -
Talk -
Breaking into Gas stations! -
Suraj Pratap
Aug 19 -
C0c0n -
Talk -
Backdooring my Enemies with a Proxy for Threat Intelligence -
Jovin Lobo , Aditya Vasekar
Aug 19 -
C0c0n -
Talk -
Attacking and crashing IOT devices via Bluetooth LE Protocol -
-
Pratap Chandra Allena , Ajay Pratap Singh
Aug 19 -
C0c0n -
Talk -
App Sec in the Time of Docker Containers -
Akash Mahajan
Aug 19 -
C0c0n -
Talk -
Abusing Digital Certificates : Malware Style -
Ajit Hatti
Aug 07 -
Defcon -
Talk -
Cyber Grand Shellphish -
-
Aravind Machiry , Yan Shoshitaishvili , Antonio Bianchi , Kevin Borgolte , Jacopo Corbetta , Francensco Disperati , Andrew Dutcher , Giovanni Vigna , Chris Salls , Nick Stephens , Fish Wang , John Grosen
Aug 05 -
Defcon -
Talk -
A Monitor Darkly: Reversing and Exploiting Ubiquitous On-Screen-Display Controllers in Modern Monitors -
Jatin Kataria , Ang Cui , Francois Charbonneau
Aug 04 -
Blackhat -
Talk -
Understanding HL7 2.x Standards Pen Testing and Defending HL7 2.x Messages -
-
Anirudh Duggal
Aug 04 -
Blackhat -
Talk -
DPTrace: Dual Purpose Trace for Exploitability Analysis of Program Crashes -
-
Rohit Mothe , Rodrigo Rubira Branco
Aug 03 -
Blackhat -
Talk -
AMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does It -
-
Nikhil Mittal
Jul 01 -
Hackinparis -
Talk -
DIFFDroid - Dynamic Analysis Made Easier for Android -
-
Anto Joseph
Jun 18 -
Recon -
Talk -
A Monitor Darkly: Reversing and Exploiting Ubiquitous On-Screen-Display Controllers in Modern Monitors -
-
Jatin Kataria , Ang Cui , Francois Charbonneau
May 26 -
Hitb Sec Conf -
Talk -
HITB Lab: Mobile Application Security for iOS and Android -
-
Tushar Dalvi , Tony Trummer
May 26 -
Hitb Sec Conf -
Talk -
HITB Lab: Droid-FF: The First Android Fuzzing Framework -
-
Anto Joseph
May 17 -
Phdays -
Talk -
Security Automation Based on Artificial Intelligence -
-
Rahul Sasi
May 17 -
Phdays -
Talk -
Fingerprinting and Attacking a Healthcare Infrastructure -
-
Anirudh Duggal
Mar 15 -
Groundzerosummit -
Talk -
Web App Security -
Harpreet Singh , Himanshu Sharma , Nipun Jaswal
Mar 15 -
Groundzerosummit -
Talk -
r00tKidz and Hacking -
Triveni Singh , Lea Paul
Mar 11 -
Nullcon -
Talk -
Real-time Ingestion of security telemetry data into Hadoop distributed system to respond to 0-day -
-
Pallav Jakhotiya , Vipul Sawant
Mar 11 -
Nullcon -
Talk -
Privacy leaks on 4G-LTE networks -
-
Altaf Shaik
Mar 11 -
Nullcon -
Talk -
Physical Lock Security -
Amey Gat , Swapnil Wadwalkar
Mar 11 -
Nullcon -
Talk -
Million Dollar Baby: Towards ANGRly conquering DARPA CGC -
Aravind Machiry
Mar 11 -
Nullcon -
Talk -
Making Machines think about security for fun and profit -
-
Rahul Sasi
Mar 11 -
Nullcon -
Talk -
Hitchhiker’s guide to hacking Industrial Control systems (ICS) -
Arun Mane
Mar 11 -
Nullcon -
Talk -
Automated Mobile Application Security Assessment with MobSF -
-
Ajin Abraham
Mar 11 -
Nullcon -
Talk -
Attacking and defending healthcare - EMR solutions -
-
Anirudh Duggal 2015
Nov 19 -
Deepsec -
Talk -
Continuous Intrusion: Why CI Tools Are an Attacker’s Best Friends. -
-
Nikhil Mittal
Nov 13 -
Blackhat -
Talk -
Continuous Intrusion: Why CI tools are an Attacker’s Best Friends -
-
Nikhil Mittal
Nov 13 -
Blackhat -
Talk -
AUTOMATING LINUX MALWARE ANALYSIS USING LIMON SANDBOX -
-
Monnappa K A ,
Nov 13 -
Blackhat -
Talk -
LTE & IMSI Catcher Myths -
-
Ravishankar Borgaonkar , N Asokan , Altaf Shaik , Valtteri Niemi , Jean Pierre Seifert
Nov 12 -
Blackhat -
Talk -
Stegosploit - Exploit Delivery with Steganography and Polyglots -
-
Saumil Shah
Nov 05 -
Ground Zero Summit -
Talk -
XSS - The art of evading web application filters! -
Anirudh Anand
Nov 05 -
Ground Zero Summit -
Talk -
Wolves Among Sheep: Defeating Targeted Attacks With Deception -
Sahir Hidayatullah , Raviraj Doshi
Nov 05 -
Ground Zero Summit -
Talk -
Trailing Terror in the Darknets -
Shesh Sarangdhar
Nov 05 -
Ground Zero Summit -
Talk -
Thanks for the free cookies -
Anshul Saxena , Nishant Yadav
Nov 05 -
Ground Zero Summit -
Talk -
Sanctioned to Hack: Your SCADA HMIs Belong to Us! -
Aditya K Sood
Nov 05 -
Ground Zero Summit -
Talk -
OSINT Black Magic: Listen who whispers your name in the dark!!! -
-
Sudhanshu Chauhan , Nutan Kumar Panda
Nov 05 -
Ground Zero Summit -
Talk -
Hacking RFIDs under 2000INR -
Jayesh Chauhan
Nov 05 -
Ground Zero Summit -
Talk -
Elliptical Curve Cryptography -
Aneesha S
Nov 05 -
Ground Zero Summit -
Talk -
Economics of Post Quantum Crypto Systems : Do we really Need it -
Ajit Hatti
Nov 05 -
Ground Zero Summit -
Talk -
Dissecting Android Malware -
Anto Joseph
Nov 05 -
Ground Zero Summit -
Talk -
Credit Card Frauds – The money making Ecosystem for Cyber criminals -
Abhinav Singh
Nov 05 -
Ground Zero Summit -
Talk -
chellam – a Wi-Fi IDS/Firewall for Windows -
Vivek Ramachandran
Nov 05 -
Ground Zero Summit -
Talk -
Browser based Malware attacks -
Harsh Daftary
Nov 05 -
Ground Zero Summit -
Talk -
Authentication flaw in Automatic Bank Passbook printing machine. -
Indrajeet Bhuyan
Nov 05 -
Ground Zero Summit -
Talk -
Western Air Command -
B S Singh Deo
Nov 05 -
Ground Zero Summit -
Talk -
Exposing Cyber Espionage: Hello from Pakistan- IIC Session -
Jiten Jain
Nov 05 -
Ground Zero Summit -
Talk -
Cyber Security in Hospitals:Hospitals Under Seige -
Anirudh Duggal
Oct 30 -
T2 -
Talk -
LTE (in) Security -
Ravishankar Borgaonkar , Altaf Shaik
Oct 25 -
Toor Con -
Talk -
PixelCAPTCHA – A Unicode Based CAPTCHA Scheme -
Gursev Singh Kalra
Oct 21 -
Hacklu -
Talk -
Stegosploit - Delivering Drive-By Exploits With Only Images -
-
Saumil Shah
Oct 08 -
Brucon -
Talk -
The .11 Veil, Camouflage & Covert!!! Invisible Wifi, Revealed -
-
Rushikesh D Nandedkar , Amrita C Iyer
Sep 25 -
App Sec Usa -
Talk -
The State of Web Application Security in SCADA Web Human Machine Interfaces (HMIs)! -
Aditya K Sood
Sep 24 -
App Sec Usa -
Talk -
QARK: Android App Exploit and SCA Tool -
-
Tushar Dalvi , Tony Trummer
Sep 24 -
App Sec Usa -
Talk -
Encouraging Diversity and Advancing Cybersecurity Education -
Shruthi Kamath , Apoorva Giri , Elissa Shevinsky
Sep 24 -
App Sec Usa -
Talk -
Continuous Cloud Security Automation -
-
Rohit Pitke
Sep 11 -
44 Con -
Talk -
Stegosploit – Drive-by Browser Exploits using only Images -
-
Saumil Shah
Aug 09 -
Defcon (Packetcapture Village) -
Talk -
802.11 Monitoring with PCAP2XML/SQLite -
-
Vivek Ramachandran
Aug 08 -
Defcon -
Talk -
QARK: Android App Exploit and SCA Tool -
-
Tushar Dalvi , Tony Trummer
Aug 08 -
Defcon (Packetcapture Village) -
Talk -
Powershell for Penetraton Testers -
-
Nikhil Mittal
Aug 08 -
Defcon -
Talk -
Dissecting the Design of SCADA Web Human Machine Interfaces (HMIs) - Hunting Vulnerabilities -
-
Aditya K Sood
Aug 08 -
Defcon -
Talk -
Chigula — a framework for Wi-Fi Intrusion Detection and Forensics -
-
Vivek Ramachandran
Aug 07 -
Defcon (Packetcapture Village) -
Talk -
Hacker’s Practice Ground -
-
Lokesh Pidawekar
Aug 07 -
Defcon (Crypto&privacy Village) -
Talk -
Getting into the Trust Store We Trust -
Ajit Hatti
Aug 07 -
Defcon -
Talk -
Chellam – a Wi-Fi IDS/Firewall for Windows -
-
Vivek Ramachandran
Aug 06 -
Blackhat -
Talk -
