Hackers of India
Talk
-
2020/12/10
Talk : Blackhat : Effective Vulnerability Discovery with Machine Learning -
Asankhya Sharma
Ming Yi Ang
-
2020/10/07
Talk : Rootcon : Automating Threat Hunting on the Dark Web and other nitty-gritty thingso -
Apurv Singh Gautam
-
2020/10/07
Talk : Rootcon : Blockchain Based OT Monitoring Solution (BBOTMS) -
Asif Hameed Khan
Gagan Jattana
-
2020/10/07
Talk : Rootcon : How I Pwned the ICS data during my internship -
Shail Patel
-
2020/10/07
Talk : Rootcon : Offensive Embedded Exploitation : Getting hands dirty with IOT/Embedded Device Security Testing -
Kaustubh Padwad
-
2020/10/07
Talk : Rootcon : ReconPal: Leveraging NLP for Infosec -
Nishant Sharma
Jeswin Mathai
-
2020/10/07
Talk : Rootcon : Zero Trust in the Era of Cloud -
Vandana Verma Sehgal
-
2020/10/01
Talk : Blackhat : Making an Impact from India to the Rest of the World by Building and Nurturing Women Infosec Community -
Vandana Verma Sehgal
-
2020/09/18
Talk : C0c0n : Herd Immunity, in the Cyber World -
Sunil Varkey
-
2020/09/18
Talk : C0c0n : How I created my clone using AI - next-gen Social Engineering -
Tamaghna Basu
-
2020/09/18
Talk : C0c0n : Introducing SniperPhish: A Web-Email Spear Phishing Toolkit -
Sreehari Haridas
-
2020/09/18
Talk : C0c0n : Kubernetes Goat - Vulnerable by Design Kubernetes Cluster Environment -
Madhu Akula
-
2020/09/18
Talk : C0c0n : All about IOT Forensics -
Hima Bindu Vejella
-
2020/09/18
Talk : C0c0n : Automation in Bug Bounties to Work Smarter -
Prerak Mittal
-
2020/09/18
Talk : C0c0n : Broken Cryptography & Account Takeover -
Harsh Bothra
-
2020/09/18
Talk : C0c0n : Cyber Security Shifts During COVID-19 -
Sunil Kanchi
-
2020/09/18
Talk : C0c0n : Deep Learning for Intrusion Attempt Detection -
Varun Kohli
-
2020/09/18
Talk : C0c0n : My top 3 findings in bug Bounty journey | Aiming for high impact issues -
Ankit Giri
-
2020/09/18
Talk : C0c0n : Offensive & Scope Based Recon -
Harsh Bothra
-
2020/09/18
Talk : C0c0n : Offensive Embedded Exploitation : Getting hands dirty with IOT/Embedded Device Security Testing -
Kaustubh Padwad
-
2020/09/18
Talk : C0c0n : Reverse Engineering Bare-Metal IoT Firmwares - Moving beyond Linux -
Munawwar Hussain Shelia
-
2020/09/18
Talk : C0c0n : Supercharging your initial foothold in Red Team engagements -
Sachin S Kamath
-
2020/08/06
Talk : Blackhat : How I Created My Clone Using AI - Next-Gen Social Engineering -
Tamaghna Basu
-
2020/08/06
Talk : Blackhat : Making an Impact from India to the Rest of the World by Building and Nurturing Women Infosec Community -
Vandana Verma Sehgal
-
2020/08/05
Talk : Blackhat : Uncommon Sense: Detecting Exploits with Novel Hardware Performance Counters and ML Magic -
Harini Kannan
Nick Gregory
-
2020/07/26
Talk : Hitb Sec Conf : Swapping Asprin Formulas With MDMA While Red Teaming a Billion Dollar Company -
Himanshu Sharma
Aman Sachdev
-
2020/04/25
Talk : Hitb Sec Conf : THE STATE OF ICS SECURITY: THEN AND NOW -
Praveen Soni
Shivbihari Pandey
Ashish Kumar Gahlot
-
2020/04/24
Talk : Hitb Sec Conf : COMMSEC: The State of ICS Security : Then and Now -
Praveen Soni
Shivbihari Pandey
Ashish Kumar Gahlot
-
2020/03/18
Talk : Can Sec West : The ARM-X Firmware Emulation Framework -
Saumil Shah
-
2020/03/06
Talk : Nullcon : Automated Classification of Web-Application Attacks for Intrusion Detection -
Aneet Kumar Dutta
-
2020/03/06
Talk : Nullcon : Cloud As an Attack vector -
Ashwin Vamshi
Rushikesh Vishwakarma
-
2020/03/06
Talk : Nullcon : InfoSec Deep Learning in Action -
Satnam Singh
-
2020/03/06
Talk : Nullcon : Putting it all together: building an iOS jailbreak from scratch -
Umang Raghuvanshi
-
2019/12/04
Talk : Blackhat : Bring Your Own Token (BYOT) to Replace the Traditional Smartcards for Strong Authentication and Signing -
Karthik Ramasamy
Eric Hampshire
-
2019/12/04
Talk : Blackhat : ClusterFuzz: Fuzzing at Google Scale -
Abhishek Arya
Oliver Chang
-
2019/11/28
Talk : Deepsec : Mastering AWS Pentesting and Methodology -
Ankit Giri
-
2019/11/01
Talk : App Sec Day Australia : A Purple Team View of Serverless and GraphQL Applications -
Abhay Bhargav
-
2019/11/01
Talk : App Sec Day Australia : Protecting the Damned: Deploying Insecure Applications at Scale -
Vivek Ramachandran
-
2019/11/01
Talk : Hackfest : The Mechanics of Malware’s Darkside -
Yagnesh Waran P
Laura Harris
-
2019/10/22
Talk : Hacklu : Intro to Dark Arts: Getting Started with CTFs -
Geethna T K
Shruti Dixit
Sowmya Potluri
-
2019/10/17
Talk : Hitb Sec Conf : Advances in the Trinity of AI: Data, Algorithms & Compute Infrastructure -
Anima Anandkumar
-
2019/10/15
Talk : Hitb Sec Conf : Car Hacking: Practical Guide to Automotive Security -
Yogesh Ojha
-
2019/10/14
Talk : Hitb Sec Conf : CALL OF DUTY: MODERN BROWSER WARFARE -
Dhiraj Mishra
-
2019/10/14
Talk : Hitb Sec Conf : IoT Pentesting The Right Way -
Yogesh Ojha
-
2019/10/14
Talk : Hitb Sec Conf : ON THE WINGS OF TIME: DEMYSTIFYING WIRELESS ETHICAL HACKING AND DEFENSES -
Harshit Agrawal
Himanshu Mehta
-
2019/10/10
Talk : Brucon : Security transition from 4G to 5G: are we secure enough? -
Altaf Shaik
Ravishankar Borgaonkar
-
2019/09/27
Talk : C0c0n : A Day in the Life of a CISO -
Sridhar Govardhan
-
2019/09/27
Talk : C0c0n : Advanced Persistent Threat and counter measures -
A a Gafoor
-
2019/09/27
Talk : C0c0n : AI, ML and Security -
Varun Kohli
-
2019/09/27
Talk : C0c0n : autoSource an automated framework for Source Code Review -
Malkit Singh
-
2019/09/27
Talk : C0c0n : Block Chain for Secured Automation -
Sanat Bhat
-
2019/09/27
Talk : C0c0n : Building a cloud security monitoring and auditing framework -
Nirali Shah
Prasoon Dwivedi
-
2019/09/27
Talk : C0c0n : CISO Mind Set -
Dr Lopa Mudraa Basuu
-
2019/09/27
Talk : C0c0n : Defense in Depth for Embedded Systems -
Jiggyasu Sharma
-
2019/09/27
Talk : C0c0n : Demystifying HealthCare Security -
Ajay Pratap Singh
-
2019/09/27
Talk : C0c0n : Detection of TOR Sources using Artificial Intelligence -
Roshy John
-
2019/09/27
Talk : C0c0n : Doing SecOps for the Cloud using Cloud Native Services -
Akash Mahajan
-
2019/09/27
Talk : C0c0n : Golang for Pentesters / RedTeamers -
Anant Shrivastava
-
2019/09/27
Talk : C0c0n : Hacking ICS devices for Fun -
Arun Mane
-
2019/09/27
Talk : C0c0n : Industry 4.0 - Security and Compliance -
Santhosh Srinivasan
-
2019/09/27
Talk : C0c0n : Lessons learned form data breaches in the cloud -
Ajay Agrawal
-
2019/09/27
Talk : C0c0n : Looking a decade ahead: Big data, drones , Robots and cyber security. -
Rahul Sasi
-
2019/09/27
Talk : C0c0n : Offensive Machine Learning for Pentesters and Red Teams -
Tamaghna Basu
-
2019/09/27
Talk : C0c0n : Practical Approach to Cyber Security for financial institutions -
Georgie Kurien
-
2019/09/27
Talk : C0c0n : RANSOMWARE - to pay or not to pay -
Seshaprakash Kusuma Sreenivasa
-
2019/09/27
Talk : C0c0n : Securing Payment Data with PCI Security Standards and Programs -
Nitin Bhatnagar
-
2019/09/27
Talk : C0c0n : Security @scale for startups -
Shivanath Somanathan
-
2019/09/27
Talk : C0c0n : Serverless SOAR -
Sabyasachi Dhal
Suresh Sharma
-
2019/09/27
Talk : C0c0n : Stepping into Password Less Economy -
Ajit Hatti
-
2019/09/27
Talk : C0c0n : VyAPI - The Vulnerable Hybrid Android App -
Riddhi Shree
-
2019/09/23
Talk : Rootcon : APAD: An EDR Grade Agent for Wi-Fi Access Points -
Vivek Ramachandran
-
2019/09/23
Talk : Rootcon : Hacking ICS devices/PLC’s for Fun - ICS and IOT Hacking -
Arun Mane
-
2019/09/23
Talk : Rootcon : Hunting Threats with Wireshark Plugins -
Nishant Sharma
Jeswin Mathai
Shivam Bathla
-
2019/09/23
Talk : Rootcon : Identity crisis: war stories from authentication failures -
Vishal Chauhan
-
2019/09/23
Talk : Rootcon : Making Anomaly Detection system(ADS) for Vehicles (Automotive Hacking) -
Arun Mane
Nikhil Bogam
-
2019/09/13
Talk : 44 Con : One Person Army – Playbook on how to be the first Security Engineer at a company -
Kashish Mittal
-
2019/09/13
Talk : 44 Con : The CISO’s Dilemma -
Saumil Shah
-
2019/08/30
Talk : Hitb Sec Conf : COMMSEC: PErfidious: Make PE Backdooring Great Again! -
Shreyans Doshi
-
2019/08/29
Talk : Hitb Sec Conf : Understanding, Attacking & Securing Medical Devices -
Ajay Pratap Singh
-
2019/08/10
Talk : Defcon : RACE - Minimal Rights and ACE for Active Directory Dominance -
Nikhil Mittal
-
2019/08/08
Talk : Blackhat : Death to the IOC: What’s Next in Threat Intelligence -
Bhavna Soman
-
2019/08/08
Talk : Blackhat : DevSecOps : What, Why and How -
Anant Shrivastava
-
2019/08/07
Talk : Blackhat : Defense Against Rapidly Morphing DDOS -
Mudit Tyagi
Mikhail Fedorov
-
2019/08/07
Talk : Blackhat : New Vulnerabilities in 5G Networks -
Ravishankar Borgaonkar
Altaf Shaik
-
2019/05/21
Talk : Phdays : Active defense using Honeypots v2 -
Rahul Binjve
-
2019/05/21
Talk : Phdays : Breaking Microsoft Edge extensions security policies -
Nikhil Mittal
-
2019/05/21
Talk : Phdays : Fuzzing 101 -
Dhiraj Mishra
Zubin Devnani
-
2019/05/21
Talk : Phdays : GDALR: an efficient model duplication attack on black-box machine learning models -
Rewanth Cool
Nikhil Joshi
-
2019/05/21
Talk : Phdays : How to fail in hardware hacking -
Arun Magesh
-
2019/05/21
Talk : Phdays : Rapid hardware hacking 101 -
Arun Magesh
-
2019/05/10
Talk : Hitb Sec Conf : HAXPO: RF Exploitation: Demystifying IoT/OT Hacks with SDR -
Himanshu Mehta
Harshit Agrawal
-
2019/05/09
Talk : Hitb Sec Conf : GDALR: Duplicating Black Box Machine Learning Models -
Rewanth Cool
Nikhil Joshi
-
2019/05/09
Talk : Hitb Sec Conf : HAXPO: WiCy: Monitoring 802.11AC Networks at Scale -
Vivek Ramachandran
-
2019/05/09
Talk : Hitb Sec Conf : Make ARM Shellcode Great Again -
Saumil Shah
-
2019/03/28
Talk : Blackhat : DevSecOps : What, Why and How -
Anant Shrivastava
-
2019/03/28
Talk : Blackhat : Investigating Malware Using Memory Forensics - A Practical Approach -
Monnappa K A
-
2019/03/21
Talk : Troopers : Evolution of kernel fuzzers in NetBSD -
Siddharth M
-
2019/02/28
Talk : Nullcon : A Hacker Walks into a Co-working Space -
