2015th
2015
-
Nov 19-
Deepsec-
Talk-
Continuous Intrusion: Why CI Tools Are an Attacker’s Best Friends.-
-
Nikhil Mittal -
Nov 13-
Blackhat(Arsenal)-
Tool demo-
Rudra - The Destroyer of Evil-
-
Ankur Tyagi -
Nov 13-
Blackhat-
Talk-
Continuous Intrusion: Why CI tools are an Attacker’s Best Friends-
-
Nikhil Mittal -
Nov 13-
Blackhat-
Talk-
AUTOMATING LINUX MALWARE ANALYSIS USING LIMON SANDBOX-
-
Monnappa K A -
Nov 13-
Blackhat-
Talk-
LTE & IMSI Catcher Myths-
-
Ravishankar Borgaonkar, N Asokan, Altaf Shaik, Valtteri Niemi, Jean Pierre Seifert -
Nov 12-
Blackhat-
Talk-
Stegosploit - Exploit Delivery with Steganography and Polyglots-
-
Saumil Shah -
Nov 12-
Blackhat(Arsenal)-
Tool demo-
Nishang - Tracking A Windows User-
-
Nikhil Mittal -
Nov 12-
Blackhat(Arsenal)-
Tool demo-
Kautilya: Fastest shells you will ever get-
-
Nikhil Mittal -
Nov 12-
Blackhat(Arsenal)-
Tool demo-
Android Tamer-
-
Anant Shrivastava -
Nov 12-
Blackhat(Arsenal)-
Tool demo-
Android InsecureBank-
-
Dinesh Shetty -
Nov 05-
Groundzerosummit-
Talk-
XSS - The art of evading web application filters!-
Anirudh Anand
-
Nov 05-
Groundzerosummit-
Talk-
Wolves Among Sheep: Defeating Targeted Attacks With Deception-
Sahir Hidayatullah, Raviraj Doshi
-
Nov 05-
Groundzerosummit-
Talk-
Trailing Terror in the Darknets-
Shesh Sarangdhar
-
Nov 05-
Groundzerosummit-
Talk-
Thanks for the free cookies-
Anshul Saxena, Nishant Yadav
-
Nov 05-
Groundzerosummit-
Talk-
Sanctioned to Hack: Your SCADA HMIs Belong to Us!-
Aditya K Sood
-
Nov 05-
Groundzerosummit-
Talk-
OSINT Black Magic: Listen who whispers your name in the dark!!!-
-
Sudhanshu Chauhan, Nutan Kumar Panda -
Nov 05-
Groundzerosummit-
Talk-
Hacking RFIDs under 2000INR-
Jayesh Chauhan
-
Nov 05-
Groundzerosummit-
Talk-
Elliptical Curve Cryptography-
Aneesha S
-
Nov 05-
Groundzerosummit-
Talk-
Economics of Post Quantum Crypto Systems : Do we really Need it-
Ajit Hatti
-
Nov 05-
Groundzerosummit-
Talk-
Dissecting Android Malware-
Anto Joseph
-
Nov 05-
Groundzerosummit-
Talk-
Credit Card Frauds – The money making Ecosystem for Cyber criminals-
Abhinav Singh
-
Nov 05-
Groundzerosummit-
Talk-
chellam – a Wi-Fi IDS/Firewall for Windows-
Vivek Ramachandran
-
Nov 05-
Groundzerosummit-
Talk-
Browser based Malware attacks-
Harsh Daftary
-
Nov 05-
Groundzerosummit-
Talk-
Authentication flaw in Automatic Bank Passbook printing machine.-
Indrajeet Bhuyan
-
Nov 05-
Groundzerosummit-
Talk-
Western Air Command-
B S Singh Deo
-
Nov 05-
Groundzerosummit-
Talk-
Exposing Cyber Espionage: Hello from Pakistan- IIC Session-
Jiten Jain
-
Nov 05-
Groundzerosummit-
Talk-
Cyber Security in Hospitals:Hospitals Under Seige-
Anirudh Duggal
-
Oct 30-
T2-
Talk-
LTE (in) Security-
Ravishankar Borgaonkar, Altaf Shaik
-
Oct 25-
Toorcon-
Talk-
PixelCAPTCHA – A Unicode Based CAPTCHA Scheme-
Gursev Singh Kalra
-
Oct 21-
Hacklu-
Talk-
Stegosploit - Delivering Drive-By Exploits With Only Images-
-
Saumil Shah -
Oct 08-
Brucon-
Talk-
The .11 Veil, Camouflage & Covert!!! Invisible Wifi, Revealed-
-
Rushikesh D Nandedkar, Amrita C Iyer -
Sep 25-
Appsecusa-
Talk-
The State of Web Application Security in SCADA Web Human Machine Interfaces (HMIs)!-
Aditya K Sood
-
Sep 24-
Appsecusa-
Talk-
QARK: Android App Exploit and SCA Tool-
-
Tushar Dalvi, Tony Trummer -
Sep 24-
Appsecusa-
Talk-
Encouraging Diversity and Advancing Cybersecurity Education-