Harnessing Intelligence from Malware Repositories -
-
Arun Lakhotia , Vivek Notani
Aug 01 -
C0c0n -
Talk -
Understanding the known : A deep look at OWASP A9 : Using Components with Known Vulnerabilities -
-
Anant Shrivastava
Aug 01 -
C0c0n -
Talk -
S3curi7y at 36K feet -
Rugved Mehta , Gaurav Trivedi
Aug 01 -
C0c0n -
Talk -
Reversing and Deciphering the Cyber Espionage Malware Communications -
Monnappa K A
Aug 01 -
C0c0n -
Talk -
NoPo - The NoSQL HoneyPot Framework -
-
Francis Alexander
Aug 01 -
C0c0n -
Talk -
Medical device security and critical infrastructure inside hospitals -
Anirudh Duggal
Aug 01 -
C0c0n -
Talk -
Hacking RFIDs under 2000 INR -
Jayesh Chauhan , Divya S John
Aug 01 -
C0c0n -
Talk -
From AOSP ( Android OpenSource Project ) to ABD ( Android Based Devices ) -
Anto Joseph
Aug 01 -
C0c0n -
Talk -
Demystifying and Breaking BLE -
Yashin Mehaboobe
Aug 01 -
C0c0n -
Talk -
Breaking into Infosec Research -
Vivek Ramachandran ,
Aug 01 -
C0c0n -
Talk -
Blockchains in Security -
Harsh Patel
Aug 01 -
C0c0n -
Talk -
Automated Security Analysis of Android & iOS Applications with Mobile Security Framework -
-
Ajin Abraham
Aug 01 -
C0c0n -
Talk -
Attack chaining for web exploitation- From Information leakage to gaining Root access -
Abhijeth Dugginapeddi
Aug 01 -
C0c0n -
Talk -
A Pentester’s Methodology to Discover, Automate and Exploit Windows Privilege Escalation flaws. -
Riyaz Walikar
Jul 06 -
Blackhat -
Talk -
DOM FLOW - UNTANGLING THE DOM FOR MORE EASY-JUICY BUGS -
-
Ahamed Nafeez ,
Jun 16 -
Blackhat -
Talk -
The Savage Curtain: Mobile SSL Failures -
-
Tushar Dalvi , Tony Trummer
May 29 -
Hitb Sec Conf -
Talk -
PowerShell for Penetration Testers -
-
Nikhil Mittal
May 29 -
Hitb Sec Conf -
Talk -
Hacking Samsung’s Tizen: The OS of Everything -
-
Ajin Abraham
May 28 -
Hitb Sec Conf -
Talk -
The Savage Curtain: Mobile SSL Failures -
-
Tushar Dalvi , Tony Trummer
May 28 -
Hitb Sec Conf -
Talk -
Stegosploit: Hacking With Pictures -
-
Saumil Shah
May 26 -
Phdays -
Talk -
iOS Application Exploitation -
-
Prateek Gianchandani , Egor Tolstoy
May 26 -
Phdays -
Talk -
Invisible Backdoors In Your Code -
Debasis Mohanty
Mar 27 -
Syscan -
Talk -
Stegosploit - Hacking with Pictures -
-
Saumil Shah
Mar 27 -
Blackhat -
Talk -
Security Content Metadata Model with an Efficient Search Methodology for Real Time Monitoring and Threat Intelligence -
-
Preeti Subramanian
Mar 26 -
Blackhat -
Talk -
The underground Ecosystem of Credit Card frauds -
-
Abhinav Singh ,
Mar 15 -
Defcon -
Talk -
TECHNICAL TALK-WIHAWK: ROUTER VULNERABILITY SCANNER -
Anamika Singh
Mar 15 -
Defcon -
Talk -
TECHNICAL TALK-THWARTING THE SURVEILLANCE IN ONLINE COMMUNICATION -
-
Adhokshaj Mishra
Mar 15 -
Defcon -
Talk -
TECHNICAL TALK-FUZZING ASYNCHRONOUS PROTOCOLS BUILT OVER WEBSOCKETS -
Lavakumar Kuppan
Mar 15 -
Hitb Sec Conf -
Talk -
Sniffing the Airwaves with RTLSDR -
-
Yashin Mehaboobe
Mar 15 -
Blackhat -
Talk -
2015 State of Vulnerability Exploits -
-
Amol Sarwate
Feb 06 -
Nullcon -
Talk -
Toliman, a Hadoop Pentesting Tool -
-
Jitendra Chauhan
Feb 06 -
Nullcon -
Talk -
Pentesting a website with million lines of Javascript -
-
Lavakumar Kuppan , Ahamed Nafeez
Feb 06 -
Nullcon -
Talk -
Hunting and Decrypting Ghost communications using Memory Forensics -
-
Monnappa K A
Feb 06 -
Nullcon -
Talk -
Hacking Tizen: The OS of Everything -
-
Ajin Abraham
Feb 06 -
Nullcon -
Talk -
Generic Executable Unpacking using Dynamic Binary Instrumentation -
-
Shubham Bansal
Feb 06 -
Nullcon -
Talk -
Drone Attacks: How I hijacked a drone -
-
Rahul Sasi
Feb 06 -
Nullcon -
Talk -
Building security and compliance into the software delivery process -
Anubhav Bathla , Dinesh Pillai , S Chandrasekhar , Harish Pillay
Feb 06 -
Nullcon -
Talk -
Building custom scans for real world enterprise network -
-
Sanoop Thomas
Feb 06 -
Nullcon -
Talk -
Attack and Defence in Radio and Communication Warfare -
-
Akib Sayyed
Feb 06 -
Nullcon -
Talk -
Anatomy of a credit card stealing POS malware -
-
Amol Sarwate
Feb 06 -
Nullcon -
Talk -
Analyzing Chrome crash reports at scale -
-
Abhishek Arya
Jan 27 -
Owasp App Sec California -
Talk -
The Savage Curtain : Mobile SSL Failures -
Tushar Dalvi , Tony Trummer
Jan 27 -
Owasp App Sec California -
Talk -
The Emperor’s New Password Manager: Security Analysis of Web-based Password Managers -
-
Devdatta Akhawe
Jan 27 -
Owasp App Sec California -
Talk -
Anatomy of memory scraping, credit card stealing POS malware -
-
Amol Sarwate 2014
Nov 21 -
Deepsec -
Talk -
Mobile SSL Failures -
-
Tushar Dalvi , Tony Trummer
Nov 13 -
Ground Zero Summit -
Talk -
Vulnerability Reproduction using Zest -
Deep Shah
Nov 13 -
Ground Zero Summit -
Talk -
SCADA Exploitation through Firmware -
Ashish Saxena
Nov 13 -
Ground Zero Summit -
Talk -
National Cyber Policy and its impact on Business -
Vaishali Bhagwat
Nov 13 -
Ground Zero Summit -
Talk -
Mobile security Automation Framework for Intelligent Auditing -
Ankur Bhargava
Nov 13 -
Ground Zero Summit -
Talk -
Making and Breaking Embedded Security -
-
Yashin Mehaboobe
Nov 13 -
Ground Zero Summit -
Talk -
Internet Governance -
Anjana Kovacs
Nov 13 -
Ground Zero Summit -
Talk -
How I won Browser Fuzzing -
Amol Naik
Nov 13 -
Ground Zero Summit -
Talk -
Hacking consumer electronics for Fun -
Atul Alex
Nov 13 -
Ground Zero Summit -
Talk -
Fuzzing Asynchronous Protocols built over Websockets -
Lavakumar Kuppan
Nov 13 -
Ground Zero Summit -
Talk -
Financial Integrity and Cyber Security -
Karnal Singh
Nov 13 -
Ground Zero Summit -
Talk -
Evaluating WAF (Web Application Firewall) for Fun and Profit with WOF -
Bhaumik Merchant
Nov 13 -
Ground Zero Summit -
Talk -
Enterprise Security -
Mano Paul
Nov 13 -
Ground Zero Summit -
Talk -
Detecting Fake Cell Phone Towers -
Vijay Mukhi
Nov 13 -
Ground Zero Summit -
Talk -
Cyber ‘BrahMos’ - Static analysis driven secure coding -
Joy Sen
Nov 13 -
Ground Zero Summit -
Talk -
Attacking Web-Proxies like never before -
Ahamed Nafeez
Nov 13 -
Ground Zero Summit -
Talk -
APT protection for the Enterprise -
Deepak Singla
Nov 13 -
Ground Zero Summit -
Talk -
9 Cell Cyber Diplomacy -
Alok Vijayant
Nov 13 -
Ground Zero Summit -
Talk -
Security vulnerabilities in DVB-C networks: Hacking Cable TV network -
Rahul Sasi
Nov 13 -
Ground Zero Summit -
Talk -
Network Time Protocol in Amplification Inferno -
Sriram Krishnan
Nov 13 -
Ground Zero Summit -
Talk -
Identity theft and its impact on Cyber - Warfare -
Tarun Wig
Nov 13 -
Ground Zero Summit -
Talk -
Attacking Cryptography & PKI Implementations -
Ajit Hatti
Oct 29 -
Ekoparty -
Talk -
Security vulnerabilities in DVB-C networks: Hacking Cable tV network part 2 -
-
Rahul Sasi
Oct 23 -
Hacklu -
Talk -
WiHawk - Router Vulnerability Scanner -
-
Anamika Singh
Oct 23 -
Hacklu -
Talk -
Hacking with Images - Evil Pictures -
-
Saumil Shah
Oct 23 -
T2 -
Talk -
Darshak: how to turn your phone into a low cost IMSI catcher device -
Ravishankar Borgaonkar , Swapnil Udar
Oct 17 -
Blackhat -
Talk -
Android Kernel and OS Security Assessment with Iron Crow -
-
Akhil Arora , Sumanth Naropanth ,
Oct 16 -
Grrcon -
Talk -
Socioware: Dissecting Online Social Network Worms – Insidious Analysis and Design -
