2012th
2012
-
Dec 06-
Blackhat-
Talk-
The art of exploiting logical flaws in web apps-
-
Sumit Siddharth, Richard Dean -
Dec 06-
Blackhat-
Talk-
Poking servers with Facebook(and other web applications)-
-
Riyaz Walikar -
Dec 06-
Blackhat-
Talk-
HTML5 top 10 threats – Stealth Attack and Silent Exploits-
-
Shreeraj Shah -
Dec 06-
Blackhat-
Talk-
Attacking ODATA-
-
Gursev Singh Kalra -
Dec 05-
Blackhat-
Talk-
Droid Exploitation Saga-
-
Aditya Gupta, Subho Halder -
Dec 01-
Clubhack-
Talk-
XSSshell-
-
Vandan Joshi -
Dec 01-
Clubhack-
Talk-
The difference between the “Reality” and “Feeling” of Security: Information Security and the Human Being-
-
Thomas Kurian Ambattu -
Dec 01-
Clubhack-
Talk-
Stand Close to Me, & You’re pwned! : Owning SmartPhones using NFC-
-
Aditya Gupta, Subho Halder -
Dec 01-
Clubhack-
Talk-
Smart Grid Security-
-
Falgun Rathod -
Dec 01-
Clubhack-
Talk-
Legal Nuances to the Cloud-
-
Ritambhara Agrawal -
Dec 01-
Clubhack-
Talk-
Infrastructure Security-
-
Sivamurthy Hiremath -
Dec 01-
Clubhack-
Talk-
HAWAS – Hybrid Analyzer for Web Application Security-
-
Lavakumar Kuppan -
Dec 01-
Clubhack-
Talk-
Hacking and Securing iOS applications-
-
Satish Bommisetty -
Dec 01-
Clubhack-
Talk-
FatCat Web Based SQL Injector-
-
Sandeep Kamble -
Dec 01-
Clubhack-
Talk-
Anatomy of a Responsible Disclosure – Zero Day Vulnerability in Oracle BI Publisher-
-
Vishal Kalro -
Dec 01-
Clubhack-
Talk-
Real Time Event Recording System, the tool for Digital Forensics Investigation-
-
Madhav Limaye -
Dec 01-
Clubhack-
Talk-
Detecting and Exploiting XSS with Xenotix XSS Exploit Framework-
-
Ajin Abraham -
Dec 01-
Clubhack-
Talk-
Content-Type attack -Dark hole in the secure environment-
-
Raman Gupta -
Nov 29-
Deepsec-
Talk-
Bad Things in Good Packages - Creative Exploit Delivery-
-
Saumil Shah -
Nov 23-
Malcon-
Talk-
Windows Phone 8 Malware Prototype-
Shantanu Gawde
-
Nov 23-
Malcon-
Talk-
Tampering in Energy Meters-
-
Mohit Arora -
Nov 23-
Malcon-
Talk-
Surprise paper!-
Atul Alex
-
Nov 23-
Malcon-
Talk-
Advances in ROP attacks-
-
Raashid Bhat -
Nov 23-
Malcon-
Talk-
Advanced Malware Engine-
-
Mohit Kumar -
Oct 26-
Appsecusa-
Talk-
XSS & CSRF with HTML5 - Attack, Exploit and Defense-
-
Shreeraj Shah -
Oct 26-
Appsecusa-
Talk-
The 7 Qualities of Highly Secure Software-
-
Mano Paul -
Oct 25-
Appsecusa-
Talk-
Cross Site Port Scanning-
-
Riyaz Walikar -
Oct 25-
Appsecusa-
Talk-
Cracking the Code of Mobile Application-
-
Sreenarayan Ashokkumar -
Oct 23-
Hacklu-
Talk-
Buster: Android Security Buster-
Atul Alex
-
Oct 11-
Hitbsecconf-
Talk-
XSS & CSRF strike back – Powered by HTML5-
-
Shreeraj Shah -
Oct 10-
Hitbsecconf-
Talk-
Innovative Approaches to Exploit Delivery-
-
Saumil Shah -
Sep 29-
Nullcon-
Talk-
Next-gen Forensics-
K K Mookhey
-
Sep 28-
Nullcon-
Talk-
Attacking Angry Droids-
Aditya Gupta, Subho Halder
-
Sep 28-
Nullcon-
Talk-
Alert(/xss/) - How to catch an XSS before someone exploits / reports it?-
