Schedule

Time(in hrs) Night 0 Day 1 – Nov 30 Day 2 – Dec 1 Day 3 – Dec 2 Day 4 – Dec 3
09 -10 Hacknight & Amiworks Registrations
1000-1030 Workshop 1 – Securing Mobile applications – Exploits Demystified and Solutions Simplified Intro Delay Due to Marathon Workshop 2 – Putting application security maturity models in practice Workshop 3 – Hackers Vs. Developers
1030-1100 Keynote – Alok Vijayant Talk – 5
1100-1130 Talk – 6
1130-1200 BREAK
1200-1230 Panel Discussion Talk – 7
1230-1300 Talk – 8
1300-1330 LUNCH
1330-1400
1400-1430 Dinesh Shetty & Ashish Rao Talk – 1 Talk – 9 Ketan Vyas Tamaghna Basu and Akash Mahajan
1430-1500 Talk – 2 Talk – 10
1500-1530 Talk – 3 Talk – 11
1530-1600 Talk – 4 Talk – 12
1600-1630 BREAK
1630-1700 Surprise Tool Launch Talk – 13
1700-1730 Talk – 14
1730-1800 Talk – 15


Talk 01 – Critical Infrastructure Security (Subodh belgi).

Talk 02 – Infrastructure Security (Sivamurthy Hiremath).

Talk 03 – Smart Grid Security (Falgun Rathod).

Talk 04 – Legal Nuances to the Cloud (Ritambhara Agrawal).

Talk 05 – Hacking and Securing iOS applications (Satish Bommisetty).

Talk 06 – HAWAS – Hybrid Analyzer for Web Application Security (Lavakumar Kuppan).

Talk 07 – The difference between the “Reality” and “Feeling” of Security: Information Security and the Human Being (Thomas Kurian).

Talk 08 – FatCat Web Based SQL Injector (Sandeep Kamble).

Talk 09 – HackNight Report Presentation

Talk 10 – Detecting and Exploiting XSS with Xenotix XSS Exploit Framework (Ajin Ibrahim).

Talk 11 – Anatomy of a Responsible Disclosure – Zero Day Vulnerability in Oracle BI Publisher (Vishal Kalro).

Talk 12 – Stand Close to Me, & You’re pwned! : Owning SmartPhones using NFC (Aditya Gupta & Subho Halder).

Talk 13 – XSSshell (Vandan Joshi).

Talk 14 – Content-Type attack -Dark hole in the secure environment (Raman Gupta).

Talk 15 – Real Time Event Recording System, the tool for Digital Forensics Investigation (Madhav Limaye).


Workshop 1 – Securing Mobile Applications (Dinesh Shetty & Ashish Rao).

Workshop 2 – Putting Application Security Maturity Models in Practice (Ketan Vyas).

Workshop 3 – Hackers Vs. Developer (Tamaghna Basu & Akash Mahajan).