Aditya K Sood , Dr. Richard J Enbody
Sep 28 -
Blackhat -
Talk -
Understanding IMSI Privacy -
-
Swapnil Udar , Ravishankar Borgaonkar ,
Sep 26 -
Virus Bulletin -
Talk -
Evolution of Android exploits from a static analysis tools perspective -
-
Jagadeesh Chandraiah , Anna Szalay
Sep 25 -
Virus Bulletin -
Talk -
Optimized mal-ops. Hack the ad network like a boss -
-
Rahul Kashyap , Vadim Kotov
Sep 24 -
Brucon -
Talk -
OWASP: OWTF -
-
Bharadwaj Machiraju
Sep 18 -
App Sec Usa -
Talk -
Anatomy of memory scraping, credit card stealing POS malware -
-
Amol Sarwate
Sep 16 -
Deepsec -
Talk -
Advanced Powershell Threat – Lethal Client Side Attacks -
-
Nikhil Mittal
Sep 12 -
44con -
Talk -
Pentesting NoSQL DB’s Using NoSQL Exploitation Framework -
-
Francis Alexander
Sep 11 -
44 Con -
Talk -
Darshak: how to turn your phone into a low cost IMSI catcher device -
-
Ravishankar Borgaonkar , Swapnil Udar
Aug 22 -
C0c0n -
Talk -
The Curious Case of ProtoBufs - Demystifying Google’s hottest binary protocol -
-
Prasanna Kanagasabai , Jovin Lobo
Aug 22 -
C0c0n -
Talk -
Still Single with a bleeding heart (Tool Release) -
Tamaghna Basu
Aug 22 -
C0c0n -
Talk -
Piracy Tracker -
Vargheese Babu
Aug 22 -
C0c0n -
Talk -
My tryst with Source Code Review -
-
Anant Shrivastava
Aug 22 -
C0c0n -
Talk -
Making and breaking security in embedded devices -
-
Yashin Mehaboobe
Aug 22 -
C0c0n -
Talk -
Lesser Known Attack - XML Injection -
Amol Naik
Aug 22 -
C0c0n -
Talk -
Idle Machines doing Bounty Hunting (Behind your Back) -
Mrityunjay Gautam
Aug 22 -
C0c0n -
Talk -
Hacking Communication -
Akib Sayyed
Aug 22 -
C0c0n -
Talk -
Exploiting NoSQL Like Never Before -
Francis Alexander
Aug 22 -
C0c0n -
Talk -
Cryptographic Backdoors: Subverting the RSA -
Adhokshaj Mishra
Aug 22 -
C0c0n -
Talk -
Cryptocalypse, Heart Bleed : Is our Government Listening? -
Ajit Hatti
Aug 22 -
C0c0n -
Talk -
Breaking and Securing Mobile Apps - Automagically -
Aditya Gupta
Aug 22 -
C0c0n -
Talk -
APT: Case Study of attackers targeting public tendering -
Rahul Sasi
Aug 21 -
Usenix -
Talk -
The Emperor’s New Password Manager: Security Analysis of Web-based Password Managers -
-
Devdatta Akhawe , Zhiwei Li , Warren He , Dawn Song
Aug 07 -
Blackhat -
Talk -
Lifecycle of a phone fraudster: Exposing fraud activity from reconnaissance to takeover using graph analysis and acoustical anomalies -
-
Vijay Balasubramaniyan , Raj Bandyopadhyay , Telvis Calhoun
Aug 06 -
Blackhat -
Talk -
What goes around comes back around - Exploiting fundamental weaknees in Botnet C&C Panels! -
-
Aditya K Sood
Jun 23 -
Hackinparis -
Talk -
Pentesting NoSQL DB’s with NoSQL Exploitation Framework -
-
Francis Alexander
May 29 -
Hitb Sec Conf -
Talk -
LOL (Layers On Layers) – Bypassing Endpoint Security for Fun and Profit -
-
Rahul Kashyap , Rafal Wojtzcuk
May 29 -
Hitb Sec Conf -
Talk -
Hacking Your Cable TV Network: Die Hard Style -
-
Rahul Sasi
May 29 -
Hitb Sec Conf -
Talk -
Exploiting NoSQL Like Never Before -
-
Francis Alexander
May 21 -
Phdays -
Talk -
ARM Exploitation -
-
Aseem Jakhar
May 21 -
Phdays -
Talk -
Android Exploitation -
-
Aditya Gupta
Mar 27 -
Blackhat -
Talk -
JS Suicide: Using JavaScript Security Features to Kill JS Security -
-
Ahamed Nafeez ,
Mar 18 -
Troopers -
Talk -
Evolution of SIM Card Security -
-
Ravishankar Borgaonkar
Mar 15 -
Hitb Sec Conf -
Talk -
JS Suicide: Using Javascript Security Features to Kill Itself -
-
Ahamed Nafeez
Mar 15 -
Blackhat -
Talk -
Anatomy of a Credit Card Stealing POS Malware -
-
Amol Sarwate
Mar 08 -
Defcon -
Talk -
WI-Hawk -
-
Anamika Singh
Feb 14 -
Nullcon -
Talk -
Wi-Hawk Password Auditing Tool -
-
Anamika Singh
Feb 14 -
Nullcon -
Talk -
User Privacy in Cellular Networks -
Ravishankar Borgaonkar
Feb 14 -
Nullcon -
Talk -
The Security Challenge -
-
Shantanu Ghosh
Feb 14 -
Nullcon -
Talk -
Strategic Information Warfare: When Ends define the means -
Amit Sharma
Feb 14 -
Nullcon -
Talk -
phoneypdf: A Virtual PDF Analysis Framework -
-
Kiran Bandla
Feb 14 -
Nullcon -
Talk -
Pentesting without Pentesters - Automating Security Testing with Functional Testing Test Cases -
-
Ankita Gupta , Lavakumar Kuppan
Feb 14 -
Nullcon -
Talk -
o’Dea Assertions - Untwining the Security of the SAML Protocol -
-
Achin Kulshrestha
Feb 14 -
Nullcon -
Talk -
Null Hardware Badge 101 (Desi Jugaad) -
-
Amey Gat , Umesh
Feb 14 -
Nullcon -
Talk -
Multi-value W-Fi What the Heck is it -
-
Abhijeet Ghosh
Feb 14 -
Nullcon -
Talk -
In air they wander, we exist to blow their cover!!! {Approaches to Evil Twin Detection from a normal user’s perspective} -
-
Rushikesh D Nandedkar , Amrita C Iyer
Feb 14 -
Nullcon -
Talk -
Hardware Attack Vectors -
-
Yashin Mehaboobe
Feb 14 -
Nullcon -
Talk -
Hacking YOu’r Cable TV Network. -
-
Rahul Sasi , Ahamed Nafeez
Feb 14 -
Nullcon -
Talk -
Flowinspect - A Network Inspection Tool -
-
Ankur Tyagi
Feb 14 -
Nullcon -
Talk -
Chrome - OS Security 2014: New and future hotness -
-
Sumit Gwalani
Feb 14 -
Nullcon -
Talk -
Attacking WPA/WPA2 in the Cloud -
-
Vivek Ramachandran
Feb 14 -
Nullcon -
Talk -
Attack of the setuid bit - pt_chown and pwning root terminals -
-
Siddhesh Poyarekar
Feb 14 -
Nullcon -
Talk -
A security analysis of Browser Extensions -
-
Abhay Rana
Feb 14 -
Nullcon -
Talk -
2014 The year in which we cannot ignore SCADA -
-
Amol Sarwate
Feb 14 -
Nullcon -
Talk -
12 YEARS AND A BAKER’S DOZEN -
-
Saumil Shah
Jan 28 -
Owasp App Sec California -
Talk -
Application Sandboxes: Know thy limits -
-
Rahul Kashyap 2013
Nov 21 -
Appsec Usa -
Talk -
Wassup MOM? Owning the Message Oriented Middleware -
-
Gursev Singh Kalra
Nov 21 -
Deepsec -
Talk -
Europe In The Carna Botnet: Telnet’s Threat To The Largest Economy -
-
Parth Shukla
Nov 21 -
Deepsec -
Talk -
Automation In Android & iOS Application Security Review -
Hemil Shah
Nov 20 -
App Sec Usa -
Talk -
Why is SCADA Security an Uphill Battle? -
-
Amol Sarwate
Nov 20 -
App Sec Usa -
Talk -
Project Talk: OWASP OpenSAMM Project -
Pravir Chandra , Seba Deleersnyder
Nov 07 -
Ground Zero Summit -
Talk -
Understanding the anatomy of advanced targeted attacks – The Trend Micro approach -
Tarun Gupta
Nov 07 -
Ground Zero Summit -
Talk -
Towards a next generation secure Internet -
Sanjay Deshpande
Nov 07 -
Ground Zero Summit -
Talk -
The seven sins of Wi-Fi security -
Vivek Ramachandran
Nov 07 -
Ground Zero Summit -
Talk -
Setting the Data Center on fire -
Ajit Hatti
Nov 07 -
Ground Zero Summit -
Talk -
Serial killing of embedded systems -
Atul Alex
Nov 07 -
Ground Zero Summit -
Talk -
Securing government Critical Information Infrastructure -
Kapil Awasthi
Nov 07 -
Ground Zero Summit -
Talk -
Malware for Firefox Mobile OS -
Shantanu Gawde
Nov 07 -
Ground Zero Summit -
Talk -
IronWASP -
-
Lavakumar Kuppan
Nov 07 -
Ground Zero Summit -
Talk -
Internet – Transforming terrorism -
Sameer Saxena
Nov 07 -
Ground Zero Summit -
Talk -
How I built a pentest lab in under 70 USD -
Swaroop Yermalkar
Nov 07 -
Ground Zero Summit -
Talk -
Evolution of network security around Software Defined Networking (SDN) – The intelligent network -
Diwakar Dayal
Nov 07 -
Ground Zero Summit -
Talk -