Rahul Binjve
-
2019/02/28
Talk : Nullcon : Andromeda - GUI based Dynamic Instrumentation Toolkit powered by Frida -
Shivang Desai
-
2019/02/28
Talk : Nullcon : Attacking & Securing HealthCare Standards & hospital secured systems -
Ajay Pratap Singh
-
2019/02/28
Talk : Nullcon : Building Hardened IoT Implementations with LangSec -
Prashant Anantharaman
-
2019/02/28
Talk : Nullcon : Dirty use of USSD Codes -
Ravishankar Borgaonkar
-
2019/02/28
Talk : Nullcon : Pentesting without Pentesters - Automating Security Testing with Functional Testing Test Cases -
Lavakumar Kuppan
Ankit Gupta
-
2018/12/06
Talk : Blackhat : AI Gone Rogue: Exterminating Deep Fakes Before They Cause Menace -
Vijay Thaware
Niranjan Agnihotri
-
2018/12/05
Talk : Blackhat : The Undeniable Truth: How Remote Attestation Circumvents Deniability Guarantees in Secure Messaging Protocols -
N Asokan
Lachlan Gunn
Ricardo Vieitez Parra
-
2018/11/29
Talk : Deepsec : DNS Exfiltration and Out-of-Band Attacks -
Nitesh Shilpkar
-
2018/11/27
Talk : Hitb Sec Conf : BSIDES: Creating Browser Extensions to Hunt for Low-Hanging Fruit -
Rewanth Cool
-
2018/11/27
Talk : Hitb Sec Conf : COMMSEC: Enhancing Deep Learning DGA Detection Models Using Separate Character Embedding -
Vikash Yadav
-
2018/11/27
Talk : Hitb Sec Conf : COMMSEC: Taking Over Telecom Networks -
Hardik Mehta
Loay Hassan Abdelrazek
-
2018/11/27
Talk : Hitb Sec Conf : Somebody Answer the Phone: Hacking Telephone Systems for Fun & Profit -
Himanshu Mehta
Sachine Wagh
-
2018/11/02
Talk : Hitb Sec Conf : Defending The Enterprise in 2018 -
Saumil Shah
-
2018/11/02
Talk : Hackfest : Exploiting Connected Medical Devices: Lessons Learned & Data Earned -
Saurabh Harit
-
2018/10/19
Talk : App Sec Day Australia : Continuous Integration and Delivery with Docker Containers -
Vasant Kumar
-
2018/10/19
Talk : App Sec Day Australia : Threat Modeling-as-Code & Automation for DevSecOps wins -
Abhay Bhargav
-
2018/10/15
Talk : Hacklu : Come to the dark side! We have radical insurance groups & ransomware -
Ankit Gangwal
Eireann Leverett
-
2018/10/15
Talk : Hacklu : Make ARM Shellcode Great Again -
Saumil Shah
-
2018/10/10
Talk : Brucon : Forging Trusts for Deception in Active Directory -
Nikhil Mittal
-
2018/10/10
Talk : Brucon : Simplifying the art of instrumentation -
Krishnakant Patil
Rushikesh D Nandedkar
-
2018/10/05
Talk : C0c0n : Defending cloud Infrastructures with Cloud Security Suite -
Jayesh Chauhan
Shivankar Madaan
-
2018/10/05
Talk : C0c0n : DNS Exfiltration and Out of Band Attacks -
Nitesh Shilpkar
-
2018/10/05
Talk : C0c0n : Pentesting GraphQL Applications -
Neelu Tripathy
-
2018/10/05
Talk : C0c0n : Adaptive GRC -
Mahesh Kalyanaraman
-
2018/10/05
Talk : C0c0n : Artificial Intelligence and Social Media Analytics in Criminal Investigation -
Amit Dubey
-
2018/10/05
Talk : C0c0n : Blockchains as techno-power structures: towards emergence of P2P Politics -
Sunil Aggarwal
-
2018/10/05
Talk : C0c0n : Cyber security in Health Care Industry -
Noorul Haq
-
2018/10/05
Talk : C0c0n : Cybersecurity Embedded Digital Transformation - The Future -
Sunil Kanchi
-
2018/10/05
Talk : C0c0n : Data management challenge for Privacy compliance -
Maria Bellarmine
-
2018/10/05
Talk : C0c0n : Dealing with Changing Threat Landscape -
Vijendra Katiyar
-
2018/10/05
Talk : C0c0n : Defending Healthcare Base -
Jiggyasu Sharma
-
2018/10/05
Talk : C0c0n : Digital Innovation revolution in Kerala Government -
Sunil Varkey
-
2018/10/05
Talk : C0c0n : DomGoat - the DOM Security Playground -
Lavakumar Kuppan
-
2018/10/05
Talk : C0c0n : Future of Mobility & Cyber Security -
Suja Chandy
-
2018/10/05
Talk : C0c0n : How can we use machine learning to prevent Frauds and password breaches -
Tamaghna Basu
-
2018/10/05
Talk : C0c0n : OSINT : Indian Citizen Edition -
Anant Shrivastava
-
2018/10/05
Talk : C0c0n : Predictive policing using Big Data analytics. -
Tarun Wig
-
2018/10/05
Talk : C0c0n : Privacy And Data Protection: Stakeholders’ Perspectives -
Rahul Sharma
-
2018/10/05
Talk : C0c0n : Resiliency Focus alongside Digital Disruption -
Lince Lawrence
-
2018/10/05
Talk : C0c0n : SCANDA: To Unbosom Malware Behavior -
Rajesh Nikam
Parmanand Mishra
-
2018/10/05
Talk : C0c0n : Taking cyber security to the board room -
Amit Pradhan
-
2018/10/05
Talk : C0c0n : Unconventional vulnerabilities in Google Cloud Platform -
Pranav Venkat
-
2018/10/05
Talk : C0c0n : Using Fault Injection for Forensics -
Yashin Mehaboobe
-
2018/10/05
Talk : C0c0n : Will Artificial Intelligence And Machine Learning Bring More Threats On Cyber Security? -
Roshy John
-
2018/09/27
Talk : Rootcon : Bug Bounty Hunting on Steroids -
Anshuman Bhartiya
-
2018/09/27
Talk : Rootcon : Cyber Security Threats to Telecom Networks -
Hardik Mehta
Rosalia D’ Alessandro
Loay Abdelrazek
-
2018/09/27
Talk : Rootcon : Defending cloud Infrastructures with Cloud Security Suite -
Shivankar Madaan
-
2018/09/27
Talk : Rootcon : Expl-iot: Hacking IoT like a boss -
Aseem Jakhar
-
2018/09/12
Talk : 44 Con : Make ARM Shellcode Great Again -
Saumil Shah
-
2018/09/06
Talk : Grrcon : Analyzing Multi-Dimensional Malware Dataset -
Ankur Tyagi
-
2018/09/06
Talk : Grrcon : Angad: A Malware Detection Framework using Multi-Dimensional Visualization -
Ankur Tyagi
-
2018/09/06
Talk : Grrcon : Crypto Gone Rogue: A Tale of Ransomware, Key Management and the CryptoAPI -
Pranshu Bajpai
Richard Enbody
-
2018/08/30
Talk : Hitb Sec Conf : Exploiting Automation in LTE Mobile Networks -
Ravishankar Borgaonkar
Altaf Shaik
-
2018/08/12
Talk : Defcon : Last mile authentication problem: Exploiting the missing link in end-to-end secure communication -
Siddharth Rao
Thanh Bui
-
2018/08/09
Talk : Blackhat : Follow the White Rabbit: Simplifying Fuzz Testing Using FuzzExMachina -
Bhargava Shastry
Vincent Ulitzsch
Dominik Maier
-
2018/08/09
Talk : Defcon : 4G—Who is paying your cellular phone bill? -
Isha Singh
Dr Silke Holtmanns
-
2018/08/09
Talk : Blackhat : Two-Factor Authentication, Usable or Not? A Two-Phase Usability Study of the FIDO U2F Security Key -
Sanchari Das
Andrew C Dingman
Gianpaolo Russo
L Jean Camp
-
2018/08/08
Talk : Blackhat : Back to the Future: A Radical Insecure Design of KVM on ARM -
Baibhav Singh
Rahul Kashyap
-
2018/08/08
Talk : Blackhat : Compression Oracle Attacks on VPN Networks -
Ahamed Nafeez
-
2018/08/08
Talk : Blackhat : LTE Network Automation Under Threat -
Ravishankar Borgaonkar
Altaf Shaik
-
2018/06/29
Talk : Hackinparis : Hunting PBX for Vulnerabilities -
Himanshu Mehta
Sachin Wagh
-
2018/05/13
Talk : Defcon : Androsia: Securing ‘Data in Process’ for your Android Apps -
Samit Anwer
-
2018/03/22
Talk : Blackhat : Securing Your In-Ear-Fitness Coach: Challenges in Hardening Next Generation Wearables -
Sumanth Naropanth
Kavya Racharla
-
2018/03/22
Talk : Blackhat : XOM-switch: Hiding Your Code from Advanced Code Reuse Attacks In One Shot -
Ravi Sahita
Daiping Liu
Mingwei Zhang
-
2018/03/15
Talk : Troopers : Defending Microsoft Environments at Scale -
Vineet Bhatia
-
2018/03/01
Talk : Nullcon : A Game between Adversary and AI Scientist -
Satnam Singh
-
2018/03/01
Talk : Nullcon : Abusing and Attacking Content Sharing Solutions -
Pratap Chandra Allena
-
2018/03/01
Talk : Nullcon : Breaking Into Container Orchestrators -
Nadeem Hussain
-
2018/03/01
Talk : Nullcon : DARWIN (A parasite covert wireless network) -
Rushikesh D Nandedkar
-
2018/03/01
Talk : Nullcon : Looting your bank savings using Digital India -
Indrajeet Bhuyan
-
2018/03/01
Talk : Nullcon : Security through obscurity and fear -
Abhinav Srivastava
-
2018/03/01
Talk : Nullcon : Software Supply Chain Cyberattack -
Samiran Ghatak
-
2018/03/01
Talk : Nullcon : SpotPhish: Zero-Hour Phishing Protection -
Ganesh Varadarajan
-
2018/03/01
Talk : Nullcon : Unleashing D* on Android Kernel Drivers -
Aravind Machiry
-
2018/03/01
Talk : Nullcon : White-Stingray: Bypassing stingray detectors -
Altaf Shaik
-
2017/12/06
Talk : Blackhat : BREAKING BAD: STEALING PATIENT DATA THROUGH MEDICAL DEVICES -
Saurabh Harit
-
2017/12/06
Talk : Blackhat : DIFUZZING ANDROID KERNEL DRIVERS -
Aravind Machiry
Chris Salls
Yan Shoshitaishvili
Jake Corina
Shuang Hao
-
2017/11/20
Talk : Hackfest : How my SV Machine nailed your Malware -
Nikhil P Kulkarni
-
2017/11/17
Talk : Deepsec : How Secure Are Your VoLTE And VoWiFi Calls? -
Sreepriya Chalakkal
-
2017/11/17
Talk : Deepsec : Intel AMT: Using & Abusing The Ghost In The Machine -
Parth Shukla
-
2017/10/19
Talk : Hacklu : Are your VoLTE and VoWiFi calls secure? -
Sreepriya Chalakkal
-
2017/10/19
Talk : Hacklu : Bug hunting using symbolic virtual machines! -
Anto Joseph
-
2017/10/19
Talk : Hacklu : Intel AMT: Using & Abusing the Ghost in the Machine -
Parth Shukla
-
2017/09/13
Talk : 44 Con : Red Team Revenge : Attacking Microsoft ATA -
Nikhil Mittal
-
2017/08/18
Talk : C0c0n : Hunting Botnets with Analytics -
Shomiron Das Gupta
-
2017/08/18
Talk : C0c0n : Phishing threats to customers and mitigation -
Bhavin Bhansali
-
2017/08/18
Talk : C0c0n : 10 Things I Hate About Your Honeypots or How to Setup Honeypots That Work -
Rahul Binjve
-
2017/08/18
Talk : C0c0n : Androsia: A tool for securing in memory sensitive data -
Samit Anwer
-
2017/08/18
Talk : C0c0n : Anti-Virus Bypassing for Fun and Profit -
Vanshit Malhotra
-
2017/08/18
Talk : C0c0n : Are TOR Hidden Services really hidden? Demystifying HS Directory surveillance by injecting Decoys inside TOR! -
Abhinav Biswas
-
2017/08/18
Talk : C0c0n : Bank on Compliance for Cyber Security -
Dinesh O Bareja
-
2017/08/18
Talk : C0c0n : Big Data Analytics with pattern matching for smarter analytics -
Tarun Wig
-
2017/08/18
Talk : C0c0n : Blockchain for Information security -
Shobha Jagathpal
-
2017/08/18
Talk : C0c0n : Case study: Security of Digital Wallet apps in India -
Ashwath Kumar
Sandesh Mysore Anand
-
2017/08/18
Talk : C0c0n : Catching Network anomalies using Deep learning -
Aditya Vasekar
-
2017/08/18
Talk : C0c0n : Challenges in Digital Banking -
Biju K
-
2017/08/18