Ahamed Nafeez
-
Sep 27-
Grrcon-
Talk-
The Realm of Third Generation Botnet Attacks-
-
Aditya K Sood, Dr. Richard J Enbody -
Sep 26-
Nullcon-
Talk-
The art of Passive Web Vul Analysis with IronWASP-
-
Lavakumar Kuppan -
Sep 26-
Nullcon-
Talk-
Opening the kimono: Automating behavioral analysis for mobile apps-
-
Pradeep Kulkarni, Michael Sutton -
Sep 26-
Nullcon-
Talk-
How secure is internet banking in India-
-
Ajit Hatti -
Sep 26-
Nullcon-
Talk-
Highly Harmful Audio Waves aka DTMF Fuzzing-
-
Rahul Sasi -
Sep 20-
Ekoparty-
Talk-
Fuzzing DTMF Input Processing Algorithms-
-
Rahul Sasi -
Sep 20-
Ekoparty-
Talk-
Dirty use of USSD Codes in Cellular Network-
-
Ravishankar Borgaonkar -
Sep 05-
44con-
Talk-
Why Integrity is left alone and not given TLC (Tender, Love and Care) it deserves?-
-
Jitender Arora -
Aug 29-
Owaspappsecindia-
Talk-
Find me if you can Smart fuzzing and discovery!-
-
Shreeraj Shah -
Aug 04-
C0c0n-
Talk-
Impact of cyber laws on various stakeholders-
Sagar Rahurkar
-
Aug 03-
C0c0n-
Talk-
WebApp Remote Code Execution using Server Side Scripting Engines-
-
Rahul Sasi -
Aug 03-
C0c0n-
Talk-
The Weakest Link - Reinforcing the Human Element-
Sandeep Godbole
-
Aug 03-
C0c0n-
Talk-
The Management of Information Security – A Corporate Practitioner’s Perspective-
Pawan Kumar Singh
-
Aug 03-
C0c0n-
Talk-
Security Incidents – Avoiding the Apocalypse in 2012-
Ashish Chandra Mishra
-
Aug 03-
C0c0n-
Talk-
Layer 8 Exploitation: A threat to National Security-
Aakash Goel
-
Aug 03-
C0c0n-
Talk-
I haz you and pwn your maal-
-
Harsimran Singh Walia -
Aug 03-
C0c0n-
Talk-
Gathering security requirements-
K v Prashant, Saleem Ahamed
-
Aug 03-
C0c0n-
Talk-
Evil JavaScript-
Bishan Singh
-
Aug 03-
C0c0n-
Talk-
Enterprise server security-
Raghav Shandilya
-
Aug 03-
C0c0n-
Talk-
Easy Money with UI-Redressing-
Amol Naik
-
Aug 03-
C0c0n-
Talk-
Data Security-
Alok Vijayant, S Bhansali
-
Aug 03-
C0c0n-
Talk-
Cyber Weapons-
Sameer Saxena
-
Aug 03-
C0c0n-
Talk-
Cracking the Mobile Application Source Code-
-
Sreenarayan Ashokkumar -
Aug 03-
C0c0n-
Talk-
Contemporary Transcription and Resource Parasitism-
Arpit Patel
-
Aug 03-
C0c0n-
Talk-
Business Continuity and Risk Management in Turbulent Times-
Venkataram Arabolu
-
Aug 03-
C0c0n-
Talk-
Building Security Incident Detection & Handling Capabilities in Enterprises-
Sunil Varkey
-
Aug 03-
C0c0n-
Talk-
A model to reduce information security risks due to human error-
-
Anup Narayanan -
Jul 28-
Defcon-
Talk-
Botnets Die Hard - Owned and Operated-
-
Aditya K Sood, Richard J Enbody -
Jul 26-
Blackhat-
Talk-
HTML5 top 10 threats – Stealth Attack and Silent Exploits-
-
Shreeraj Shah -
Jul 26-
Blackhat(Arsenal)-
Tool demo-
Bypassing Every CAPTCHA provider with clipcaptcha-
-
Gursev Singh Kalra -
Jul 25-
Blackhat(Arsenal)-
Tool demo-
Oyedata for OData Assessments-
-
Gursev Singh Kalra -
Jul 22-
Blackhat(Arsenal)-
Tool demo-
