- About Goa'15
- Schedule
- Venue
- Speakers
- Training
- CFP
- Recreation
- Blackshield Awards
- CTF
- Sponsors
- Exhibition
- Job Fair
- CXO Track
- Bugbash
- Goa'15
- About Schedule
SCHEDULE GOA 2015
YOUR ITINERARY FOR GOA 2015
Start | End | Day 1 | Venue | Training Name | Trainer Names |
---|---|---|---|---|---|
9:00 | 18:00 | Training 1 | Coral 1 | Xtreme Web Hacking | Akash & Riyaz |
9:00 | 18:00 | Training 2 | Coral 2 | Audit +++ | Joerg Simon |
9:00 | 18:00 | Training 3 | Coral 3 | Offensive HTML, SVG, CSS and other Browser-Evil | Mario Heiderich |
9:00 | 18:00 | Training 4 | Aqua | Penetration Testing SmartGrid and SCADA | Justin Searle |
9:00 | 18:00 | Training 5 | HQ 1 - The HQ Hotel | Xtreme Android Exploitation Lab | Anant & Aditya |
9:00 | 18:00 | Training 6 | HQ 2 - The HQ Hotel | Xtreme Exploitation | Omair |
9:00 | 18:00 | Training 7 | HQ 3 - The HQ Hotel | Reverse Engineering and Malware Analysis | Abhishek Datta |
9:00 | 18:00 | Training 8 | Meteora | Attack Monitoring using Elasticsearch, Logstash, Kibana | Himanshu & prajal |
9:00 | 18:00 | Training 9 | The Queeny Hotel | Xtreme Browser Fuzzing | Amol & Anil |
Start | End | Day 2 | Venue | Training Name | Trainer Names |
---|---|---|---|---|---|
9:00 | 18:00 | Training 1 | Coral 1 | Xtreme Web Hacking | Akash & Riyaz |
9:00 | 18:00 | Training 2 | Coral 2 | Audit +++ | Joerg Simon |
9:00 | 18:00 | Training 3 | Coral 3 | Offensive HTML, SVG, CSS and other Browser-Evil | Mario Heiderich |
9:00 | 18:00 | Training 4 | Aqua | Penetration Testing SmartGrid and SCADA | Justin Searle |
9:00 | 18:00 | Training 5 | HQ 1 - The HQ Hotel | Xtreme Android Exploitation Lab | Anant & Aditya |
9:00 | 18:00 | Training 6 | HQ 2 - The HQ Hotel | Xtreme Exploitation | Omair |
9:00 | 18:00 | Training 7 | HQ 3 - The HQ Hotel | Reverse Engineering and Malware Analysis | Abhishek Datta |
9:00 | 18:00 | Training 9 | The Queeny Hotel | Xtreme Browser Fuzzing | Amol & Anil |
Start | End | Meteora Hall (Talks) |
---|---|---|
20:00 | 20:30 | Keynote null |
20:30 | 21:00 | Blackshield Award |
21:00 | 21:30 | Privacy - by Pranesh Prakash |
21:30 | 22:00 | Clusterfuzz: Analyzing Chrome crash reports at scale - by Abhishek Arya |
22:00 | 22:30 | Toliman, a Hadoop Pentesting Tool - by Jitendra Chauhan |
22:30 | 22:50 | Halcyon - Building custom scans for real world enterprise network - by Sanoop Thomas |
Start | End | Meteora Hall (Talks) | Coral 1 Hall (CXO Track) | Coral 2 Hall (Workshops) | Coral 3 Hall (CTFs) | Aqua Lounge (Villages/CTFs) |
---|---|---|---|---|---|---|
8:00 | 9:30 | Registration | ||||
9:30 | 10:00 | Inaugural Note by Honourable Shri Janardhana Swamy | ||||
10:00 | 10:30 | Keynote by Dr. Keshav Dattatreya Nayak | ||||
10:30 | 11:00 | Keynote by Jennifer Steffens | ||||
11:00 | 11:20 | Tea Break | Tea Break | Tea Break | ||
11:20 | 12:10 | The Windows Sandbox Paradox – by James Forshaw | CXO Opening note - by Roland Cloutier followed by CXO Panel - "Why CISO should promote more of such technical events - pros and cons, benefits etc" Moderator - Burgess Cooper, CTSO - Vodafone |
EMC Defenders League (Top 30 winners of nullcon HackIM (Powered by EMC) Battle their way to the top for First Prize - INR 500000/- |
||
