- Schedule
- Venue
- Speakers
- Training
- CFP
- Volunteer
- Recreation
- Blackshield Awards
- CTF
- Sponsors
- Exhibition
- Job Fair
- CXO Track
- Goa'16
- About Schedule
SCHEDULE GOA 2016
YOUR ITINERARY FOR GOA 2016
Start | End | Day 1 | Venue | Training Name | Trainer Names |
---|---|---|---|---|---|
9:00 | 18:00 | Training 1 | Coral 1 - Bogmallo Beach Resort | Xtreme Web Hacking | Akash & Riyaz |
9:00 | 18:00 | Training 2 | Coral 2 - Bogmallo Beach Resort | Offensive HTML, SVG, CSS and other Browser-Evil | Mario Heiderich |
9:00 | 18:00 | Training 3 | Coral 3 - Bogmallo Beach Resort | Penetration Testing SmartGrid and SCADA | Justin Searle |
9:00 | 18:00 | Training 4 | Aqua - Bogmallo Beach Resort | Audit +++ | Joerg Simon |
9:00 | 18:00 | Training 5 | HQ 1 - The HQ Hotel | Attack Monitoring using Elasticsearch, Logstash, Kibana | Himanshu, Prajal & Shubham |
9:00 | 18:00 | Training 6 | HQ 2 - The HQ Hotel | Windows Kernel Exploitation | Ashfaq Ansari |
9:00 | 18:00 | Training 7 | HQ 3 - The HQ Hotel | Xtreme Android Exploitation Lab | Anant & Anto |
9:00 | 18:00 | Training 8 | Elite 1 - Hotel La Paz Garden | Reverse Engineering and Malware Analysis | Abhishek Datta |
9:00 | 18:00 | Training 9 | Elite 2 - Hotel La Paz Garden | Xtreme Exploitation | Omair |
9:00 | 18:00 | Training 10 | The Queeny Hotel | Understanding and exploiting cryptography & PKI Implementations | Ajit Hatti |
Start | End | Day 1 | Venue | Training Name | Trainer Names |
---|---|---|---|---|---|
9:00 | 18:00 | Training 1 | Coral 1 - Bogmallo Beach Resort | Xtreme Web Hacking | Akash & Riyaz |
9:00 | 18:00 | Training 2 | Coral 2 - Bogmallo Beach Resort | Offensive HTML, SVG, CSS and other Browser-Evil | Mario Heiderich |
9:00 | 18:00 | Training 3 | Coral 3 - Bogmallo Beach Resort | Penetration Testing SmartGrid and SCADA | Justin Searle |
9:00 | 18:00 | Training 4 | Aqua - Bogmallo Beach Resort | Audit +++ | Joerg Simon |
9:00 | 18:00 | Training 5 | HQ 1 - The HQ Hotel | Attack Monitoring using Elasticsearch, Logstash, Kibana | Himanshu, Prajal & Shubham |
9:00 | 18:00 | Training 6 | HQ 2 - The HQ Hotel | Windows Kernel Exploitation | Ashfaq Ansari |
9:00 | 18:00 | Training 7 | HQ 3 - The HQ Hotel | Xtreme Android Exploitation Lab | Anant & Anto |
9:00 | 18:00 | Training 8 | Elite 1 - Hotel La Paz Garden | Reverse Engineering and Malware Analysis | Abhishek Datta |
9:00 | 18:00 | Training 9 | Elite 2 - Hotel La Paz Garden | Xtreme Exploitation | Omair |
9:00 | 18:00 | Training 10 | The Queeny Hotel | Understanding and exploiting cryptography & PKI Implementations | Ajit Hatti |
Start | End | Meteora Hall (Talks) | Coral I | Coral II |
---|---|---|---|---|
19:00 | 20:00 | Registration | ||
20:00 | 20:30 | Keynote null | ||
20:30 | 21:00 | Blackshield Award | ||
21:00 | 21:30 | How to build Big Brother: Critical Vulnerabilities in 3G/4G Modems by Yunusov Timur | CXO Networking (Invite Only) | Bounty Craft, Finding Bugs and Profiting |
21:30 | 22:00 | Real-time Ingestion of security telemetry data into Hadoop distributed system to respond to 0-day attacks by Vipul Sawant & Pallav Jakhotiya | ||
22:00 | 22:30 | Sandbox detection: Abuse, test, leak by Zoltan Balazs | Speaker Party (Invite Only) | |
