Event Timeline
Start | End | Imperia stand | Imperia hall 1 | Imperia hall 2 | Powerhouse 2 & Powerhouse 3 |
---|---|---|---|---|---|
7:00 | 9:00 | Registration / Breakfast | |||
8:45 | 9:00 | Opening Note | Job Fair Interviews | ||
9:00 | 9:45 | Keynote 1 (Heath Adams) | |||
9:45 | 10:30 | Keynote 2 (Yassine Aboukir) | |||
10:30 | 10:45 | The Dark Side of DeFi by Rudra Singh And Arbaz Hussain | Playing with Fake emails for fun and profit By Sayaan Alam | Drone Hacking Village (Exploitation Every 30 MIN) | |
10:45 | 11:00 | Exploiting BurpSuite Upstream Proxy By Armaan Pathan | |||
11:00 | 11:15 | PHP EAR To SQLi By Kuldeep Pandya | |||
11:15 | 11:30 | Securing Layer 8 by Hudney Piquant & Charlie Waterhouse | Race condition to Crypto Token Drainage by Keyur Talati | ||
11:30 | 11:45 | Masquerading malicious campaign By Ahmad Ashraff Ahmad | |||
11:45 | 12:00 | Tale of Chaining Bugs for Account Takeovers By Harsh Bothra | |||
12:00 | 12:15 | How to write your First Nuclei Template By Dhiyaneshwaran B. | Finding P1(s) at will by Satyam Gothi | ||
12:15 | 12:30 | Bypass limits in whole web via python selenium By Kartikey Aggarwal | |||
12:30 | 12:45 | ||||
12:45 | 14:00 | Lunch/Networking Break | |||
14:00 | 14:45 | Bug Bounty On Steroids By Hussein Daher | Breaking into Information Security [Panel] | Drone Hacking Village (Exploitation Every 30 MIN) | Job Fair Interviews |
14:45 | 15:30 | Pwning Android Apps at Scale By Sparsh Kulshrestha & Shashank Barthwal | How to communicate security in Layman words to Boards & Non-Technical Stakeholders [Panel] | ||
15:30 | 16:00 | Coffee Break | |||
16:00 | 16:45 | Smart contract security By Shashank | How to Get Started in Bug Bounties [Panel] | Drone Hacking Village (Exploitation Every 30 MIN) | Job Fair Interviews |
16:45 | 17:00 | Closing Note By Eugene | |||
17:00 | 17:30 | ||||
17:30 | 18:00 | Closing Remarks & Giveaway Winners | |||
19:30 Onwards | After Party (DoubleTree by Hilton Ahmedabad) |