Hackers of India
Home
Timeline
Tools
About
RoadMap
2014th
---- 2014 ----
2014/11/13
Talk
:
Ground Zero Summit
:
Vulnerability Reproduction using Zest
-
Deep Shah
2014/11/13
Talk
:
Ground Zero Summit
:
SCADA Exploitation through Firmware
-
Ashish Saxena
2014/11/13
Talk
:
Ground Zero Summit
:
National Cyber Policy and its impact on Business
-
Vaishali Bhagwat
2014/11/13
Talk
:
Ground Zero Summit
:
Mobile security Automation Framework for Intelligent Auditing
-
Ankur Bhargava
2014/11/13
Talk
:
Ground Zero Summit
:
Making and Breaking Embedded Security
-
Yashin Mehaboobe
2014/11/13
Talk
:
Ground Zero Summit
:
Internet Governance
-
Anjana Kovacs
2014/11/13
Talk
:
Ground Zero Summit
:
How I won Browser Fuzzing
-
Amol Naik
2014/11/13
Talk
:
Ground Zero Summit
:
Hacking consumer electronics for Fun
-
Atul Alex
2014/11/13
Talk
:
Ground Zero Summit
:
Fuzzing Asynchronous Protocols built over Websockets
-
Lavakumar Kuppan
2014/11/13
Talk
:
Ground Zero Summit
:
Financial Integrity and Cyber Security
-
Karnal Singh
2014/11/13
Talk
:
Ground Zero Summit
:
Evaluating WAF (Web Application Firewall) for Fun and Profit with WOF
-
Bhaumik Merchant
2014/11/13
Talk
:
Ground Zero Summit
:
Enterprise Security
-
Mano Paul
2014/11/13
Talk
:
Ground Zero Summit
:
Detecting Fake Cell Phone Towers
-
Vijay Mukhi
2014/11/13
Talk
:
Ground Zero Summit
:
Cyber ‘BrahMos’ - Static analysis driven secure coding
-
Joy Sen
2014/11/13
Talk
:
Ground Zero Summit
:
Attacking Web-Proxies like never before
-
Ahamed Nafeez
2014/11/13
Talk
:
Ground Zero Summit
:
APT protection for the Enterprise
-
Deepak Singla
2014/11/13
Talk
:
Ground Zero Summit
:
9 Cell Cyber Diplomacy
-
Alok Vijayant
2014/11/13
Talk
:
Ground Zero Summit
:
Security vulnerabilities in DVB-C networks: Hacking Cable TV network
-
Rahul Sasi
2014/11/13
Talk
:
Ground Zero Summit
:
Network Time Protocol in Amplification Inferno
-
Sriram Krishnan
2014/11/13
Talk
:
Ground Zero Summit
:
Identity theft and its impact on Cyber - Warfare
-
Tarun Wig
2014/11/13
Talk
:
Ground Zero Summit
:
Attacking Cryptography & PKI Implementations
-
Ajit Hatti
2014/10/29
Talk
:
Ekoparty
:
Security vulnerabilities in DVB-C networks: Hacking Cable tV network part 2
-
Rahul Sasi
2014/10/23
Talk
:
Hacklu
:
WiHawk - Router Vulnerability Scanner
-
Anamika Singh
2014/10/23
Talk
:
Hacklu
:
Hacking with Images - Evil Pictures
-
Saumil Shah
2014/10/17
Talk
:
Blackhat
:
Android Kernel and OS Security Assessment with Iron Crow
-
Akhil Arora
Sumanth Naropanth
2014/10/16
Talk
:
Grrcon
:
Socioware: Dissecting Online Social Network Worms – Insidious Analysis and Design
-
Aditya K Sood
Dr. Richard J Enbody
2014/09/28
Talk
:
Blackhat
:
Understanding IMSI Privacy
-
Swapnil Udar
Ravishankar Borgaonkar
2014/09/24
Talk
:
Brucon
:
OWASP: OWTF
-
Bharadwaj Machiraju
2014/08/22
Talk
:
C0c0n
:
The Curious Case of ProtoBufs - Demystifying Google’s hottest binary protocol
-
Prasanna Kanagasabai
Jovin Lobo
2014/08/22
Talk
:
C0c0n
:
Still Single with a bleeding heart (Tool Release)
-
Tamaghna Basu
2014/08/22
Talk
:
C0c0n
:
Piracy Tracker
-
Vargheese Babu
2014/08/22
Talk
:
C0c0n
:
My tryst with Source Code Review
-
Anant Shrivastava
2014/08/22
Talk
:
C0c0n
:
Making and breaking security in embedded devices
-
Yashin Mehaboobe
2014/08/22
Talk
:
C0c0n
:
Lesser Known Attack - XML Injection
-
Amol Naik
2014/08/22
Talk
:
C0c0n
:
Idle Machines doing Bounty Hunting (Behind your Back)
-
Mrityunjay Gautam
2014/08/22
Talk
:
C0c0n
:
Hacking Communication
-
Akib Sayyed
2014/08/22
Talk
:
C0c0n
:
Exploiting NoSQL Like Never Before
-
Francis Alexander
2014/08/22
Talk
:
C0c0n
:
Cryptographic Backdoors: Subverting the RSA
-
Adhokshaj Mishra
2014/08/22
Talk
:
C0c0n
:
Cryptocalypse, Heart Bleed : Is our Government Listening?
