Toggle navigation
Press Archive
Nullcon in the media
Event Archive
Goa 2022
Goa 2021
Online Training (Nov. 2020)
Online Training (Aug. 2020)
Goa 2020
Delhi 2019
Bangalore 2019
Goa 2019
Bangalore 2018
Goa 2018
Hyderabad 2017
Goa 2017
Bangalore 2016
Goa 2016
Goa 2015
Goa 2014
Goa 2013
Delhi 2012
Goa 2012
Goa 2011
Goa 2010
Goa 2022
Berlin 2022
Online Training (December 2022)
Online Training (May 2022)
Goa 2021
Online Training (Nov. 2020)
Online Training (Aug. 2020)
Goa 2020
Delhi 2019
Bangalore 2019
Goa 2019
Bangalore 2018
Goa 2018
Hyderabad 2017
Goa 2017
Bangalore 2016
Goa 2016
Goa 2015
Goa 2014
Goa 2013
Delhi 2012
Goa 2012
Goa 2011
Goa 2010
Schedule
Venue
Speakers
Training
CFP
Volunteer
Recreation
Blackshield Awards
CTF
Sponsors
Exhibition
Job Fair
CXO Track
Archives
nullcon Goa'17
NULLCON GOA'17
THE SECURITY EVENT OF 2017
Presentations
Talk Title, Speaker
Videos
Presentations
Keynote - Joshua Pennell
Antivirus Evasion Reconstructed - Veil 3.0 by Christopher Truncer
Case Study on RFID (proximity cards) Hacking by Sarwar Jahan and Ashwath Kumar
Explorer's Guide to Shooting Satellite Transponders by Jay Turla
Injecting Security into Web apps with Runtime Patching and Context Learning by Ajin Abraham
Invoke - Obfuscation: PowerShell obFUsk8tion Techniques & How To (Try To) D""e` Tec` T 'Th'+'em' by Daniel Bohannon
The Mirai BotNet and where DDoS attacks are headed by Ben Herzberg
Tale of training a Web Terminator! By Bharadwaj Machiraju
The Art of Bootloader Unlocking: Exploiting Samsung Sboot by Nitay Artenstein
Hacking medical devices and infrastructure by Anirudh Duggal
Hypervisors in Your Toolbox: Monitoring and Controlling System Events with HyperPlatform by Satoshi Tanda and Timo Kreuzer
p≡p ≡ pretty Easy privacy: making privacy the default for everyone by Sva
Case study of SS7 / Sigtran assessment by Akib Sayyed
Drone Hijacking and other IoT hacking with GNU Radio and SDR by Arthur Garipov
Nearly generic fuzzing of XML - based formats by Nicolas Gregoire
Blockchain and security: bank and insurance applications by Renaud Lifchitz
7 sins of ATM protection against logical attacks by Timur Yunusov
Rapid Security in the Cloud with AWS and CIS by Mikhail Advani & Rajesh Tamhane
Barbarians At The Gate(way) by Dave Lewis
'Digital Warriors: India And The Future Of Conflict On The Internet'
'Application Security Opportunities And Challenges In A DevOps World'
When Enough Is Enough: The Limits Of Desirable Security by Karsten Nohl
Scroll