1 |
 |
Nullcon Goa 2012: Ivr Security Internal Network Attacks Via Phone - By Rahul Sasi Alert Icon |
8 years, 9 months |
null0x00 |
nullcon null "IVR Security" "IVR Hacking" "Security Conference" IVR |
2097 |
None |
2 |
 |
Nullcon Goa 2012: Binary God - By Atul Alex |
8 years, 9 months |
null0x00 |
null nullcon "Abstract processor" nullcon.net "Binary God" |
2386 |
None |
3 |
 |
Nullcon Goa 2012: Haxdroid Empowering Handsets - By Anant &Amp; Pardhu |
8 years, 9 months |
null0x00 |
nullcon null "HaxdroiD Empowering Handsets" nullcon.net null.co.in "Hacking Conference" "Security Conference" "Android Hacking" "Android" |
1897 |
None |
4 |
 |
Jailbreak 2012 Teaser |
8 years, 9 months |
null0x00 |
Jailbreak null nullcon null.co.in nullcon.net CTF "Capture the Flag" "Hacking Challenge" |
1760 |
None |
5 |
 |
Nullcon Jailbreak 2012 Part 1 |
8 years, 9 months |
null0x00 |
Jailbreak null nullcon null.co.in nullcon.net CTF "Capture the Flag" Hacking Challenge |
1917 |
None |
6 |
 |
Nullcon Jailbreak 2012 Part 2 |
8 years, 9 months |
null0x00 |
Jailbreak null nullcon null.co.in nullcon.net CTF "Capture the Flag" "Hacking Challenge" |
1927 |
None |
7 |
 |
Nullcon Goa 2012: Attacking And Defending The Smart Grid - By Justin Searle |
8 years, 9 months |
null0x00 |
"Smart Grid" "Smart Grid vulnerability" nullcon "nullcon Goa" nullcon.net null null.co.in "Security Conference" "Hacking Conference" "Presentation on Smart Grid" "Presentation on Smart Meters" "Smart meter security" "Smart Grid Security" |
1856 |
None |
8 |
 |
Nullcon Goa 2012: Attacking Backup Software - By Nibin Varghese |
8 years, 9 months |
null0x00 |
nullcon null www.nullco.net www.null.co.in "IT Security Conference" "Security Conference" "Attacking Backup Software" "Backup Software Security" |
1907 |
2 |
9 |
 |
Nullcon Goa 2012: An Effective Incident Response Triage Framework In The Age Of Apt - By Albert Hui |
8 years, 8 months |
null0x00 |
nullcon null nullcon.net null.co.in APT "Advance Persistent Threat" "Incident response" "Security Conference" "IT Security Conference" "Security Conference India" |
1908 |
None |
10 |
 |
Nullcon Goa 2012: Scada Security: Why Is It So Hard? - By Amol Sarwate |
8 years, 8 months |
null0x00 |
nullcon null nullcon.net null.co.in SCADA "SCADA Security" "IT Security Conference" "Security Conference" |
1802 |
None |
11 |
 |
Nullcon Goa 2012: Captchas For Fun And Profit - By Gursev Kalra |
8 years, 8 months |
null0x00 |
nullcon |
3604 |
None |
12 |
 |
Nullcon Goa 2012: Javascript Analysis With Ironwasp - By Lavakumar |
8 years, 8 months |
null0x00 |
nullcon null nullcon.net null.co.in IronWASP "Javascript analysis" "Security Conference" "IT Security Conference" "Hacking Conference" |
3082 |
None |
13 |
 |
Nullcon Goa 2012: Ra.2: Blackbox Dom-Based Xss Scanner - By Nishant And Sarathi |
8 years, 8 months |
null0x00 |
Ra.2 nullco null nullcon.net null.co.in "DOM based XSS Scanner" "IT Security Conference" "Security Conference" "DOM based XSS" |
2121 |
None |
14 |
 |
Nullcon Goa 2012 Desi Jugaad: Teensy For Fun &Amp; Jugaad - By Amey Ghat |
8 years, 7 months |
null0x00 |
nullcon null nullcon.net null.co.in Teensy "Teensy Hacking" "Teensy for fun and profit" "Teenshy ++" "Security Conference" "International Security Conference" |
1977 |
2 |
15 |
 |
Nullcon Goa 2012: Node.Js: The Good, Bad And Ugly - By Bishan Singh |
8 years, 7 months |
null0x00 |
nullcon null nullcon.net null.co.in Node.js "Server side JavaScript Programming" "Node.js: The good, bad and ugly" "Security Conference" "IT Security Conference" |
2381 |
None |
16 |
 |
Nullcon Goa 2012: Sandboxing: The Deep Truth - By Disha Agarwal And Manish Pali |
8 years, 7 months |
null0x00 |
nullcon null nullcon.net null.co.in Sandboxing Sandbox "Security Conference" "IT Security Conferee" |
1850 |
None |
17 |
 |
Nullcon Goa 2012: Best Practices To Improve Security Grading Of Your Product - By Hemant Khandelwal |
8 years, 7 months |
null0x00 |
