Hackers of India
Home
Timeline
Tools
About
RoadMap
2010th
---- 2011 ----
2011/10/07
Talk
:
C0c0n
:
Password Less Authentication, Authorization
-
Srikar Sagi
---- 2010 ----
2010/12/04
Talk
:
Clubhack
:
Windows Memory Forensic Analysis
-
Aashish Kunte
2010/12/04
Talk
:
Clubhack
:
Ultimate Pen Test – Compromising a highly secure environment
-
Nikhil Mittal
2010/12/04
Talk
:
Clubhack
:
Mantra – Free and Open Source security framework based on browser platform
-
Abhi M Balakrishnan
2010/12/04
Talk
:
Clubhack
:
Firefox Security!
-
Prasanna Kanagasabai
2010/12/04
Talk
:
Clubhack
:
Data theft in India
-
K K Mookhey
2010/12/04
Talk
:
Clubhack
:
Attacking with HTML5
-
Lavakumar Kuppan
2010/11/25
Talk
:
Deepsec
:
Developers are from Mars, Compliance Auditors are from Venus
-
Neelay S Shah
2010/10/27
Talk
:
Hacklu
:
Exploit Delivery - Tricks and Techniques
-
Saumil Shah
2010/10/14
Talk
:
Hitb Sec Conf
:
Exploit Delivery
-
Saumil Shah
2010/10/13
Talk
:
Hitb Sec Conf
:
Hacking a Browser’s DOM – Exploiting Ajax and RIA
-
Shreeraj Shah
2010/08/01
Talk
:
C0c0n
:
Writing x86 ShellCode & Secure Self Modifying code and Cross Platform Programming - A Security Angle
-
Praseed Pai
2010/08/01
Talk
:
C0c0n
:
Wireless MITM
-
Prashant Mahajan
2010/08/01
Talk
:
C0c0n
:
VoIP Security
-
Mukund Krishnamurthy
2010/08/01
Talk
:
C0c0n
:
Overview of Cyber Legal Systems in India
-
Sagar Rahurkar
2010/08/01
Talk
:
C0c0n
:
Mobile Security
-
Suhas Desai
2010/08/01
Talk
:
C0c0n
:
Last line of defense - Host Intrusion Prevention and Secure application development.
-
Avinash Shenoi
2010/08/01
Talk
:
C0c0n
:
Horses, Rats and Bots
-
Jayaram Ramesh
2010/08/01
Talk
:
C0c0n
:
Hackers’ EcoSystem in India
-
Rohit Srivastwa
2010/08/01
Talk
:
C0c0n
:
End-point Security
-
Laxi Eshwari
2010/08/01
Talk
:
C0c0n
:
Dangers and dynamic Malware analysis
-
Dr Chandrasekar
2010/08/01
Talk
:
C0c0n
:
Concept, Methodology and Challenges in Computer Forensics
-
Sebastian Edassery
2010/08/01
Talk
:
C0c0n
:
Code Disclosure over HTTP
-
Anant Kochhar
2010/08/01
Talk
:
C0c0n
:
Cloud Computing & Security: Boon or Bane; Hype or Reality; Cloud Implementation Challenges: A Live Case Study
-
Krishnakumar Kottekkat
Whiteknight
2010/08/01
Talk
:
C0c0n
:
Client Side Exploits using PDF
-
Ankur Bhargava
Tamaghna Basu
2010/07/31
Talk
:
Defcon
:
WPA Too!
-
Md Sohail Ahmad
2010/07/29
Talk
:
Blackhat
:
Hacking Oracle From Web Apps
-
Sumit Siddharth
2010/07/29
Talk
:
Blackhat
:
Hacking Browser’s DOM - Exploiting Ajax and RIA
-
Shreeraj Shah
2010/07/01
Talk
:
Hitb Sec Conf
:
Top 10 Web 2.0 Attacks and Exploits
-
Shreeraj Shah
2010/07/01
Talk
:
Hitb Sec Conf
:
The Travelling Hacksmith 2009 – 2010
-
Saumil Shah
2010/06/18
Talk
:
Syscan
:
REVERSE ENGINEERING WEB 2.0 APPLICATIONS
-
Shreeraj Shah
2010/04/21
Talk
:
Hitb Sec Conf
:
Web Security – Going Nowhere?
-
Saumil Shah
2010/04/14
Talk
:
Blackhat
:
Attacking JAVA Serialized Communication
-
Manish Saindane
2010/02/25
Talk
:
Nullcon
:
Steganography & Stegananalysis: A Technical & Psychological Perspective
-
Prince Komal Boonlia
Reena Bhansali
2010/02/25
Talk
:
Nullcon
:
Quantum Computing Challenges in the field of security
-
Navin Pai
2010/02/25
Talk
:
Nullcon
:
Penetration Testing versus Source Code
-
Nikhil Wagholikar
2010/02/25
Talk
:
Nullcon
:
Malware Detection Tool for Websites: A Proof-Of-Concept
-
Anant Kochhar
2010/02/25
Talk
:
Nullcon
:
Intelligent debugging and in memory fuzzing.
-
Vishwas Sharma
Amandeep Bharti
2010/02/25
Talk
:
Nullcon
:
Imposter ke karnamey: The Browser Phishing Tool.
-
Lavakumar Kuppan
2010/02/25
Talk
:
Nullcon
:
Botnet mitigation, monitoring and management.
-
Harshad Patil
2010/02/25
Talk
:
Nullcon
:
Software Fuzzing with Wireplay.
-
Abhisek Datta
2010/02/03
Talk
:
Blackhat
:
Beware of Serialized GUI Objects Bearing Data
-
Rohini Sulatycki
David Byrne