Talk : C0c0n : Cloud_Security Suite - One stop tool for auditing cloud infrastructure -
Shivankar Madaan
Jayesh Chauhan
-
2017/08/18
Talk : C0c0n : CoAP versus MQTT: IoT Protocol Vulnerability analysis -
Rajiv Pandey
-
2017/08/18
Talk : C0c0n : Cyber bullying and Cyber Harassment -
Martina Mathew
Jacob Jose
Ankit John Abraham
Lekshmi B
-
2017/08/18
Talk : C0c0n : Cyber bullying-Screen the Mean -
Nitin Awade
Surjata Awade
-
2017/08/18
Talk : C0c0n : Cyber Security Threat Management – Model it, Collect Intelligence and Hunt them! -
Illyas Kooliyankal
-
2017/08/18
Talk : C0c0n : Cyber Threat Intelligence - Are We There , Yet…? -
A Shiju Rawther
-
2017/08/18
Talk : C0c0n : Do Students really require Smartphones -
Pranav a Menon
-
2017/08/18
Talk : C0c0n : Dynamic Binary Instrumentation -
Vivek Arora
Bhaskar Rastogi
-
2017/08/18
Talk : C0c0n : Exploiting the smartness of BLE Stack -
Apoorva Gupta
-
2017/08/18
Talk : C0c0n : Hacking Homes: A hardware insight for IoT [in]Security -
Jiggyasu Sharma
-
2017/08/18
Talk : C0c0n : Hunting the Hunters – Fighting CyberCrime at the Source -
Valan Sivasubramanian
-
2017/08/18
Talk : C0c0n : Identity Theft -
Devika a V
Meera P
-
2017/08/18
Talk : C0c0n : iGoat – A Self Learning Tool for iOS App Pentesting and Security -
Swaroop Yermalkar
-
2017/08/18
Talk : C0c0n : Internet Addiction and Children -
Teena Jose
-
2017/08/18
Talk : C0c0n : Mobile Banking (In)Security -
Sneha Rajguru
-
2017/08/18
Talk : C0c0n : Moving from Cybersecurity Awareness to Cybersecurity Competence -
Anup Narayanan
-
2017/08/18
Talk : C0c0n : OSINT and Privacy -
Rohit Srivastwa
-
2017/08/18
Talk : C0c0n : Penetration Testing Orchestrator: A Framework that leverages multi-tool penetration testing approach combined with Machine Learning-NLP for faster result analysis -
Furqan Khan
Siddharth Anbalahan
-
2017/08/18
Talk : C0c0n : Prevent Dark Side of your Smart City - A Defensive Security model for Smart City and Critical Infrastructure -
Manas Pratim Sarma
-
2017/08/18
Talk : C0c0n : Sleep, Screen and Teenagers -
Natishia Rebecca Chandy
Pulkit Deepak Khatri
-
2017/08/18
Talk : C0c0n : Social Media and You -
Parry Aftab
-
2017/08/18
Talk : C0c0n : Technology-The New Frontier in Teaching -
Bindu Mony
-
2017/08/18
Talk : C0c0n : The card hack - Lessons from the Hitachi Payments Breach -
Saikat Datta
-
2017/08/18
Talk : C0c0n : The Covert Cupid Under .11 Veil !!! /* Approach for Covert WIFI*/ -
Rushikesh D Nandedkar
-
2017/08/18
Talk : C0c0n : The Internet Of Things: Essentials of Secur(IOT)y -
Arpit Bajpai
Ronald Michael
-
2017/08/18
Talk : C0c0n : The Internet Of Things: Essentials of Secur(IOT)y -
Ronald Michel
-
2017/08/18
Talk : C0c0n : The need for Teachers to cope with Technology -
Resmi Rajan
-
2017/08/18
Talk : C0c0n : The need for Teachers to cope with Technology -
Shibi Anand
-
2017/08/18
Talk : C0c0n : The Role of Teachers in Digital Era -
Nisha Prayan
-
2017/08/18
Talk : C0c0n : Threats with online gaming and issues with games like Pokemon -
Riyaz Walikar
Akash Mahajan
-
2017/08/18
Talk : C0c0n : What Security Managers can learn from story tellers? -
Anup Narayanan
-
2017/08/18
Talk : C0c0n : Yarafying Android Malware: A Missing Step Before Malware Analysis -
Shivang Desai
-
2017/08/18
Talk : C0c0n : Your friendly neighbourhood exploit -
Aseem Jakhar
-
2017/07/27
Talk : Blackhat : Evading Microsoft ATA for Active Directory Domination -
Nikhil Mittal
-
2017/07/26
Talk : Blackhat : New Adventures in Spying 3G and 4G Users: Locate, Track & Monitor -
Ravishankar Borgaonkar
Altaf Shaik
Shinjo Park
Lucca Hirschi
Andrew Martin
Jean Pierre Seifert
-
2017/07/26
Talk : Blackhat : Wire Me Through Machine Learning -
Ankit Singh
Vijay Thaware
-
2017/06/23
Talk : Hackinparis : Injecting Security into Web apps with Runtime Patching and Context Learning -
Ajin Abraham
-
2017/05/23
Talk : Phdays : How we hacked distributed configuration management systems -
Bharadwaj Machiraju
Francis Alexander
-
2017/05/23
Talk : Phdays : Injecting security into web apps in the runtime -
Ajin Abraham
-
2017/05/23
Talk : Phdays : Practical machine learning in infosecurity -
Anto Joseph
Clarence Chio
-
2017/04/19
Talk : Brucon : Evading Microsoft ATA for Active Directory Domination -
Nikhil Mittal
-
2017/04/14
Talk : Hitb Sec Conf : COMMSEC: IoT Hacking Simplified -
Aseem Jakhar
-
2017/04/14
Talk : Hitb Sec Conf : Is There a Doctor in The House? Hacking Medical Devices and Healthcare Infrastructure -
Anirudh Duggal
-
2017/03/31
Talk : Blackhat : Mobile-Telephony Threats in Asia -
Payas Gupta
Marco Balduzzi
Lion Gu
-
2017/03/31
Talk : Blackhat : The Seven Axioms of Security -
Saumil Shah
-
2017/03/31
Talk : Blackhat : WHAT MALWARE AUTHORS DON’T WANT YOU TO KNOW - EVASIVE HOLLOW PROCESS INJECTION -
Monnappa K A
-
2017/03/30
Talk : Nullcon : DAMN VULNERABLE SS7 NETWORK -
Akib Sayyed
-
2017/03/15
Talk : Can Sec West : Inside Stegosploit -
Saumil Shah
-
2017/03/03
Talk : Nullcon : Agility with security mitigations in Windows 10 -
Swamy Shivaganga Nagaraju
-
2017/03/03
Talk : Nullcon : Case study of SS7/Sigtran assessment -
Akib Sayyed
-
2017/03/03
Talk : Nullcon : Case Study on RFID (proximity cards) hacking -
Sarwar Jahan
Ashwath Kumar
-
2017/03/03
Talk : Nullcon : DevOpSec: Rapid Security in the Cloud with AWS and CIS -
Mikhail Advani
Rajesh Tamhane
-
2017/03/03
Talk : Nullcon : Hacking medical devices and infrastructure -
Anirudh Duggal
-
2017/03/03
Talk : Nullcon : Injecting Security into Web apps with Runtime Patching and Context Learning -
Ajin Abraham
-
2017/03/03
Talk : Nullcon : Tale of training a Web Terminator! -
Bharadwaj Machiraju
-
2016/11/11
Talk : Deepsec : AMSI: How Windows 10 Plans To Stop Script Based Attacks and How Good It Does That -
Nikhil Mittal
-
2016/11/11
Talk : Deepsec : Human vs Artificial intelligence – Battle of Trust -
Hemil Shah
-
2016/11/05
Talk : Hackfest : LockPicker: Leaking data from live LUKS partition -
Adhokshaj Mishra
-
2016/11/04
Talk : Blackhat : AppMon: Runtime Security Testing & Profiling Framework for Native Apps -
Nishant Das Patnaik
-
2016/11/04
Talk : Blackhat : Detach Me Not - DoS Attacks Against 4G Cellular Users Worldwide from your Desk -
Siddharth Rao
Bhanu Kotte
Dr. Silke Holtmanns
-
2016/11/04
Talk : Blackhat : Randomization Can’t Stop BPF JIT Spray -
N Asokan
Filippo Bonazzi
Elena Reshetova
-
2016/10/27
Talk : Brucon : Decepticon The Rise and Evolution of an Intelligent Evil Twin…!!! -
Rushikesh D Nandedkar
Amrita C Iyer
Krishnakant Patil
-
2016/10/19
Talk : Hacklu : 2016: The Infosec Crossroads -
Saumil Shah
-
2016/09/23
Talk : Rootcon : Halcyon – A Faster Way to Build Custom Scripts for Nmap Scans -
Sanoop Thomas
-
2016/09/14
Talk : 44 Con : 2016: The Infosec Crossroads -
Saumil Shah
-
2016/08/19
Talk : C0c0n : Abusing Digital Certificates : Malware Style -
Ajit Hatti
-
2016/08/19
Talk : C0c0n : App Sec in the Time of Docker Containers -
Akash Mahajan
-
2016/08/19
Talk : C0c0n : Attacking and crashing IOT devices via Bluetooth LE Protocol -
Pratap Chandra Allena
Ajay Pratap Singh
-
2016/08/19
Talk : C0c0n : Backdooring my Enemies with a Proxy for Threat Intelligence -
Jovin Lobo
Aditya Vasekar
-
2016/08/19
Talk : C0c0n : Breaking into Gas stations! -
Suraj Pratap
-
2016/08/19
Talk : C0c0n : Esoteric XSS Payloads -
Riyaz Walikar
-
2016/08/19
Talk : C0c0n : Evading Corporate Security – You’re as secure as the weakest link -
Prajwal Panchmahalkar
-
2016/08/19
Talk : C0c0n : How (in)secure are Indian GSM networks? -
Ajay Fuloria
-
2016/08/19
Talk : C0c0n : Kill the password - A new era of authentication -
Tamaghna Basu
-
2016/08/19
Talk : C0c0n : SSD Forensics : A Nightmare for Forensic Investigators -
Santosh Khadsare
-
2016/08/19
Talk : C0c0n : The Art of Social Hacking -
Gaurav Trivedi
Rugved Mehta
-
2016/08/19
Talk : C0c0n : Threats in Connected World -
Bhavin Gandhi
-
2016/08/04
Talk : Blackhat : DPTrace: Dual Purpose Trace for Exploitability Analysis of Program Crashes -
Rohit Mothe
Rodrigo Rubira Branco
-
2016/08/03
Talk : Blackhat : AMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does It -
Nikhil Mittal
-
2016/07/01
Talk : Hackinparis : DIFFDroid - Dynamic Analysis Made Easier for Android -
Anto Joseph
-
2016/05/26
Talk : Hitb Sec Conf : HITB Lab: Droid-FF: The First Android Fuzzing Framework -
Anto Joseph
-
2016/05/26
Talk : Hitb Sec Conf : HITB Lab: Mobile Application Security for iOS and Android -
Tushar Dalvi
Tony Trummer
-
2016/05/17
Talk : Phdays : Fingerprinting and Attacking a Healthcare Infrastructure -
Anirudh Duggal
-
2016/05/17
Talk : Phdays : Security Automation Based on Artificial Intelligence -
Rahul Sasi
-
2016/04/01
Talk : Blackhat : Halcyon – A Faster Way to Build Custom Scripts for Nmap Scans -
Sanoop Thomas
-
2016/03/11
Talk : Nullcon : Attacking and defending healthcare - EMR solutions -
Anirudh Duggal
-
2016/03/11
Talk : Nullcon : Automated Mobile Application Security Assessment with MobSF -
Ajin Abraham
-
2016/03/11
Talk : Nullcon : Hitchhiker’s guide to hacking Industrial Control systems (ICS) -
Arun Mane
-
2016/03/11
Talk : Nullcon : Making Machines think about security for fun and profit -
Rahul Sasi
-
2016/03/11
Talk : Nullcon : Million Dollar Baby: Towards ANGRly conquering DARPA CGC -
Aravind Machiry
-
2016/03/11
Talk : Nullcon : Privacy leaks on 4G-LTE networks -
Altaf Shaik
-
2016/03/11
Talk : Nullcon : Real-time Ingestion of security telemetry data into Hadoop distributed system to respond to 0-day -
Pallav Jakhotiya
Vipul Sawant
-
2015/11/19
Talk : Deepsec : Continuous Intrusion: Why CI Tools Are an Attacker’s Best Friends. -
Nikhil Mittal
-
2015/11/13
Talk : Blackhat : LTE & IMSI Catcher Myths -
Ravishankar Borgaonkar
N Asokan
Altaf Shaik
Valtteri Niemi
Jean Pierre Seifert
-
2015/11/13
Talk : Blackhat : AUTOMATING LINUX MALWARE ANALYSIS USING LIMON SANDBOX -
Monnappa K A
-
2015/11/13
Talk : Blackhat : Continuous Intrusion: Why CI tools are an Attacker’s Best Friends -
Nikhil Mittal
-
2015/11/12
