2013th
2013
-
Nov 21-
Appsecusa-
Talk-
Wassup MOM? Owning the Message Oriented Middleware-
-
Gursev Singh Kalra -
Nov 21-
Deepsec-
Talk-
Europe In The Carna Botnet: Telnet’s Threat To The Largest Economy-
-
Parth Shukla -
Nov 21-
Deepsec-
Talk-
Automation In Android & iOS Application Security Review-
-
Hemil Shah -
Nov 20-
Appsecusa-
Talk-
Why is SCADA Security an Uphill Battle?-
-
Amol Sarwate -
Nov 20-
Appsecusa-
Talk-
Project Talk: OWASP OpenSAMM Project-
-
Pravir Chandra, Seba Deleersnyder -
Nov 20-
Appsecusa-
Panel-
Aim-Ready-Fire-
Pravir Chandra, Ajoy Kumar, Suprotik Ghose, Jason Rottaupt, Ramin Safai, Sean Barnum, Wendy Nather
-
Nov 07-
Groundzerosummit-
Talk-
Understanding the anatomy of advanced targeted attacks – The Trend Micro approach-
Tarun Gupta
-
Nov 07-
Groundzerosummit-
Talk-
Towards a next generation secure Internet-
Sanjay Deshpande
-
Nov 07-
Groundzerosummit-
Talk-
The seven sins of Wi-Fi security-
Vivek Ramachandran
-
Nov 07-
Groundzerosummit-
Talk-
Setting the Data Center on fire-
Ajit Hatti
-
Nov 07-
Groundzerosummit-
Talk-
Serial killing of embedded systems-
Atul Alex
-
Nov 07-
Groundzerosummit-
Talk-
Securing government Critical Information Infrastructure-
Kapil Awasthi
-
Nov 07-
Groundzerosummit-
Talk-
Malware for Firefox Mobile OS-
Shantanu Gawde
-
Nov 07-
Groundzerosummit-
Talk-
IronWASP-
-
Lavakumar Kuppan -
Nov 07-
Groundzerosummit-
Talk-
Internet – Transforming terrorism-
Sameer Saxena
-
Nov 07-
Groundzerosummit-
Talk-
How I built a pentest lab in under 70 USD-
Swaroop Yermalkar
-
Nov 07-
Groundzerosummit-
Talk-
Evolution of network security around Software Defined Networking (SDN) – The intelligent network-
Diwakar Dayal
-
Nov 07-
Groundzerosummit-
Talk-
Cloud Security: Enabling continuous, scalable security for today’s hyper connected world-
Sumedh Thakar
-
Nov 07-
Groundzerosummit-
Talk-
Central Monitoring System and IT Act 2000 – Balance between rights of citizens and state-
Vaishali Bhagwat
-
Nov 07-
Groundzerosummit-
Talk-
Approach to containing the outbreak of malicious information in online social networks-
Sriniketh Vijayaraghavan
-
Nov 07-
Groundzerosummit-
Talk-
Advanced security for advanced threats-
Kartik Shahani
-
Nov 07-
Groundzerosummit-
Talk-
Abusing Google Apps: Google is my command and control center-
-
Ajin Abraham -
Oct 19-
Toorcon-
Talk-
Static Malware Analysis with PyTriage-
-
Yashin Mehaboobe -
Oct 17-
Hitbsecconf-
Talk-
Static Analysis and Dynamic Instrumentation for Intelligent Exploit Analysis-
-
Rahul Sasi -
Sep 27-
C0c0n-
Talk-
The Secure Software Development Life Cycle-
Harshal Jamdade
-
Sep 27-
C0c0n-
Talk-
The Art and Science of Anamoly based Vulnerability Detection-
Lavakumar Kuppan
-
Sep 27-
C0c0n-
Talk-
Static analysis of malware with PyTriage-
-
Yashin Mehaboobe -
Sep 27-
C0c0n-
Talk-
SSRF / XSPA - Real World Attacks and Mitigations-
Riyaz Walikar
-
Sep 27-
C0c0n-
Talk-
Snake Bites-
-
Anant Shrivastava -
Sep 27-
C0c0n-
Talk-
Sandy - The Malicious Analysis-
-
Rahul Sasi -
Sep 27-
C0c0n-
Talk-
Risk and challenges in virtual currencies.-
Harsh Patel, Swatantra Kumar Gupta
-
Sep 27-
C0c0n-
Talk-
Pwning WiFi Devices!-
Swaroop Yermalkar
-
Sep 27-
C0c0n-
Talk-
Lets Play - Applanting on new Grounds-
Ajit Hatti
-
Sep 27-
C0c0n-
Talk-
Infiltrating the Intranet with Skanda-
-
Jayesh Chauhan -
Sep 27-
C0c0n-
Talk-
Hello CISO! How to make end-users LIKE and FOLLOW “Brand Infosec”?-
Anup Narayanan
-
Sep 27-
C0c0n-
Talk-
From Bedroom to Boardroom - Taking your Weekend Infosec Project Global-
Vivek Ramachandran
-
Sep 27-
C0c0n-
Talk-
