2011th
2019
2011
-
Dec 15-
Blackhat-
Talk-
Kautilya: Teensy Beyond Shell-
-
Nikhil Mittal -
Dec 14-
Blackhat-
Talk-
SCADA Security - Why Is It So Hard?-
-
Amol Sarwate -
Dec 04-
Clubhack-
Talk-
Wi-Fi malware for Fun and Profit-
Vivek Ramachandran
-
Dec 04-
Clubhack-
Talk-
One Link Facebook-
-
Anand Pandey -
Dec 04-
Clubhack-
Talk-
Mere paas Teensy hai-
-
Nikhil Mittal -
Dec 04-
Clubhack-
Talk-
Handle Exploitation of Remote System From Email Account-
-
Bhaumik Merchant -
Dec 04-
Clubhack-
Talk-
Hacking your Droid-
-
Aditya Gupta -
Dec 04-
Clubhack-
Talk-
Exploit the Exploit Kits-
-
Dhruv Soi -
Dec 04-
Clubhack-
Talk-
DOM XSS – Encounters of the 3rd Kind-
-
Bishan Singh -
Dec 04-
Clubhack-
Talk-
Android Tamer-
-
Anant Shrivastava -
Dec 04-
Clubhack-
Talk-
Android Forensics-
-
Manish Chasta -
Dec 04-
Clubhack-
Talk-
Pen testing Mobile Applications-
-
Prashant Verma -
Nov 25-
Malcon-
Talk-
Mareech : Look it’s a HID made up of gold-
Nikhil Mittal
-
Nov 25-
Malcon-
Talk-
Exploit the Exploit kits-
Dhruv Soi
-
Nov 25-
Malcon-
Talk-
Advanced Malware for Apple Products-
Atul Alex
-
Nov 17-
Deepsec-
Talk-
FakeAntiVirus - Journey from Trojan to a Persisent Threat-
Jagadeesh Chandraiah
-
Nov 17-
Deepsec-
Talk-
Behavioral Security: 10 steps forward 5 steps backward-
-
Sourabh Satish -
Nov 04-
Hackfest-
Talk-
Here are your keystrokes-
Nikhil Mittal
-
Oct 13-
Hitb Sec Conf-
Talk-
Web Wars 3-
Saumil Shah
-
Oct 13-
Hitb Sec Conf-
Talk-
Femtocells: A Poisonous Needle in the Operator’s Hay Stack-
-
Ravishankar Borgaonkar, Kevin Redon, Nico Golde -
Oct 08-
C0c0n-
Talk-
Stratagemizing Security Against Perpetrators In Cloud Infrastructure-
K S Abhiraj
-
Oct 07-
C0c0n-
Talk-
Wi-Fi Malware for Fun and Profit-
Vivek Ramachandran
-
Oct 07-
C0c0n-
Talk-
Web Application Backdoor Attack,Evasion and Detection-
-
Rahul Sasi -
Oct 07-
C0c0n-
Talk-
Security Threats in Custom ROM’s (Android)-
-
Anant Shrivastava -
Oct 07-
C0c0n-
Talk-
Security and Privacy Risks of Cloud Computing-
Vishnu Tiwari
-
Oct 07-
C0c0n-
Talk-
Secure HTTP Headers or How I can finally convince management to let go of IE6-
-
Akash Mahajan -
Oct 07-
C0c0n-
Talk-
Section 43A IT Act compliance-
Sagar Rahurkar
-
Oct 07-
C0c0n-
Talk-
Runtime thread injection and execution in Linux processes-
Aseem Jakhar
-
Oct 07-
C0c0n-
Talk-
Pentesting iPhone Applications-
-
Satish Bommisetty -
Oct 07-
C0c0n-
Talk-
Paranoid Android-
Ankur Bhargava, Mrigesh
-
Oct 07-
C0c0n-
Talk-
Network Security- Modern Mechanism for Intrusion Detection and avoidance in a P2P Network-
Bala Kumar S, Mohamed Emraanullah
-
Oct 07-
C0c0n-
Talk-
Mobile Security-
-
Santosh Satam -
Oct 07-
C0c0n-
Talk-
iPhone Jailbreak-
Antriksh Shah
-
Oct 07-
C0c0n-
Talk-
Exploiting the TCP Simultaneous Connection to Provide a Low Cost DoS Mitigation Solution-
-
Ahamed Nafeez -
Oct 07-
C0c0n-
Talk-
Digital Evidence-
Sushanth Samudrala
-
Oct 07-
C0c0n-
Talk-
Deep(er) Penetration: Reaching the Internal Network using Exposed Web Applications-
Riyaz Walikar
-
Oct 07-
Virus Bulletin-
Talk-
Browser exploit packs - exploitation paradigm-
-
Aditya K Sood, Richard J Enbody -
Oct 07-
C0c0n-
Talk-
Automated Malware Analysis - Setting up the Environment-
-
K v Prashant, Pushkar Pashupat -
Sep 19-
Brucon-
Talk-
Wifi malware for fun and profit-
-
Vivek Ramachandran -
Sep 19-
Hacklu-
Talk-
The travelling hacksmith-
Saumil Shah
-
Sep 19-
Brucon-
Talk-
Step-by-Step for Software Security (that anyone can follow)-
Pravir Chandra
-
Sep 19-
Hacklu-
Talk-
Linux thread injection - The jugaad way-
-
Aseem Jakhar -
Sep 19-
Brucon-
Talk-
Botnets and Browsers, Brothers in a Ghost Shell-
-
Aditya K Sood -
Sep 16-
Grrcon-
Talk-
Mobile App Moolah: Profit taking with Mobile Malware-
-
Jimmy Shah -
Sep 07-
Securitybyte-
Talk-
Web Application Defender-
-
K v Prashant, Mohammed Imran -
Sep 07-
Securitybyte-
Talk-
