2010th
2011
2010
-
Dec 04-
Clubhack-
Talk-
Windows Memory Forensic Analysis-
-
Aashish Kunte -
Dec 04-
Clubhack-
Talk-
Ultimate Pen Test – Compromising a highly secure environment-
-
Nikhil Mittal -
Dec 04-
Clubhack-
Talk-
Mantra – Free and Open Source security framework based on browser platform-
-
Abhi M Balakrishnan -
Dec 04-
Clubhack-
Talk-
Firefox Security!-
-
Prasanna Kanagasabai -
Dec 04-
Clubhack-
Talk-
Data theft in India-
-
K K Mookhey -
Dec 04-
Clubhack-
Talk-
Attacking with HTML5-
-
Lavakumar Kuppan -
Nov 25-
Deepsec-
Talk-
Developers are from Mars, Compliance Auditors are from Venus-
-
Neelay S Shah -
Nov 11-
Blackhat-
Talk-
Attacking with HTML5-
-
Lavakumar Kuppan -
Oct 29-
T2-
Talk-
Hacking Femtocells-
-
Ravishankar Borgaonkar, Kevin Redon -
Oct 27-
Hacklu-
Talk-
Exploit Delivery - Tricks and Techniques-
-
Saumil Shah -
Oct 14-
Hitbsecconf-
Talk-
Exploit Delivery-
-
Saumil Shah -
Oct 13-
Hitbsecconf-
Talk-
Hacking a Browser’s DOM – Exploiting Ajax and RIA-
-
Shreeraj Shah -
Aug 01-
C0c0n-
Talk-
Writing x86 ShellCode & Secure Self Modifying code and Cross Platform Programming - A Security Angle-
Praseed Pai
-
Aug 01-
C0c0n-
Talk-
Wireless MITM-
Prashant Mahajan
-
Aug 01-
C0c0n-
Talk-
VoIP Security-
Mukund Krishnamurthy
-
Aug 01-
C0c0n-
Talk-
Overview of Cyber Legal Systems in India-
Sagar Rahurkar
-
Aug 01-
C0c0n-
Talk-
Mobile Security-
Suhas Desai
-
Aug 01-
C0c0n-
Talk-
Last line of defense - Host Intrusion Prevention and Secure application development.-
Avinash Shenoi
-
Aug 01-
C0c0n-
Talk-
Horses, Rats and Bots-
Jairam Ramesh
-
Aug 01-
C0c0n-
Talk-
Hackers’ EcoSystem in India-
Rohit Srivastwa
-
Aug 01-
C0c0n-
Talk-
End-point Security-
Laxi Eshwari
-
Aug 01-
C0c0n-
Talk-
Dangers and dynamic Malware analysis-
Chandrasekar
-
Aug 01-
C0c0n-
Talk-
Concept, Methodology and Challenges in Computer Forensics-
Sebastian Edassery
-
Aug 01-
C0c0n-
Talk-
Code Disclosure over HTTP-
Anant Kochhar
-
Aug 01-
C0c0n-
Talk-
Cloud Computing & Security: Boon or Bane; Hype or Reality; Cloud Implementation Challenges: A Live Case Study-
Krishnakumar Kottekkat, Whiteknight
-
Aug 01-
C0c0n-
Talk-
Client Side Exploits using PDF-
-
Ankur Bhargava, Tamaghna Basu -
Jul 31-
Defcon-
Talk-
WPA Too!-
-
Md Sohail Ahmad -
Jul 30-
Defcon-
Talk-
Hacking Oracle From Web Apps-
-
Sumit Siddharth -
Jul 29-
Blackhat-
Talk-
Hacking Oracle From Web Apps-
-
Sumit Siddharth -
Jul 29-
Blackhat-
Talk-
Hacking Browser’s DOM - Exploiting Ajax and RIA-
-
Shreeraj Shah -
Jul 01-
Hitbsecconf-
Talk-
Top 10 Web 2.0 Attacks and Exploits-
-
Shreeraj Shah -
Jul 01-
Hitbsecconf-
Talk-
The Travelling Hacksmith 2009 – 2010-
Saumil Shah
-
Jun 18-
Syscan-
Talk-
REVERSE ENGINEERING WEB 2.0 APPLICATIONS-
Shreeraj Shah
-
Apr 21-
Hitbsecconf-
Talk-
Web Security – Going Nowhere?-
-
Saumil Shah -
Apr 14-
Blackhat-
Talk-
Attacking JAVA Serialized Communication-
-
Manish Saindane -
Mar 15-
Blackhat-
Talk-
400 Apps in 40 Days-
-
Nish Bhalla, Sahba Kazerooni -
Feb 25-
Nullcon-
Talk-
Steganography & Stegananalysis: A Technical & Psychological Perspective-
-
Prince Komal Boonlia, Reena Bhansali -
Feb 25-
Nullcon-
Talk-
Quantum Computing Challenges in the field of security-
-
Navin Pai -
Feb 25-
Nullcon-
Talk-
Penetration Testing versus Source Code-
-
Nikhil Wagholikar -
Feb 25-
Nullcon-
Talk-
Malware Detection Tool for Websites: A Proof-Of-Concept-
-
Anant Kochhar -
Feb 25-
Nullcon-
Talk-
Intelligent debugging and in memory fuzzing.-
-
Vishwas Sharma, Amandeep Bharti -
Feb 25-
Nullcon-
Talk-
Imposter ke karnamey: The Browser Phishing Tool.-
Lavakumar Kuppan
-
Feb 25-
Nullcon-
Talk-
Botnet mitigation, monitoring and management.-
-
Harshad Patil -
Feb 25-
Nullcon-
Talk-
Software Fuzzing with Wireplay.-
-
Abhisek Datta -
Feb 03-
Blackhat-
Talk-
Beware of Serialized GUI Objects Bearing Data-
-
Rohini Sulatycki, David Byrne
↑