2014th
2014
-
Nov 21-
Deepsec-
Talk-
Mobile SSL Failures-
-
Tushar Dalvi, Tony Trummer -
Nov 13-
Groundzerosummit-
Talk-
Vulnerability Reproduction using Zest-
Deep Shah
-
Nov 13-
Groundzerosummit-
Talk-
SCADA Exploitation through Firmware-
Ashish Saxena
-
Nov 13-
Groundzerosummit-
Talk-
National Cyber Policy and its impact on Business-
Vaishali Bhagwat
-
Nov 13-
Groundzerosummit-
Talk-
Mobile security Automation Framework for Intelligent Auditing-
Ankur Bhargava
-
Nov 13-
Groundzerosummit-
Talk-
Making and Breaking Embedded Security-
-
Yashin Mehaboobe -
Nov 13-
Groundzerosummit-
Talk-
Internet Governance-
Anjana Kovacs
-
Nov 13-
Groundzerosummit-
Talk-
How I won Browser Fuzzing-
Amol Naik
-
Nov 13-
Groundzerosummit-
Talk-
Hacking consumer electronics for Fun-
Atul Alex
-
Nov 13-
Groundzerosummit-
Talk-
Fuzzing Asynchronous Protocols built over Websockets-
Lavakumar Kuppan
-
Nov 13-
Groundzerosummit-
Talk-
Financial Integrity and Cyber Security-
Karnal Singh
-
Nov 13-
Groundzerosummit-
Talk-
Evaluating WAF (Web Application Firewall) for Fun and Profit with WOF-
Bhaumik Merchant
-
Nov 13-
Groundzerosummit-
Talk-
Enterprise Security-
Mano Paul
-
Nov 13-
Groundzerosummit-
Talk-
Detecting Fake Cell Phone Towers-
Vijay Mukhi
-
Nov 13-
Groundzerosummit-
Talk-
Cyber ‘BrahMos’ - Static analysis driven secure coding-
Joy Sen
-
Nov 13-
Groundzerosummit-
Talk-
Attacking Web-Proxies like never before-
Ahamed Nafeez
-
Nov 13-
Groundzerosummit-
Talk-
APT protection for the Enterprise-
Deepak Singla
-
Nov 13-
Groundzerosummit-
Talk-
9 Cell Cyber Diplomacy-
Alok Vijayant
-
Nov 13-
Groundzerosummit-
Talk-
Security vulnerabilities in DVB-C networks: Hacking Cable TV network-
Rahul Sasi
-
Nov 13-
Groundzerosummit-
Talk-
Network Time Protocol in Amplification Inferno-
Sriram Krishnan
-
Nov 13-
Groundzerosummit-
Talk-
Identity theft and its impact on Cyber - Warfare-
Tarun Wig
-
Nov 13-
Groundzerosummit-
Talk-
Attacking Cryptography & PKI Implementations-
Ajit Hatti
-
Oct 29-
Ekoparty-
Talk-
Security vulnerabilities in DVB-C networks: Hacking Cable tV network part 2-
-
Rahul Sasi -
Oct 23-
Hacklu-
Talk-
WiHawk - Router Vulnerability Scanner-
-
Anamika Singh -
Oct 23-
Hacklu-
Talk-
Hacking with Images - Evil Pictures-
-
Saumil Shah -
Oct 23-
T2-
Talk-
Darshak: how to turn your phone into a low cost IMSI catcher device-
-
Ravishankar Borgaonkar, Swapnil Udar -
Oct 17-
Blackhat-
Talk-
Android Kernel and OS Security Assessment with Iron Crow-
-
Akhil Arora, Sumanth Naropanth -
Oct 16-
Grrcon-
Talk-
Socioware: Dissecting Online Social Network Worms – Insidious Analysis and Design-
Aditya K Sood, Dr. Richard J Enbody
-
Sep 28-
Blackhat-
Talk-
Understanding IMSI Privacy-
-
Swapnil Udar, Ravishankar Borgaonkar -
Sep 26-
Virusbulletin-
Talk-
Evolution of Android exploits from a static analysis tools perspective-
-
Jagadeesh Chandraiah, Anna Szalay -
Sep 25-
Virusbulletin-
Talk-
Optimized mal-ops. Hack the ad network like a boss-
-
Rahul Kashyap, Vadim Kotov -
Sep 24-
Brucon-
Talk-
OWASP: OWTF-
-
Bharadwaj Machiraju -
Sep 16-
Deepsec-
Talk-
Advanced Powershell Threat – Lethal Client Side Attacks-
-
Nikhil Mittal -
Sep 12-
44con-
Talk-
Pentesting NoSQL DB’s Using NoSQL Exploitation Framework-
-
Francis Alexander -
Sep 11-
44con-
Talk-
Darshak: how to turn your phone into a low cost IMSI catcher device-
-
Ravishankar Borgaonkar, Swapnil Udar -
Aug 22-
C0c0n-
Talk-
The Curious Case of ProtoBufs - Demystifying Google’s hottest binary protocol-
-
Prasanna Kanagasabai, Jovin Lobo -
Aug 22-
C0c0n-
Talk-
Still Single with a bleeding heart (Tool Release)-
Tamaghna Basu
-
Aug 22-
C0c0n-
Talk-
Piracy Tracker-
Vargheese Babu
-
Aug 22-
C0c0n-
Talk-
My tryst with Source Code Review-
-
Anant Shrivastava -
Aug 22-
C0c0n-
Talk-
Making and breaking security in embedded devices-
-
Yashin Mehaboobe -
Aug 22-
C0c0n-
Talk-
Lesser Known Attack - XML Injection-
Amol Naik
-
Aug 22-
C0c0n-
Talk-
Idle Machines doing Bounty Hunting (Behind your Back)-
Mrityunjay Gautam
-
Aug 22-
C0c0n-
Talk-
Hacking Communication-
Akib Sayyed
-
Aug 22-
C0c0n-
Talk-
Exploiting NoSQL Like Never Before-
Francis Alexander
-
Aug 22-
C0c0n-
Talk-
Cryptographic Backdoors: Subverting the RSA-
Adhokshaj Mishra
-
Aug 22-
C0c0n-
Talk-
Cryptocalypse, Heart Bleed : Is our Government Listening?-
Ajit Hatti
-
Aug 22-
C0c0n-
Talk-
Breaking and Securing Mobile Apps - Automagically-
Aditya Gupta
-
Aug 22-
C0c0n-
Talk-
APT: Case Study of attackers targeting public tendering-
Rahul Sasi
-
Aug 21-
Usenix-
Talk-
The Emperor’s New Password Manager: Security Analysis of Web-based Password Managers-
-
Devdatta Akhawe, Zhiwei Li, Warren He, Dawn Song -
Aug 07-
Blackhat-
Talk-
Lifecycle of a phone fraudster: Exposing fraud activity from reconnaissance to takeover using graph analysis and acoustical anomalies-
-
Vijay Balasubramaniyan, Raj Bandyopadhyay, Telvis Calhoun -
Aug 07-
Blackhat(Arsenal)-
Tool demo-
C-SCAD: Assessing Security flaws in clearscada Web_X client!-
-
Aditya K Sood -
Aug 06-
Blackhat-
Talk-
What goes around comes back around - Exploiting fundamental weaknees in Botnet C&C Panels!-
-
Aditya K Sood -
Aug 06-
Blackhat(Arsenal)-
Tool demo-
Flowinspect: Yet another network inspection tool-
-
Ankur Tyagi -
Jun 23-
Hackinparis-
Talk-
Pentesting NoSQL DB’s with NoSQL Exploitation Framework-
-
Francis Alexander -
May 29-
Hitbsecconf-
Talk-
LOL (Layers On Layers) – Bypassing Endpoint Security for Fun and Profit-
-
Rahul Kashyap, Rafal Wojtzcuk -
May 29-
Hitbsecconf-
Talk-
Hacking Your Cable TV Network: Die Hard Style-
-
Rahul Sasi -
May 29-
Hitbsecconf-
Talk-
Exploiting NoSQL Like Never Before-
