- AMMO
- CFP
- CTF
- CXO Track
- Exhibition
- For You
- Hackathon
- HackerHelp
- Horror Stories from Hacker World
- Recreation
- Resume Clinic
- Schedule
- Speakers
- Sponsors
- StartVille
- Training
- Venue
- Volunteer
- Goa 2020
- Schedule
SCHEDULE GOA 2020
YOUR ITINERARY FOR Goa 2020
Training | Venue | Hall Name | Training Name | Trainers | |||
---|---|---|---|---|---|---|---|
3 Day Training (3rd to 5th March 2020) | Taj Hotel & Convention Center | Assembleia 1 | Beyond the Web Application Hackers handbook - Advanced Web Hacking | Marcus Pinto | |||
Assembleia 2 | Advanced Infrastructure Security Assessment | Prashant Mahajan & Omair | |||||
Assembleia 3 | Breaking & Owning Application and Servers on AWS and Azure | Bharath & Riyaz Walikar | |||||
South 1 | Windows Kernel Exploitation Foundation & Advanced | Ashfaq Ansari | |||||
South 2 | Hacking iOS Application, Like A Pro | Abhinav Mishra | |||||
West 1 | AppSecOps A Holistic Approach To Application Security | Rohit Salecha & Abhijay Singh | |||||
West 2 | ML for Security and security for ML | Nikhil Joshi | |||||
Cinema | Pentesting the Modern Application Stack | Bharadwaj Machiraju & Francis Alexander | |||||
Cidade de Goa | Harmonia | BoothPwn - Pwning Secure Boot by Expereince | Niek Timmers & Cristofaro Mune | ||||
Chances Resort and Casino An Indy Resort | Ballroom | Attacking and Auditing Docker Containers and Kuberneters Clusters | Abhisek Datta | ||||
Chancery | Practical IoT Hacking | Munawwar Hussain Shelia & Aseem Jakhar | |||||
Samarkand | Practical 3G/4G Security and Attacks | Dr. Ravishankar Borgaonkar & Altaf Shaik | |||||
2 Day Training (4th to 5th March 2020) | Vivanta Goa, Panaji | Tango 1 | Xtreme Android Hacking | Ankur Bhargava | |||
Tango 2 | Building An Enterpise Grade Security Analytics Platform Using Elastic Stack | Himanshu Kumar & Prajal Kulkarni | |||||
Debate | Practical Side-channel Attacks | Stjepan Picek | |||||
Analysis Strategy | Audit +++ (OPSE Certification) | Joerg Simon | |||||
Taj Hotel & Convention Center | Practical RFID / NFC Hacking | Adam Laurie | |||||
Timing | |||||||
Registration Starts | 08:30 | ||||||
Training Starts | 09:30 | ||||||
Tea/Coffee Break | 11:00 to 11:15 | ||||||
Lunch | 13:00 to 14:00 | ||||||
Tea/Coffee Break | 16:00 to 16:15 | ||||||
Training Ends | 18:00 |
6th March 2020 | |||||||
---|---|---|---|---|---|---|---|
Time/Venue | Assembleia 1 | Assembleia 2 | Assembleia 3 | West 1 | South 1 | AMMO (Exhibition Area) | |
8:00 to 9:30 | Registration | ||||||
9:40 to 10:00 | Welcome Note | ||||||
10:00 to 10:45 | [KEYNOTE] The Metadata Trap: Whistleblowers in the Age of Surveillance and Big Data by Micah Lee | ||||||
10:45 to 11:00 | BREAK | ||||||
11:00 to 12:00 | Bug Bounty: Why is this happening? by Adam Ruddermann | Panel: Securing the Human Factor | PwdLess: Exploitation Tales from RouterLand by Christofaro Mune | [Workshop] Learn by Doing - DevSecOps on AWS using Cloud-Native Services by Akash Mahajan & Sunesh Govindaraj | Become a CISO & live life in the fast lane by Jaya Baloo | Providence by Swapnil Kumbhar & Akshay Shah Fuzz Cube by Anto Joseph Talisman by Suhas Vishwanath PivotSuite by Manish Gupta |
|