Social Web & Privacy – An evolving world-
Bala Sathiamurthy, Aridaman Tripathi
-
Sep 07-
Securitybyte-
Talk-
Mobile Devices – Boon or Curse?-
-
Kishor Sonawane, Oliver Ng -
Sep 07-
Securitybyte-
Talk-
IronWASP - A Web Application Security Testing Platform-
-
Lavakumar Kuppan -
Sep 07-
Securitybyte-
Talk-
Enterprise Wi-Fi Worms, Backdoors and Botnets for Fun and Profit-
-
Vivek Ramachandran -
Sep 07-
Securitybyte-
Talk-
Data Protection-
Dipankar Roy
-
Sep 06-
Securitybyte-
Talk-
Application Security Strategies-
-
K K Mookhey -
Sep 06-
Securitybyte-
Talk-
Using Data Analytics for Incident Response-
-
Samir Saklikar -
Sep 06-
Securitybyte-
Talk-
Security Threats on Social Networks-
-
Nithya Raman -
Sep 06-
Securitybyte-
Talk-
Runtime thread injection and execution in Linux processes-
-
Aseem Jakhar -
Sep 06-
Securitybyte-
Talk-
Private Internet Circuits - Towards A Next Generation Internet-
-
Sanjay Deshpande -
Sep 06-
Securitybyte-
Talk-
Enabling Un-trusted Mashups-
-
Bishan Singh -
Sep 06-
Securitybyte-
Talk-
Botnets at Application+ layer-
-
Raj Shastrakar -
Aug 07-
Defcon-
Talk-
VDLDS — All Your Voice Are Belong To Us-
-
Ganesh Devarajan, Don Le Bert -
Aug 05-
Defcon-
Talk-
Jugaad – Linux Thread Injection Kit-
-
Aseem Jakhar -
Aug 03-
Blackhat-
Talk-
Reverse Engineering Browser Components: Dissecting and Hacking Silverlight, HTML 5 and Flex-
-
Shreeraj Shah -
Aug 03-
Blackhat-
Talk-
Killing the Myth of Cisco IOS Diversity: Towards Reliable, Large-Scale Exploitation of Cisco IOS-
-
Jatin Kataria, Ang Cui, Salvatore Stolfo -
Aug 03-
Blackhat-
Talk-
Femtocells: A poisonous needle in the operator’s hay stack-
-
Ravishankar Borgaonkar, Nico Golde, Kevin Redon -
May 20-
Hitb Sec Conf-
Talk-
Next Generation Web Attacks – HTML 5, DOM(L3) and XHR(L2)-
-
Shreeraj Shah -
May 19-
Hitb Sec Conf-
Talk-
Spying on SpyEye – What Lies Beneath?-
-
Aditya K Sood -
Mar 30-
Troopers-
Talk-
Femtocell: Femtostep to the Holy Grail-
-
Ravishankar Borgaonkar, Kevin Redon -
Mar 15-
Nullcon-
Talk-
Information Warfare Ñ The Indian Perspective-
Alok Vijayant
-
Feb 25-
Nullcon-
Talk-
SSLSmart – Smart SSL Cipher Enumeration-
-
Gursev Singh Kalra -
Feb 25-
Nullcon-
Talk-
Security Analysis of India’s Electronic Voting Machines: Memoirs of a whistleblower-
-
Hari Krishna Prasad Vemuru -
Feb 25-
Nullcon-
Talk-
Reversing microsoft patches to reveal vulnerable code-
-
Harsimran Singh Walia -
Feb 25-
Nullcon-
Talk-
Protect infrastructure or protect information – Lessons from Wikileaks-
-
Vishal Gupta -
Feb 25-
Nullcon-
Talk-
Penetration Testing a Biometric System-
-
Rahul Sasi -
Feb 25-
Nullcon-
Talk-
Lessons Learned From 2010-
-
Saumil Shah -
Feb 25-
Nullcon-
Talk-
Jugaad Beta: Linux Thread Injection malware PoC-
-
Aseem Jakhar -
Feb 25-
Nullcon-
Talk-
JSON Fuzzing: New approach to old problems-
-
K v Prashant, Tamaghna Basu -
Feb 25-
Nullcon-
Talk-
Incident Management and Beyond-
Dinesh O Bareja
-
Feb 25-
Nullcon-
Talk-
Hacking the Parliament – A classic Social Engineering attack-
Anurag Dhanda
-
Feb 25-
Nullcon-
Talk-
Fuzzing with complexities-
-
Vishwas Sharma -
Feb 25-
Nullcon-
Talk-
Future of cyber crimes: Limitations and Challenges-
Pratap Reddy
-
Feb 25-
Nullcon-
Talk-
Enterprise Paradigm for Controlling Data Leakage-
-
Deepak Rout -
Feb 25-
Nullcon-
Talk-
Cyber Crime 101 - Cost of cybercrime, trends & analysis-
-
Simran Gambhir, Cn Shashidhar -
Feb 25-
Nullcon-
Talk-
Chupa Rustam-
-
Abhijeet Hatekar -
Feb 25-
Nullcon-
Talk-
Buffer Under Run Exploits-
-
Saurabh Sharma, Chinmaya Kamal -
Feb 25-
Nullcon-
Talk-
Automatic Program Analysis using Dynamic Binary Instrumentation (DBI)-
-
Sunil Kumar -
Feb 25-
Nullcon-
Talk-
(secure) SiteHoster – Disable XSS & SQL Injection-
-
Abhishek Kumar -
Feb 15-
Nullcon-
Talk-
Botnet Detection approach by DNS behavior and clustering analysis-
-
Nilesh Sharma, Pulkit Mehndiratta
↑