http://nullcon.net/website/archives/goa-2017.php
Presentations
| Talk Title, Speaker | Videos | Presentations | 
|---|
| Keynote - Joshua Pennell |  |   | 
| Antivirus Evasion Reconstructed - Veil 3.0 by Christopher Truncer |   |  | 
| Case Study on RFID (proximity cards) Hacking by Sarwar Jahan and Ashwath Kumar |   |  | 
| Explorer's Guide to Shooting Satellite Transponders by Jay Turla |   |  | 
| Injecting Security into Web apps with Runtime Patching and Context Learning by Ajin Abraham |   |  | 
| Invoke - Obfuscation: PowerShell obFUsk8tion Techniques & How To (Try To) D""e` Tec` T 'Th'+'em' by Daniel Bohannon |   |  | 
| The Mirai BotNet and where DDoS attacks are headed by Ben Herzberg |   |  | 
| Tale of training a Web Terminator! By Bharadwaj Machiraju |   |  | 
| The Art of Bootloader Unlocking: Exploiting Samsung Sboot by Nitay Artenstein |  |  | 
| Hacking medical devices and infrastructure by Anirudh Duggal |   |  | 
| Hypervisors in Your Toolbox: Monitoring and Controlling System Events with HyperPlatform by Satoshi Tanda and Timo Kreuzer |   |  | 
| p≡p ≡ pretty Easy privacy: making privacy the default for everyone by Sva |   |  | 
| Case study of SS7 / Sigtran assessment by Akib Sayyed |   |  | 
| Drone Hijacking and other IoT hacking with GNU Radio and SDR by Arthur Garipov |   |  | 
| Nearly generic fuzzing of XML - based formats by Nicolas Gregoire |   |  | 
| Blockchain and security : bank and insurance applications by Renaud Lifchitz |   |  | 
| 7 sins of ATM protection against logical attacks by Timur Yunusov |   |  | 
| Rapid Security in the Cloud with AWS and CIS by Mikhail Advani & Rajesh Tamhane |   |  | 
| Barbarians At The Gate(way) by Dave Lewis |   |  |