Grand Hyatt, Kochi, Kerala
Trainings
07-09 Oct, 2025
Conference
10-11 Oct, 2025
support@c0c0n.org
|
(+91)-974-690-6654
Home
Speakers
Speakers - ALL
Speakers - Conference
Speakers - Training
Speakers - LEA
Speakers - CSEA
Speakers - Village
Speakers - Workshop
Schedule
Agenda
7 to 11, Oct 2025
Tabbed Layout
10
th
Oct 2025
Timeline Layout
11
th
Oct 2025
Timeline Layout
Trainings
Windows Kernel Exploitation Foundation & Advanced Training
Multi-Cloud (AWS, Azure & GCP) Security [2025 Edition]
Offensive OSINT
Android Security Primer
Automotive Security: A Hands-On Approach
Mastering Telecom Security: A Hands-on Guide to RAN & Core Network Protection
Hands-on in SIGINT, ELINT, COMINT and Electronic Warfare
StealthOps: Red Team Operations 2025 Edition
HackTheWeb: Pentesting Beyond Basics
Secure Code Audit Exclusive Edition
Hacking Android, iOS and IoT apps by Example
Breaking Smart Kiosks with Windows 11 OS Hardening
Offensive Tradecraft
Villages
Radio Controlled (RC) Engineering Village
Radio Village
AI Village
Telecom Village
Adversary Village
IoT Security Village
Lock Picking Village
Phishing Village
CTF
Dome CTF
c0c0n CTF
LEA CTF
CSEA
VIDTF Training
Hackathon | HacKP
CSEA Track
LEA Track
2 Day Training
LEA Track
LEA CTF
Call For Papers LEA
Exhibition
More...
Giveaway - WINBIG
Students Scholarship
Venue
Speakers
Speakers - ALL
Speakers - Conference
Speakers - Training
Speakers - LEA
Speakers - CSEA
Speakers - Village
Speakers - Workshop
Call For
CFP LEA
Call For Papers Technical Track
CFP Review Board
Call For Villages
Become a Sponsor
Team
Sponsors
Exhibitors
Archives
c0c0n @17 (2024)
c0c0n @16 (2023)
c0c0n 2022
c0c0n 2021
c0c0n 2020
c0c0n XII
c0c0n XI
c0c0n X
c0c0n 2016
c0c0n 2015
c0c0n 2014
c0c0n 2013
c0c0n 2012
c0c0n 2011
c0c0n 2010
c0c0n 2009
Register Now
Contact
Home
Speakers
Speakers - ALL
Speakers - Conference
Speakers - Training
Speakers - LEA
Speakers - CSEA
Speakers - Village
Speakers - Workshop
Schedule
Agenda
7 to 11, Oct 2025
Tabbed Layout
10
th
Oct 2025
Timeline Layout
11
th
Oct 2025
Timeline Layout
Trainings
Windows Kernel Exploitation Foundation & Advanced Training
Multi-Cloud (AWS, Azure & GCP) Security [2025 Edition]
Offensive OSINT
Android Security Primer
Automotive Security: A Hands-On Approach
Mastering Telecom Security: A Hands-on Guide to RAN & Core Network Protection
Hands-on in SIGINT, ELINT, COMINT and Electronic Warfare
StealthOps: Red Team Operations 2025 Edition
HackTheWeb: Pentesting Beyond Basics
Secure Code Audit Exclusive Edition
Hacking Android, iOS and IoT apps by Example
Breaking Smart Kiosks with Windows 11 OS Hardening
Offensive Tradecraft
Villages
Radio Controlled (RC) Engineering Village
Radio Village
AI Village
Telecom Village
Adversary Village
IoT Security Village
Lock Picking Village
Phishing Village
CTF
Dome CTF
c0c0n CTF
LEA CTF
CSEA
VIDTF Training
Hackathon | HacKP
CSEA Track
LEA Track
2 Day Training
LEA Track
LEA CTF
Call For Papers LEA
Exhibition
More...
