c0c0n 12 | Hacking and Cyber Security Briefing

Contact Details

Hacking and Cyber Security Briefing
manu
Manu Zacharia
+91-98470-96355
thomas
Thomas Kurian Ambattu
+91-94470-22081
akash
Akash Joseph Thomas
+91-94974-65363

Pre Conference Workshops - 25 – 26 September, 2019

Technical sessions
Mobile Radio Access Network Exploitation

WS-1 Mobile Radio Access Network Exploitation

Workshop Objective: The most accessible segment of a mobile network is Radio Access Network or RAN, which handle the subscriber signals. In this talk, we will demonstrate mobile Radio Access Network concepts and talk about weaknesses, vulnerabilities, risks and practical hacking scenarios.

Read More
Mobile Radio Access Network Exploitation

WS-2 Reversing and The exploitation of Vehicle (CAR Hacking)

Workshop Objective: Today all vehicles are connected through V2X technologies. All manufacturers are coming with new technologies which can be added technologies for Vehicle industries like Fleet management systems, diagnosis toolset etc.

Read More
Attacking Android and iOS apps

WS-3 Attacking Android and iOS apps

Workshop Objective: This course is ideal for those intending to expand their knowledge about mobile app security as it covers a large number of topics: People relatively new to mobile security will benefit from the practical deep dive while more advanced students can polish their skills in specific areas and perhaps complete more CTF....

Read More
Container Security for Red and Blue Teams

WS-4 Container Security for Red and Blue Teams

Workshop Objective: An organization using micro services, or any other distributed architecture rely heavily on containers and orchestration engines like Kubernetes and as such its infrastructure security is paramount to its business operations. This workshop will focus on how attackers can break into docker container and Kubernetes.....

Read More
Attacking Applications and Servers on AWS

WS-5 Attacking Applications and Servers on AWS

Workshop Objective: Amazon Web Services (AWS) one of the most popular cloud service. There is a need for security testers, Cloud/IT admins and people tasked with the role of DevSecOps to learn on how to effectively attack and test their cloud infrastructure. In this training we will cover attack approaches........

Read More
Secure code audit - NINJA Edition

WS-6 Secure code audit - NINJA Edition

Workshop Objective:                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                           

Read More
Elastic Security Analytics

WS-7 Elastic Security Analytics

Workshop Objective: It is important to keep pace with the attack vectors of today and tomorrow. So, we need a solution which helps us to hunt for a needle in a haystack. Building a solution which collates, sanitizes and stores security event information, will enable further analysis by a SOC Analyst – using a single pane of glass........

Read More
Reversing and exploiting Firmware

WS-8 Reversing and exploiting Firmware

Workshop Objective: Nowadays, hardware and operating system (OS) securities have become more robust, so hackers and researchers look for exploits in other areas such as firmware. Many IoT devices become vulnerable to cyber attacks because their firmware isn’t updated. One of the instances where we might have heard of ........

Read More
Dissecting and Exploiting BLE Devices 101

WS-9 Dissecting and Exploiting BLE Devices 101

Workshop Objective: Dissecting and exploiting BLE device 101 is built for anyone who wants to get started with BLE security testing, understating the BLE internals, and the packet format of Bluetooth Low Energy devices which helps the attendees to understand, enumerate and exploit the BLE smart devices.

Read More

Conference Partners

  • ISRA
  • Clients
  • Clients
  • Clients