Cloud Security: Enabling continuous, scalable security for today’s hyper connected world -
Sumedh Thakar
Nov 07 -
Ground Zero Summit -
Talk -
Central Monitoring System and IT Act 2000 – Balance between rights of citizens and state -
Vaishali Bhagwat
Nov 07 -
Ground Zero Summit -
Talk -
Approach to containing the outbreak of malicious information in online social networks -
Sriniketh Vijayaraghavan
Nov 07 -
Ground Zero Summit -
Talk -
Advanced security for advanced threats -
Kartik Shahani
Nov 07 -
Ground Zero Summit -
Talk -
Abusing Google Apps: Google is my command and control center -
-
Ajin Abraham
Oct 19 -
Toor Con -
Talk -
Static Malware Analysis with PyTriage -
Yashin Mehaboobe
Oct 17 -
Hitb Sec Conf -
Talk -
Static Analysis and Dynamic Instrumentation for Intelligent Exploit Analysis -
-
Rahul Sasi
Sep 27 -
C0c0n -
Talk -
The Secure Software Development Life Cycle -
Harshal Jamdade
Sep 27 -
C0c0n -
Talk -
The Art and Science of Anamoly based Vulnerability Detection -
Lavakumar Kuppan
Sep 27 -
C0c0n -
Talk -
Static analysis of malware with PyTriage -
-
Yashin Mehaboobe
Sep 27 -
C0c0n -
Talk -
SSRF / XSPA - Real World Attacks and Mitigations -
Riyaz Walikar
Sep 27 -
C0c0n -
Talk -
Snake Bites -
-
Anant Shrivastava
Sep 27 -
C0c0n -
Talk -
Sandy - The Malicious Analysis -
-
Rahul Sasi
Sep 27 -
C0c0n -
Talk -
Risk and challenges in virtual currencies. -
Harsh Patel , Swatantra Kumar Gupta
Sep 27 -
C0c0n -
Talk -
Pwning WiFi Devices! -
Swaroop Yermalkar
Sep 27 -
C0c0n -
Talk -
Lets Play - Applanting on new Grounds -
Ajit Hatti
Sep 27 -
C0c0n -
Talk -
Infiltrating the Intranet with Skanda -
-
Jayesh Chauhan
Sep 27 -
C0c0n -
Talk -
Hello CISO! How to make end-users LIKE and FOLLOW “Brand Infosec”? -
Anup Narayanan
Sep 27 -
C0c0n -
Talk -
From Bedroom to Boardroom - Taking your Weekend Infosec Project Global -
Vivek Ramachandran
Sep 27 -
C0c0n -
Talk -
Disclosing Vulnerabilities: The Bug Bounty Style -
Nikhil P Kulkarni
Sep 27 -
C0c0n -
Talk -
Blur Captcha -
Anirudh Duggal , Abhinav Mohanty
Sep 27 -
C0c0n -
Talk -
ARM, Thumb and the Finger -
Aseem Jakhar
Sep 13 -
Rootcon -
Talk -
My Experiments with truth: a different route to bug hunting -
Devesh Bhatt
Sep 13 -
Grrcon -
Talk -
Matriux Leandros - An Open Source Penetration Testing and Forensic Distribution -
Prajwal Panchmahalkar
Sep 12 -
Grrcon -
Talk -
The Droid Exploitation Saga – All Over Again! -
Aditya Gupta , Subho Halder ,
Aug 16 -
Usenix -
Talk -
Building Securable Infrastructure: Open-Source Private Clouds -
Pravir Chandra
Aug 15 -
Usenix -
Talk -
An Empirical Study of Vulnerability Rewards Programs -
-
Devdatta Akhawe , David Wagner , Matthew Finifter
Aug 15 -
Usenix -
Talk -
Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness -
-
Devdatta Akhawe , Adrienne Felt
Aug 03 -
Defcon -
Talk -
PowerPreter: Post Exploitation Like a Boss -
-
Nikhil Mittal
Aug 02 -
Defcon -
Talk -
Interactive Web Security Testing with IronWASP -
Lavakumar Kuppan
Aug 01 -
Blackhat -
Talk -
Hot knives through butter: Bypassing automated analysis systems -
-
Abhishek Singh , Zheng Bu
Jul 31 -
Blackhat -
Talk -
LTE booms with vulnerabilities -
-
Ankit Gupta ,
Jul 31 -
Blackhat -
Talk -
Javascript static security analysis made easy with JSPrime -
-
Nishant Das Patnaik , Sarathi Sabyasachi Sahoo ,
Jul 31 -
Blackhat -
Talk -
Clickjacking revisited: A perceptual view of UI security -
-
Devdatta Akhawe ,
Apr 21 -
Defcon -
Talk -
LTE boom in vulnerabilities -
Ankit Gupta
Mar 15 -
Blackhat -
Talk -
Vulnerability analysis of 2013 SCADA issues -
-
Amol Sarwate
Mar 15 -
Blackhat -
Talk -
The Sandbox Roulette- Are you ready for the gamble? -
-
Rahul Kashyap , Rafal Wojtczuk
Mar 14 -
Blackhat -
Talk -
Lets play - Applanting -
-
Ajit Hatti ,
Mar 12 -
Troopers -
Talk -
Dirty use of USSD Codes in Cellular Network -
-
Ravishankar Borgaonkar
Mar 07 -
Can Sec West -
Talk -
SMS to Meterpreter - Fuzzing USB Modems -
-
Rahul Sasi
Mar 01 -
Nullcon -
Talk -
Vulnerability research anyone? -
Omair
Mar 01 -
Nullcon -
Talk -
SMS to Meterpreter - Fuzzing USB Modems -
-
Rahul Sasi
Mar 01 -
Nullcon -
Talk -
Sensitive Campus Security with Network -
-
Aravind Sitaraman
Mar 01 -
Nullcon -
Talk -
Rest - A Real Stealth and Semi Stealth MITM Attack Tool for IPv4 Networks -
-
Naga Rohit Samineni
Mar 01 -
Nullcon -
Talk -
Pawing the Droid: Twisting the ARM -
Divyanshu Shekhar , Anshul Kumar
Mar 01 -
Nullcon -
Talk -
Mobile Code mining for discovery and exploits -
-
Hemil Shah
Mar 01 -
Nullcon -
Talk -
Inception of graphical passwords -
-
Rishi Narang
Mar 01 -
Nullcon -
Talk -
Detecting and Exploiting XSS Vulnerabilities and Xenotix XSS Exploitation Framework -
-
Ajin Abraham
Mar 01 -
Nullcon -
Talk -
CSRF Finder as a Mozilla Addon -
-
Piyush Pattanayak
Mar 01 -
Nullcon -
Talk -
Capturing Zero-Day Information -
-
Dinesh O Bareja , Sumit Sharma
Mar 01 -
Nullcon -
Talk -
BYOD: How will it shape your wireless network security in future? -
-
Kiran Deshpande
Mar 01 -
Nullcon -
Talk -
Bug Bounty Hunter’s confession -
-
Amol Naik
Mar 01 -
Nullcon -
Talk -
Automating JavaScript Static Analysis -
Lavakumar Kuppan 2012
Dec 06 -
Blackhat -
Talk -
The art of exploiting logical flaws in web apps -
-
Sumit Siddharth , Richard Dean
Dec 06 -
Blackhat -
Talk -
Poking servers with Facebook(and other web applications) -
-
Riyaz Walikar ,
Dec 06 -
Blackhat -
Talk -
HTML5 top 10 threats – Stealth Attack and Silent Exploits -
-
Shreeraj Shah
Dec 06 -
Blackhat -
Talk -
Attacking ODATA -
-
Gursev Singh Kalra ,
Dec 05 -
Blackhat -
Talk -
Droid Exploitation Saga -
-
Aditya Gupta , Subho Halder ,
Dec 01 -
Clubhack -
Talk -
XSSshell -
-
Vandan Joshi
Dec 01 -
Clubhack -
Talk -
The difference between the “Reality” and “Feeling” of Security: Information Security and the Human Being -
-
Thomas Kurian Ambattu
Dec 01 -
Clubhack -
Talk -
Stand Close to Me, & You’re pwned! : Owning SmartPhones using NFC -
-
Aditya Gupta , Subho Halder
Dec 01 -
Clubhack -
Talk -
Smart Grid Security -
-
Falgun Rathod
Dec 01 -
Clubhack -
Talk -
Legal Nuances to the Cloud -
-
Ritambhara Agrawal
Dec 01 -
Clubhack -
Talk -
Infrastructure Security -
-
Sivamurthy Hiremath
Dec 01 -
Clubhack -
Talk -
HAWAS – Hybrid Analyzer for Web Application Security -
-
Lavakumar Kuppan
Dec 01 -
Clubhack -
Talk -
Hacking and Securing iOS applications -
-
Satish Bommisetty
Dec 01 -
Clubhack -
Talk -
FatCat Web Based SQL Injector -
-
Sandeep Kamble
Dec 01 -
Clubhack -
Talk -
Anatomy of a Responsible Disclosure – Zero Day Vulnerability in Oracle BI Publisher -
-
Vishal Kalro
Dec 01 -
Clubhack -
Talk -
Real Time Event Recording System, the tool for Digital Forensics Investigation -
-
Madhav Limaye
Dec 01 -
Clubhack -
Talk -
Detecting and Exploiting XSS with Xenotix XSS Exploit Framework -
-
Ajin Abraham
Dec 01 -
Clubhack -
Talk -
Content-Type attack -Dark hole in the secure environment -
-
Raman Gupta
Nov 29 -
Deepsec -
Talk -
Bad Things in Good Packages - Creative Exploit Delivery -
-
Saumil Shah
Nov 23 -
Malcon -
Talk -
Windows Phone 8 Malware Prototype -
Shantanu Gawde
Nov 23 -
Malcon -
Talk -
Tampering in Energy Meters -
-
Mohit Arora
Nov 23 -
Malcon -
Talk -
Surprise paper! -
