Our Talkshows


We identified ECU vulnerabilities in Indian OEM e-scooters, which can also be found in other models. In our demonstration, we will show how we took control of an e-scooter using a cost-effective hardware implant attack. By reverse-engineering CANBUS messages, we created a hardware implant that enables remote access to the e-scooter's functions.
Click here to view More



Click here to view More



The ALL Village offers a unique opportunity to explore Automotive ICS, IoT, and CAR hacking in a hands-on, three-day practical session. Attendees will learn methodologies for hardware, automotive, IoT, and ICS testing, covering topics such as ICS and DCS differences, ISA99/IEC62443, NIST 800-82 standards, PLC programming, Modbus protocols, and various cyber-attacks on ICS and telecommunications systems.

Click here to view More


Penetration Testing of ECU and FMS (2020)


Addressing their weakness requires specific skillset in cybersecurity as well as attack mitigation of vehicle industries. The mitigation part requires huge and niche expertise in vehicle industries. No one show, how to mitigate these vehicle attacks over ECU and FMS in any conference. This talk will show you how to mitigate vehicle cybersecurity attacks against CANBUS and LIN protocol over ECU and FMS.

Click here to view More




Click here to view More


“REVERSING AND THE EXPLOITATION OF VEHICLE (CAR HACKING)”at c0c0n 2019 Kerala.


With vehicles now connected through V2X technologies, new third-party systems like fleet management tools and diagnostic toolsets are emerging but remain vulnerable. This course offers hands-on experience with real cars for testing component security, from basic to advanced levels, and includes a “Khaleesi” virtual machine with essential toolkits for ongoing security testing in vehicles, ICS, IoT, and hardware.

Click here to view More


“Making Anomaly Detection system(ADS) for Vehicles (Automotive Hacking)” at Rootcon 2019 Manila PH


Click here to view More


“ GnuRadio101” at x33fcon 2019 Poland


New generation malware and attacks have been targeting ICS and systems causing huge monetary and human life losses. ICS system still vulnerable in nature because it’s poorly understood. Penetration testing on ICS systems is a very niche field which requires in-depth knowledge and has a huge dependency in terms of the Hardware availability.  

Click here to view More


"CAR Hacking" at Defcamp 2019 Romania 


With vehicles increasingly connected via V2X technologies, new third-party systems like fleet management tools and diagnostic toolsets are emerging, but they remain vulnerable to cyberattacks. In the Car Hacking Village, participants will gain hands-on experience with automotive technologies, tackle realistic CTF challenges, and learn basic attack vectors for vehicle security. The village will also provide a virtual machine with necessary toolkits and offer a CANBUS hacking hardware device as a giveaway. Pre-register to secure your spot and fully engage in this unique opportunity!

Click here to view More



New-generation malware and attacks increasingly target ICS, causing significant financial and human losses due to longstanding vulnerabilities and outdated security measures. This talk will demonstrate the vulnerabilities in third-party devices and well-known PLCs, focusing on HMIs, protocols, and hardware.
Click here to view More


Penetration Testing of Vehicle Components (ECU and FMS) 2019


With vehicles increasingly connected through V2X technologies, new third-party systems like fleet management tools and diagnostic toolsets are emerging but remain vulnerable. This talk will provide insights into mitigating cybersecurity attacks on ECU and FMS, focusing on CANBUS and LIN protocols, an area rarely covered in conferences.
Click here to view More



Modern malware and attacks increasingly target ICS, causing significant financial and human losses. ICS systems remain vulnerable due to their outdated security measures and the lack of security consideration since their inception. This talk will highlight vulnerabilities in third-party devices and well-known PLCs, focusing on their HMIs, protocols, and hardware.
Click here to view More


Delivered Training on “Practical ICS Hacking Master Class” at x33fcon 2019 Poland


New generation malware and attacks have been targeting ICS and systems causing huge monetary and human life losses. ICS system still vulnerable in nature because it’s poorly understood. Penetration testing on ICS systems is a very niche field which requires in-depth knowledge and has a huge dependency in terms of the Hardware availability.
Click here to view More


Delivered talk on “Backdooring DVR/NVR devices ” at Defcamp Romania 2018


Embedded devices, IoT, connected devices are growing very fast as their demand increases and innovation taking place in the industry. Due to huge demand in market, they lack in security prospect. There are many ways to attack such devices especially in DVR/NVR devices. 5 to 6 years back NSA ANT catalog leaked, they used to backdoor devices and they use to intercept/get data from the system. Due to ANT catalog leakage, Hardware implant attack were introduced in public.

Click here to view More


Delivered Talk at x33fcon 2018 – “Car Hacking”


Click here to view More


Speaker at BesidesDelhi 2017 - “Exploiting Home Automation, The Esoteric Ways!


Click here to view More


ICS village speaker – Nullcon 2017, c0c0n X 2017, BsidesDelhi 2017, Defcamp 2017


New generation malware and attacks have been targeting ICS and systems causing huge monetary and human life losses. Penetration testing on ICS systems is a very niche field which requires in-depth knowledge and has a huge dependency in terms of the Hardware availability. This contest/Context will concentrate on methodologies to conduct penetration testing of commercial Hardware devices such as PLCs as well as simulators.
Link1 Link2  Link3  Link4


Speaker at Nullcon 2016 – “Hitchhiker's guide to hacking Industrial Control systems (ICS)”


Todays new gen attacks and malwares have been targeting ICS systems causing huge monetary and Human life losses. The White Security community lacks knowledge and resources to cope up these modern day attacks. This talk will concentrate on bridging this gap and enabling White Hat security community mitigates some these common attacks.

Hacking Industrial Control systems (ICS) is very niche field which is not just requires in-depth knowledge but also there is huge dependencies in terms of the Hardware. Due to this there is huge gap between security enthusiasts and accessibility to this technology. In this talk i will be releasing a TEST BED which is an emulation of an ICS system. I will also be guiding people How to begin/approach pen-testing of an ICS system.

Click here to view More