• Goa 2020
  • Schedule



Training Venue Hall Name Training Name Trainers
3 Day Training (3rd to 5th March 2020) Taj Hotel & Convention Center Assembleia 1 Beyond the Web Application Hackers handbook - Advanced Web Hacking Marcus Pinto
Assembleia 2 Advanced Infrastructure Security Assessment Prashant Mahajan & Omair
Assembleia 3 Breaking & Owning Application and Servers on AWS and Azure Bharath & Riyaz Walikar
South 1 Windows Kernel Exploitation Foundation & Advanced Ashfaq Ansari
South 2 Hacking iOS Application, Like A Pro Abhinav Mishra
West 1 AppSecOps A Holistic Approach To Application Security Rohit Salecha & Abhijay Singh
West 2 ML for Security and security for ML Nikhil Joshi
Cinema Pentesting the Modern Application Stack Bharadwaj Machiraju & Francis Alexander
Cidade de Goa Harmonia BoothPwn - Pwning Secure Boot by Expereince Niek Timmers & Cristofaro Mune
Chances Resort and Casino An Indy Resort Ballroom Attacking and Auditing Docker Containers and Kuberneters Clusters Abhisek Datta
Chancery Practical IoT Hacking Munawwar Hussain Shelia & Aseem Jakhar
Samarkand Practical 3G/4G Security and Attacks Dr. Ravishankar Borgaonkar & Altaf Shaik
2 Day Training (4th to 5th March 2020) Vivanta Goa, Panaji Tango 1 Xtreme Android Hacking Ankur Bhargava
Tango 2 Building An Enterpise Grade Security Analytics Platform Using Elastic Stack Himanshu Kumar & Prajal Kulkarni
Debate Practical Side-channel Attacks Stjepan Picek
Analysis Strategy Audit +++ (OPSE Certification) Joerg Simon
Taj Hotel & Convention Center Practical RFID / NFC Hacking Adam Laurie
Registration Starts 08:30
Training Starts 09:30
Tea/Coffee Break 11:00 to 11:15
Lunch 13:00 to 14:00
Tea/Coffee Break 16:00 to 16:15
Training Ends 18:00
6th March 2020
Time/Venue Assembleia 1 Assembleia 2 Assembleia 3 West 1 South 1 AMMO (Exhibition Area)
8:00 to 9:30 Registration
9:40 to 10:00 Welcome Note
10:00 to 10:45 [KEYNOTE] The Metadata Trap: Whistleblowers in the Age of Surveillance and Big Data by Micah Lee
10:45 to 11:00 BREAK
11:00 to 12:00 Bug Bounty: Why is this happening? by Adam Ruddermann Panel: Securing the Human Factor PwdLess: Exploitation Tales from RouterLand by Christofaro Mune [Workshop] Learn by Doing - DevSecOps on AWS using Cloud-Native Services by Akash Mahajan & Sunesh Govindaraj Become a CISO & live life in the fast lane by Jaya Baloo Providence by Swapnil Kumbhar & Akshay Shah

Fuzz Cube by Anto Joseph

Talisman by Suhas Vishwanath

PivotSuite by Manish Gupta
12:00 to 13:00 Automotive Security Bugs Explained for Bug Hunters by Jay Turla Panel: Predicting Danger: Building the Ideal Threat Intelligence Model Rage against the IDOR’s: Using Machine Learning models to detect and stop authorization bypass vulnerabilities by Juan Berner Internet Goverance by Ihita Gangavarapu

Data Sniffing over Air Gap by Avni Singh & Garima
13:00 to 14:00 LUNCH
14:00 to 14:45 HackerHelp Panel: Lessons from the Cyber Trenches Don't Ruck Us Too Hard - Owning All of Ruckus AP devices by Gal Zror [Workshop] When Sh*t’s on Fire by Valentine Mairet & Sebastiaan Groot [Workshop] Hardware Hacking by Asmita Jha Mobexler by Abhishek Jaiswal & Abhinav Mishra

F.R.I.D.A.Y by Shyam Sundar Ramaswami

FriSpy by Tejas Girme & Parmanand Mishra

14:45 to 15:30 Panel: Complication in Security Practices Mlw #41: a new sophisticated loader by APT group TA505 by Alexey Vishnyakov
15:30 to 16:00 BREAK
16:00 to 16:45 Hacker Q&A with Nathaniel Wakelam & Laurie Mercer Taking the guess out of Glitching by Adam Laurie StartVille
16:45 to 17:30 [Closing Note] Cybersecurity In India - Information Asymmetry, Cross Border Threats and National Sovereignty by Saumil Shah
7th March 2020
Time/Venue Assembleia 1 Assembleia 2 Assembleia 3 West 1 West 2 South 1 AMMO (Exhibition Area)
10:00 to 10:45 [KEYNOTE] Crouching hacker, killer robot? Removing fear from cyber-physical security by Stefano Zanero
10:45 to 11:00 BREAK
11:00 to 12:00 The One Weird Trick SecureROM Hates, vol. 2 by Nikias Bassen Panel: Supply Chain Security in Critical Infrastructure Systems InfoSec Deep Learning in Action by Satnam Singh [Workshop] Out-of-Band Exploitation for Asynchronous Vulnerabilities by Ashwin Pathak & Ajay Prashar Resume Clinic RedTeam Village Wolverine by Furqan Khan & Siddharth Anbalahan

Hachi by Parmanand Mishra

Sastri by Rushikesh D Nandedkar & Lalit Singh Bhandari

Phishing Simulation by Jyoti Raval
12:00 to 13:00 Putting it all together: building an iOS jailbreak from scratch by Umang Raghuvanshi Panel: Economics of Data Breach and Attack Hacking Automatically: Applying Program Analysis to IoT by Ryan Speers
13:00 to 14:00 LUNCH
14:00 to 14:45 XNU heap exploitation: From kernel bug to kernel control by Tihmstar Panel: Hack the law : Protection for ethical cyber security research in India COMpromise: remote code execution in Windows development environments by Stan Hegt Automated Classification of Web-Application Attacks for Intrusion Detection by Aneet Kumar Dutta Horror Stories from Hacker World RedTeam Village Callidus by Chirag Savla

Spike2Kill by Manish Singh

Omniscient by Pramod Rana

VyAPI by Riddhi Shree
14:45 to 15:30 Dissecting Rotten Apples – macOS Malware Analysis by Felix Seele Building advanced security applications on Qiling.io by Kaijern Lau & Quynh Nguyen Anh MITRE ATT&CK Meetup
15:30 to 16:00 BREAK
16:00 to 16:45 Cloud As an Attack vector by Rushikesh Vishwakarma & Ashwin Vamshi [Workshop] How India’s new Data Protection Bill will affect you Horror Stories from Hacker World
16:45 to 17:30 Closing Note & Prize Distribution
17:30 to 18:00

Copyright © 2023 | Nullcon India | International Security Conference | All Rights Reserved