12:00 to 13:00 | Automotive Security Bugs Explained for Bug Hunters by Jay Turla | Panel: Predicting Danger: Building the Ideal Threat Intelligence Model | Rage against the IDOR’s: Using Machine Learning models to detect and stop authorization bypass vulnerabilities by Juan Berner | Internet Goverance by Ihita Gangavarapu Data Sniffing over Air Gap by Avni Singh & Garima |
|||
13:00 to 14:00 | LUNCH | ||||||
14:00 to 14:45 | HackerHelp | Panel: Lessons from the Cyber Trenches | Don't Ruck Us Too Hard - Owning All of Ruckus AP devices by Gal Zror | [Workshop] When Sh*t’s on Fire by Valentine Mairet & Sebastiaan Groot | [Workshop] Hardware Hacking by Asmita Jha |
Mobexler by Abhishek Jaiswal & Abhinav Mishra F.R.I.D.A.Y by Shyam Sundar Ramaswami FriSpy by Tejas Girme & Parmanand Mishra |
|
14:45 to 15:30 | Panel: Complication in Security Practices | Mlw #41: a new sophisticated loader by APT group TA505 by Alexey Vishnyakov | |||||
15:30 to 16:00 | BREAK | ||||||
16:00 to 16:45 | Hacker Q&A with Nathaniel Wakelam & Laurie Mercer | Taking the guess out of Glitching by Adam Laurie | StartVille | ||||
16:45 to 17:30 | [Closing Note] Cybersecurity In India - Information Asymmetry, Cross Border Threats and National Sovereignty by Saumil Shah |
7th March 2020 | |||||||
---|---|---|---|---|---|---|---|
Time/Venue | Assembleia 1 | Assembleia 2 | Assembleia 3 | West 1 | West 2 | South 1 | AMMO (Exhibition Area) |
10:00 to 10:45 | [KEYNOTE] Crouching hacker, killer robot? Removing fear from cyber-physical security by Stefano Zanero | ||||||
10:45 to 11:00 | BREAK | ||||||
11:00 to 12:00 | The One Weird Trick SecureROM Hates, vol. 2 by Nikias Bassen | Panel: Supply Chain Security in Critical Infrastructure Systems | InfoSec Deep Learning in Action by Satnam Singh | [Workshop] Out-of-Band Exploitation for Asynchronous Vulnerabilities by Ashwin Pathak & Ajay Prashar | Resume Clinic | RedTeam Village | Wolverine by Furqan Khan & Siddharth Anbalahan Hachi by Parmanand Mishra Sastri by Rushikesh D Nandedkar & Lalit Singh Bhandari Phishing Simulation by Jyoti Raval |
12:00 to 13:00 | Putting it all together: building an iOS jailbreak from scratch by Umang Raghuvanshi | Panel: Economics of Data Breach and Attack | Hacking Automatically: Applying Program Analysis to IoT by Ryan Speers | ||||
13:00 to 14:00 | LUNCH | ||||||
14:00 to 14:45 | XNU heap exploitation: From kernel bug to kernel control by Tihmstar | Panel: Hack the law : Protection for ethical cyber security research in India | COMpromise: remote code execution in Windows development environments by Stan Hegt | Automated Classification of Web-Application Attacks for Intrusion Detection by Aneet Kumar Dutta | Horror Stories from Hacker World | RedTeam Village | Callidus by Chirag Savla Spike2Kill by Manish Singh Omniscient by Pramod Rana VyAPI by Riddhi Shree |
14:45 to 15:30 | Dissecting Rotten Apples – macOS Malware Analysis by Felix Seele | Building advanced security applications on Qiling.io by Kaijern Lau & Quynh Nguyen Anh | MITRE ATT&CK Meetup | ||||
15:30 to 16:00 | BREAK | ||||||
16:00 to 16:45 | Cloud As an Attack vector by Rushikesh Vishwakarma & Ashwin Vamshi | [Workshop] How India’s new Data Protection Bill will affect you | Horror Stories from Hacker World | ||||
16:45 to 17:30 | Closing Note & Prize Distribution | ||||||
17:30 to 18:00 |