22:30 | 23:00 |
Start | End | Meteora Hall (Talks) | Coral 1 Hall (CXO Track) | Coral 2 Hall (Workshops) | Coral 3 Hall | La Palmira |
---|---|---|---|---|---|---|
8:00 | 9:30 | Registration | ||||
9:45 | 10:00 | Opening Note | ||||
10:00 | 10:45 | Keynote by Jaya Baloo | ||||
10:45 | 11:00 | Break | Break | Break | Break | Break |
11:00 | 12:00 | Automatic Automotive Hacking by Craig Smith | Bounty Craft, Finding Bugs and Profiting | |||
12:00 | 13:00 | Travis Goodspeed | CXO Panel 1 - Hacking Community <-> CISO Community tête-à-tête | |||
13:00 | 14:00 | Lunch | Lunch | Lunch | Lunch | Lunch |
14:00 | 14:45 | What Google knows about you and your devices, and how to get it by Vladimir Katalov | CXO Panel 2 - Framework for Government/Industry, Cooperation & Information Exchange in the age of IT savvy Crime | Social Engineering Man & the Machine or Social Engineering Village by Neelu Tripathy | Bounty Craft, Finding Bugs and Profiting | |
14:45 | 15:30 | Abusing Software Defined Networks (Part Two): Using the SDN-Toolkit to Test Your Software Defined Network by Gregory Pickett | CXO Panel 3 - Future of security | |||
15:30 | 16:00 | Break | Break | Break | Break | Break |
16:00 | 16:45 | Million Dollar Baby: Towards ANGRly conquering DARPA CGC by Aravind Machiry | Physical Lock Security by Amey Gat & Swapnil Wadwalkar | Application Security Workshop by Amit Ashbel | BugBash by BugCrowd | Bounty Craft, Finding Bugs and Profiting |
16:45 | 17:30 | Closing Note + Prize Distribution | Global null meet | |||
17:30 | 18:00 | |||||
19:30 | 22:30 | Nullcon Networking Party (Invite only) |
Start | End | Meteora Hall (Talks) | Coral 1 Hall (Talks) | Coral 2 Hall (Workshops) | Coral 3 Hall | La Palmira |
---|---|---|---|---|---|---|
8:30 | 9:00 | Winja Breakfast Session | ||||
10:00 | 10:45 | Keynote by Roland Cloutier | ||||
10:45 | 11:00 | Break | Break | Break | Break | Break |
11:00 | 12:00 | An Abusive Relationship with AngularJS – About the Security Adventures with the 'Super-Hero' Framework by Mario Heiderich | Show Me the Data: Analyzing Security Trends Across 100 Companies by Clint Gibler | Cyber WarGame | ||
12:00 | 12:45 | Let's Play Doctor: Practical OS X Malware Detection & Analysis by Patrick Wardle | Making Machines think about security for fun and profit by Rahul Sasi | Cybersecurity – A Global Talent Perspective | Physical Lock Security by Amey Gat & Swapnil Wadwalkar | |
12:45 | 14:00 | Lunch | Lunch | Lunch | Lunch | Lunch |
14:00 | 15:00 | Attacking and defending healthcare - EMR solutions by Anirudh Duggal | Hardsploit project : All-In-One Tool for Hardware Security Audit by Julien Moinard | The Age of Cyber Threats by Anudeep Kumar & Ajitest Roy Chowdhury | Winja - CTF | |
15:00 | 15:45 | Privacy leaks on 4G-LTE networks by Altaf Shaik | Hitchhiker's guide to hacking Industrial Control systems by Arun Mane | |||
15:45 | 16:00 | Break | Break | Break | Break | Break |
16:00 | 16:45 | Automated Mobile Application Security Assessment with MobSF by Ajin Abraham | Attacking Radio: A hands on workshop by Yashin Mehaboobe |
Train like you fight : Develop Cyber Warriors by Brendan Leitch | ||
16:45 | 17:30 |