ClubHack 2011 Dec. 3, 2011 to Dec. 5, 2011, Pune, India

Event Page

Tell us about missing data
Title Speakers Summary Topic Types
Exploit the Exploit Kits Dhruv Soi Exploit kits are being used by cyber criminals to carry out targeted attacks against the ... Security
Android Tammer Anant Shrivastva Android is emerging as a leading mobile brand however, with rise of any system also ... Security
One Link Facebook Anand Pandey Facebook have millions of users and nearly everyone wants to have a look at others ... Security
Android Forensics Manish Chasta Smartphones can be used in cyber crimes like shooting illegal videos, sexual harassment cases, used ... Security
DOM XSS Encounters of the 3rd Kind Bishan singh Kochher Frontend development paradigm has shifted to Rich Internet Applications. Existing and newer technologies are creating ... Security
Mere paas Teensy hai Nikhil Mittal The title of the talk is inspired from an answer to a question from a ... Security
How Android based phone helped me win American Idol Elad Shapira The lecture will enable a rare glimpse into the workings of hackers, when moving rapidly ... Security
Handle Exploitation of Remote System From Email Account Merchant Bhowmick In this talk , we gonna cover offline exploitation ways . One of the way ... Security
Pen testing Mobile Applications Prashant Verma Recent studies show that the attacks on mobile applications are on the rise. With mobile ... Security
Scenario Based Hacking in Wi-Fi Enterprise Vivek Ramachandran In this talk, we will explore how perfectly legitimate and useful features like the Wi-Fi ... Security
Hacking your Droid Aditya Gupta In the present world scenario, there is one more thing than our computers which need ... Security
Scenario Based Hacking a.k.a How Professional Hackers really Hack Vivek Ramachandran Most of corporate and enterprise security is driven by compliance and checklists, rather than a ... Security