Talk : Blackhat : Stegosploit - Exploit Delivery with Steganography and Polyglots -
Saumil Shah
-
2015/11/05
Talk : Ground Zero Summit : Cyber Security in Hospitals:Hospitals Under Seige -
Anirudh Duggal
-
2015/11/05
Talk : Ground Zero Summit : Exposing Cyber Espionage: Hello from Pakistan- IIC Session -
Jiten Jain
-
2015/11/05
Talk : Ground Zero Summit : Western Air Command -
B S Singh Deo
-
2015/11/05
Talk : Ground Zero Summit : Authentication flaw in Automatic Bank Passbook printing machine. -
Indrajeet Bhuyan
-
2015/11/05
Talk : Ground Zero Summit : Browser based Malware attacks -
Harsh Daftary
-
2015/11/05
Talk : Ground Zero Summit : chellam – a Wi-Fi IDS/Firewall for Windows -
Vivek Ramachandran
-
2015/11/05
Talk : Ground Zero Summit : Credit Card Frauds – The money making Ecosystem for Cyber criminals -
Abhinav Singh
-
2015/11/05
Talk : Ground Zero Summit : Dissecting Android Malware -
Anto Joseph
-
2015/11/05
Talk : Ground Zero Summit : Economics of Post Quantum Crypto Systems : Do we really Need it -
Ajit Hatti
-
2015/11/05
Talk : Ground Zero Summit : Elliptical Curve Cryptography -
Aneesha S
-
2015/11/05
Talk : Ground Zero Summit : Hacking RFIDs under 2000INR -
Jayesh Chauhan
-
2015/11/05
Talk : Ground Zero Summit : OSINT Black Magic: Listen who whispers your name in the dark!!! -
Sudhanshu Chauhan
Nutan Kumar Panda
-
2015/11/05
Talk : Ground Zero Summit : Sanctioned to Hack: Your SCADA HMIs Belong to Us! -
Aditya K Sood
-
2015/11/05
Talk : Ground Zero Summit : Thanks for the free cookies -
Anshul Saxena
Nishant Yadav
-
2015/11/05
Talk : Ground Zero Summit : Trailing Terror in the Darknets -
Shesh Sarangdhar
-
2015/11/05
Talk : Ground Zero Summit : Wolves Among Sheep: Defeating Targeted Attacks With Deception -
Sahir Hidayatullah
Raviraj Doshi
-
2015/11/05
Talk : Ground Zero Summit : XSS - The art of evading web application filters! -
Anirudh Anand
-
2015/10/21
Talk : Hacklu : Stegosploit - Delivering Drive-By Exploits With Only Images -
Saumil Shah
-
2015/10/08
Talk : Brucon : The .11 Veil, Camouflage & Covert!!! Invisible Wifi, Revealed -
Rushikesh D Nandedkar
Amrita C Iyer
-
2015/09/11
Talk : 44 Con : Stegosploit – Drive-by Browser Exploits using only Images -
Saumil Shah
-
2015/08/08
Talk : Defcon : Chigula — a framework for Wi-Fi Intrusion Detection and Forensics -
Vivek Ramachandran
-
2015/08/08
Talk : Defcon : Dissecting the Design of SCADA Web Human Machine Interfaces (HMIs) - Hunting Vulnerabilities -
Aditya K Sood
-
2015/08/08
Talk : Defcon : QARK: Android App Exploit and SCA Tool -
Tushar Dalvi
Tony Trummer
-
2015/08/07
Talk : Defcon : Chellam – a Wi-Fi IDS/Firewall for Windows -
Vivek Ramachandran
-
2015/08/06
Talk : Blackhat : Harnessing Intelligence from Malware Repositories -
Arun Lakhotia
Vivek Notani
-
2015/08/01
Talk : C0c0n : A Pentester’s Methodology to Discover, Automate and Exploit Windows Privilege Escalation flaws. -
Riyaz Walikar
-
2015/08/01
Talk : C0c0n : Attack chaining for web exploitation- From Information leakage to gaining Root access -
Abhijeth Dugginapeddi
-
2015/08/01
Talk : C0c0n : Automated Security Analysis of Android & iOS Applications with Mobile Security Framework -
Ajin Abraham
-
2015/08/01
Talk : C0c0n : Blockchains in Security -
Harsh Patel
-
2015/08/01
Talk : C0c0n : Breaking into Infosec Research -
Vivek Ramachandran
-
2015/08/01
Talk : C0c0n : Demystifying and Breaking BLE -
Yashin Mehaboobe
-
2015/08/01
Talk : C0c0n : From AOSP ( Android OpenSource Project ) to ABD ( Android Based Devices ) -
Anto Joseph
-
2015/08/01
Talk : C0c0n : Hacking RFIDs under 2000 INR -
Jayesh Chauhan
Divya S John
-
2015/08/01
Talk : C0c0n : Medical device security and critical infrastructure inside hospitals -
Anirudh Duggal
-
2015/08/01
Talk : C0c0n : NoPo - The NoSQL HoneyPot Framework -
Francis Alexander
-
2015/08/01
Talk : C0c0n : Reversing and Deciphering the Cyber Espionage Malware Communications -
Monnappa K A
-
2015/08/01
Talk : C0c0n : S3curi7y at 36K feet -
Rugved Mehta
Gaurav Trivedi
-
2015/08/01
Talk : C0c0n : Understanding the known : A deep look at OWASP A9 : Using Components with Known Vulnerabilities -
Anant Shrivastava
-
2015/07/06
Talk : Blackhat : DOM FLOW - UNTANGLING THE DOM FOR MORE EASY-JUICY BUGS -
Ahamed Nafeez
-
2015/05/29
Talk : Hitb Sec Conf : Hacking Samsung’s Tizen: The OS of Everything -
Ajin Abraham
-
2015/05/29
Talk : Hitb Sec Conf : PowerShell for Penetration Testers -
Nikhil Mittal
-
2015/05/28
Talk : Hitb Sec Conf : Stegosploit: Hacking With Pictures -
Saumil Shah
-
2015/05/28
Talk : Hitb Sec Conf : The Savage Curtain: Mobile SSL Failures -
Tushar Dalvi
Tony Trummer
-
2015/05/26
Talk : Phdays : Invisible Backdoors In Your Code -
Debasis Mohanty
-
2015/05/26
Talk : Phdays : iOS Application Exploitation -
Prateek Gianchandani
Egor Tolstoy
-
2015/03/27
Talk : Blackhat : Security Content Metadata Model with an Efficient Search Methodology for Real Time Monitoring and Threat Intelligence -
Preeti Subramanian
-
2015/03/27
Talk : Syscan : Stegosploit - Hacking with Pictures -
Saumil Shah
-
2015/03/26
Talk : Blackhat : The underground Ecosystem of Credit Card frauds -
Abhinav Singh
-
2015/02/06
Talk : Nullcon : Analyzing Chrome crash reports at scale -
Abhishek Arya
-
2015/02/06
Talk : Nullcon : Anatomy of a credit card stealing POS malware -
Amol Sarwate
-
2015/02/06
Talk : Nullcon : Attack and Defence in Radio and Communication Warfare -
Akib Sayyed
-
2015/02/06
Talk : Nullcon : Building custom scans for real world enterprise network -
Sanoop Thomas
-
2015/02/06
Talk : Nullcon : Drone Attacks: How I hijacked a drone -
Rahul Sasi
-
2015/02/06
Talk : Nullcon : Generic Executable Unpacking using Dynamic Binary Instrumentation -
Shubham Bansal
-
2015/02/06
Talk : Nullcon : Hacking Tizen: The OS of Everything -
Ajin Abraham
-
2015/02/06
Talk : Nullcon : Hunting and Decrypting Ghost communications using Memory Forensics -
Monnappa K A
-
2015/02/06
Talk : Nullcon : Pentesting a website with million lines of Javascript -
Lavakumar Kuppan
Ahamed Nafeez
-
2015/02/06
Talk : Nullcon : Toliman, a Hadoop Pentesting Tool -
Jitendra Chauhan
-
2014/11/13
Talk : Ground Zero Summit : Attacking Cryptography & PKI Implementations -
Ajit Hatti
-
2014/11/13
Talk : Ground Zero Summit : Identity theft and its impact on Cyber - Warfare -
Tarun Wig
-
2014/11/13
Talk : Ground Zero Summit : Network Time Protocol in Amplification Inferno -
Sriram Krishnan
-
2014/11/13
Talk : Ground Zero Summit : Security vulnerabilities in DVB-C networks: Hacking Cable TV network -
Rahul Sasi
-
2014/11/13
Talk : Ground Zero Summit : 9 Cell Cyber Diplomacy -
Alok Vijayant
-
2014/11/13
Talk : Ground Zero Summit : APT protection for the Enterprise -
Deepak Singla
-
2014/11/13
Talk : Ground Zero Summit : Attacking Web-Proxies like never before -
Ahamed Nafeez
-
2014/11/13
Talk : Ground Zero Summit : Cyber ‘BrahMos’ - Static analysis driven secure coding -
Joy Sen
-
2014/11/13
Talk : Ground Zero Summit : Detecting Fake Cell Phone Towers -
Vijay Mukhi
-
2014/11/13
Talk : Ground Zero Summit : Enterprise Security -
Mano Paul
-
2014/11/13
Talk : Ground Zero Summit : Evaluating WAF (Web Application Firewall) for Fun and Profit with WOF -
Bhaumik Merchant
-
2014/11/13
Talk : Ground Zero Summit : Financial Integrity and Cyber Security -
Karnal Singh
-
2014/11/13
Talk : Ground Zero Summit : Fuzzing Asynchronous Protocols built over Websockets -
Lavakumar Kuppan
-
2014/11/13
Talk : Ground Zero Summit : Hacking consumer electronics for Fun -
Atul Alex
-
2014/11/13
Talk : Ground Zero Summit : How I won Browser Fuzzing -
Amol Naik
-
2014/11/13
Talk : Ground Zero Summit : Internet Governance -
Anjana Kovacs
-
2014/11/13
Talk : Ground Zero Summit : Making and Breaking Embedded Security -
Yashin Mehaboobe
-
2014/11/13
Talk : Ground Zero Summit : Mobile security Automation Framework for Intelligent Auditing -
Ankur Bhargava
-
2014/11/13
Talk : Ground Zero Summit : National Cyber Policy and its impact on Business -
Vaishali Bhagwat
-
2014/11/13
Talk : Ground Zero Summit : SCADA Exploitation through Firmware -
Ashish Saxena
-
2014/11/13
Talk : Ground Zero Summit : Vulnerability Reproduction using Zest -
Deep Shah
-
2014/10/29
Talk : Ekoparty : Security vulnerabilities in DVB-C networks: Hacking Cable tV network part 2 -
Rahul Sasi
-
2014/10/23
Talk : Hacklu : Hacking with Images - Evil Pictures -
Saumil Shah
-
2014/10/23
Talk : Hacklu : WiHawk - Router Vulnerability Scanner -
Anamika Singh
-
2014/10/17
Talk : Blackhat : Android Kernel and OS Security Assessment with Iron Crow -
Akhil Arora
Sumanth Naropanth
-
2014/10/16
Talk : Grrcon : Socioware: Dissecting Online Social Network Worms – Insidious Analysis and Design -
Aditya K Sood
Dr. Richard J Enbody
-
2014/09/28
Talk : Blackhat : Understanding IMSI Privacy -
Swapnil Udar
Ravishankar Borgaonkar
-
2014/09/24
Talk : Brucon : OWASP: OWTF -
Bharadwaj Machiraju
-
2014/08/22
Talk : C0c0n : APT: Case Study of attackers targeting public tendering -
Rahul Sasi
-
2014/08/22
Talk : C0c0n : Breaking and Securing Mobile Apps - Automagically -
Aditya Gupta
-
2014/08/22
Talk : C0c0n : Cryptocalypse, Heart Bleed : Is our Government Listening? -
Ajit Hatti
-
2014/08/22
Talk : C0c0n : Cryptographic Backdoors: Subverting the RSA -
Adhokshaj Mishra
-
2014/08/22
Talk : C0c0n : Exploiting NoSQL Like Never Before -
Francis Alexander
-
2014/08/22
Talk : C0c0n : Hacking Communication -
Akib Sayyed
-
2014/08/22
Talk : C0c0n : Idle Machines doing Bounty Hunting (Behind your Back) -
Mrityunjay Gautam
-
2014/08/22
Talk : C0c0n : Lesser Known Attack - XML Injection -
Amol Naik
-
2014/08/22
Talk : C0c0n : Making and breaking security in embedded devices -
Yashin Mehaboobe
-
2014/08/22
Talk : C0c0n : My tryst with Source Code Review -
Anant Shrivastava
-
2014/08/22
Talk : C0c0n : Piracy Tracker -
Vargheese Babu
-
2014/08/22
Talk : C0c0n : Still Single with a bleeding heart (Tool Release) -
Tamaghna Basu
-
2014/08/22
Talk : C0c0n : The Curious Case of ProtoBufs - Demystifying Google’s hottest binary protocol -