nullcon null nullcon.net null.co.in "Security Best Practice" "Security Conference" "IT Security Conference" |
1824 |
None |
18 |
 |
Nullcon Goa 2012- War Texting: Weaponizing Machine 2 Machine - By Don A. Bailey |
8 years, 7 months |
null0x00 |
nullcon null nullcon.net null.co.in Wartexting "Machine to Machine" "IT Security Conference" "Security Conference" |
2174 |
None |
19 |
 |
Nullcon Goa 2012: Content Sniffing Algorithm Bypassing Techniques By Anil And Chaitany |
8 years, 7 months |
null0x00 |
nullcon null nullcon.net null.co.in "Content sniffing Algorithm" "IT Security Conference" "hacking" "Security Conference" |
1902 |
None |
20 |
 |
Nullcon Goa 2012: Application Security Cost Management - By Ketan Vyas |
8 years, 6 months |
null0x00 |
nullcon null nullcon.net null.co.in "Application Securiity Cost Management" "IT Security Conference" "Security Conference" "Hacker Convention" "Information Security Convention" Hacking "Computer Security" "Application Security" |
2010 |
None |
21 |
 |
Nullcon Goa 2012: Keynote By Dr. Kamlesh Bajaj Ceo – Dsci |
8 years, 6 months |
null0x00 |
nullcon null nullcon.net null.co.in "nullcon Gao 2012 Keynote" "IT security Conference" "Security Conference" |
1746 |
None |
22 |
 |
Nullcong Goa 2012 Desi Jugaad Talk: Your Phone Is Your Phone But Your Call Are Now My Calls |
8 years, 6 months |
null0x00 |
nullcon null nullcon.net "GSM Hacking" "Phone Hacking" "GSM vulnerability" "GSM Security" "IT Security Conference" "Security Confence" |
2477 |
None |
23 |
 |
Nullcon Delhi 2012: Highly Harmful Audio Waves Aka Dtmf Fuzzing - By Rahul Sasi |
8 years, 2 months |
null0x00 |
nullcon null nullcon.net null.co.in "DTMF Fuzzing" "IVR Security" |
2541 |
None |
24 |
 |
Nullcon Delhi 2012: Microsoft Emet Attack Mitigations - By Neil Sikka |
8 years, 2 months |
null0x00 |
EMET "Microsoft EMET" nullcon null nullcon.net null "Exploit Mitigation" |
2200 |
None |
25 |
 |
Nullcon Delhi 2012: Another Security Lab - By Joerg Simon |
8 years, 2 months |
null0x00 |
Fedora Security, Another Security Lab, nullcon, null, null.co.in, nullcon.net |
3958 |
None |
26 |
 |
Nullcon Delhi 2012: Securing Software Ventures - By Aiden Riley Eller |
8 years, 2 months |
null0x00 |
nullcon, null, nullcon.net, null.co.in, Securing Software Ventures, Aiden Railey, nullcon Delhi, nullcon Delhi 2012 |
3549 |
None |
27 |
 |
Nullcon Delhi 2012: Opening The Kimono: Automating Behavioral Analysis For Mobile Apps - By Michael &Amp; Pradeep |
8 years, 1 month |
null0x00 |
Zscalar, Opening, the, Kimo, Opening the Kimo, nullcon, null, nullcon Delhi, nullcon.net, null.co.in, Mobile apps behavioral analysis, Mobile apps security |
3422 |
None |
28 |
 |
Nullcon Delhi 2012: Opening The Kimono: The Art Of Passive Web Vulnerability Analysis With Ironwasp - By Lavakumar |
8 years, 1 month |
null0x00 |
Ironwasp, Lavakumar, Lava Kumar, nullcon, null, nullcon.net, null.co.in, Passive Web Vulnerability Analysis, Web Vulnerability, Static Web Vulnerability Analysis, nullcon Delhi |
3351 |
None |
29 |
 |
Nullcon Delhi 2012: Reverse Engineering Of Fraudster Brain - By Neyolov Evgeny |
8 years, 1 month |
null0x00 |
nullcon, null, nulllcon.net, null.co.in, nullcon Delhi, Reverse engineering of fraudster brain, Casino Fraud, Online Casino vulnerability, online Poker vulnerability, online betting, e-payment system vulnerability, Forensic analysis of online casino server |
3363 |
None |
30 |
 |
Nullcon Delhi 2012: Security Evalution Of Set Top Box Security - By Zoltán Hornák |
8 years, 1 month |
null0x00 |
security development lifecycle, software security, hardware security, product security, penetration testing tools, conditional access systems, video set-top box security, crypto chipset security, side channel attacks, fault injection, passive active combined attacks |
3171 |
None |
31 |
 |
Nullcon Delhi 2012: Forensics Timeline Analysis - By Ashish Kunte |
8 years |
null0x00 |
Forensics, Timeline, Analysis, Ashish, Kunte, nullcon, null, nullcon.net, null.co.in, nullcon delhi |
4002 |
None |