• Goa 2020
  • Schedule



Training Venue Training Name Trainers
3 Day Training (3rd to 5th March 2020) Taj Hotel & Convention Center Advanced Infrastructure Security Assessment Prashant Mahajaan & Omair
Breaking & Owning Application and Servers on AWS and Azure Bharath & Riyaz Walikar
Beyond the Web Application Hackers handbook - Advanced Web Hacking Marcus Pinto
Pentesting the Modern Application Stack Bharadwaj Machiraju & Francis Alexander
AppSecOps A Holistic Approach To Application Security Rohit Salecha & Abhijay Singh
ML for Security and security for ML Nikhil Joshi
Windows Kernel Exploitation Foundation & Advanced Ashfaq Ansari
Cidade de Goa BoothPwn - Pwning Secure Boot by Expereince Niek Timmers & Cristofaro Mune
Hacking iOS Application, Like A Pro Abhinav Mishra
Chances Resort and Casino An Indy Resort Practical IoT Hacking Munawwar Hussain Shelia & Aseem Jakhar
Attacking and Auditing Docker Containers and Kuberneters Clusters Abhisek Datta
Practical 3G/4G Security and Attacks Dr. Ravishankar Borgaonkar & Altaf Shaik
2 Day Training (4th to 5th March 2020) Taj Vivanta Panaji Xtreme Android Hacking Ankur Bhargava
Audit +++ (OPSE Certification) Joerg Simon
Practical RFID / NFC Hacking Adam Laurie
Practical Side-channel Attacks Stjepan Picek
Building An Enterpise Grade Security Analytics Platform Using Elastic Stack Himanshu Kumar & Prajal Kulkarni
Training Starts 09:30
Tea/Coffee Break 11:00 to 11:15
Lunch 13:00 to 14:00
Tea/Coffee Break 16:00 to 16:15
Training Ends 18:00
6th March 2020
Time/Venue Assembleia 1 Assembleia 2 Assembleia 3 West 1 South 1 AMMO (Exhibition Area)
8:00 to 9:30 Registration
9:40 to 10:00 Welcome Note
10:00 to 10:45 [KEYNOTE] Crouching hacker, killer robot? Removing fear from cyber-physical security by Stefano Zanero
10:45 to 11:00 BREAK
11:00 to 12:00 Google VRP Bug Hunting by Martin Straka Panel: AI/ML in Cybersecurity – Hype or Promise? PwdLess: Exploitation Tales from RouterLand by Christofaro Mune [Workshop] Learn by Doing - DevSecOps on AWS using Cloud-Native Services by Akash Mahajan & Sunesh Govindaraj Cyber Murder Mystery by Maya Horowitz Providence by Swapnil Kumbhar & Akshay Shah

Fuzz Cube by Anto Joseph

Talisman by Suhas Vishwanath

PivotSuite by Manish Gupta
12:00 to 13:00 Bug Bounty: Why is this happening? by Adam Ruddermann Panel: Predicting Danger: Building the Ideal Threat Intelligence Model Rage against the IDOR’s: Using Machine Learning models to detect and stop authorization bypass vulnerabilities by Juan Berner Become a CISO & live life in the fast lane by Jaya Baloo
13:00 to 14:00 LUNCH
14:00 to 14:45 Maximize your research investment in Microsoft Online Services by Sean Hinchee Panel: Securing the Human Factor Don't Ruck Us Too Hard - Owning All of Ruckus AP devices by Gal Zror [Workshop] When Sh*t’s on Fire by Valentine Mairet & Sebastiaan Groot [Workshop] Hardware Hacking by Asmita Jha Mobexler by Abhishek Jaiswal & Abhinav Mishra

F.R.I.D.A.Y by Shyam Sundar Ramaswami

FriSpy by Tejas Girme & Parmanand Mishra

14:45 to 15:30 Hacker Q&A with Nathaniel Wakelam & Laurie Mercer Panel: Lessons from the Cyber Trenches Kr00k: How KRACKing Amazon Echo exposed a billion+ vulnerable Wi-Fi devices by Robert Lipovsky
15:30 to 16:00 BREAK
16:00 to 16:45 Automotive Security Bugs Explained for Bug Hunters by Jay Turla Taking the guess out of Glitching by Adam Laurie Mlw #41: a new sophisticated loader by APT group TA505 by Alexey Vishnyakov StartVille
16:45 to 17:30 [Closing Note] Cybersecurity In India - Information Asymmetry, Cross Border Threats and National Sovereignty by Saumil Shah
7th March 2020
Time/Venue Assembleia 1 Assembleia 2 Assembleia 3 West 1 West 2 South 1 AMMO (Exhibition Area)
10:00 to 10:45 [KEYNOTE] The Metadata Trap: Whistleblowers in the Age of Surveillance and Big Data by Micah Lee
10:45 to 11:00 BREAK
11:00 to 12:00 The One Weird Trick SecureROM Hates, vol. 2 by Nikias Bassen Panel: Supply Chain Security in Critical Infrastructure Systems InfoSec Deep Learning in Action by Dr. Satnam Singh [Workshop] Out-of-Band Exploitation for Asynchronous Vulnerabilities by Ashwin Pathak & Ajay Prashar Resume Clinic RedTeam Village Wolverine by Furqan Khan & Siddharth Anbalahan

Hachi by Parmanand Mishra

Sastri by Rushikesh D Nandedkar & Lalit Singh Bhandari

Phishing Simulation by Jyoti Raval
12:00 to 13:00 Putting it all together: building an iOS jailbreak from scratch by Umang Raghuvanshi Panel: Economics of Data Breach and Attack Hacking Automatically: Applying Program Analysis to IoT by Ryan Speers
13:00 to 14:00 LUNCH
14:00 to 14:45 XNU heap exploitation: From kernel bug to kernel control by Tihmstar Panel: Emerging Cyber Security threats in Industrial Control Systems and OT components” COMpromise: remote code execution in Windows development environments by Stan Hegt Automated Classification of Web-Application Attacks for Intrusion Detection by Aneet Kumar Dutta HackerHelp RedTeam Village Callidus by Chirag Savla

Spike2Kill by Manish Singh

Omniscient by Pramod Rana

VyAPI by Riddhi Shree
14:45 to 15:30 Dissecting Rotten Apples – macOS Malware Analysis by Felix Seele Panel: Hack the law : Protection for ethical cyber security research in India Building advanced security applications on Qiling.io by Kaijern Lau & Quynh Nguyen Anh
15:30 to 16:00 BREAK
16:00 16:45 KTRW: The journey to build a debuggable iPhone by Brandon Azad Panel: Need for Speed Cloud As an Attack vector by Rushikesh Vishwakarma & Ashwin Vamshi [Workshop] How India’s new Data Protection Bill will affect you Horror Stories from Hacker World
16:45 to 17:30 Closing Note & Prize Distribution
17:30 to 18:00

Copyright © 2019-20 | Nullcon India | International Security Conference | All Rights Reserved