Shruthi Kamath, Apoorva Giri, Elissa Shevinsky
-
Sep 24-
Appsecusa-
Talk-
Continuous Cloud Security Automation-
-
Rohit Pitke -
Sep 11-
44con-
Talk-
Stegosploit – Drive-by Browser Exploits using only Images-
-
Saumil Shah -
Aug 28-
Blackhat(Arsenal)-
Tool demo-
Damn Vulnerable iOS App (DVIA)-
-
Prateek Gianchandani -
Aug 09-
Defcon(Packetcapture Village)-
Talk-
802.11 Monitoring with PCAP2XML/SQLite-
-
Vivek Ramachandran -
Aug 08-
Defcon(DemoLabs)-
Tool demo-
Rudra-
-
Ankur Tyagi -
Aug 08-
Defcon-
Talk-
QARK: Android App Exploit and SCA Tool-
-
Tushar Dalvi, Tony Trummer -
Aug 08-
Defcon(Packetcapture Village)-
Talk-
Powershell for Penetraton Testers-
-
Nikhil Mittal -
Aug 08-
Defcon-
Talk-
Dissecting the Design of SCADA Web Human Machine Interfaces (HMIs) - Hunting Vulnerabilities-
-
Aditya K Sood -
Aug 08-
Defcon-
Talk-
Chigula — a framework for Wi-Fi Intrusion Detection and Forensics-
-
Vivek Ramachandran -
Aug 07-
Defcon(Packetcapture Village)-
Talk-
Hacker’s Practice Ground-
-
Lokesh Pidawekar -
Aug 07-
Defcon(Crypto&privacy Village)-
Talk-
Getting into the Trust Store We Trust-
Ajit Hatti
-
Aug 07-
Defcon-
Talk-
Chellam – a Wi-Fi IDS/Firewall for Windows-
-
Vivek Ramachandran -
Aug 06-
Blackhat(Arsenal)-
Tool demo-
Kautilya-
-
Nikhil Mittal -
Aug 06-
Blackhat-
Talk-
Harnessing Intelligence from Malware Repositories-
-
Arun Lakhotia, Vivek Notani -
Aug 06-
Blackhat(Arsenal)-
Tool demo-
Chellam-
Vivek Ramachandran
-
Aug 05-
Blackhat(Arsenal)-
Tool demo-
Rudra - The Destroyer of Evil-
-
Ankur Tyagi -
Aug 05-
Blackhat(Arsenal)-
Tool demo-
QARK - Android Application SCA and Exploit Tool-
-
Tushar Dalvi -
Aug 05-
Blackhat(Arsenal)-
Tool demo-
PixelCaptcha: A unicode based captcha scheme-
-
Gursev Singh Kalra -
Aug 01-
C0c0n-
Talk-
Understanding the known : A deep look at OWASP A9 : Using Components with Known Vulnerabilities-
-
Anant Shrivastava -
Aug 01-
C0c0n-
Talk-
S3curi7y at 36K feet-
Rugved Mehta, Gaurav Trivedi
-
Aug 01-
C0c0n-
Talk-
Reversing and Deciphering the Cyber Espionage Malware Communications-
Monnappa K A
-
Aug 01-
C0c0n-
Talk-
NoPo - The NoSQL HoneyPot Framework-
-
Francis Alexander -
Aug 01-
C0c0n-
Talk-
Medical device security and critical infrastructure inside hospitals-
Anirudh Duggal
-
Aug 01-
C0c0n-
Talk-
Hacking RFIDs under 2000 INR-
Jayesh Chauhan, Divya S John
-
Aug 01-
C0c0n-
Talk-
From AOSP ( Android OpenSource Project ) to ABD ( Android Based Devices )-
Anto Joseph
-
Aug 01-
C0c0n-
Talk-
Demystifying and Breaking BLE-
Yashin Mehaboobe
-
Aug 01-
C0c0n-
Talk-
Breaking into Infosec Research-
Vivek Ramachandran
-
Aug 01-
C0c0n-
Talk-
Blockchains in Security-
Harsh Patel
-
Aug 01-
C0c0n-
Talk-
Automated Security Analysis of Android & iOS Applications with Mobile Security Framework-
-
Ajin Abraham -
Aug 01-
C0c0n-
Talk-
Attack chaining for web exploitation- From Information leakage to gaining Root access-
Abhijeth Dugginapeddi
-
Aug 01-
C0c0n-
Talk-
A Pentester’s Methodology to Discover, Automate and Exploit Windows Privilege Escalation flaws.-
Riyaz Walikar
-
Jul 06-
Blackhat-
Talk-
DOM FLOW - UNTANGLING THE DOM FOR MORE EASY-JUICY BUGS-
-
Ahamed Nafeez -
Jun 16-
Blackhat-
Talk-
The Savage Curtain: Mobile SSL Failures-
-
Tushar Dalvi, Tony Trummer -
May 29-
Hitbsecconf-
Talk-
PowerShell for Penetration Testers-
-
Nikhil Mittal -
May 29-
Hitbsecconf-
Talk-
Hacking Samsung’s Tizen: The OS of Everything-
