Rahul Sasi 's biography

Rahul's past and future talks

Hacker's Live: A Session by Hacker(s)

Dynamic CISO Summit 2020

28 February, 2020 • 1k people in the audience

A Session by Hacker. Cybersecurity professionals should create a robust “Defense Mechanism” for a stronger, better, cybersecurity posture.

Shouldn't organization disclose breaches

c0c0n XII

27 September, 2019 • 50 people in the audience

Art of Hacking

TEDxGCT

9 July, 2016 • 1k people in the audience

Hacking has become a very frequent phenomenon. But the extent a person can do legally brings the question of introspection. With the word "privacy" becoming a mockery, the art of white ha...

Security vulnerabilities in DVB C networks; Hacking Cable TV network

Ekoparty 2015

22 October, 2015 • 500 people in the audience

DVB-C stands for "Digital Video Broadcasting - Cable" and it is the DVB European consortium standard for the broadcast transmission of digital television over cable. This system transmits...

Static Analysis and Dynamic Instrumentation for Intelligent Exploit Analysis

Hacker in the Box (HITB) Security Conference 2013

17 October, 2013 • 500 people in the audience

With the rise in the number of targeted attacks against government and private companies, there is a certain requirement for automated exploit analysis and filtering document file formats...

CXML/VXML Auditing for IVR Pentesters and PCI/DSS Consultants

Hacker in the Box (HITB) - Amsterdam

22 October, 2012 • 250 people in the audience

CXML and VXML languages are used to power IVR applications. IVR systems are often seen in Phone Banking , Call Center applications, and other auto attendent systems. These devices are con...

Rahul talks about

3
Hacking
2
Cybersecurity
2
Man in the midd...
1
Hacker
1
Cyberdefence
1
Vulnerability d...
1
Cxml/vxml hacking
1
Exploit analysis
1
Intrusion detec...
1
Threat detection
1
Dvb hacking
1
Breaches
1
Tv hacking
1
Exploit
1
Backdoor
1
Drone hacking
1
Drone
Artificial inte...
Digital risk ma...
Penetration tes...
Computer forensics
Malware analysis
Security