SecurityTrainings

Posts in category Uncategorized

Announcing New Cyber Security Communi...

Announcing New Cyber Security Community: Cysinfo

I remember my first meeting with Nagareshwar in 2011. We were sitting in a small cafe with a cup of coffee. we discussed many things but one of the topic was how to build a group of like minded people to solve some real problems with education system, economic system or just to create an […]

SecurityXploded Cyber Security Meet &...

SecurityXploded Cyber Security Meet – 28th May 2016

Here is the quick update and presentations from our recently concluded ‘SecurityXploded Cyber Security Quarterly Meetup’.     In this meet, Adarsh Agarwal delivered presentation on “Understanding Cryptolocker (Ransomware) with a Case study”, Satyam Saxena covered the topic on “Malicious Client Detection using Machine Learning”, Abhinav Chourasia presented on “Buffer Overflow Attacks”, Anirudh Duggal presented […]

Reversing and Investigating Malware E...

Reversing and Investigating Malware Evasive Tactics – Hollow Process Injection

In this presentation, Monnappa explained the concept of code injection and hollow process injection. He demonstrated the working of hollow process injection using reverse engineering and showed how such infections can be detected and investigated using memory forensics   Presentation:     Demo 1 – Understanding Hollow Process Injection Using Reverse Engineering:     Demo […]

Fingerprinting Healthcare Institution...

Fingerprinting Healthcare Institutions

In this presentation, Anirudh Duggal covered the techniques used to fingerprint vulnerable hospitals and healthcare infrastructure using web based tools. He also explained the potential attack points and the measures that can be taken to secure such infrastructure.   Presentation:  

Buffer Overflow Attacks

Buffer Overflow Attacks

In this presentation, Abhinav chourasia covered the concept of Buffer Overflow and he also demonstrated how one can exploit a vulnerable application and take control of a system and execute arbitrary commands on the system   Presentation:  

Malicious Client Detection Using Mach...

Malicious Client Detection Using Machine Learning

In this presentation, Satyam Saxena talked about features that can be used to detect DGA domains and he also covered how Whois information and passive dns data can be used to build model to detect the infected systems   Presentation:  

Understanding Cryptolocker (Ransomwar...

Understanding Cryptolocker (Ransomware) with a Case Study

In this presentation, Adarsh Agarwal covered the the infection mechanism of Ransomwares, different variants of Ransomwares, differences between the variants, anatomy of ransomwares, timeline of the Ransomware infections since jan 2016 and the case study of TeslaCrypt V2   Presentation:  

SecurityXploded Cyber Security Meetup...

SecurityXploded Cyber Security Meetup – 28th  May 2016, Bangalore, India

This is an announcement for the upcoming SecurityXploded cyber security community meetup on 28th May 2016 in Bangalore, India. This meet is completely free and doesn’t require any registration or any other formalities to attend. The meet will start at 9:30 AM IST.     After the meet, we will upload the presentations/videos for our […]

SecurityXploded 6th Quarterly Meetup ...

SecurityXploded 6th Quarterly Meetup – 30th January 2016

Here is the quick update and presentations from our recently concluded Sixth ‘SecurityXploded Cyber Security Quarterly Meetup’.     In this meet, Jiggyasu Sharma delivered presentation on “Bluetooth [in]security”, Jitendra Kumar Patel covered the topic on “Secure Multi Party Computation”, Anirudh Duggal presented on “Breaking Into Hospitals” and Monnappa K A presented on the topic […]

SX 6th Meetup – Linux Malware A...

SX 6th Meetup – Linux Malware Analysis using Limon Sandbox

In this presentation, Monnappa covered Linux malware analysis and showed automation of Linux malware analysis using Limon sandbox, he also demonstrated analysis of Linux malwares Tsunami, Mayhem and Suterusu Rootkit using Limon   Presentation:     Demo 1 – Analysis of Linux Malware Tsunami using Limon:     Demo 2a – Analysis of Linux Malware […]