Prasanna Kanagasabai
Jovin Lobo
-
2014/08/07
Talk : Blackhat : Lifecycle of a phone fraudster: Exposing fraud activity from reconnaissance to takeover using graph analysis and acoustical anomalies -
Vijay Balasubramaniyan
Raj Bandyopadhyay
Telvis Calhoun
-
2014/08/06
Talk : Blackhat : What goes around comes back around - Exploiting fundamental weaknees in Botnet C&C Panels! -
Aditya K Sood
-
2014/06/23
Talk : Hackinparis : Pentesting NoSQL DB’s with NoSQL Exploitation Framework -
Francis Alexander
-
2014/05/29
Talk : Hitb Sec Conf : Hacking Your Cable TV Network: Die Hard Style -
Rahul Sasi
-
2014/05/29
Talk : Hitb Sec Conf : LOL (Layers On Layers) – Bypassing Endpoint Security for Fun and Profit -
Rahul Kashyap
Rafal Wojtzcuk
-
2014/05/21
Talk : Phdays : Android Exploitation -
Aditya Gupta
-
2014/05/21
Talk : Phdays : ARM Exploitation -
Aseem Jakhar
-
2014/03/27
Talk : Blackhat : JS Suicide: Using JavaScript Security Features to Kill JS Security -
Ahamed Nafeez
-
2014/03/18
Talk : Troopers : Evolution of SIM Card Security -
Ravishankar Borgaonkar
-
2014/02/14
Talk : Nullcon : 12 YEARS AND A BAKER’S DOZEN -
Saumil Shah
-
2014/02/14
Talk : Nullcon : 2014 The year in which we cannot ignore SCADA -
Amol Sarwate
-
2014/02/14
Talk : Nullcon : A security analysis of Browser Extensions -
Abhay Rana
-
2014/02/14
Talk : Nullcon : Attack of the setuid bit - pt_chown and pwning root terminals -
Siddhesh Poyarekar
-
2014/02/14
Talk : Nullcon : Attacking WPA/WPA2 in the Cloud -
Vivek Ramachandran
-
2014/02/14
Talk : Nullcon : Chrome - OS Security 2014: New and future hotness -
Sumit Gwalani
-
2014/02/14
Talk : Nullcon : Flowinspect - A Network Inspection Tool -
Ankur Tyagi
-
2014/02/14
Talk : Nullcon : Hacking YOu’r Cable TV Network. -
Rahul Sasi
Ahamed Nafeez
-
2014/02/14
Talk : Nullcon : Hardware Attack Vectors -
Yashin Mehaboobe
-
2014/02/14
Talk : Nullcon : In air they wander, we exist to blow their cover!!! {Approaches to Evil Twin Detection from a normal user’s perspective} -
Rushikesh D Nandedkar
Amrita C Iyer
-
2014/02/14
Talk : Nullcon : Multi-value W-Fi What the Heck is it -
Abhijeet Ghosh
-
2014/02/14
Talk : Nullcon : Null Hardware Badge 101 (Desi Jugaad) -
Amey Gat
Umesh
-
2014/02/14
Talk : Nullcon : o’Dea Assertions - Untwining the Security of the SAML Protocol -
Achin Kulshrestha
-
2014/02/14
Talk : Nullcon : Pentesting without Pentesters - Automating Security Testing with Functional Testing Test Cases -
Ankita Gupta
Lavakumar Kuppan
-
2014/02/14
Talk : Nullcon : phoneypdf: A Virtual PDF Analysis Framework -
Kiran Bandla
-
2014/02/14
Talk : Nullcon : Strategic Information Warfare: When Ends define the means -
Amit Sharma
-
2014/02/14
Talk : Nullcon : The Security Challenge -
Shantanu Ghosh
-
2014/02/14
Talk : Nullcon : Wi-Hawk Password Auditing Tool -
Anamika Singh
-
2013/11/21
Talk : Deepsec : Automation In Android & iOS Application Security Review -
Hemil Shah
-
2013/11/21
Talk : Deepsec : Europe In The Carna Botnet: Telnet’s Threat To The Largest Economy -
Parth Shukla
-
2013/11/07
Talk : Ground Zero Summit : Abusing Google Apps: Google is my command and control center -
Ajin Abraham
-
2013/11/07
Talk : Ground Zero Summit : Advanced security for advanced threats -
Kartik Shahani
-
2013/11/07
Talk : Ground Zero Summit : Approach to containing the outbreak of malicious information in online social networks -
Sriniketh Vijayaraghavan
-
2013/11/07
Talk : Ground Zero Summit : Central Monitoring System and IT Act 2000 – Balance between rights of citizens and state -
Vaishali Bhagwat
-
2013/11/07
Talk : Ground Zero Summit : Cloud Security: Enabling continuous, scalable security for today’s hyper connected world -
Sumedh Thakar
-
2013/11/07
Talk : Ground Zero Summit : Evolution of network security around Software Defined Networking (SDN) – The intelligent network -
Diwakar Dayal
-
2013/11/07
Talk : Ground Zero Summit : How I built a pentest lab in under 70 USD -
Swaroop Yermalkar
-
2013/11/07
Talk : Ground Zero Summit : Internet – Transforming terrorism -
Sameer Saxena
-
2013/11/07
Talk : Ground Zero Summit : IronWASP -
Lavakumar Kuppan
-
2013/11/07
Talk : Ground Zero Summit : Malware for Firefox Mobile OS -
Shantanu Gawde
-
2013/11/07
Talk : Ground Zero Summit : Securing government Critical Information Infrastructure -
Kapil Awasthi
-
2013/11/07
Talk : Ground Zero Summit : Serial killing of embedded systems -
Atul Alex
-
2013/11/07
Talk : Ground Zero Summit : Setting the Data Center on fire -
Ajit Hatti
-
2013/11/07
Talk : Ground Zero Summit : The seven sins of Wi-Fi security -
Vivek Ramachandran
-
2013/11/07
Talk : Ground Zero Summit : Towards a next generation secure Internet -
Sanjay Deshpande
-
2013/11/07
Talk : Ground Zero Summit : Understanding the anatomy of advanced targeted attacks – The Trend Micro approach -
Tarun Gupta
-
2013/10/17
Talk : Hitb Sec Conf : Static Analysis and Dynamic Instrumentation for Intelligent Exploit Analysis -
Rahul Sasi
-
2013/09/27
Talk : C0c0n : ARM, Thumb and the Finger -
Aseem Jakhar
-
2013/09/27
Talk : C0c0n : Blur Captcha -
Anirudh Duggal
Abhinav Mohanty
-
2013/09/27
Talk : C0c0n : Disclosing Vulnerabilities: The Bug Bounty Style -
Nikhil P Kulkarni
-
2013/09/27
Talk : C0c0n : From Bedroom to Boardroom - Taking your Weekend Infosec Project Global -
Vivek Ramachandran
-
2013/09/27
Talk : C0c0n : Hello CISO! How to make end-users LIKE and FOLLOW “Brand Infosec”? -
Anup Narayanan
-
2013/09/27
Talk : C0c0n : Infiltrating the Intranet with Skanda -
Jayesh Chauhan
-
2013/09/27
Talk : C0c0n : Lets Play - Applanting on new Grounds -
Ajit Hatti
-
2013/09/27
Talk : C0c0n : Pwning WiFi Devices! -
Swaroop Yermalkar
-
2013/09/27
Talk : C0c0n : Risk and challenges in virtual currencies. -
Harsh Patel
Swatantra Kumar Gupta
-
2013/09/27
Talk : C0c0n : Sandy - The Malicious Analysis -
Rahul Sasi
-
2013/09/27
Talk : C0c0n : Snake Bites -
Anant Shrivastava
-
2013/09/27
Talk : C0c0n : SSRF / XSPA - Real World Attacks and Mitigations -
Riyaz Walikar
-
2013/09/27
Talk : C0c0n : Static analysis of malware with PyTriage -
Yashin Mehaboobe
-
2013/09/27
Talk : C0c0n : The Art and Science of Anamoly based Vulnerability Detection -
Lavakumar Kuppan
-
2013/09/27
Talk : C0c0n : The Secure Software Development Life Cycle -
Harshal Jamdade
-
2013/09/13
Talk : Rootcon : My Experiments with truth: a different route to bug hunting -
Devesh Bhatt
-
2013/09/12
Talk : Grrcon : The Droid Exploitation Saga – All Over Again! -
Aditya Gupta
Subho Halder
-
2013/08/03
Talk : Defcon : PowerPreter: Post Exploitation Like a Boss -
Nikhil Mittal
-
2013/08/01
Talk : Blackhat : Hot knives through butter: Bypassing automated analysis systems -
Abhishek Singh
Zheng Bu
-
2013/07/31
Talk : Blackhat : Clickjacking revisited: A perceptual view of UI security -
Devdatta Akhawe
-
2013/07/31
Talk : Blackhat : Javascript static security analysis made easy with JSPrime -
Nishant Das Patnaik
Sarathi Sabyasachi Sahoo
-
2013/07/31
Talk : Blackhat : LTE booms with vulnerabilities -
Ankit Gupta
-
2013/03/15
Talk : Blackhat : The Sandbox Roulette- Are you ready for the gamble? -
Rahul Kashyap
Rafal Wojtczuk
-
2013/03/14
Talk : Blackhat : Lets play - Applanting -
Ajit Hatti
-
2013/03/12
Talk : Troopers : Dirty use of USSD Codes in Cellular Network -
Ravishankar Borgaonkar
-
2013/03/07
Talk : Can Sec West : SMS to Meterpreter - Fuzzing USB Modems -
Rahul Sasi
-
2013/03/01
Talk : Nullcon : Automating JavaScript Static Analysis -
Lavakumar Kuppan
-
2013/03/01
Talk : Nullcon : Bug Bounty Hunter’s confession -
Amol Naik
-
2013/03/01
Talk : Nullcon : BYOD: How will it shape your wireless network security in future? -
Kiran Deshpande
-
2013/03/01
Talk : Nullcon : Capturing Zero-Day Information -
Dinesh O Bareja
Sumit Sharma
-
2013/03/01
Talk : Nullcon : CSRF Finder as a Mozilla Addon -
Piyush Pattanayak
-
2013/03/01
Talk : Nullcon : Detecting and Exploiting XSS Vulnerabilities and Xenotix XSS Exploitation Framework -
Ajin Abraham
-
2013/03/01
Talk : Nullcon : Inception of graphical passwords -
Rishi Narang
-
2013/03/01
Talk : Nullcon : Mobile Code mining for discovery and exploits -
Hemil Shah
-
2013/03/01
Talk : Nullcon : Pawing the Droid: Twisting the ARM -
Divyanshu Shekhar
Anshul Kumar
-
2013/03/01
Talk : Nullcon : Rest - A Real Stealth and Semi Stealth MITM Attack Tool for IPv4 Networks -
Naga Rohit Samineni
-
2013/03/01
Talk : Nullcon : Sensitive Campus Security with Network -
Aravind Sitaraman
-
2013/03/01
Talk : Nullcon : SMS to Meterpreter - Fuzzing USB Modems -
Rahul Sasi
-
2013/03/01
Talk : Nullcon : Vulnerability research anyone? -
Omair
-
2012/12/06
Talk : Blackhat : Attacking ODATA -
Gursev Singh Kalra
-
2012/12/06
Talk : Blackhat : HTML5 top 10 threats – Stealth Attack and Silent Exploits -
Shreeraj Shah
-
2012/12/06
Talk : Blackhat : Poking servers with Facebook(and other web applications) -
Riyaz Walikar
-
2012/12/06
Talk : Blackhat : The art of exploiting logical flaws in web apps -
Sumit Siddharth
Richard Dean
-
2012/12/05
Talk : Blackhat : Droid Exploitation Saga -
Aditya Gupta
Subho Halder
-
2012/12/01
Talk : Clubhack : Content-Type attack -Dark hole in the secure environment -
Raman Gupta
-
2012/12/01
Talk : Clubhack : Detecting and Exploiting XSS with Xenotix XSS Exploit Framework -
Ajin Abraham
-
2012/12/01
Talk : Clubhack : Real Time Event Recording System, the tool for Digital Forensics Investigation -
Madhav Limaye
-
2012/12/01
Talk : Clubhack : Anatomy of a Responsible Disclosure – Zero Day Vulnerability in Oracle BI Publisher -
Vishal Kalro
-
2012/12/01
Talk : Clubhack : FatCat Web Based SQL Injector -
Sandeep Kamble
-
2012/12/01
Talk : Clubhack : Hacking and Securing iOS applications -
Satish Bommisetty
-
2012/12/01
Talk : Clubhack : HAWAS – Hybrid Analyzer for Web Application Security -
Lavakumar Kuppan
-
2012/12/01
Talk : Clubhack : Infrastructure Security -
Sivamurthy Hiremath
-
2012/12/01
Talk : Clubhack : Legal Nuances to the Cloud -
Ritambhara Agrawal
-
2012/12/01