-
Ajit Hatti
2014/08/22
Talk
:
C0c0n
:
Breaking and Securing Mobile Apps - Automagically
-
Aditya Gupta
2014/08/22
Talk
:
C0c0n
:
APT: Case Study of attackers targeting public tendering
-
Rahul Sasi
2014/08/07
Talk
:
Blackhat
:
Lifecycle of a phone fraudster: Exposing fraud activity from reconnaissance to takeover using graph analysis and acoustical anomalies
-
Vijay Balasubramaniyan
Raj Bandyopadhyay
Telvis Calhoun
2014/08/07
Tool Demo
:
Blackhat
:
C-SCAD: Assessing Security flaws in clearscada Web_X client!
-
Aditya K Sood
2014/08/06
Talk
:
Blackhat
:
What goes around comes back around - Exploiting fundamental weaknees in Botnet C&C Panels!
-
Aditya K Sood
2014/08/06
Tool Demo
:
Blackhat
:
Flowinspect: Yet another network inspection tool
-
Ankur Tyagi
2014/06/23
Talk
:
Hackinparis
:
Pentesting NoSQL DB’s with NoSQL Exploitation Framework
-
Francis Alexander
2014/05/29
Talk
:
Hitb Sec Conf
:
LOL (Layers On Layers) – Bypassing Endpoint Security for Fun and Profit
-
Rahul Kashyap
Rafal Wojtzcuk
2014/05/29
Talk
:
Hitb Sec Conf
:
Hacking Your Cable TV Network: Die Hard Style
-
Rahul Sasi
2014/05/21
Talk
:
Phdays
:
ARM Exploitation
-
Aseem Jakhar
2014/05/21
Talk
:
Phdays
:
Android Exploitation
-
Aditya Gupta
2014/03/27
Talk
:
Blackhat
:
JS Suicide: Using JavaScript Security Features to Kill JS Security
-
Ahamed Nafeez
2014/03/18
Talk
:
Troopers
:
Evolution of SIM Card Security
-
Ravishankar Borgaonkar
2014/02/15
Tool Demo
:
Nullcon
:
XMLChor
-
Harshal Jamdade
2014/02/15
Tool Demo
:
Nullcon
:
OWASP Xenotix XSS Exploit Framerwork
-
Ajin Abraham
2014/02/15
Tool Demo
:
Nullcon
:
OWASP OWTF - The Offensive (Web) Testing Framework
-
Bharadwaj Machiraju
Abraham Aranguren
2014/02/15
Tool Demo
:
Nullcon
:
NoSQL Exploitation Framework
-
Francis Alexander
2014/02/15
Tool Demo
:
Nullcon
:
DrupSnipe
-
Ranjeet Sengar
Sukesh Pappu
2014/02/14
Talk
:
Nullcon
:
Wi-Hawk Password Auditing Tool
-
Anamika Singh
2014/02/14
Talk
:
Nullcon
:
The Security Challenge
-
Shantanu Ghosh
2014/02/14
Talk
:
Nullcon
:
Strategic Information Warfare: When Ends define the means
-
Amit Sharma
2014/02/14
Talk
:
Nullcon
:
phoneypdf: A Virtual PDF Analysis Framework
-
Kiran Bandla
2014/02/14
Talk
:
Nullcon
:
Pentesting without Pentesters - Automating Security Testing with Functional Testing Test Cases
-
Ankita Gupta
Lavakumar Kuppan
2014/02/14
Talk
:
Nullcon
:
o’Dea Assertions - Untwining the Security of the SAML Protocol
-
Achin Kulshrestha
2014/02/14
Talk
:
Nullcon
:
Null Hardware Badge 101 (Desi Jugaad)
-
Amey Gat
Umesh
2014/02/14
Talk
:
Nullcon
:
Multi-value W-Fi What the Heck is it
-
Abhijeet Ghosh
2014/02/14
Talk
:
Nullcon
:
In air they wander, we exist to blow their cover!!! {Approaches to Evil Twin Detection from a normal user’s perspective}
-
Rushikesh D Nandedkar
Amrita C Iyer
2014/02/14
Talk
:
Nullcon
:
Hardware Attack Vectors
-
Yashin Mehaboobe
2014/02/14
Talk
:
Nullcon
:
Hacking YOu’r Cable TV Network.
-
Rahul Sasi
Ahamed Nafeez
2014/02/14
Talk
:
Nullcon
:
Flowinspect - A Network Inspection Tool
-
Ankur Tyagi
2014/02/14
Talk
:
Nullcon
:
Chrome - OS Security 2014: New and future hotness
-
Sumit Gwalani
2014/02/14
Talk
:
Nullcon
:
Attacking WPA/WPA2 in the Cloud
-
Vivek Ramachandran
2014/02/14
Talk
:
Nullcon
:
Attack of the setuid bit - pt_chown and pwning root terminals
-
Siddhesh Poyarekar
2014/02/14
Talk
:
Nullcon
:
A security analysis of Browser Extensions
-
Abhay Rana
2014/02/14
Talk
:
Nullcon
:
2014 The year in which we cannot ignore SCADA
-
Amol Sarwate
2014/02/14
Talk
:
Nullcon
:
12 YEARS AND A BAKER’S DOZEN
-
Saumil Shah