Kautilya and Nishang-
-
Nikhil Mittal -
Jul 14-
Hope-
Talk-
Advancements in Botnet Attacks and Malware Distribution-
-
Aditya K Sood -
May 24-
Hitbsecconf-
Talk-
CXML/VXML Auditing for IVR Pentesters and PCI/DSS Consultants-
-
Rahul Sasi -
May 13-
Carolinacon-
Talk-
Attacking CAPTCHAs for Fun and Profit-
Gursev Singh Kalra
-
Mar 21-
Troopers-
Talk-
More Fun Using Kautilya or Is It a Thumb Drive? Is It a Toy? No, It’s a Keyboard-
-
Nikhil Mittal -
Mar 16-
Blackhat-
Talk-
The Pwnage Saga Continues-
-
Nikhil Mittal -
Mar 16-
Blackhat-
Talk-
IVR Security- Internal Network Attack via Phone Lines-
-
Rahul Sasi -
Mar 15-
Owaspappsecindia-
Talk-
The Magic of Passive Web Vulnerability Analysis-
Lavakumar Kuppan
-
Mar 15-
Grrcon-
Talk-
SCADA Security: Why is it so hard?-
-
Amol Sarwate -
Mar 15-
Hackinparis-
Talk-
SCADA Security: Why Is It So Hard ?-
-
Amol Sarwate -
Mar 15-
C0c0n-
Talk-
Integrated Dial 100 System for Law Enforcement-
Nandkumar Saravade, R Srikumar
-
Mar 15-
Nullcon-
Talk-
An App(le) a day keeps the wallet away-
Antriksh Shah
-
Mar 14-
Blackhat-
Talk-
HTML5 top 10 threats – Stealth Attack and Silent Exploits-
-
Shreeraj Shah -
Mar 14-
Blackhat-
Talk-
Hacking XPATH 2.0-
-
Sumit Siddharth, Tom Forbes -
Feb 15-
Nullcon-
Talk-
Your phone is your phone but your calls are now my calls-
Akib Sayyed, Bipul Sahu, Dipesh Goyal, Nitin Agarwal
-
Feb 15-
Nullcon-
Talk-
Teensy for fun and jugaad-
Amey Gat
-
Feb 15-
Nullcon-
Talk-
Shall we dust Beep? The Geo-strategic realities of Cyberwar-
-
Pukhraj Singh -
Feb 15-
Nullcon-
Talk-
SCADA Security: Why is it so hard-
Amol Sarwate
-
Feb 15-
Nullcon-
Talk-
Sandboxing The deep truth-
-
Disha Agarwal, Manish Pali -
Feb 15-
Nullcon-
Talk-
Ra.2 Blackbox DOM-based XSS scanner-
-
Nishant Das Patnaik, Sarathi Sabyasachi Sahoo -
Feb 15-
Nullcon-
Talk-
Open source revolution :Need Hardware - Software marriage-
Venkatesh
-
Feb 15-
Nullcon-
Talk-
Node.js: The good, bad and ugly-
-
Bishan Singh -
Feb 15-
Nullcon-
Talk-
Javascript static analysis with IronWASP-
-
Lavakumar Kuppan -
Feb 15-
Nullcon-
Talk-
IVR Security: Internal Network attacks via phone lines-
-
Rahul Sasi -
Feb 15-
Nullcon-
Talk-
Haxdroid: Empowering Android Handset-
-
Anant Shrivastava, Prashant Mahajan, Pardhasaradhi Ch -
Feb 15-
Nullcon-
Talk-
Friction in the machine-
Dinesh Shenoy
-
Feb 15-
Nullcon-
Talk-
Cyberspace: Global commons or a national asset-
Kamlesh Bajaj
-
Feb 15-
Nullcon-
Talk-
Content sniffing Algorithm bypassing techniques and possible attack vectors-
-
Anil Aphale, Chaitany Kamble -
Feb 15-
Nullcon-
Talk-
CAPTCHAs for fun and Profit-
-
Gursev Singh Kalra -
Feb 15-
Nullcon-
Talk-
Binary God-
-
Atul Alex -
Feb 15-
Nullcon-
Talk-
Best practices to improve the security grading of your project-
-
Hemant Khandelwal -
Feb 15-
Nullcon-
Talk-
Attacking Backup Software-
-
Nibin Varghese -
Feb 15-
Nullcon-
Talk-
Application security cost management-
-
Ketan Vyas
↑