Talk : Clubhack : Smart Grid Security -
Falgun Rathod
-
2012/12/01
Talk : Clubhack : Stand Close to Me, & You’re pwned! : Owning SmartPhones using NFC -
Aditya Gupta
Subho Halder
-
2012/12/01
Talk : Clubhack : The difference between the “Reality” and “Feeling” of Security: Information Security and the Human Being -
Thomas Kurian Ambattu
-
2012/12/01
Talk : Clubhack : XSSshell -
Vandan Joshi
-
2012/11/29
Talk : Deepsec : Bad Things in Good Packages - Creative Exploit Delivery -
Saumil Shah
-
2012/11/23
Talk : Malcon : Advanced Malware Engine -
Mohit Kumar
-
2012/11/23
Talk : Malcon : Advances in ROP attacks -
Raashid Bhat
-
2012/11/23
Talk : Malcon : Surprise paper! -
Atul Alex
-
2012/11/23
Talk : Malcon : Tampering in Energy Meters -
Mohit Arora
-
2012/11/23
Talk : Malcon : Windows Phone 8 Malware Prototype -
Shantanu Gawde
-
2012/10/23
Talk : Hacklu : Buster: Android Security Buster -
Atul Alex
-
2012/10/11
Talk : Hitb Sec Conf : XSS & CSRF strike back – Powered by HTML5 -
Shreeraj Shah
-
2012/10/10
Talk : Hitb Sec Conf : Innovative Approaches to Exploit Delivery -
Saumil Shah
-
2012/09/27
Talk : Grrcon : The Realm of Third Generation Botnet Attacks -
Aditya K Sood
Dr. Richard J Enbody
-
2012/09/26
Talk : Nullcon : Forensics Timeline Analysis -
Aashish Kunte
-
2012/09/26
Talk : Nullcon : Highly Harmful Audio Waves aka DTMF Fuzzing -
Rahul Sasi
-
2012/09/26
Talk : Nullcon : How secure is internet banking in India -
Ajit Hatti
-
2012/09/26
Talk : Nullcon : Opening the kimono: Automating behavioral analysis for mobile apps -
Pradeep Kulkarni
Michael Sutton
-
2012/09/26
Talk : Nullcon : The art of Passive Web Vul Analysis with IronWASP -
Lavakumar Kuppan
-
2012/09/20
Talk : Ekoparty : Dirty use of USSD Codes in Cellular Network -
Ravishankar Borgaonkar
-
2012/09/20
Talk : Ekoparty : Fuzzing DTMF Input Processing Algorithms -
Rahul Sasi
-
2012/09/05
Talk : 44 Con : Why Integrity is left alone and not given TLC (Tender, Love and Care) it deserves? -
Jitender Arora
-
2012/08/03
Talk : C0c0n : A model to reduce information security risks due to human error -
Anup Narayanan
-
2012/08/03
Talk : C0c0n : Building Security Incident Detection & Handling Capabilities in Enterprises -
Sunil Varkey
-
2012/08/03
Talk : C0c0n : Business Continuity and Risk Management in Turbulent Times -
Venkataram Arabolu
-
2012/08/03
Talk : C0c0n : Contemporary Transcription and Resource Parasitism -
Arpit Patel
-
2012/08/03
Talk : C0c0n : Cracking the Mobile Application Source Code -
Sreenarayan Ashokkumar
-
2012/08/03
Talk : C0c0n : Easy Money with UI-Redressing -
Amol Naik
-
2012/08/03
Talk : C0c0n : Enterprise server security -
Raghav Shandilya
-
2012/08/03
Talk : C0c0n : Evil JavaScript -
Bishan Singh
-
2012/08/03
Talk : C0c0n : Gathering security requirements -
K v Prashant
Saleem Ahamed
-
2012/08/03
Talk : C0c0n : I haz you and pwn your maal -
Harsimran Singh Walia
-
2012/08/03
Talk : C0c0n : Layer 8 Exploitation: A threat to National Security -
Aakash Goel
-
2012/08/03
Talk : C0c0n : Security Incidents – Avoiding the Apocalypse in 2012 -
Ashish Chandra Mishra
-
2012/08/03
Talk : C0c0n : The Management of Information Security – A Corporate Practitioner’s Perspective -
Pawan Kumar Singh
-
2012/08/03
Talk : C0c0n : The Weakest Link - Reinforcing the Human Element -
Sandeep Godbole
-
2012/08/03
Talk : C0c0n : WebApp Remote Code Execution using Server Side Scripting Engines -
Rahul Sasi
-
2012/07/28
Talk : Defcon : Botnets Die Hard - Owned and Operated -
Aditya K Sood
Richard J Enbody
-
2012/07/26
Talk : Blackhat : HTML5 top 10 threats – Stealth Attack and Silent Exploits -
Shreeraj Shah
-
2012/05/24
Talk : Hitb Sec Conf : CXML/VXML Auditing for IVR Pentesters and PCI/DSS Consultants -
Rahul Sasi
-
2012/03/21
Talk : Troopers : More Fun Using Kautilya or Is It a Thumb Drive? Is It a Toy? No, It’s a Keyboard -
Nikhil Mittal
-
2012/03/16
Talk : Blackhat : IVR Security- Internal Network Attack via Phone Lines -
Rahul Sasi
-
2012/03/16
Talk : Blackhat : The Pwnage Saga Continues -
Nikhil Mittal
-
2012/03/14
Talk : Blackhat : Hacking XPATH 2.0 -
Sumit Siddharth
Tom Forbes
-
2012/03/14
Talk : Blackhat : HTML5 top 10 threats – Stealth Attack and Silent Exploits -
Shreeraj Shah
-
2012/02/15
Talk : Nullcon : Application security cost management -
Ketan Vyas
-
2012/02/15
Talk : Nullcon : Attacking Backup Software -
Nibin Varghese
-
2012/02/15
Talk : Nullcon : Best practices to improve the security grading of your project -
Hemant Khandelwal
-
2012/02/15
Talk : Nullcon : Binary God -
Atul Alex
-
2012/02/15
Talk : Nullcon : CAPTCHAs for fun and Profit -
Gursev Singh Kalra
-
2012/02/15
Talk : Nullcon : Content sniffing Algorithm bypassing techniques and possible attack vectors -
Anil Aphale
Chaitany Kamble
-
2012/02/15
Talk : Nullcon : Cyberspace: Global commons or a national asset -
Kamlesh Bajaj
-
2012/02/15
Talk : Nullcon : Friction in the machine -
Dinesh Shenoy
-
2012/02/15
Talk : Nullcon : Haxdroid: Empowering Android Handset -
Anant Shrivastava
Prashant Mahajan
Pardhasaradhi Ch
-
2012/02/15
Talk : Nullcon : IVR Security: Internal Network attacks via phone lines -
Rahul Sasi
-
2012/02/15
Talk : Nullcon : Javascript static analysis with IronWASP -
Lavakumar Kuppan
-
2012/02/15
Talk : Nullcon : Node.js: The good, bad and ugly -
Bishan Singh
-
2012/02/15
Talk : Nullcon : Open source revolution :Need Hardware - Software marriage -
Dr Venkatesh
-
2012/02/15
Talk : Nullcon : Ra.2 Blackbox DOM-based XSS scanner -
Nishant Das Patnaik
Sarathi Sabyasachi Sahoo
-
2012/02/15
Talk : Nullcon : Sandboxing The deep truth -
Disha Agarwal
Manish Pali
-
2012/02/15
Talk : Nullcon : SCADA Security: Why is it so hard -
Amol Sarwate
-
2012/02/15
Talk : Nullcon : Shall we dust Beep? The Geo-strategic realities of Cyberwar -
Pukhraj Singh
-
2012/02/15
Talk : Nullcon : Teensy for fun and jugaad -
Amey Gat
-
2012/02/15
Talk : Nullcon : Your phone is your phone but your calls are now my calls -
Akib Sayyed
Bipul Sahu
Dipesh Goyal
Nitin Agarwal
-
2011/12/15
Talk : Blackhat : Kautilya: Teensy Beyond Shell -
Nikhil Mittal
-
2011/12/14
Talk : Blackhat : SCADA Security - Why Is It So Hard? -
Amol Sarwate
-
2011/12/04
Talk : Clubhack : Pen testing Mobile Applications -
Prashant Verma
-
2011/12/04
Talk : Clubhack : Android Forensics -
Manish Chasta
-
2011/12/04
Talk : Clubhack : Android Tamer -
Anant Shrivastava
-
2011/12/04
Talk : Clubhack : DOM XSS – Encounters of the 3rd Kind -
Bishan Singh
-
2011/12/04
Talk : Clubhack : Exploit the Exploit Kits -
Dhruv Soi
-
2011/12/04
Talk : Clubhack : Hacking your Droid -
Aditya Gupta
-
2011/12/04
Talk : Clubhack : Handle Exploitation of Remote System From Email Account -
Bhaumik Merchant
-
2011/12/04
Talk : Clubhack : Mere paas Teensy hai -
Nikhil Mittal
-
2011/12/04
Talk : Clubhack : One Link Facebook -
Anand Pandey
-
2011/11/25
Talk : Malcon : Advanced Malware for Apple Products -
Atul Alex
-
2011/11/25
Talk : Malcon : Exploit the Exploit kits -
Dhruv Soi
-
2011/11/25
Talk : Malcon : Mareech : Look it’s a HID made up of gold -
Nikhil Mittal
-
2011/11/17
Talk : Deepsec : Behavioral Security: 10 steps forward 5 steps backward -
Sourabh Satish
-
2011/11/17
Talk : Deepsec : FakeAntiVirus - Journey from Trojan to a Persisent Threat -
Jagadeesh Chandraiah
-
2011/11/04
Talk : Hackfest : Here are your keystrokes -
Nikhil Mittal
-
2011/10/13
Talk : Hitb Sec Conf : Femtocells: A Poisonous Needle in the Operator’s Hay Stack -
Ravishankar Borgaonkar
Kevin Redon
Nico Golde
-
2011/10/13
Talk : Hitb Sec Conf : Web Wars 3 -
Saumil Shah
-
2011/10/08
Talk : C0c0n : Stratagemizing Security Against Perpetrators In Cloud Infrastructure -
K S Abhiraj
-
2011/10/07
Talk : C0c0n : Automated Malware Analysis - Setting up the Environment -
K v Prashant
Pushkar Pashupat
-
2011/10/07
Talk : C0c0n : Deep(er) Penetration: Reaching the Internal Network using Exposed Web Applications -
Riyaz Walikar
-
2011/10/07
Talk : C0c0n : Digital Evidence -
Sushanth Samudrala
-
2011/10/07
Talk : C0c0n : Exploiting the TCP Simultaneous Connection to Provide a Low Cost DoS Mitigation Solution -
Ahamed Nafeez
-
2011/10/07
Talk : C0c0n : iPhone Jailbreak -
Antriksh Shah
-
2011/10/07
Talk : C0c0n : Mobile Security -
Santosh Satam
-
2011/10/07
Talk : C0c0n : Network Security- Modern Mechanism for Intrusion Detection and avoidance in a P2P Network -
Bala Kumar S
Mohamed Emraanullah
-
2011/10/07
Talk : C0c0n : Paranoid Android -
Ankur Bhargava
Migresh
-
2011/10/07
Talk : C0c0n : Password Less Authentication, Authorization -
Srikar Sagi
-
2011/10/07
Talk : C0c0n : Pentesting iPhone Applications -
Satish Bommisetty
-
2011/10/07
Talk : C0c0n : Runtime thread injection and execution in Linux processes -
Aseem Jakhar
-
2011/10/07
Talk : C0c0n : Section 43A IT Act compliance -
Sagar Rahurkar
-
2011/10/07
Talk : C0c0n : Secure HTTP Headers or How I can finally convince management to let go of IE6 -
Akash Mahajan
-
2011/10/07
Talk : C0c0n : Security and Privacy Risks of Cloud Computing -
Vishnu Tiwari
-
2011/10/07
Talk : C0c0n : Security Threats in Custom ROM’s (Android) -
Anant Shrivastava
-
2011/10/07
Talk : C0c0n : Web Application Backdoor Attack,Evasion and Detection -
Rahul Sasi
-
2011/10/07
Talk : C0c0n : Wi-Fi Malware for Fun and Profit -
Vivek Ramachandran
-
2011/09/19
Talk : Brucon : Botnets and Browsers, Brothers in a Ghost Shell -
Aditya K Sood
-
2011/09/19
Talk : Hacklu : Linux thread injection - The jugaad way -
Aseem Jakhar
-
2011/09/19
Talk : Brucon : Step-by-Step for Software Security (that anyone can follow) -
Pravir Chandra
-
2011/09/19
Talk : Hacklu : The travelling hacksmith -
Saumil Shah
-
2011/09/19
Talk : Brucon : Wifi malware for fun and profit -
Vivek Ramachandran
-
2011/09/07
Talk : Securitybyte : Data Protection -
Dipankar Roy
-
2011/09/07
Talk : Securitybyte : Enterprise Wi-Fi Worms, Backdoors and Botnets for Fun and Profit -
Vivek Ramachandran
-
2011/09/07
Talk : Securitybyte : IronWASP - A Web Application Security Testing Platform -
Lavakumar Kuppan
-
2011/09/07