Atul Alex
Nov 23 -
Malcon -
Talk -
Advances in ROP attacks -
-
Raashid Bhat
Nov 23 -
Malcon -
Talk -
Advanced Malware Engine -
-
Mohit Kumar
Oct 26 -
App Sec Usa -
Talk -
XSS & CSRF with HTML5 - Attack, Exploit and Defense -
Shreeraj Shah
Oct 26 -
App Sec Usa -
Talk -
The 7 Qualities of Highly Secure Software -
-
Mano Paul
Oct 25 -
App Sec Usa -
Talk -
Cross Site Port Scanning -
-
Riyaz Walikar
Oct 25 -
App Sec Usa -
Talk -
Cracking the Code of Mobile Application -
-
Sreenarayan Ashokkumar
Oct 23 -
Hacklu -
Talk -
Buster: Android Security Buster -
Atul Alex ,
Oct 11 -
Hitb Sec Conf -
Talk -
XSS & CSRF strike back – Powered by HTML5 -
-
Shreeraj Shah
Oct 10 -
Hitb Sec Conf -
Talk -
Innovative Approaches to Exploit Delivery -
-
Saumil Shah
Sep 29 -
Nullcon -
Talk -
Next-gen Forensics -
K K Mookhey
Sep 28 -
Nullcon -
Talk -
Attacking Angry Droids -
Aditya Gupta , Subho Halder
Sep 28 -
Nullcon -
Talk -
Alert(/xss/) - How to catch an XSS before someone exploits / reports it? -
Ahamed Nafeez
Sep 27 -
Grrcon -
Talk -
The Realm of Third Generation Botnet Attacks -
-
Aditya K Sood , Dr. Richard J Enbody
Sep 27 -
Grrcon -
Talk -
Reversing Patches for Exploit Creation, Pen-Testing or Just Fun! -
Bharat Jogi ,
Sep 27 -
Grrcon -
Talk -
Isn’t it all just SMS-sending trojans?: Real advances in Android Malware -
-
Jimmy Shah
Sep 26 -
Nullcon -
Talk -
The art of Passive Web Vul Analysis with IronWASP -
-
Lavakumar Kuppan
Sep 26 -
Nullcon -
Talk -
Opening the kimono: Automating behavioral analysis for mobile apps -
-
Pradeep Kulkarni , Michael Sutton
Sep 26 -
Nullcon (Delhi) -
Talk -
Nullcon_delhi_2012 -
-
Prasanna Kanagasabai ,
Sep 26 -
Nullcon -
Talk -
How secure is internet banking in India -
-
Ajit Hatti ,
Sep 26 -
Nullcon -
Talk -
Highly Harmful Audio Waves aka DTMF Fuzzing -
-
Rahul Sasi
Sep 26 -
Nullcon -
Talk -
Forensics Timeline Analysis -
-
Aashish Kunte ,
Sep 20 -
Ekoparty -
Talk -
Fuzzing DTMF Input Processing Algorithms -
-
Rahul Sasi
Sep 20 -
Ekoparty -
Talk -
Dirty use of USSD Codes in Cellular Network -
-
Ravishankar Borgaonkar
Sep 05 -
44 Con -
Talk -
Why Integrity is left alone and not given TLC (Tender, Love and Care) it deserves? -
-
Jitender Arora
Aug 29 -
Owasp App Sec India -
Talk -
Find me if you can Smart fuzzing and discovery! -
-
Shreeraj Shah
Aug 04 -
C0c0n -
Talk -
Impact of cyber laws on various stakeholders -
Sagar Rahurkar
Aug 03 -
C0c0n -
Talk -
WebApp Remote Code Execution using Server Side Scripting Engines -
-
Rahul Sasi
Aug 03 -
C0c0n -
Talk -
The Weakest Link - Reinforcing the Human Element -
Sandeep Godbole
Aug 03 -
C0c0n -
Talk -
The Management of Information Security – A Corporate Practitioner’s Perspective -
Pawan Kumar Singh
Aug 03 -
C0c0n -
Talk -
Security Incidents – Avoiding the Apocalypse in 2012 -
Ashish Chandra Mishra
Aug 03 -
C0c0n -
Talk -
Layer 8 Exploitation: A threat to National Security -
Aakash Goel
Aug 03 -
C0c0n -
Talk -
I haz you and pwn your maal -
-
Harsimran Singh Walia
Aug 03 -
C0c0n -
Talk -
Gathering security requirements -
K v Prashant , Saleem Ahamed
Aug 03 -
C0c0n -
Talk -
Evil JavaScript -
Bishan Singh
Aug 03 -
C0c0n -
Talk -
Enterprise server security -
Raghav Shandilya
Aug 03 -
C0c0n -
Talk -
Easy Money with UI-Redressing -
Amol Naik
Aug 03 -
C0c0n -
Talk -
Data Security -
Alok Vijayant , S Bhansali
Aug 03 -
C0c0n -
Talk -
Cyber Weapons -
Sameer Saxena
Aug 03 -
C0c0n -
Talk -
Cracking the Mobile Application Source Code -
-
Sreenarayan Ashokkumar
Aug 03 -
C0c0n -
Talk -
Contemporary Transcription and Resource Parasitism -
Arpit Patel
Aug 03 -
C0c0n -
Talk -
Business Continuity and Risk Management in Turbulent Times -
Venkataram Arabolu
Aug 03 -
C0c0n -
Talk -
Building Security Incident Detection & Handling Capabilities in Enterprises -
Sunil Varkey
Aug 03 -
C0c0n -
Talk -
A model to reduce information security risks due to human error -
-
Anup Narayanan
Jul 28 -
Defcon -
Talk -
Botnets Die Hard - Owned and Operated -
-
Aditya K Sood , Richard J Enbody
Jul 26 -
Blackhat -
Talk -
HTML5 top 10 threats – Stealth Attack and Silent Exploits -
-
Shreeraj Shah
Jul 14 -
Hope -
Talk -
Advancements in Botnet Attacks and Malware Distribution -
-
Aditya K Sood
May 24 -
Hitb Sec Conf -
Talk -
CXML/VXML Auditing for IVR Pentesters and PCI/DSS Consultants -
-
Rahul Sasi
May 13 -
Carolina Con -
Talk -
Attacking CAPTCHAs for Fun and Profit -
Gursev Singh Kalra
Mar 21 -
Troopers -
Talk -
More Fun Using Kautilya or Is It a Thumb Drive? Is It a Toy? No, It’s a Keyboard -
-
Nikhil Mittal
Mar 16 -
Blackhat -
Talk -
The Pwnage Saga Continues -
-
Nikhil Mittal
Mar 16 -
Blackhat -
Talk -
IVR Security- Internal Network Attack via Phone Lines -
-
Rahul Sasi
Mar 15 -
Owasp App Sec India -
Talk -
The Magic of Passive Web Vulnerability Analysis -
Lavakumar Kuppan
Mar 15 -
Grr Con -
Talk -
SCADA Security: Why is it so hard? -
-
Amol Sarwate
Mar 15 -
Hackinparis -
Talk -
SCADA Security: Why Is It So Hard ? -
-
Amol Sarwate
Mar 15 -
C0c0n -
Talk -
Integrated Dial 100 System for Law Enforcement -
Nandkumar Saravade , R Srikumar
Mar 15 -
Nullcon -
Talk -
An App(le) a day keeps the wallet away -
Antriksh Shah
Mar 14 -
Blackhat -
Talk -
HTML5 top 10 threats – Stealth Attack and Silent Exploits -
-
Shreeraj Shah
Mar 14 -
Blackhat -
Talk -
Hacking XPATH 2.0 -
-
Sumit Siddharth , Tom Forbes
Feb 15 -
Nullcon -
Talk -
Your phone is your phone but your calls are now my calls -
Akib Sayyed , Bipul Sahu , Dipesh Goyal , Nitin Agarwal
Feb 15 -
Nullcon -
Talk -
Teensy for fun and jugaad -
Amey Gat
Feb 15 -
Nullcon -
Talk -
Shall we dust Beep ? The Geo-strategic realities of Cyberwar -
-
Pukhraj Singh
Feb 15 -
Nullcon -
Talk -
SCADA Security: Why is it so hard -
Amol Sarwate
Feb 15 -
Nullcon -
Talk -
Sandboxing The deep truth -
-
Disha Agarwal , Manish Pali
Feb 15 -
Nullcon -
Talk -
Ra.2 Blackbox DOM-based XSS scanner -
-
Nishant Das Patnaik , Sarathi Sabyasachi Sahoo
Feb 15 -
Nullcon -
Talk -
Open source revolution :Need Hardware - Software marriage -
Venkatesh
Feb 15 -
Nullcon -
Talk -
Node.js: The good, bad and ugly -
-
Bishan Singh
Feb 15 -
Nullcon -
Talk -
Javascript static analysis with IronWASP -
-
Lavakumar Kuppan
Feb 15 -
Nullcon -
Talk -
IVR Security: Internal Network attacks via phone lines -
-
Rahul Sasi
Feb 15 -
Nullcon -
Talk -
Haxdroid: Empowering Android Handset -
-
Anant Shrivastava , Prashant Mahajan , Pardhasaradhi Ch
Feb 15 -
Nullcon -
Talk -
Friction in the machine -
Dinesh Shenoy
Feb 15 -
Nullcon -
Talk -
Cyberspace: Global commons or a national asset -
Kamlesh Bajaj
Feb 15 -
Nullcon -
Talk -
Content sniffing Algorithm bypassing techniques and possible attack vectors -
-
Anil Aphale , Chaitany Kamble
Feb 15 -
Nullcon -
Talk -
CAPTCHAs for fun and Profit -
-
Gursev Singh Kalra
Feb 15 -
Nullcon -
Talk -
Binary God -
-
Atul Alex
Feb 15 -
Nullcon -
Talk -
Best practices to improve the security grading of your project -
-
Hemant Khandelwal
Feb 15 -
Nullcon -
Talk -
Attacking Backup Software -
-
Nibin Varghese
Feb 15 -
Nullcon -
Talk -
Application security cost management -
-
Ketan Vyas 2011
Dec 15 -
Blackhat -
Talk -
Kautilya: Teensy Beyond Shell -
-
Nikhil Mittal
Dec 14 -