-
Francis Alexander -
May 21-
Phdays-
Talk-
ARM Exploitation-
-
Aseem Jakhar -
May 21-
Phdays-
Talk-
Android Exploitation-
-
Aditya Gupta -
Mar 27-
Blackhat-
Talk-
JS Suicide: Using JavaScript Security Features to Kill JS Security-
-
Ahamed Nafeez -
Mar 18-
Troopers-
Talk-
Evolution of SIM Card Security-
-
Ravishankar Borgaonkar -
Mar 15-
Hitbsecconf-
Talk-
JS Suicide: Using Javascript Security Features to Kill Itself-
-
Ahamed Nafeez -
Mar 15-
Blackhat-
Talk-
Anatomy of a Credit Card Stealing POS Malware-
-
Amol Sarwate -
Feb 15-
Nullcon-
Tool demo-
XMLChor-
-
Harshal Jamdade -
Feb 15-
Nullcon-
Tool demo-
OWASP Xenotix XSS Exploit Framerwork-
-
Ajin Abraham -
Feb 15-
Nullcon-
Tool demo-
OWASP OWTF - The Offensive (Web) Testing Framework-
-
Bharadwaj Machiraju, Abraham Aranguren -
Feb 15-
Nullcon-
Tool demo-
NoSQL Exploitation Framework-
-
Francis Alexander -
Feb 15-
Nullcon-
Tool demo-
DrupSnipe-
Ranjeet Sengar, Sukesh Pappu
-
Feb 14-
Nullcon-
Talk-
Wi-Hawk Password Auditing Tool-
-
Anamika Singh -
Feb 14-
Nullcon-
Talk-
User Privacy in Cellular Networks-
Ravishankar Borgaonkar
-
Feb 14-
Nullcon-
Talk-
The Security Challenge-
-
Shantanu Ghosh -
Feb 14-
Nullcon-
Talk-
Strategic Information Warfare: When Ends define the means-
Amit Sharma
-
Feb 14-
Nullcon-
Talk-
phoneypdf: A Virtual PDF Analysis Framework-
-
Kiran Bandla -
Feb 14-
Nullcon-
Talk-
Pentesting without Pentesters - Automating Security Testing with Functional Testing Test Cases-
-
Ankita Gupta, Lavakumar Kuppan -
Feb 14-
Nullcon-
Talk-
o’Dea Assertions - Untwining the Security of the SAML Protocol-
-
Achin Kulshrestha -
Feb 14-
Nullcon-
Talk-
Null Hardware Badge 101 (Desi Jugaad)-
-
Amey Gat, Umesh -
Feb 14-
Nullcon-
Talk-
Multi-value W-Fi What the Heck is it-
-
Abhijeet Ghosh -
Feb 14-
Nullcon-
Talk-
In air they wander, we exist to blow their cover!!! {Approaches to Evil Twin Detection from a normal user’s perspective}-
-
Rushikesh D Nandedkar, Amrita C Iyer -
Feb 14-
Nullcon-
Talk-
Hardware Attack Vectors-
-
Yashin Mehaboobe -
Feb 14-
Nullcon-
Talk-
Hacking YOu’r Cable TV Network.-
-
Rahul Sasi, Ahamed Nafeez -
Feb 14-
Nullcon-
Talk-
Flowinspect - A Network Inspection Tool-
-
Ankur Tyagi -
Feb 14-
Nullcon-
Talk-
Chrome - OS Security 2014: New and future hotness-
-
Sumit Gwalani -
Feb 14-
Nullcon-
Talk-
Attacking WPA/WPA2 in the Cloud-
-
Vivek Ramachandran -
Feb 14-
Nullcon-
Talk-
Attack of the setuid bit - pt_chown and pwning root terminals-
-
Siddhesh Poyarekar -
Feb 14-
Nullcon-
Talk-
A security analysis of Browser Extensions-
-
Abhay Rana -
Feb 14-
Nullcon-
Talk-
2014 The year in which we cannot ignore SCADA-
-
Amol Sarwate -
Feb 14-
Nullcon-
Talk-
12 YEARS AND A BAKER’S DOZEN-
-
Saumil Shah -
Jan 28-
Owaspappseccalifornia-
Talk-
Application Sandboxes: Know thy limits-
-
Rahul Kashyap
↑