Toggle navigation
Press Archive
Nullcon in the media
Event Archive
Goa 2022
Goa 2021
Online Training (Nov. 2020)
Online Training (Aug. 2020)
Goa 2020
Delhi 2019
Bangalore 2019
Goa 2019
Bangalore 2018
Goa 2018
Hyderabad 2017
Goa 2017
Bangalore 2016
Goa 2016
Goa 2015
Goa 2014
Goa 2013
Delhi 2012
Goa 2012
Goa 2011
Goa 2010
Goa 2022
Berlin 2022
Goa 2021
Online Training (Nov. 2020)
Online Training (Aug. 2020)
Goa 2020
Delhi 2019
Bangalore 2019
Goa 2019
Bangalore 2018
Goa 2018
Hyderabad 2017
Goa 2017
Bangalore 2016
Goa 2016
Goa 2015
Goa 2014
Goa 2013
Delhi 2012
Goa 2012
Goa 2011
Goa 2010
About Goa'14
Schedule
Venue
Speakers
Training
CFP
Recreation
Blackshield Awards
CTF
AMMO
Sponsors
Exhibition
Job Fair
Archives
nullcon Goa'14
NULLCON GOA'14
THE SECURITY EVENT OF 2014
Presentations
Talk Title, Speaker
Videos
Presentations
Pentesting without Pentesters - Automating Security Testing with Functional Testing Test Cases - by Lavakumar Kuppan & Ankita Gupta
Chrome - OS Security 2014 - New and future hotness - by Sumit Gwalani
12yrs and a bakers dozen - by Saumil Shah
Attaching WPA_WPA2 in the Cloud - by Vivek Ramachandran
Humanity - scale Infosec by Smari Mccarthy
The Security Challenge - by Shanatnu Ghosh
Modern smartphone forensics Apple iCloud, encrypted Blackberry - by Vladimir Katalov
2014 The year in which we cannot ignore SCADA - by Amol Sarwate
Flowinspect - A Network Inspection Tool - by Ankur Tyagi
Hardware Attack Vectors - by Yashin Mehaboobe
Fuzzing the easy way using Zulu - by Andy Davis
In air they wander we exist to blow there cover - by Amrita & Rushikesh
Multi-value W-Fi What the Heck is it - by Abhijeet Ghosh
Phoney PDF A Virtual PDF Analysis Framework - by Kiran Bandla
ShoulderSurfing 2.0 - by Federico Pacheco
Wi-Hawk Password Auditing Tool - by Anamika Singh
Pentesting Proprietary RF Communications by Justin Searle
Nullcon Hardware Badge 101 (Desi Jugaad) by Amey & Umesh
A security analysis of Browser Extensions by Abhay Rana
Attack of the setuid bit - pt_chown and pwning root terminals by Siddhesh Poyarekar
Lets screw with NMAP
o'Dea Assertions - Untwining the Security of the SAML Protocol
Scroll