12:10 | 13:00 | ECMA Script 6 from an Attacker's Perspective - Breaking Frameworks, Sandboxes, and everything else - by Mario Heidrich | ||||
13:00 | 14:00 | Lunch | Lunch | Lunch | ||
14:00 | 15:00 | Anatomy of a credit card stealing POS malware – by Amol Sarwate | CXO Panel - "2015: The Global Threat Defense Landscape - A discussion on the challenges faced by enterprises in engaging the bad guys" "Moderator - Shomiron Gupta, Founder, CEO - NETMONASTERY" |
Cuckoo Sandbox 102: State-of-the-art malware analysis - by Jurriaan Bremer | EMC Defenders League | Physical Lock Security - by Amey and Swapnil |
15:00 | 15:45 | ICS/SCADA Security - Analysis of a Beckhoff CX5020 PLC - by Hans Höfken | Defender's Diary: Who's attacking? What are my options? Moderator - Sastry Tumuluri, CISO - Govt. of Haryana |
|||
15:45 | 16:00 | Tea Break | Tea Break | Tea Break | ||
16:00 | 16:45 | Drone Attacks: How I hijacked a drone - by Rahul Sasi | CXO Panel - "Building security and compliance into the software delivery process" Moderator - Joanne Molesky, Principal Associate at ThoughtWorks |
Hardware Reverse Engineering: From Boot to Root - by Yashin Mehaboobe | ||
16:45 | 17:30 | FinSpy - Inside Spying - by Attila Marosi | ||||
17:30 | 18:15 | Closing note | ||||
20:00 | 23:30 | Invite only Nullcon Networking Party |
Start | End | Meteora Hall (Talks) | Coral 1 Hall (Talks) | Coral 2 Hall (Workshops) | Coral 3 Hall (CTFs) | Aqua Lounge (Villages/CTFs) |
---|---|---|---|---|---|---|
10:00 Hrs | 10:30 Hrs | Keynote by Paul Vixie | ||||
10:30 Hrs | 11:00 Hrs | Keynote by Katie Moussouris | ||||
11:00 Hrs | 11:20 Hrs | Tea Break | Tea Break | Tea Break | ||
11:20 Hrs | 12:10 Hrs | Mobile Self-Defence - by Karsten Nohl | Warning Ahead: Security Storms are Brewing in Your JavaScript - by Yuval Idan | When the Sky is Falling: High-Volume Reflection/Amplification Attacks by Manish Sinha | Physical Lock Security - by Amey and Swapnil | |
12:10 Hrs | 13:00 Hrs | Cold Boot Attack on DDR2 and DDR3 RAM by Marko Schuba | Attack and Defence in Radio and Communication Warfare - by Akib Sayyed | |||
13:00 Hrs | 14:00 Hrs | Lunch | Lunch | Lunch | ||
14:00 Hrs | 15:00 Hrs | The NSA Playset: RF Retroreflectors - by Michael Ossman | Hunting and Decrypting Ghost communications using Memory Forensics - by Monnappa K.A | NDIS Disassembly for Hackers: Reversing Network Drivers at the Lowest Layer - by Nitay Artenstein | BugBash by Bugcrowd | Winja (CTF by women for women) |
15:00 Hrs | 15:45 Hrs | Hacking Tizen: The OS of Everything - By Ajin Abraham | Generic Executable Unpacking using Dynamic Binary Instrumentation - by Shubham Bansal | |||
15:45 Hrs | 16:00 Hrs | Tea Break | Tea Break | Tea Break | ||
16:00 Hrs | 16:45 Hrs | Pentesting a website with million lines of Javascript - by Lavakumar Kuppan & Nafeez Ahmed | Parkomagic: a few words about the security of parking terminals – by Denis Makrushin | Hackonomics and the emergence of Digital Age Heroes followed by Breach - A cyber crime thriller. Book signing and talk - by Author Amrita Chowdhury |
BugBash by Bugcrowd | Winja (CTF by women for women) |
16:45 Hrs | 17:30 Hrs | Startup Panel - "Make in India" Moderator - Aseem Jakhar, Director - Research, Payatu Technologies |
||||
17:30 Hrs | 18:00 Hrs | Closing note | ||||
20:00 Hrs | 22:00 Hrs | Live Performance by JapaTheBand |