Blackhat -
Talk -
SCADA Security - Why Is It So Hard? -
-
Amol Sarwate
Dec 04 -
Clubhack -
Talk -
Wi-Fi malware for Fun and Profit -
Vivek Ramachandran
Dec 04 -
Clubhack -
Talk -
One Link Facebook -
-
Anand Pandey
Dec 04 -
Clubhack -
Talk -
Mere paas Teensy hai -
-
Nikhil Mittal
Dec 04 -
Clubhack -
Talk -
Handle Exploitation of Remote System From Email Account -
-
Bhaumik Merchant
Dec 04 -
Clubhack -
Talk -
Hacking your Droid -
-
Aditya Gupta
Dec 04 -
Clubhack -
Talk -
Exploit the Exploit Kits -
-
Dhruv Soi
Dec 04 -
Clubhack -
Talk -
DOM XSS – Encounters of the 3rd Kind -
-
Bishan Singh
Dec 04 -
Clubhack -
Talk -
Android Tamer -
-
Anant Shrivastava
Dec 04 -
Clubhack -
Talk -
Android Forensics -
-
Manish Chasta
Dec 04 -
Clubhack -
Talk -
Pen testing Mobile Applications -
-
Prashant Verma
Nov 25 -
Malcon -
Talk -
Mareech : Look it’s a HID made up of gold -
Nikhil Mittal
Nov 25 -
Malcon -
Talk -
Exploit the Exploit kits -
Dhruv Soi
Nov 25 -
Malcon -
Talk -
Advanced Malware for Apple Products -
Atul Alex
Nov 17 -
Deepsec -
Talk -
FakeAntiVirus - Journey from Trojan to a Persisent Threat -
Jagadeesh Chandraiah
Nov 17 -
Deepsec -
Talk -
Behavioral Security: 10 steps forward 5 steps backward -
-
Sourabh Satish
Nov 04 -
Hackfest -
Talk -
Here are your keystrokes -
Nikhil Mittal
Oct 13 -
Hitb Sec Conf -
Talk -
Web Wars 3 -
Saumil Shah
Oct 13 -
Hitb Sec Conf -
Talk -
Femtocells: A Poisonous Needle in the Operator’s Hay Stack -
-
Ravishankar Borgaonkar , Kevin Redon , Nico Golde
Oct 08 -
C0c0n -
Talk -
Stratagemizing Security Against Perpetrators In Cloud Infrastructure -
K S Abhiraj
Oct 07 -
C0c0n -
Talk -
Wi-Fi Malware for Fun and Profit -
Vivek Ramachandran
Oct 07 -
C0c0n -
Talk -
Web Application Backdoor Attack,Evasion and Detection -
-
Rahul Sasi
Oct 07 -
C0c0n -
Talk -
Security Threats in Custom ROM’s (Android) -
-
Anant Shrivastava
Oct 07 -
C0c0n -
Talk -
Security and Privacy Risks of Cloud Computing -
Vishnu Tiwari
Oct 07 -
C0c0n -
Talk -
Secure HTTP Headers or How I can finally convince management to let go of IE6 -
-
Akash Mahajan
Oct 07 -
C0c0n -
Talk -
Section 43A IT Act compliance -
Sagar Rahurkar
Oct 07 -
C0c0n -
Talk -
Runtime thread injection and execution in Linux processes -
Aseem Jakhar
Oct 07 -
C0c0n -
Talk -
Pentesting iPhone Applications -
-
Satish Bommisetty
Oct 07 -
C0c0n -
Talk -
Password Less Authentication, Authorization -
-
Srikar Sagi
Oct 07 -
C0c0n -
Talk -
Paranoid Android -
Ankur Bhargava , Mrigesh
Oct 07 -
C0c0n -
Talk -
Network Security- Modern Mechanism for Intrusion Detection and avoidance in a P2P Network -
Bala Kumar S , Mohamed Emraanullah
Oct 07 -
C0c0n -
Talk -
Mobile Security -
-
Santosh Satam
Oct 07 -
C0c0n -
Talk -
iPhone Jailbreak -
Antriksh Shah
Oct 07 -
C0c0n -
Talk -
Exploiting the TCP Simultaneous Connection to Provide a Low Cost DoS Mitigation Solution -
-
Ahamed Nafeez
Oct 07 -
C0c0n -
Talk -
Digital Evidence -
Sushanth Samudrala
Oct 07 -
C0c0n -
Talk -
Deep(er) Penetration: Reaching the Internal Network using Exposed Web Applications -
Riyaz Walikar
Oct 07 -
Virus Bulletin -
Talk -
Browser exploit packs - exploitation paradigm -
-
Aditya K Sood , Richard J Enbody
Oct 07 -
C0c0n -
Talk -
Automated Malware Analysis - Setting up the Environment -
-
K v Prashant , Pushkar Pashupat
Sep 19 -
Brucon -
Talk -
Wifi malware for fun and profit -
-
Vivek Ramachandran
Sep 19 -
Hacklu -
Talk -
The travelling hacksmith -
Saumil Shah
Sep 19 -
Brucon -
Talk -
Step-by-Step for Software Security (that anyone can follow) -
Pravir Chandra
Sep 19 -
Hacklu -
Talk -
Linux thread injection - The jugaad way -
-
Aseem Jakhar
Sep 19 -
Brucon -
Talk -
Botnets and Browsers, Brothers in a Ghost Shell -
-
Aditya K Sood
Sep 16 -
Grrcon -
Talk -
Mobile App Moolah: Profit taking with Mobile Malware -
-
Jimmy Shah
Sep 07 -
Securitybyte -
Talk -
Web Application Defender -
-
K v Prashant , Mohammed Imran ,
Sep 07 -
Securitybyte -
Talk -
Social Web & Privacy – An evolving world -
Bala Sathiamurthy , Aridaman Tripathi ,
Sep 07 -
Securitybyte -
Talk -
Mobile Devices – Boon or Curse? -
-
Kishor Sonawane , Oliver Ng
Sep 07 -
Securitybyte -
Talk -
IronWASP - A Web Application Security Testing Platform -
-
Lavakumar Kuppan ,
Sep 07 -
Securitybyte -
Talk -
Enterprise Wi-Fi Worms, Backdoors and Botnets for Fun and Profit -
-
Vivek Ramachandran ,
Sep 07 -
Securitybyte -
Talk -
Data Protection -
Dipankar Roy ,
Sep 06 -
Securitybyte -
Talk -
Application Security Strategies -
-
K K Mookhey ,
Sep 06 -
Securitybyte -
Talk -
Using Data Analytics for Incident Response -
-
Samir Saklikar ,
Sep 06 -
Securitybyte -
Talk -
Security Threats on Social Networks -
-
Nithya Raman ,
Sep 06 -
Securitybyte -
Talk -
Runtime thread injection and execution in Linux processes -
-
Aseem Jakhar ,
Sep 06 -
Securitybyte -
Talk -
Private Internet Circuits - Towards A Next Generation Internet -
-
Sanjay Deshpande ,
Sep 06 -
Securitybyte -
Talk -
Enabling Un-trusted Mashups -
-
Bishan Singh ,
Sep 06 -
Securitybyte -
Talk -
Botnets at Application+ layer -
-
Raj Shastrakar ,
Aug 07 -
Defcon -
Talk -
VDLDS — All Your Voice Are Belong To Us -
-
Ganesh Devarajan , Don Le Bert
Aug 05 -
Defcon -
Talk -
Jugaad – Linux Thread Injection Kit -
-
Aseem Jakhar
Aug 03 -
Blackhat -
Talk -
Reverse Engineering Browser Components: Dissecting and Hacking Silverlight, HTML 5 and Flex -
-
Shreeraj Shah
Aug 03 -
Blackhat -
Talk -
Killing the Myth of Cisco IOS Diversity: Towards Reliable, Large-Scale Exploitation of Cisco IOS -
-
Jatin Kataria , Ang Cui , Salvatore Stolfo
Aug 03 -
Blackhat -
Talk -
Femtocells: A poisonous needle in the operator’s hay stack -
-
Ravishankar Borgaonkar , Nico Golde , Kevin Redon
May 20 -
Hitb Sec Conf -
Talk -
Next Generation Web Attacks – HTML 5, DOM(L3) and XHR(L2) -
-
Shreeraj Shah
May 19 -
Hitb Sec Conf -
Talk -
Spying on SpyEye – What Lies Beneath? -
-
Aditya K Sood
Mar 30 -
Troopers -
Talk -
Femtocell: Femtostep to the Holy Grail -
-
Ravishankar Borgaonkar , Kevin Redon
Mar 15 -
Nullcon -
Talk -
Information Warfare Ñ The Indian Perspective -
Alok Vijayant
Feb 25 -
Nullcon -
Talk -
SSLSmart – Smart SSL Cipher Enumeration -
-
Gursev Singh Kalra
Feb 25 -
Nullcon -
Talk -
Security Analysis of India’s Electronic Voting Machines: Memoirs of a whistleblower -
-
Hari Krishna Prasad Vemuru
Feb 25 -
Nullcon -
Talk -
Reversing microsoft patches to reveal vulnerable code -
-
Harsimran Singh Walia
Feb 25 -
Nullcon -
Talk -
Protect infrastructure or protect information – Lessons from Wikileaks -
-
Vishal Gupta
Feb 25 -
Nullcon -
Talk -
Penetration Testing a Biometric System -
-
Rahul Sasi
Feb 25 -
Nullcon -
Talk -
Lessons Learned From 2010 -
-
Saumil Shah
Feb 25 -
Nullcon -
Talk -
Jugaad Beta: Linux Thread Injection malware PoC -
-
Aseem Jakhar
Feb 25 -
Nullcon -
Talk -
JSON Fuzzing: New approach to old problems -
-
K v Prashant , Tamaghna Basu
Feb 25 -
Nullcon -
Talk -
Incident Management and Beyond -
Dinesh O Bareja
Feb 25 -
Nullcon -
Talk -
Hacking the Parliament – A classic Social Engineering attack -
Anurag Dhanda
Feb 25 -
Nullcon -
Talk -
Fuzzing with complexities -
-
Vishwas Sharma
Feb 25 -
Nullcon -
Talk -