-
Ajin Abraham -
May 28-
Hitbsecconf-
Talk-
The Savage Curtain: Mobile SSL Failures-
-
Tushar Dalvi, Tony Trummer -
May 28-
Hitbsecconf-
Talk-
Stegosploit: Hacking With Pictures-
-
Saumil Shah -
May 26-
Phdays-
Talk-
iOS Application Exploitation-
-
Prateek Gianchandani, Egor Tolstoy -
May 26-
Phdays-
Talk-
Invisible Backdoors In Your Code-
Debasis Mohanty
-
Mar 27-
Syscan-
Talk-
Stegosploit - Hacking with Pictures-
-
Saumil Shah -
Mar 27-
Blackhat-
Talk-
Security Content Metadata Model with an Efficient Search Methodology for Real Time Monitoring and Threat Intelligence-
-
Preeti Subramanian -
Mar 26-
Blackhat(Arsenal)-
Tool demo-
YSO Mobile Security Framework-
-
Ajin Abraham -
Mar 26-
Blackhat-
Talk-
The underground Ecosystem of Credit Card frauds-
-
Abhinav Singh -
Mar 26-
Blackhat(Arsenal)-
Tool demo-
SecPod Saner-
-
Preeti Subramanian -
Mar 26-
Blackhat(Arsenal)-
Tool demo-
OWASP Xenotix XSS Exploit Framework-
-
Ajin Abraham -
Mar 15-
Defcon-
Talk-
TECHNICAL TALK-FUZZING ASYNCHRONOUS PROTOCOLS BUILT OVER WEBSOCKETS-
Lavakumar Kuppan
-
Mar 15-
Hitbsecconf-
Talk-
Sniffing the Airwaves with RTLSDR-
-
Yashin Mehaboobe -
Feb 07-
Nullcon-
Panel-
Startup panel – Make in India-
Aseem Jakhar, Radha Shelat, Sumit D Chowdhury, Shomiron Das Gupta, Sastry Tumuluri, Shiju Sathyadevan
-
Feb 06-
Nullcon-
Panel-
Why CISO should promote more of such technical events - pros and cons, benefits etc-
Burgess Cooper, Maya Viswanathan, Sanjay Burman, Sridharan Sankaran, Massoud Issa, Katie Moussouris
-
Feb 06-
Nullcon-
Talk-
Toliman, a Hadoop Pentesting Tool-
-
Jitendra Chauhan -
Feb 06-
Nullcon-
Talk-
Pentesting a website with million lines of Javascript-
-
Lavakumar Kuppan, Ahamed Nafeez -
Feb 06-
Nullcon-
Talk-
Hunting and Decrypting Ghost communications using Memory Forensics-
-
Monnappa K A -
Feb 06-
Nullcon-
Talk-
Hacking Tizen: The OS of Everything-
-
Ajin Abraham -
Feb 06-
Nullcon-
Talk-
Generic Executable Unpacking using Dynamic Binary Instrumentation-
-
Shubham Bansal -
Feb 06-
Nullcon-
Talk-
Drone Attacks: How I hijacked a drone-
-
Rahul Sasi -
Feb 06-
Nullcon-
Panel-
Defender’s Diary: Who’s attacking? What are my options?-
Sastry Tumuluri, Amit Sharma, Venkatesh Subramaniam, Sachin Burman, Deepak Singla
-
Feb 06-
Nullcon-
Talk-
Building security and compliance into the software delivery process-
Anubhav Bathla, Dinesh Pillai, S Chandrasekhar, Harish Pillay
-
Feb 06-
Nullcon-
Talk-
Building custom scans for real world enterprise network-
-
Sanoop Thomas -
Feb 06-
Nullcon-
Talk-
Attack and Defence in Radio and Communication Warfare-
-
Akib Sayyed -
Feb 06-
Nullcon-
Talk-
Anatomy of a credit card stealing POS malware-
-
Amol Sarwate -
Feb 06-
Nullcon-
Talk-
Analyzing Chrome crash reports at scale-
-
Abhishek Arya -
Feb 06-
Nullcon-
Panel-
2015: The Global Threat Defense Landscape - A discussion on the challenges faced by enterprises in engaging the bad guys-
Shomiron Das Gupta, K S Narayanan, Shantanu Ghosh, Subrahmanya Gupta Boda, Vishal Salvi, Benjamin Rivera
-
Jan 27-
Owaspappseccalifornia-
Talk-
The Savage Curtain : Mobile SSL Failures-
Tushar Dalvi, Tony Trummer
-
Jan 27-
Owaspappseccalifornia-
Talk-
The Emperor’s New Password Manager: Security Analysis of Web-based Password Managers-
-
Devdatta Akhawe -
Jan 27-
Owaspappseccalifornia-
Talk-
Anatomy of memory scraping, credit card stealing POS malware-
-
Amol Sarwate
↑