Toggle navigation
Press Archive
Nullcon in the media
Event Archive
Goa 2022
Goa 2021
Online Training (Nov. 2020)
Online Training (Aug. 2020)
Goa 2020
Delhi 2019
Bangalore 2019
Goa 2019
Bangalore 2018
Goa 2018
Hyderabad 2017
Goa 2017
Bangalore 2016
Goa 2016
Goa 2015
Goa 2014
Goa 2013
Delhi 2012
Goa 2012
Goa 2011
Goa 2010
Goa 2022
Berlin 2022
Goa 2021
Online Training (Nov. 2020)
Online Training (Aug. 2020)
Goa 2020
Delhi 2019
Bangalore 2019
Goa 2019
Bangalore 2018
Goa 2018
Hyderabad 2017
Goa 2017
Bangalore 2016
Goa 2016
Goa 2015
Goa 2014
Goa 2013
Delhi 2012
Goa 2012
Goa 2011
Goa 2010
About Goa'15
Schedule
Venue
Speakers
Training
CFP
Recreation
Blackshield Awards
CTF
Sponsors
Exhibition
Job Fair
CXO Track
Bug Bash
Archives
nullcon Goa'15
NULLCON GOA'15
THE SECURITY EVENT OF 2015
Presentations
Talk Title, Speaker
Videos
Presentations
Inaugural Note by Shri Janardhana Swamy
Cyber Space by K D Nayak
DNS vs.SECURITY by Dr. Paul Vixie
Bounties & The Security Development Lifecycle - by Katie Moussouris
ECMA Script 6 from an Attacker's Perspective - Breaking Frameworks, Sandboxes, and everything else - by Mario Heiderich
Drone Attacks: How I hijacked a drone - by Rahul Sasi
ICS/SCADA SECURITY - ANALYSIS OF A BECKHOFF CX5020 PLC - by Hans Hoefken
The NSA Playset: RF Retroreflectors - by Michael Ossmann
Mobile self-defence - by Karsten Nohl
The Windows Sandbox Paradox - by James Forshaw
Attack and Defence in Radio and Communication Warfare - by Akib Sayyad
Analyzing Chrome crash reports at scale - by Abhishek Arya
Generic Executable Unpacking using Dynamic Binary Instrumentation - by Shubham Bansal
Hacking Tizen: The OS of Everything - by Ajin Abraham
Building custom scans for real world enterprise network - by Sanoop Thomas
Hunting and Decrypting Ghost communications using Memory Forensics - by Monnappa K.A
When the Sky is Falling: High-Volume Reflection/Amplification Attacks - by Manish Sinha
Parkomagic: a few words about the security of parking terminals - by Denis Makrushin
Pentesting a website with million lines of Javascript - by Lavakumar & Nafeez
Warning Ahead: Security Storms are Brewing in Your JavaScript - by Yuval Idan
Anatomy of a credit card stealing POS malware - by Amol Sarwate
Cold Boot Attack on DDR2 and DDR3 RAM - by Marko Schuba
Scroll