Submissions

hacker; researcher

Netconf 2020 edition

Video thumbnail

Circumventing Internet shutdowns

This flash talk provides a brief overview of a few practical methods that can be used to circumvent Internet censorship techniques. more
  • 0 comments
  • Confirmed & scheduled
  • 11 Feb 2020
Format of the session: Flash talk (10 mins)

JSFoo Coimbatore 2019

Leveraging Web Application Vulnerabilities for Resourceful Intelligence Gathering

This talk aims to introduce the audience how web application vulnerabilities can be leveraged for self-sufficient information and intelligence gathering. more
  • 0 comments
  • Confirmed & scheduled
  • 04 May 2019
Section: Full talk (40 mins) Technical level: Beginner Session type: Demo Technical level: Intermediate Session type: Lecture

Rootconf 2019

Video thumbnail

Defensive and Offensive Applications of Open Source Intelligence

In real life, a footprint can be used to distinguish and confirm the identity of an individual. The same is true on the Internet, where activities and transactions that have been carried out leave behind a digital footprint, which at times can be leveraged for gathering intelligence about a particular individual and their activities. As an example, websites which reveal partial phone numbers can … more
  • 0 comments
  • Confirmed & scheduled
  • 07 Jun 2019
Section: Birds Of Feather (BOF) Session Technical level: Intermediate Section: Birds Of Feather (BOF) session Technical level: Intermediate Session type: Discussion