Giveaway - WINBIG
Students Scholarship
Venue
Speakers
Speakers - ALL
Speakers - Conference
Speakers - Training
Speakers - LEA
Speakers - CSEA
Speakers - Village
Speakers - Workshop
Call For
CFP LEA
Call For Papers Technical Track
CFP Review Board
Call For Villages
Become a Sponsor
Team
Sponsors
Exhibitors
Archives
c0c0n @17 (2024)
c0c0n @16 (2023)
c0c0n 2022
c0c0n 2021
c0c0n 2020
c0c0n XII
c0c0n XI
c0c0n X
c0c0n 2016
c0c0n 2015
c0c0n 2014
c0c0n 2013
c0c0n 2012
c0c0n 2011
c0c0n 2010
c0c0n 2009
Register Now
Contact
Register Online
Agenda
Home
Schedule - Conference Day 1
Schedule
10-October-2025
08:30
09:00
09:30
10:00
10:30
11:00
11:30
12:00
12:30
13:00
13:30
14:00
14:30
15:00
15:30
16:00
16:30
17:00
17:30
18:00
TRACK 1
Management, GRC, Policy, Strategy, Legal
Registration
Opening Ceremony & KEYNOTE
Tea/Coffee Break
Passive Radar Using Low Earth Orbit Satellites - Exploiting StarLink as Illumination for Target detection, classification and tracking
The Future of Identity, Access, and Zero Trust Architecture
PANEL
TBA
Networking Lunch
TBA
Cockpits, Code & Compromise: Threat Vectors in Modern Aviation Systems
PANEL
Tea / Coffee Break
Sustainable Cybersecurity: (Environmental, Social, and Governance) ESG Meets Infosec
PANEL
Weaponized Intelligence: When AI Goes on the Cyber Offense
TRACK 2
Technology | Innovation | Research
Registration
Tea/Coffee Break
Breaking into Azure AD via Device Code Phsihing and PRT
12 Digits Sailing on the Fragile Foundation
The Allure of Go's Cross-Platform Capability: A Gateway for Threat Actors to Mac and Linux
KubeShadow (Advanced Offensive Kubernetes Red-Team Framework)
Networking Lunch
Breaching Windows Server 2025 Datacenter Edition: Kung Fu Scripting Techniques to Bypass Critical Security Layers
A Practical Guide to Red Teaming in Mac Environments
Tea / Coffee Break
Cloud of the Living Dead: A Strategic Armory to Disrupt Non-Human Identities
Whose Passkey is This, Anyway - Stealing Passkeys made Possible
Pre-installation attacks on web installers
TRACK AI
Artificial Intelligence (AI)
Registration
Tea/Coffee Break
Red Teaming the LLM Stack: Lessons from Models Under Hallucination
The Agent Had a Plan—So Did I: Top Attacks on OWASP Agentic AI Systems
Kill Chain, Meet Skill Chain: Human + Agentic AI in Modern Cyber Defense
Networking Lunch
Ghosts in Your GitHub Actions and AI's Hunt for Hidden Exploits
Hijacking AI Agents: Attacks, Abuses, and How to Fight Back
Tea / Coffee Break
AI-Driven Cyber-Resilient SCADA Mesh in Open RAN-Enabled Smart Infrastructure
Generative Adversarial Networks for Enhanced Malware Detection
Agents under the Siege: Threat Modeling the Next Generation AI
TRACK LEA
Law Enforcement Agencies
Registration
Tea/Coffee Break
TBA
TBA
TBA
Pre-emptive Identification of Unsuspecting Cybercrime Victims: Case Studies and an Automated Tool for Law Enforcement
Networking Lunch
Decoding Telecom Frauds: Uncovering the Root cause
The silent threat of IMSI-catchers in the age of 5G
Tea / Coffee Break
Tracking network infrastructure behind industrial-scale scams
Bridging OSINT and Digital Forensics to Produce Legally Defensible Admissible Digital Evidence
The Forgery Files: Exposing Shadows Behind Counterfeit Cash and IDs
Piercing the Veil: Investigative Techniques for VPN & Tor Anonymity (40 min)
TRACK Workshop
Workshop
Registration
Tea/Coffee Break
Hacking the Heart of Healthcare: Real-World Lessons in Medical Device Cybersecurity (Session 1)
Networking Lunch
Practical Exploitation of Wireless Protocols: Attacking Zigbee Networks with USB-based RF transceivers and Bluetooth LE in IoT Ecosystems - Session 1
Tea / Coffee Break
Practical Exploitation of Wireless Protocols: Attacking Zigbee Networks with USB-based RF transceivers and Bluetooth LE in IoT Ecosystems - Session 2
TRACK CSEA
Child Sexual Exploitation and Abuse
Close