Future of cyber crimes: Limitations and Challenges -
Pratap Reddy
Feb 25 -
Nullcon -
Talk -
Enterprise Paradigm for Controlling Data Leakage -
-
Deepak Rout
Feb 25 -
Nullcon -
Talk -
Cyber Crime 101 - Cost of cybercrime, trends & analysis -
-
Simran Gambhir , Cn Shashidhar
Feb 25 -
Nullcon -
Talk -
Chupa Rustam -
-
Abhijeet Hatekar
Feb 25 -
Nullcon -
Talk -
Buffer Under Run Exploits -
-
Saurabh Sharma , Chinmaya Kamal
Feb 25 -
Nullcon -
Talk -
Automatic Program Analysis using Dynamic Binary Instrumentation (DBI) -
-
Sunil Kumar
Feb 25 -
Nullcon -
Talk -
(secure) SiteHoster – Disable XSS & SQL Injection -
-
Abhishek Kumar
Feb 15 -
Nullcon -
Talk -
Botnet Detection approach by DNS behavior and clustering analysis -
-
Nilesh Sharma , Pulkit Mehndiratta 2010
Dec 04 -
Clubhack -
Talk -
Windows Memory Forensic Analysis -
-
Aashish Kunte
Dec 04 -
Clubhack -
Talk -
Ultimate Pen Test – Compromising a highly secure environment -
-
Nikhil Mittal
Dec 04 -
Clubhack -
Talk -
Mantra – Free and Open Source security framework based on browser platform -
-
Abhi M Balakrishnan
Dec 04 -
Clubhack -
Talk -
Firefox Security! -
-
Prasanna Kanagasabai
Dec 04 -
Clubhack -
Talk -
Data theft in India -
-
K K Mookhey
Dec 04 -
Clubhack -
Talk -
Attacking with HTML5 -
-
Lavakumar Kuppan
Nov 25 -
Deepsec -
Talk -
Developers are from Mars, Compliance Auditors are from Venus -
-
Neelay S Shah
Nov 11 -
Blackhat -
Talk -
Attacking with HTML5 -
-
Lavakumar Kuppan
Oct 29 -
T2 -
Talk -
Hacking Femtocells -
Ravishankar Borgaonkar , Kevin Redon
Oct 27 -
Hacklu -
Talk -
Exploit Delivery - Tricks and Techniques -
-
Saumil Shah
Oct 14 -
Hitb Sec Conf -
Talk -
Exploit Delivery -
-
Saumil Shah
Oct 13 -
Hitb Sec Conf -
Talk -
Hacking a Browser’s DOM – Exploiting Ajax and RIA -
-
Shreeraj Shah
Aug 01 -
C0c0n -
Talk -
Writing x86 ShellCode & Secure Self Modifying code and Cross Platform Programming - A Security Angle -
Praseed Pai
Aug 01 -
C0c0n -
Talk -
Wireless MITM -
Prashant Mahajan
Aug 01 -
C0c0n -
Talk -
VoIP Security -
Mukund Krishnamurthy
Aug 01 -
C0c0n -
Talk -
Overview of Cyber Legal Systems in India -
Sagar Rahurkar
Aug 01 -
C0c0n -
Talk -
Mobile Security -
Suhas Desai
Aug 01 -
C0c0n -
Talk -
Last line of defense - Host Intrusion Prevention and Secure application development. -
Avinash Shenoi
Aug 01 -
C0c0n -
Talk -
Horses, Rats and Bots -
Jairam Ramesh
Aug 01 -
C0c0n -
Talk -
Hackers’ EcoSystem in India -
Rohit Srivastwa
Aug 01 -
C0c0n -
Talk -
End-point Security -
Laxi Eshwari
Aug 01 -
C0c0n -
Talk -
Dangers and dynamic Malware analysis -
Chandrasekar
Aug 01 -
C0c0n -
Talk -
Concept, Methodology and Challenges in Computer Forensics -
Sebastian Edassery
Aug 01 -
C0c0n -
Talk -
Code Disclosure over HTTP -
Anant Kochhar
Aug 01 -
C0c0n -
Talk -
Cloud Computing & Security: Boon or Bane; Hype or Reality; Cloud Implementation Challenges: A Live Case Study -
Krishnakumar Kottekkat , Whiteknight
Aug 01 -
C0c0n -
Talk -
Client Side Exploits using PDF -
-
Ankur Bhargava , Tamaghna Basu
Jul 31 -
Defcon -
Talk -
WPA Too! -
-
Md Sohail Ahmad
Jul 30 -
Defcon -
Talk -
Hacking Oracle From Web Apps -
Sumit Siddharth
Jul 29 -
Blackhat -
Talk -
Hacking Oracle From Web Apps -
-
Sumit Siddharth
Jul 29 -
Blackhat -
Talk -
Hacking Browser’s DOM - Exploiting Ajax and RIA -
-
Shreeraj Shah
Jul 01 -
Hitb Sec Conf -
Talk -
Top 10 Web 2.0 Attacks and Exploits -
-
Shreeraj Shah
Jul 01 -
Hitb Sec Conf -
Talk -
The Travelling Hacksmith 2009 – 2010 -
Saumil Shah
Jun 18 -
Syscan -
Talk -
REVERSE ENGINEERING WEB 2.0 APPLICATIONS -
Shreeraj Shah
Apr 21 -
Hitb Sec Conf -
Talk -
Web Security – Going Nowhere? -
-
Saumil Shah
Apr 14 -
Blackhat -
Talk -
Attacking JAVA Serialized Communication -
-
Manish Saindane
Mar 15 -
Blackhat -
Talk -
400 Apps in 40 Days -
-
Nish Bhalla , Sahba Kazerooni
Feb 25 -
Nullcon -
Talk -
Steganography & Stegananalysis: A Technical & Psychological Perspective -
-
Prince Komal Boonlia , Reena Bhansali
Feb 25 -
Nullcon -
Talk -
Quantum Computing Challenges in the field of security -
-
Navin Pai
Feb 25 -
Nullcon -
Talk -
Penetration Testing versus Source Code -
-
Nikhil Wagholikar
Feb 25 -
Nullcon -
Talk -
Malware Detection Tool for Websites: A Proof-Of-Concept -
-
Anant Kochhar
Feb 25 -
Nullcon -
Talk -
Intelligent debugging and in memory fuzzing. -
-
Vishwas Sharma , Amandeep Bharti
Feb 25 -
Nullcon -
Talk -
Imposter ke karnamey: The Browser Phishing Tool. -
Lavakumar Kuppan
Feb 25 -
Nullcon -
Talk -
Botnet mitigation, monitoring and management. -
-
Harshad Patil
Feb 25 -
Nullcon -
Talk -
Software Fuzzing with Wireplay. -
-
Abhisek Datta
Feb 03 -
Blackhat -
Talk -
Beware of Serialized GUI Objects Bearing Data -
-
Rohini Sulatycki , David Byrne 2009
Dec 05 -
Clubhack -
Talk -
Risk Based Penetration Testing -
-
Nikhil Wagholikar , K K Mookhey
Dec 05 -
Clubhack -
Talk -
Revealing the Secrets: Source Code Disclosure, Techniques and Impacts -
-
Anant Kochhar
Dec 05 -
Clubhack -
Talk -
Open source for securing data with advanced Crypto-Steganography technology -
-
Suhas Desai
Dec 05 -
Clubhack -
Talk -
Mobile Application Security Testing -
-
Gursev Singh Kalra
Dec 05 -
Clubhack -
Talk -
Lust 2.0 – Desire for free WiFi and the threat of the Imposter -
-
Lavakumar Kuppan
Dec 05 -
Clubhack -
Talk -
Indian IT Act 2000 vs 2009 -
-
Rohas Nagpal
Dec 05 -
Clubhack -
Talk -
Incident Handling and Log Analysis for Web Based Incidents -
-
Manindra Kishore
Dec 05 -
Clubhack -
Talk -
Advance Computer Forensic concepts (windows) -
-
Kush Wadhwa
Dec 05 -
Clubhack -
Talk -
India Cyber Crime Scene - Caught in the Crossfire -
-
Vinoo Thomas , Rahul Mohandas
Dec 04 -
Clubhack -
Talk -
Facilitate Collaboration with Information Rights Management -
Abhijit Tannu
Nov 19 -
Deepsec -
Talk -
Top 10 Security Issues Developers Don’t Know About -
-
Neelay S Shah
Nov 19 -
Deepsec -
Talk -
Ownage 2.0 -
-
Saumil Shah
Nov 18 -
Securitybyte -
Talk -
Rumbling Infections – Web Malware Ontology -
-
Aditya K Sood
Nov 18 -
Securitybyte -
Talk -
Risk based Penetration Testing -
-
K K Mookhey
Nov 18 -
Securitybyte -
Talk -
Introduction to Web Protection Library -
-
Anil Chintala ,
Nov 18 -
Securitybyte -
Talk -
Hacking Oracle From Web -
-
Sumit Siddharth
Nov 18 -
Securitybyte -
Talk -
Cloud Hacking – Distributed Attack & Exploit Platform -
Shreeraj Shah
Nov 17 -
Securitybyte -
Talk -
Vbootkit 2.0: Attacking Windows 7 Via Boot Sectors -
-
Nitin Kumar , Vipin Kumar
Nov 17 -
Securitybyte -
Talk -
Usability and Privacy in Security -
-
Ponnurangam Kumaraguru ,
Nov 17 -
Securitybyte -
Talk -
Threat Modeling -
-
Varun Sharma ,
Nov 17 -
Securitybyte -
Talk -
Lust 2.0 – Desire for free WiFi and the threat of the Imposter -
-
Lavakumar Kuppan
Nov 17 -
Securitybyte -
Talk -
Business Continuity Case Study -
Venkataram Arabolu ,
Nov 17 -
Securitybyte -
Talk -
Business Case-Risk Management/Compliance at AMITY -
Js Sodhi ,
Nov 17 -
Securitybyte -
Talk -
Behind the scenes at the MSRC -
-
Suresh Venkateswaran , Dave Midturi
Nov 17 -
Securitybyte -
Talk -
Applications - The new cyber security frontier -
-
Mano Paul ,
Oct 28 -
Hacklu -
Talk -
Ownage 2.0 -
Saumil Shah
Oct 07 -
Hitb Sec Conf -
Talk -
