DEFCON GROUP TRIVANDRUM - Virtual Weekly Breakout sessions
All of our sessions and meet-ups are OPEN and FREE to everyone!
Season 1: 2020
Bio: Cyber Security Analyst, EY
Abstract: Power side-channel attacks exploit variations in power consumption to extract secrets from a device, e.g., cryptographic keys. Prior attacks typically required physical access to the target device and specialized equipment such as probes and a high-resolution oscilloscope. PLATYPUS (Power Leakage Attacks: Targeting Your Protected User Secrets) can detect weak electrical signals emitted by its prey. PLATYPUS attacks which are novel software-based power side-channel attacks on Intel server, desktop, and laptop CPUs. Exploit unprivileged access to the Intel Running Average Power Limit (RAPL) interface that exposes values directly correlated with power consumption, forming a lowresolution side channel. Distinguishes different instructions and different Hamming weights of operands and memory loads. This enables attacker to not only monitor the control flow of applications but also to infer data and extract cryptographic keys.
Bio: Senior Cyber Security Consultant, EY
Abstract: Overview on the missing puzzle of the blue team, "Mitre Shield" launched recently by MITRE. Walkthrough on the Tactics and technique mapping of Mitre Shield. Applying these in your defensive practice.
Bio: Associate Security Engineer at UST Global.
Abstract: I will be talking on how my hobby helped me learn information security.Then will talk about advantages of using android device for hacking and a breif discussion of tools that can be run on android device. At last I hope to show a small demo of hacking a kioptrix machines using an android phone
Bio: I am Sreemol Menon, working as Cyber security analyst in EY. I have an overall experience of 7 years , specifically in Information security field for 2 years. Currently handling Incident Response and Incident triaging tasks.Also I am a GIAC certified professional in Defensible Security Architecture.
Abstract: Zero trust architecture and its basics: Zero Trust is a security concept centered on the belief that organizations should not automatically trust anything inside or outside its perimeters and instead must verify anything and everything trying to connect to its systems before granting access. “The strategy around Zero Trust boils down to don't trust anyone.
Bio: Currently working as a Security Consultant with Activbytes, Active CTF player and SOC Analyst.
Abstract: A beginner friendly session to detect various Active Directory Attacks on ELK Stack and configure custom Detection Rules on Elastic SIEM.
Bio: Security Engineer at UST Global, Bugbounty hunter, Photographer.
Abstract: Introductory session about Android app security testing focused on beginners who are interested in android app pentesting.
Bio: Student,bug hunter and web security enthusiast who loves to explore web based client side vulnerabilities.A proud member of DEFCON Group, Trivandrum and loves sharing knowledge back to the community.Also one of the top 30 bug hunters featured in Google Hall of Fame.
Bio: Nimna has more than 9 years of experience in the field of Cybersecurity, Incident triaging and Incident response (IR). She is currently part of the Internal Security Team working as a Digital Forensics Analyst with one of the Big Four companies. She has a deep understanding of latest security threats, vulnerabilities, and Incident Response. She possesses multiple professional certifications like GIAC certified Forensic Examiner (GCFE), ISO27001 Lead Auditor, etc. Nimna has been associated with DEFCON group Trivandrum since past 2 years. She was part of the winning team at the Red team Village - CTF competition organized at C0c0n 2019.
Abstract: When it comes to endpoint security, a handful of threats make up the bulk of the most serious attack tools and tactics. According to a recent study, the most common critical-severity cybersecurity threat to endpoints was fileless malware. Fileless malware has been rapidly evolving. This is because digital threats have evolved far beyond signatures. Most threats we see today are polymorphic. They are able to create a whole new version or variant of themselves upon every new infection in order to fool basic AV. Through this session, I would describe the emerging fileless malware and the techniques they employ to evade detection.
Bio: Aravind is working as a Security Analyst at Lucideus Tech. Primarily working as a part of internal security team. He has been working in the cyber security industry for the past 2 years. Aravind has been volunteering for the c0c0n organization team from 2018, a proud member of DEFCON Group Trivandrum and part-time volunteer at the Red Team Village community.
Abstract: All the fortune 500 are using active directory. Are we sure all these teams Configuring it properly. I will be talking about common Active directory configuration mistakes. What it can lead to, and how to fix it?