Disclosing Vulnerabilities: The Bug Bounty Style-
Nikhil Prabhakar
-
Sep 27-
C0c0n-
Talk-
Blur Captcha-
Anirudh Duggal, Abhinav Mohanty
-
Sep 27-
C0c0n-
Talk-
ARM, Thumb and the Finger-
Aseem Jakhar
-
Sep 13-
Rootcon-
Talk-
My Experiments with truth: a different route to bug hunting-
-
Devesh Bhatt -
Sep 13-
Grrcon-
Talk-
Matriux Leandros - An Open Source Penetration Testing and Forensic Distribution-
Prajwal Panchmahalkar
-
Sep 12-
Grrcon-
Talk-
The Droid Exploitation Saga – All Over Again!-
Aditya Gupta, Subho Halder
-
Aug 16-
Usenix-
Talk-
Building Securable Infrastructure: Open-Source Private Clouds-
-
Pravir Chandra -
Aug 15-
Usenix-
Talk-
An Empirical Study of Vulnerability Rewards Programs-
-
Devdatta Akhawe, David Wagner, Matthew Finifter -
Aug 15-
Usenix-
Talk-
Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness-
-
Devdatta Akhawe, Adrienne Felt -
Aug 03-
Defcon-
Talk-
PowerPreter: Post Exploitation Like a Boss-
-
Nikhil Mittal -
Aug 02-
Defcon-
Talk-
Interactive Web Security Testing with IronWASP-
Lavakumar Kuppan
-
Aug 01-
Blackhat(Arsenal)-
Tool demo-
XENOTIX xBOT-
-
Ajin Abraham -
Aug 01-
Blackhat(Arsenal)-
Tool demo-
Sparty-
-
Aditya K Sood -
Aug 01-
Blackhat(Arsenal)-
Tool demo-
OWASP Xenotix XSS Exploit Framework-
-
Ajin Abraham -
Aug 01-
Blackhat-
Talk-
Hot knives through butter: Bypassing automated analysis systems-
-
Abhishek Singh, Zheng Bu -
Jul 31-
Blackhat-
Talk-
LTE booms with vulnerabilities-
-
Ankit Gupta -
Jul 31-
Blackhat(Arsenal)-
Tool demo-
JMSDigger-
-
Gursev Singh Kalra -
Jul 31-
Blackhat-
Talk-
Javascript static security analysis made easy with JSPrime-
-
Nishant Das Patnaik, Sarathi Sabyasachi Sahoo -
Jul 31-
Blackhat-
Talk-
Clickjacking revisited: A perceptual view of UI security-
-
Devdatta Akhawe -
Mar 15-
Blackhat-
Talk-
Vulnerability analysis of 2013 SCADA issues-
-
Amol Sarwate -
Mar 15-
Blackhat-
Talk-
The Sandbox Roulette- Are you ready for the gamble?-
-
Rahul Kashyap, Rafal Wojtczuk -
Mar 15-
Blackhat(Arsenal)-
Tool demo-
Prasadhak (And Offensive Powershell)-
-
Nikhil Mittal -
Mar 15-
Blackhat(Arsenal)-
Tool demo-
OWASP Xenotix XSS Exploit Framework-
-
Ajin Abraham -
Mar 14-
Blackhat-
Talk-
Lets play - Applanting-
-
Ajit Hatti -
Mar 12-
Troopers-
Talk-
Dirty use of USSD Codes in Cellular Network-
-
Ravishankar Borgaonkar -
Mar 07-
Cansecwest-
Talk-
SMS to Meterpreter - Fuzzing USB Modems-
-
Rahul Sasi -
Mar 01-
Nullcon-
Talk-
Vulnerability research anyone?-
Omair
-
Mar 01-
Nullcon-
Talk-
SMS to Meterpreter - Fuzzing USB Modems-
-
Rahul Sasi -
Mar 01-
Nullcon-
Talk-
Sensitive Campus Security with Network-
-
Aravind Sitaraman -
Mar 01-
Nullcon-
Talk-
Rest - A Real Stealth and Semi Stealth MITM Attack Tool for IPv4 Networks-
-
Naga Rohit Samineni -
Mar 01-
Nullcon-
Talk-
Pawing the Droid: Twisting the ARM-
Divyanshu Shekhar, Anshul Kumar
-
Mar 01-
Nullcon-
Talk-
Mobile Code mining for discovery and exploits-
-
Hemil Shah -
Mar 01-
Nullcon-
Talk-
Inception of graphical passwords-
-
Rishi Narang -
Mar 01-
Nullcon-
Talk-
Detecting and Exploiting XSS Vulnerabilities and Xenotix XSS Exploitation Framework-
-
Ajin Abraham -
Mar 01-
Nullcon-
Talk-
CSRF Finder as a Mozilla Addon-
-
Piyush Pattanayak -
Mar 01-
Nullcon-
Talk-
Capturing Zero-Day Information-
-
Dinesh O Bareja, Sumit Sharma -
Mar 01-
Nullcon-
Talk-
BYOD: How will it shape your wireless network security in future?-
-
Kiran Deshpande -
Mar 01-
Nullcon-
Talk-
Bug Bounty Hunter’s confession-
-
Amol Naik -
Mar 01-
Nullcon-
Talk-
Automating JavaScript Static Analysis-
Lavakumar Kuppan
↑