8th Meetup – Exploits & Mitigations – Memory Corruption Techniques
In this meet, Sameer Patil presented on “Exploits & Mitigations – Memory Corruption Techniques”
In this meet, Sameer Patil presented on “Exploits & Mitigations – Memory Corruption Techniques”
In this meet, Amit Malik presented on “EMET evasion techniques detected in the wild”
In this meet, Abhishek J M presented on “Dissecting Android APK” Video Demo :
In this meet, Ajithkumar V presented on “Elliptic curve cryptography”
In this meet, Monnappa K A presented on “Investigating Malware using Memory Forensics” Video Demo: https://youtu.be/C6uUDl0Vc6E
In this meet, Ajay pratap Singh delivered presentation on “Attacking and Crashing IoT Devices via Bluetooth LE protocol”
In this presentation, Monnappa explained the concept of code injection and hollow process injection. He demonstrated the working of hollow process injection using reverse engineering and showed how such infections can be detected and investigated using memory forensics Presentation: Demo 1 – Understanding Hollow Process Injection Using Reverse Engineering: Demo 2 – Investigating […]
In this presentation, Anirudh Duggal covered the techniques used to fingerprint vulnerable hospitals and healthcare infrastructure using web based tools. He also explained the potential attack points and the measures that can be taken to secure such infrastructure. Presentation:
In this presentation, Abhinav chourasia covered the concept of Buffer Overflow and he also demonstrated how one can exploit a vulnerable application and take control of a system and execute arbitrary commands on the system Presentation:
In this presentation, Satyam Saxena talked about features that can be used to detect DGA domains and he also covered how Whois information and passive dns data can be used to build model to detect the infected systems Presentation: