Registration + Tea/Coffee
Introduction to THREAT CON
Exploring Application Logic: Uncovering Unusual Vulnerabilities by Nikhil Shrivastava
Diving Into The Realm Of Source Code Review by Ananda Dhakal
Networking Break
Empowering Security: Unveiling Company Triggers From The Customer Side Of Bug Bounty Program by Gaurav Bhosale & Vedant Jain
Business Logic Issues : The Unexplored Dark Areas With Plethora Of Bugs by Prateek Thakare & Saddam Hussain
Lunch Break
Breaking The IOS Security Testing Barrier: How We Did It & How You Can Too by Akshay Jain & Bharath Kumar
Tea/Coffee Break