• Most recent
  • Conferences
  • For organizers
  • The rig
  • Buy me a Mate
  • Search
  • Fundraiser
  • Bluesky
  • 15
  • 14
  • 13
  • 11
  • 10
  • 9
  • 8
Edition logo

Nullcon 14

2023-09-22 - 2023-09-23
  • Thumbnail for the video - click to play

    ►

    Opening Note
    - Antriksh Shah
  • Thumbnail for the video - click to play

    ►

    Multiplying Threat Intelligence
    - John Lambert
  • Thumbnail for the video - click to play

    ►

    Hacking Mitsubishi PLC Without Access To Firmware
    - Anton Dorfman
  • Thumbnail for the video - click to play

    ►

    Smashing The State Machine: The True Potential Of Web Race Conditions
    - James Kettle
  • Video will not be published
    Inside The Investor'S Mind: A Fireside Chat Of Entrepreneur-VC (Aap Ki Adalat)
    - Panel
  • Thumbnail for the video - click to play

    ►

    The Curious Case Of The Rogue SOAR
    - Jaden Furtado & Mukesh Kumar
  • Thumbnail for the video - click to play

    ►

    How I Hacked Your Bank Account: A Detailed Look At UPI Security
    - Nemo
  • Video will not be published
    Data Protection Law And Its Potential Implications For The Industry
    - Panel
  • Thumbnail for the video - click to play

    ►

    Lens Of Deceit: Unmasking And Altering Camera Sunglasses' Footage
    - Daniel Schwendner
  • Thumbnail for the video - click to play

    ►

    Securing CI/CD Pipelines: Exploring Vulnerabilities In Workflows
    - Siddharth Muralee
  • Video will not be published
    Weaponization Of AI With Special Reference To Gen-AI
    - Panel
  • Thumbnail for the video - click to play

    ►

    Android-SigMorph: Covert Communication Exploiting Android Signing Schemes
    - Ayan Saha And Achute Sharma
  • Video will not be published
    Threat Intel Sharing In OT Community And Industry
    - Panel
  • Thumbnail for the video - click to play

    ►

    Uncovering Azure'S Silent Threats: A Journey Into Cloud Vulnerabilities
    - Nitesh Surana
  • Video will not be published
    Journey In Setting Up OT SOC By Ramandeep Walia
    - Panel
  • Thumbnail for the video - click to play

    ►

    Critical Information Infrastructure(CII) Protection: Challenges And Opportunities- How Can The Nullcon Community Contribute
    - Panel
  • Thumbnail for the video - click to play

    ►

    MITM On PSTN: Novel Methods For Intercepting Phone Calls
    - Kirils Solovjovs
  • Video will not be published
    Shifting Left With Security And The Evolution Of Your DevSecOps Team’s Journey To Excellence
    - Panel
  • Thumbnail for the video - click to play

    ►

    Cyber Operations, Doctrine And Geo-Politics
    - Panel
  • Thumbnail for the video - click to play

    ►

    Reverse Engineering RGB Keyboard Backlights With Linux Kernel Drivers
    - Rishit Bansal
  • Video will not be published
    C4CII - Securing Use Of Cloud In Critical Information Infrastructure
    - Panel
  • Thumbnail for the video - click to play

    ►

    Unlocking Any Door In 21st Century. Immersion In Biometric Security
    - Timur Yunusov and Aleksandra Murzina
  • Video will not be published
    Intelligence-led Defense: Leveraging Threat Intelligence In The Age Of AI
    - Panel
  • Thumbnail for the video - click to play

    ►

    Jailbreaking The Apple HomePod: Fun With Checkm8 And Smart Speakers
    - Tihmstar and Linus Henze
  • Thumbnail for the video - click to play

    ►

    The Convergence Of EBPF, Buildroot, And QEMU For Automated Linux Malware Analysis
    - Nikhil Hegde
  • Video will not be published
    Adversary Simulation And Incident Response Impact
    - Panel
  • Thumbnail for the video - click to play

    ►

    Deconstructing The Beast: A Deep Dive Into JIT Compilation Attacks In IOS
    - Shubham Sharma
  • Thumbnail for the video - click to play

    ►

    Cracking With Automated USB Fuzz
    - Conna And Subba Bachina
  • Video will not be published
    A Cyber-Physical System For India With Security, Privacy, And Equity
    - Panel
  • Thumbnail for the video - click to play

    ►

    Self-Signed, Why Not! Exploiting Insecure Certificate Validation In IOS And MacOS
    - Aapo Oksman
  • Thumbnail for the video - click to play

    ►

    IoT Hacking 101 : Reverse Engineering The Xiaomi Ecosystem
    - Dennis Giese
  • Thumbnail for the video - click to play

    ►

    Closing Note
    - Antriksh Shah