Talk : Securitybyte : Mobile Devices – Boon or Curse? -
Kishor Sonawane
Oliver Ng
-
2011/09/07
Talk : Securitybyte : Social Web & Privacy – An evolving world -
Bala Sathiamurthy
Aridaman Tripathi
-
2011/09/07
Talk : Securitybyte : Web Application Defender -
K v Prashant
Mohammed Imran
-
2011/09/06
Talk : Securitybyte : Application Security Strategies -
K K Mookhey
-
2011/09/06
Talk : Securitybyte : Botnets at Application+ layer -
Raj Shastrakar
-
2011/09/06
Talk : Securitybyte : Enabling Un-trusted Mashups -
Bishan Singh
-
2011/09/06
Talk : Securitybyte : Private Internet Circuits - Towards A Next Generation Internet -
Sanjay Deshpande
-
2011/09/06
Talk : Securitybyte : Runtime thread injection and execution in Linux processes -
Aseem Jakhar
-
2011/09/06
Talk : Securitybyte : Security Threats on Social Networks -
Nithya Raman
-
2011/09/06
Talk : Securitybyte : Using Data Analytics for Incident Response -
Samir Saklikar
-
2011/08/07
Talk : Defcon : VDLDS — All Your Voice Are Belong To Us -
Ganesh Devarajan
Don Le Bert
-
2011/08/05
Talk : Defcon : Jugaad – Linux Thread Injection Kit -
Aseem Jakhar
-
2011/08/03
Talk : Blackhat : Killing the Myth of Cisco IOS Diversity: Towards Reliable, Large-Scale Exploitation of Cisco IOS -
Jatin Kataria
Ang Cui
Salvatore Stolfo
-
2011/08/03
Talk : Blackhat : Reverse Engineering Browser Components: Dissecting and Hacking Silverlight, HTML 5 and Flex -
Shreeraj Shah
-
2011/05/20
Talk : Hitb Sec Conf : Next Generation Web Attacks – HTML 5, DOM(L3) and XHR(L2) -
Shreeraj Shah
-
2011/05/19
Talk : Hitb Sec Conf : Spying on SpyEye – What Lies Beneath? -
Aditya K Sood
-
2011/03/30
Talk : Troopers : Femtocell: Femtostep to the Holy Grail -
Ravishankar Borgaonkar
Kevin Redon
-
2011/02/25
Talk : Nullcon : (secure) SiteHoster – Disable XSS & SQL Injection -
Abhishek Kumar
-
2011/02/25
Talk : Nullcon : Automatic Program Analysis using Dynamic Binary Instrumentation (DBI) -
Sunil Kumar
-
2011/02/25
Talk : Nullcon : Buffer Under Run Exploits -
Saurabh Sharma
Chinmaya Kamal
-
2011/02/25
Talk : Nullcon : Chupa Rustam -
Abhijeet Hatekar
-
2011/02/25
Talk : Nullcon : Cyber Crime 101 - Cost of cybercrime, trends & analysis -
Simran Gambhir
Cn Shashidhar
-
2011/02/25
Talk : Nullcon : Enterprise Paradigm for Controlling Data Leakage -
Deepak Rout
-
2011/02/25
Talk : Nullcon : Future of cyber crimes: Limitations and Challenges -
Pratap Reddy
-
2011/02/25
Talk : Nullcon : Fuzzing with complexities -
Vishwas Sharma
-
2011/02/25
Talk : Nullcon : Hacking the Parliament – A classic Social Engineering attack -
Anurag Dhanda
-
2011/02/25
Talk : Nullcon : Incident Management and Beyond -
Dinesh O Bareja
-
2011/02/25
Talk : Nullcon : JSON Fuzzing: New approach to old problems -
K v Prashant
Tamaghna Basu
-
2011/02/25
Talk : Nullcon : Jugaad Beta: Linux Thread Injection malware PoC -
Aseem Jakhar
-
2011/02/25
Talk : Nullcon : Lessons Learned From 2010 -
Saumil Shah
-
2011/02/25
Talk : Nullcon : Penetration Testing a Biometric System -
Rahul Sasi
-
2011/02/25
Talk : Nullcon : Protect infrastructure or protect information – Lessons from Wikileaks -
Vishal Gupta
-
2011/02/25
Talk : Nullcon : Reversing microsoft patches to reveal vulnerable code -
Harsimran Singh Walia
-
2011/02/25
Talk : Nullcon : Security Analysis of India’s Electronic Voting Machines: Memoirs of a whistleblower -
Hari Krishna Prasad Vemuru
-
2011/02/25
Talk : Nullcon : SSLSmart – Smart SSL Cipher Enumeration -
Gursev Singh Kalra
-
2011/02/15
Talk : Nullcon : Botnet Detection approach by DNS behavior and clustering analysis -
Nilesh Sharma
Pulkit Mehndiratta
-
2010/12/04
Talk : Clubhack : Attacking with HTML5 -
Lavakumar Kuppan
-
2010/12/04
Talk : Clubhack : Data theft in India -
K K Mookhey
-
2010/12/04
Talk : Clubhack : Firefox Security! -
Prasanna Kanagasabai
-
2010/12/04
Talk : Clubhack : Mantra – Free and Open Source security framework based on browser platform -
Abhi M Balakrishnan
-
2010/12/04
Talk : Clubhack : Ultimate Pen Test – Compromising a highly secure environment -
Nikhil Mittal
-
2010/12/04
Talk : Clubhack : Windows Memory Forensic Analysis -
Aashish Kunte
-
2010/11/25
Talk : Deepsec : Developers are from Mars, Compliance Auditors are from Venus -
Neelay S Shah
-
2010/10/27
Talk : Hacklu : Exploit Delivery - Tricks and Techniques -
Saumil Shah
-
2010/10/14
Talk : Hitb Sec Conf : Exploit Delivery -
Saumil Shah
-
2010/10/13
Talk : Hitb Sec Conf : Hacking a Browser’s DOM – Exploiting Ajax and RIA -
Shreeraj Shah
-
2010/08/01
Talk : C0c0n : Client Side Exploits using PDF -
Ankur Bhargava
Tamaghna Basu
-
2010/08/01
Talk : C0c0n : Cloud Computing & Security: Boon or Bane; Hype or Reality; Cloud Implementation Challenges: A Live Case Study -
Krishnakumar Kottekkat
Whiteknight
-
2010/08/01
Talk : C0c0n : Code Disclosure over HTTP -
Anant Kochhar
-
2010/08/01
Talk : C0c0n : Concept, Methodology and Challenges in Computer Forensics -
Sebastian Edassery
-
2010/08/01
Talk : C0c0n : Dangers and dynamic Malware analysis -
Dr Chandrasekar
-
2010/08/01
Talk : C0c0n : End-point Security -
Laxi Eshwari
-
2010/08/01
Talk : C0c0n : Hackers’ EcoSystem in India -
Rohit Srivastwa
-
2010/08/01
Talk : C0c0n : Horses, Rats and Bots -
Jayaram Ramesh
-
2010/08/01
Talk : C0c0n : Last line of defense - Host Intrusion Prevention and Secure application development. -
Avinash Shenoi
-
2010/08/01
Talk : C0c0n : Mobile Security -
Suhas Desai
-
2010/08/01
Talk : C0c0n : Overview of Cyber Legal Systems in India -
Sagar Rahurkar
-
2010/08/01
Talk : C0c0n : VoIP Security -
Mukund Krishnamurthy
-
2010/08/01
Talk : C0c0n : Wireless MITM -
Prashant Mahajan
-
2010/08/01
Talk : C0c0n : Writing x86 ShellCode & Secure Self Modifying code and Cross Platform Programming - A Security Angle -
Praseed Pai
-
2010/07/31
Talk : Defcon : WPA Too! -
Md Sohail Ahmad
-
2010/07/29
Talk : Blackhat : Hacking Browser’s DOM - Exploiting Ajax and RIA -
Shreeraj Shah
-
2010/07/29
Talk : Blackhat : Hacking Oracle From Web Apps -
Sumit Siddharth
-
2010/07/01
Talk : Hitb Sec Conf : The Travelling Hacksmith 2009 – 2010 -
Saumil Shah
-
2010/07/01
Talk : Hitb Sec Conf : Top 10 Web 2.0 Attacks and Exploits -
Shreeraj Shah
-
2010/06/18
Talk : Syscan : REVERSE ENGINEERING WEB 2.0 APPLICATIONS -
Shreeraj Shah
-
2010/04/21
Talk : Hitb Sec Conf : Web Security – Going Nowhere? -
Saumil Shah
-
2010/04/14
Talk : Blackhat : Attacking JAVA Serialized Communication -
Manish Saindane
-
2010/02/25
Talk : Nullcon : Software Fuzzing with Wireplay. -
Abhisek Datta
-
2010/02/25
Talk : Nullcon : Botnet mitigation, monitoring and management. -
Harshad Patil
-
2010/02/25
Talk : Nullcon : Imposter ke karnamey: The Browser Phishing Tool. -
Lavakumar Kuppan
-
2010/02/25
Talk : Nullcon : Intelligent debugging and in memory fuzzing. -
Vishwas Sharma
Amandeep Bharti
-
2010/02/25
Talk : Nullcon : Malware Detection Tool for Websites: A Proof-Of-Concept -
Anant Kochhar
-
2010/02/25
Talk : Nullcon : Penetration Testing versus Source Code -
Nikhil Wagholikar
-
2010/02/25
Talk : Nullcon : Quantum Computing Challenges in the field of security -
Navin Pai
-
2010/02/25
Talk : Nullcon : Steganography & Stegananalysis: A Technical & Psychological Perspective -
Prince Komal Boonlia
Reena Bhansali
-
2010/02/03
Talk : Blackhat : Beware of Serialized GUI Objects Bearing Data -
Rohini Sulatycki
David Byrne
-
2009/12/05
Talk : Clubhack : India Cyber Crime Scene - Caught in the Crossfire -
Vinoo Thomas
Rahul Mohandas
-
2009/12/05
Talk : Clubhack : Advance Computer Forensic concepts (windows) -
Kush Wadhwa
-
2009/12/05
Talk : Clubhack : Incident Handling and Log Analysis for Web Based Incidents -
Manindra Kishore
-
2009/12/05
Talk : Clubhack : Indian IT Act 2000 vs 2009 -
Rohas Nagpal
-
2009/12/05
Talk : Clubhack : Lust 2.0 – Desire for free WiFi and the threat of the Imposter -
Lavakumar Kuppan
-
2009/12/05
Talk : Clubhack : Mobile Application Security Testing -
Gursev Singh Kalra
-
2009/12/05
Talk : Clubhack : Open source for securing data with advanced Crypto-Steganography technology -
Suhas Desai
-
2009/12/05
Talk : Clubhack : Revealing the Secrets: Source Code Disclosure, Techniques and Impacts -
Anant Kochhar
-
2009/12/05
Talk : Clubhack : Risk Based Penetration Testing -
Nikhil Wagholikar
K K Mookhey
-
2009/12/04
Talk : Clubhack : Facilitate Collaboration with Information Rights Management -
Abhijit Tannu
-
2009/11/19
Talk : Deepsec : Ownage 2.0 -
Saumil Shah
-
2009/11/19
Talk : Deepsec : Top 10 Security Issues Developers Don’t Know About -
Neelay S Shah
-
2009/11/18
Talk : Securitybyte : Cloud Hacking – Distributed Attack & Exploit Platform -
Shreeraj Shah
-
2009/11/18
Talk : Securitybyte : Hacking Oracle From Web -
Sumit Siddharth
-
2009/11/18
Talk : Securitybyte : Introduction to Web Protection Library -
Anil Chintala
-
2009/11/18
Talk : Securitybyte : Risk based Penetration Testing -
K K Mookhey
-
2009/11/18
Talk : Securitybyte : Rumbling Infections – Web Malware Ontology -
Aditya K Sood
-
2009/11/17
Talk : Securitybyte : Applications - The new cyber security frontier -
Mano Paul
-
2009/11/17
Talk : Securitybyte : Behind the scenes at the MSRC -
Suresh Venkateswaran
Dave Midturi
-
2009/11/17
Talk : Securitybyte : Business Case-Risk Management/Compliance at AMITY -
Dr Js Sodhi
-
2009/11/17
Talk : Securitybyte : Business Continuity Case Study -
Venkataram Arabolu
-
2009/11/17
Talk : Securitybyte : Lust 2.0 – Desire for free WiFi and the threat of the Imposter -
Lavakumar Kuppan
-
2009/11/17
Talk : Securitybyte : Threat Modeling -
Varun Sharma
-
2009/11/17
Talk : Securitybyte : Usability and Privacy in Security -
Ponnurangam Kumaraguru
-
2009/11/17
Talk : Securitybyte : Vbootkit 2.0: Attacking Windows 7 Via Boot Sectors -
Nitin Kumar
Vipin Kumar
-
2009/10/28
Talk : Hacklu : Ownage 2.0 -
Saumil Shah
-
2009/10/07
Talk : Hitb Sec Conf : How to Own the World – One Desktop at a Time -
Saumil Shah
-
2009/08/06
Talk : C0c0n : Cyber Forensics -
Krishna Sastry Pendyal
-
2009/08/06
Talk : C0c0n : Cyber Victimisation -