How to Own the World – One Desktop at a Time -
-
Saumil Shah
Aug 06 -
C0c0n -
Talk -
Network Intrusions and Hacking -
Manu Zacharia
Aug 06 -
C0c0n -
Talk -
Microsoft Security Strategies -
Binoy VC
Aug 06 -
C0c0n -
Talk -
Management & Security of Large Scale Storage Devices -
Prashant Dinde
Aug 06 -
C0c0n -
Talk -
Know Your Enemy, and Yourself: Demystifying Threat Modelin -
Meera Subbarao
Aug 06 -
C0c0n -
Talk -
Information Warfare -
A a Gafoor , Vinayak Mishra
Aug 06 -
C0c0n -
Talk -
Information security management practices - Technical issues and the impact of risk management. -
Kp Paulson
Aug 06 -
C0c0n -
Talk -
Information Security Audit -
Venkatapathy Subramaniam
Aug 06 -
C0c0n -
Talk -
Cyber Victimisation -
K Jaishankar
Aug 06 -
C0c0n -
Talk -
Cyber Forensics -
Krishna Sastry Pendyal
Aug 02 -
Defcon -
Talk -
Wi-Fish Finder: Who Will Bite the Bait -
-
Md Sohail Ahmad , Prabhash Dhyani
Aug 01 -
Defcon -
Talk -
The Making of the second SQL injection Worm -
-
Sumit Siddharth
Jul 31 -
Defcon -
Talk -
Advancing Video Application Attacks with Video Interception, Recording, and Replay -
-
Arjun Sambamoorthy , Jason Ostrom
Jul 29 -
Blackhat -
Talk -
Psychotronica: Exposure, Control, and Deceit -
-
Nitesh Dhanjani
May 19 -
Syscan -
Talk -
Securing Enterprise Applications -
Shreeraj Shah
May 19 -
Syscan -
Talk -
Securing Applications at Gateway with Web Application Firewalls -
Shreeraj Shah
Apr 22 -
Hitb Sec Conf -
Talk -
Vbootkit 2.0: Attacking Windows 7 via Boot Sectors -
-
Nitin Kumar , Vipin Kumar
Apr 22 -
Troopers -
Talk -
SQL Injections: More Fun and Profit -
-
Sumit Siddharth
Apr 22 -
Hitb Sec Conf -
Talk -
Pwnage 2.0 -
-
Saumil Shah
Apr 22 -
Troopers -
Talk -
Browser Design Flaws – Hacking by Breaking in Architectures -
-
Aditya K Sood
Apr 22 -
Hitb Sec Conf -
Talk -
Application Defense Tactics & Strategies - WAF at the Gateway -
-
Shreeraj Shah
Mar 16 -
Can Sec West -
Talk -
On Approaches and Tools for Automated Vulnerability Analysis -
-
Tanmay Ganacharya , Abhishek Singh , Swapnil Bhalode , Nikola Livic , Scott Lambert
Feb 19 -
Blackhat -
Talk -
Blinded by Flash: Widespread Security Risks Flash Developers Don’t See -
-
Prajakta Jagdale 2008
Dec 06 -
Clubhack -
Talk -
State of Cyber Law in India -
-
Rohas Nagpal
Dec 06 -
Clubhack -
Talk -
Reverse Engineering v/s Secure Coding -
-
Atul Alex
Dec 06 -
Clubhack -
Talk -
Reverse Engineering for exploit writers -
-
Nibin Varghese
Dec 06 -
Clubhack -
Talk -
Introduction to backtrack -
-
Kunal Sehgal ,
Dec 06 -
Clubhack -
Talk -
Insecure Implementation of Security Best Practices: of hashing, CAPTCHA’s and Caching -
-
Karmendra Kohli
Dec 06 -
Clubhack -
Talk -
Immune IT: Moving from Security to Immunity -
-
Ajit Hatti
Dec 06 -
Clubhack -
Talk -
Hacking Client Side Insecurities -
-
Aditya K Sood
Dec 06 -
Clubhack -
Talk -
Economic offenses through Credit Card Frauds Dissected -
-
Harshad Patil
Dec 06 -
Clubhack -
Talk -
AntiSpam - Understanding the good, the bad and the ugly -
-
Aseem Jakhar
Nov 13 -
Deepsec -
Talk -
Game of Web 2.0 Security - Attacking Next Generation Apps -
Shreeraj Shah
Oct 29 -
Hitb Sec Conf -
Talk -
Top 10 Web 2.0 Attacks -
-
Shreeraj Shah
Oct 29 -
Hitb Sec Conf -
Talk -
Browser Exploits - A New Model for Browser Security -
-
Saumil Shah
Oct 22 -
Hacklu -
Talk -
Browser Exploits - A new model for Browser security -
Saumil Shah
Aug 21 -
Owasp App Sec India -
Talk -
AppSec For Managers -
Nish Bhalla
Aug 20 -
Owasp App Sec India -
Talk -
Web Application Security: Too Costly To Ignore -
-
Rajesh Nayak
Aug 20 -
Owasp App Sec India -
Talk -
Web 2.0 Attacks - Next Generation Threats on the Rise -
-
Shreeraj Shah
Aug 20 -
Owasp App Sec India -
Talk -
Case Study: Testing 200+ applications in a $10 Billion Enterprise -
-
Roshen Chandran
Aug 20 -
Owasp App Sec India -
Talk -
Building Enterprise AppSec Program -
Nish Bhalla
Aug 20 -
Owasp App Sec India -
Talk -
Application Security Trends & Challenges -
-
Kamlesh Bajaj
Aug 09 -
Defcon -
Talk -
Autoimmunity Disorder in Wireless LAN -
-
Jvr Murthy , Amit Vartak , Md Sohail Ahmad ,
Aug 07 -
Blackhat -
Talk -
Got Citrix, Hack It! -
-
Shanit Gupta
Aug 06 -
Blackhat -
Talk -
Bad Sushi: Beating Phishers at Their Own Game -
-
Nitesh Dhanjani , Billy Rios
Apr 16 -
Hitb Sec Conf -
Talk -
Securing Next Generation Applications – Scan, Detect and Mitigate -
Shreeraj Shah
Mar 28 -
Blackhat -
Talk -
Spam-Evolution -
-
Aseem Jakhar
Mar 27 -
Blackhat -
Talk -
Iron Chef Black Hat: John Henry Challenge -
-
Pravir Chandra , Jacob West , Brian Chess , Sean Fay
Mar 26 -
Can Sec West -
Talk -
Vulnerabilities Die Hard -
Kowsik Guruswamy
Feb 20 -
Blackhat -
Talk -
Scanning Applications 2.0 - Next Generation Scan, Attacks and Tools -
-
Shreeraj Shah
Feb 20 -
Blackhat -
Talk -
Hacking VoIP through IPSec Tunnels -
-
Sachin Joglekar , Sudeep Patwardhan 2007
Dec 19 -
Clubhack -
Talk -
Backdoor 2.0: Hacking Firefox to steal his web secrets -
-
Sunil Arora
Dec 09 -
Clubhack -
Talk -
Vulnerabilities in VoIP Products and Services -
-
Gaurav Saha
Dec 09 -
Clubhack -
Talk -
The future of automated web application testing -
-
Amish Shah , Umesh Nagori
Dec 09 -
Clubhack -
Talk -
Subtle Security flaws: Why you must follow the basic principles of software security -
-
Varun Sharma ,
Dec 09 -
Clubhack -
Talk -
Mining Digital Evidence in Microsoft Windows – Answering Who, When, Why and How? -
-
Chetan Gupta
Dec 09 -
Clubhack -
Talk -
Legiment Techniques of IPS/IDS Evasion -
-
Ajit Hatti
Dec 09 -
Clubhack -
Talk -
Hacking Web 2.0 Art and Science of Vulnerability Detection -
-
Shreeraj Shah
Dec 09 -
Clubhack -
Talk -
Analysis of Adversarial Code: The Role of Malware Kits! -
-
Rahul Mohandas ,
Dec 09 -
Clubhack -
Talk -
7 years of Indian IT act - 7 Best Cases -
-
Rohas Nagpal
Nov 20 -
Deepsec -
Talk -
Web 2.0 Application Kung-Fu - Securing Ajax & Web Services -
-
Shreeraj Shah
Sep 06 -
Hitb Sec Conf -
Talk -
Hacking Ajax and Web Services – Next Generation Web Attacks on the Rise -
-
Shreeraj Shah
Aug 04 -
Defcon -
Talk -
The Emperor Has No Cloak - WEP Cloaking Exposed -
-
Vivek Ramachandran
Aug 02 -
Blackhat -
Talk -
The Evolution Of Phishing To Organized Crime -
-
Rohyt Belani
Aug 02 -
Blackhat -
Talk -
Smoke ’em Out! -
-
Rohyt Belani ,
Aug 02 -
Blackhat -
Talk -
Breaking C++ Applications -
-
Neel Mehta , Mark Dowd
Aug 01 -
Blackhat -
Talk -
Vulnerabilities in Wi-Fi/Dual-Mode VoIP Phones -
-
Krishna Kurapati
Aug 01 -
Blackhat -
Talk -
PISA: Protocol Identification via Statistical Analysis -
-
Rohit Dhamankar , Rob King
Apr 18 -
Can Sec West -
Talk -
Low-Rate Denial-of-Service attacks -
Anil Kumar
Apr 05 -
Hitb Sec Conf -
Talk -
WEB 2.0 Hacking – Defending Ajax and Web Services -
-
Shreeraj Shah
Apr 04 -
Hitb Sec Conf -
Talk -
Vboot Kit: Compromising Windows Vista Security -
-
Vipin Kumar , Nitin Kumar
Mar 30 -
Blackhat -
Talk -
Web Service Vulnerabilities -
-
Nish Bhalla
Mar 29 -
Blackhat -
Talk -
Vboot Kit: Compromising Windows Vista Security -
-
Nitin Kumar , Vipin Kumar
Mar 15 -
Blackhat -
Talk -
Exploit-Me Series – Free Firefox Application Penetration Testing Suite Launch -
-
Nish Bhalla , Rohit Sethi 2006
2005
2004
2003
2002
2001
1998
↑