K Jaishankar
-
2009/08/06
Talk : C0c0n : Information Security Audit -
Venkatapathy Subramaniam
-
2009/08/06
Talk : C0c0n : Information security management practices - Technical issues and the impact of risk management. -
Kp Paulson
-
2009/08/06
Talk : C0c0n : Information Warfare -
A a Gafoor
Vinayak Mishra
-
2009/08/06
Talk : C0c0n : Know Your Enemy, and Yourself: Demystifying Threat Modelin -
Meera Subbarao
-
2009/08/06
Talk : C0c0n : Management & Security of Large Scale Storage Devices -
Prashant Dinde
-
2009/08/06
Talk : C0c0n : Microsoft Security Strategies -
Binoy VC
-
2009/08/06
Talk : C0c0n : Network Intrusions and Hacking -
Manu Zacharia
-
2009/08/02
Talk : Defcon : Wi-Fish Finder: Who Will Bite the Bait -
Md Sohail Ahmad
Prabhash Dhyani
-
2009/08/01
Talk : Defcon : The Making of the second SQL injection Worm -
Sumit Siddharth
-
2009/07/31
Talk : Defcon : Advancing Video Application Attacks with Video Interception, Recording, and Replay -
Arjun Sambamoorthy
Jason Ostrom
-
2009/05/19
Talk : Syscan : Securing Applications at Gateway with Web Application Firewalls -
Shreeraj Shah
-
2009/05/19
Talk : Syscan : Securing Enterprise Applications -
Shreeraj Shah
-
2009/04/22
Talk : Hitb Sec Conf : Application Defense Tactics & Strategies - WAF at the Gateway -
Shreeraj Shah
-
2009/04/22
Talk : Troopers : Browser Design Flaws – Hacking by Breaking in Architectures -
Aditya K Sood
-
2009/04/22
Talk : Hitb Sec Conf : Pwnage 2.0 -
Saumil Shah
-
2009/04/22
Talk : Troopers : SQL Injections: More Fun and Profit -
Sumit Siddharth
-
2009/04/22
Talk : Hitb Sec Conf : Vbootkit 2.0: Attacking Windows 7 via Boot Sectors -
Nitin Kumar
Vipin Kumar
-
2009/03/16
Talk : Can Sec West : On Approaches and Tools for Automated Vulnerability Analysis -
Tanmay Ganacharya
Abhishek Singh
Swapnil Bhalode
Nikola Livic
Scott Lambert
-
2009/02/19
Talk : Blackhat : Blinded by Flash: Widespread Security Risks Flash Developers Don’t See -
Prajakta Jagdale
-
2008/12/06
Talk : Clubhack : AntiSpam - Understanding the good, the bad and the ugly -
Aseem Jakhar
-
2008/12/06
Talk : Clubhack : Economic offenses through Credit Card Frauds Dissected -
Harshad Patil
-
2008/12/06
Talk : Clubhack : Hacking Client Side Insecurities -
Aditya K Sood
-
2008/12/06
Talk : Clubhack : Immune IT: Moving from Security to Immunity -
Ajit Hatti
-
2008/12/06
Talk : Clubhack : Insecure Implementation of Security Best Practices: of hashing, CAPTCHA’s and Caching -
Karmendra Kohli
-
2008/12/06
Talk : Clubhack : Introduction to backtrack -
Kunal Sehgal
-
2008/12/06
Talk : Clubhack : Reverse Engineering for exploit writers -
Nibin Varghese
-
2008/12/06
Talk : Clubhack : Reverse Engineering v/s Secure Coding -
Atul Alex
-
2008/12/06
Talk : Clubhack : State of Cyber Law in India -
Rohas Nagpal
-
2008/11/13
Talk : Deepsec : Game of Web 2.0 Security - Attacking Next Generation Apps -
Shreeraj Shah
-
2008/10/29
Talk : Hitb Sec Conf : Browser Exploits - A New Model for Browser Security -
Saumil Shah
-
2008/10/29
Talk : Hitb Sec Conf : Top 10 Web 2.0 Attacks -
Shreeraj Shah
-
2008/10/22
Talk : Hacklu : Browser Exploits - A new model for Browser security -
Saumil Shah
-
2008/08/21
Talk : Owasp App Sec India : AppSec For Managers -
Nish Bhalla
-
2008/08/20
Talk : Owasp App Sec India : Application Security Trends & Challenges -
Kamlesh Bajaj
-
2008/08/20
Talk : Owasp App Sec India : Building Enterprise AppSec Program -
Nish Bhalla
-
2008/08/20
Talk : Owasp App Sec India : Case Study: Testing 200+ applications in a $10 Billion Enterprise -
Roshen Chandran
-
2008/08/20
Talk : Owasp App Sec India : Web 2.0 Attacks - Next Generation Threats on the Rise -
Shreeraj Shah
-
2008/08/20
Talk : Owasp App Sec India : Web Application Security: Too Costly To Ignore -
Rajesh Nayak
-
2008/08/09
Talk : Defcon : Autoimmunity Disorder in Wireless LAN -
Jvr Murthy
Amit Vartak
Md Sohail Ahmad
-
2008/08/07
Talk : Blackhat : Got Citrix, Hack It! -
Shanit Gupta
-
2008/04/16
Talk : Hitb Sec Conf : Securing Next Generation Applications – Scan, Detect and Mitigate -
Shreeraj Shah
-
2008/03/28
Talk : Blackhat : Spam-Evolution -
Aseem Jakhar
-
2008/03/27
Talk : Blackhat : Iron Chef Black Hat: John Henry Challenge -
Pravir Chandra
Jacob West
Brian Chess
Sean Fay
-
2008/03/26
Talk : Can Sec West : Vulnerabilities Die Hard -
Kowsik Guruswamy
-
2008/02/20
Talk : Blackhat : Hacking VoIP through IPSec Tunnels -
Sachin Joglekar
Sudeep Patwardhan
-
2008/02/20
Talk : Blackhat : Scanning Applications 2.0 - Next Generation Scan, Attacks and Tools -
Shreeraj Shah
-
2007/12/19
Talk : Clubhack : Backdoor 2.0: Hacking Firefox to steal his web secrets -
Sunil Arora
-
2007/12/09
Talk : Clubhack : 7 years of Indian IT act - 7 Best Cases -
Rohas Nagpal
-
2007/12/09
Talk : Clubhack : Analysis of Adversarial Code: The Role of Malware Kits! -
Rahul Mohandas
-
2007/12/09
Talk : Clubhack : Hacking Web 2.0 Art and Science of Vulnerability Detection -
Shreeraj Shah
-
2007/12/09
Talk : Clubhack : Legiment Techniques of IPS/IDS Evasion -
Ajit Hatti
-
2007/12/09
Talk : Clubhack : Mining Digital Evidence in Microsoft Windows – Answering Who, When, Why and How? -
Chetan Gupta
-
2007/12/09
Talk : Clubhack : Subtle Security flaws: Why you must follow the basic principles of software security -
Varun Sharma
-
2007/12/09
Talk : Clubhack : The future of automated web application testing -
Amish Shah
Umesh Nagori
-
2007/12/09
Talk : Clubhack : Vulnerabilities in VoIP Products and Services -
Gaurav Saha
-
2007/11/20
Talk : Deepsec : Web 2.0 Application Kung-Fu - Securing Ajax & Web Services -
Shreeraj Shah
-
2007/11/20
Talk : Deepsec : Breaking and Securing Web Applications -
Nitesh Dhanjani
-
2007/10/20
Talk : Hacklu : Breaking and Securing Web applications -
Nitesh Dhanjani
-
2007/09/06
Talk : Hitb Sec Conf : Hacking Ajax and Web Services – Next Generation Web Attacks on the Rise -
Shreeraj Shah
-
2007/08/04
Talk : Defcon : The Emperor Has No Cloak - WEP Cloaking Exposed -
Vivek Ramachandran
-
2007/08/02
Talk : Blackhat : Smoke ’em Out! -
Rohyt Belani
-
2007/08/01
Talk : Blackhat : PISA: Protocol Identification via Statistical Analysis -
Rohit Dhamankar
Rob King
-
2007/08/01
Talk : Blackhat : Vulnerabilities in Wi-Fi/Dual-Mode VoIP Phones -
Krishna Kurapati
-
2007/04/18
Talk : Can Sec West : Low-Rate Denial-of-Service attacks -
Anil Kumar
-
2007/04/05
Talk : Hitb Sec Conf : WEB 2.0 Hacking – Defending Ajax and Web Services -
Shreeraj Shah
-
2007/04/04
Talk : Hitb Sec Conf : Vboot Kit: Compromising Windows Vista Security -
Vipin Kumar
Nitin Kumar
-
2007/03/30
Talk : Blackhat : Web Service Vulnerabilities -
Nish Bhalla
-
2007/03/29
Talk : Blackhat : Vboot Kit: Compromising Windows Vista Security -
Nitin Kumar
Vipin Kumar
-
2006/11/29
Talk : Pac Sec : Smashing Heap by Free Simulation -
Sandip Chaudhari
-
2006/10/19
Talk : Hacklu : Smashing Heap by Free Simulation: -
Sandip Chaudhari
-
2006/10/19
Talk : Hacklu : Writing Metasploit plugins - from vulnerability to exploit -
Saumil Shah
-
2006/09/21
Talk : Hitb Sec Conf : Finding Secrets in ISAPI -
Nish Bhalla
-
2006/09/21
Talk : Hitb Sec Conf : Smashing the Stack for Profit - Period -
Rohyt Belani
-
2006/08/05
Talk : Defcon : Zulu A Command Line Wireless Frame Generator -
Anmol Sheth
Damon Mccoy
-
2006/08/02
Talk : Blackhat : SQL Injections by Truncation -
Bala Neerumalla
-
2006/04/13
Talk : Hitb Sec Conf : Writing Metasploit Plugins - From Vulnerability to Exploit -
Saumil Shah
-
2006/01/26
Talk : Blackhat : Analysis of Adversarial Code: Problem, Challenges, Results -
Arun Lakhotia
-
2005/10/18
Talk : Blackhat : Adware/Spyware -
Saumil Shah
Dave Cole
-
2005/09/29
Talk : Hitb Sec Conf : Analyzing Code for Security Defects -
Nish Bhalla
-
2005/09/29
Talk : Hitb Sec Conf : Trends in Real World Attacks: A Compilation of Case Studies -
Rohyt Belani
-
2005/09/26
Talk : Hitb Sec Conf : Web hacking Kung-Fu and Art of Defense -
Shreeraj Shah
-
2005/07/28
Talk : Blackhat : Rapid Threat Modeling -
Akshay Aggarwal
-
2005/04/12
Talk : Hitb Sec Conf : Web Application Kung-Fu, The Art of Defense -
Shreeraj Shah
-
2005/04/10
Talk : Hitb Sec Conf : Whispers On The Wire - Network Based Covert Channels, Exploitation and Detection -
Pukhraj Singh
-
2005/03/31
Talk : Blackhat : Defeating Automated Web Assessment Tools -
Saumil Shah
-
2004/10/06
Talk : Hitb Sec Conf : Web Services - Attacks and Defense Strategies, Methods and Tools -
Shreeraj Shah
-
2004/07/29
Talk : Blackhat : Evasion and Detection of Web Application Attacks -
K K Mookhey
-
2004/07/28
Talk : Blackhat : Defeating Automated Web Assessment Tools -
Saumil Shah
-
2004/05/19
Talk : Blackhat : HTTP Fingerprinting and Advanced Assessment Techniques -
Saumil Shah
-
2004/01/29
Talk : Blackhat : HTTP Fingerprinting and Advanced Assessment Techniques -
Saumil Shah
-
2003/12/16
Talk : Blackhat : HTTP Fingerprinting & Advanced Assessment Techniques -
Saumil Shah
-
2003/12/12
Talk : Hitb Sec Conf : Defending Web Applications: Strategies, methods and practices -
Shreeraj Shah
-
2003/12/12
Talk : Hitb Sec Conf : New Generation Frauds -
Yerra Ravi Kiran Raju
-
2003/12/12
Talk : Hitb Sec Conf : Threats to Wireless Networks - War Driving -
Anurana Saluja
-
2003/10/01
Talk : Blackhat : HTTP Fingerprinting & Advanced Assessment Techniques -
Saumil Shah
-
2003/07/31
Talk : Blackhat : HTTP Fingerprinting & Advanced Assessment Techniques -
Saumil Shah
-
2003/02/26
Talk : Blackhat : HTTP: Advanced Assessment Techniques -
Saumil Shah
-
2002/10/03
Talk : Blackhat : Top Ten Web Attacks -
Saumil Shah
-
2001/11/21
Talk : Blackhat : One-Way SQL Hacking : Futility of Firewalls in Web Hacking -
Saumil Shah
-
2001/07/13
Talk : Defcon : Security & Privacy are Critically Important Issues in Todays Digitally Connected Age -
Sharad Popli
-
2001/04/26
Talk : Blackhat : Web Hacking -
Saumil Shah
-
2001/02/14
Talk : Blackhat : Web Hacking -
Saumil Shah
-
1998/07/29
Talk : Blackhat : Security as an enabler for new business opportunities - The Business Value of Security -
Karan Khanna