Threat Hunting Village

An immersive experience in threat hunting—where defenders sharpen their skills, learn advanced techniques, and collaborate with experts in the field. Whether you're a SOC analyst, blue teamer, or aspiring threat hunter, this village is your battleground to hunt down threats in real-world attack scenarios.

Amazing CTF War!

  • 00Days
  • 00Hours
  • 00Minutes
  • 00Seconds

At Threat Hunting Village

Interactive Learning

At SeaSides 2025, we believe cybersecurity is best learned through experience. Our interactive sessions feature hands-on labs, real-world attack simulations, and collaborative problem-solving—offering something for both beginners and experts!

Beginner to Advanced Content

At SeaSides 2025, we believe cybersecurity is best learned through hands-on experience. Our interactive sessions include labs, real-world attack simulations, and collaborative problem-solving, ensuring an engaging learning experience for both beginners and experts.

CTF

Test your skills in a series of real-world security scenarios, where you'll solve puzzles, exploit vulnerabilities, and capture flags to earn points. Whether you're a newcomer or a seasoned pro, our CTF events offer the perfect opportunity to sharpen your skills, collaborate with others, and compete for glory!

Career Guidance

We’re here to help you grow your career! Join our career guidance sessions, where industry professionals will share insights on building a successful career in cybersecurity.

Great Insights

You’ll gain valuable insights from some of the brightest minds in cybersecurity. Our speakers will share cutting-edge research, real-world experiences, and emerging trends in the field.

Growth

SeaSides 2025 is the perfect place to expand your professional network! Connect with industry experts, fellow enthusiasts, and cybersecurity professionals from all over the world.

Event Schedules

Decoding Threat Actors: Command & Control Servers in Action and Motives in Multi-Stage Attacks
  • 10:00 - 11:15
  • Chetan Kawley
  • ICG, Goa

Decoding Threat Actors: Command & Control Servers in Action and Motives in Multi-Stage Attacks

In this session, we’ll break down how Command & Control (C2) servers function in cyberattacks, their role in orchestrating multi-stage campaigns, and the motives behind them. Learn to identify and respond to advanced persistent threats (APTs) as we explore how attackers execute their strategies, from initial breach to final payload delivery.

Proactive Threat Hunting: Leveraging Logs to Detect Advanced Threats
  • 11:15 - 12:30
  • Kushlendra Singh
  • ICG, Goa

Proactive Threat Hunting: Leveraging Logs to Detect Advanced Threats

This session will provide key insights on attacker tactics using the MITRE ATT&CK framework, effective log correlation and parsing methods, and best practices for leveraging SIEM, EDR, and cloud security tools to detect and respond to advanced threats. Gain practical knowledge to stay ahead in the threat hunting game!

  • 12:30 - 01:30

Lunch Break

Introduction to AMSI: Understanding the fundamentals of the Antimalware Scan Interface.
  • 01:30 - 02:45
  • Shreedhar Vantamure and Aryan Bhujbal
  • ICG, Goa

Introduction to AMSI: Understanding the fundamentals of the Antimalware Scan Interface.

This session will introduce the Antimalware Scan Interface (AMSI), a key security feature that helps detect and block malicious scripts. Learn how AMSI integrates with Windows Defender and antivirus software to provide real-time threat detection, particularly for PowerShell and other scripting environments, strengthening defenses against evolving malware attacks.

Ransomware Attack Lifecycle from the Dark Web Perspective
  • 02:45 - 04:00
  • Shubham Chaudhary
  • ICG, Goa

Ransomware Attack Lifecycle from the Dark Web Perspective

This session will take you through the ransomware attack lifecycle from the Dark Web perspective. Explore how attackers plan and execute ransomware campaigns, from initial access and data exfiltration to the ransom demand and payment. Learn about the tools and services sold on the Dark Web that facilitate these attacks, and how threat actors collaborate to maximize their impact. Gain insights into how to detect, prevent, and respond to these attacks using a holistic defense strategy.

Blueprint for Malware Defense: Leveraging Behavioral Analysis & Rule-Based Mitigation in XDR
  • 10:00 - 11:15
  • Devendra Sinha and Sandhra Bino
  • ICG, Goa

Blueprint for Malware Defense: Leveraging Behavioral Analysis & Rule-Based Mitigation in XDR

In this session, we’ll dive into the blueprint for malware defense using Extended Detection and Response (XDR). Learn how to leverage behavioral analysis to identify suspicious activities and rule-based mitigation to automate responses. Discover how XDR integrates multiple security layers, providing advanced threat detection and response capabilities across endpoints, networks, and servers. This session will equip you with practical techniques to enhance your malware defense strategy and strengthen overall security posture.

Simulate credential dumping via Mimikatz
  • 11:15 - 12:30
  • Tanish Saxena and Vinay Sinha
  • ICG, Goa

Simulate credential dumping via Mimikatz

In this session, we’ll walk through the process of credential dumping using Mimikatz, a powerful tool used for extracting credentials from Windows systems. Learn how attackers exploit system memory to retrieve cleartext passwords and NTLM hashes. We will demonstrate how Mimikatz interacts with the system's memory and what tools and techniques are used to detect and defend against credential dumping. This session will provide you with practical insights on how to protect systems from credential theft and bolster your security defenses.

  • 12:30 - 01:30

Break

Unleashing UAC Bypass: Tactics, Mitigation, and Detection Mastery
  • 01:30 - 02:45
  • Jalaj Bhaskar and Sandeep Biswal
  • ICG, Goa

Unleashing UAC Bypass: Tactics, Mitigation, and Detection Mastery

In this session, we’ll walk through the process of credential dumping using Mimikatz, a powerful tool used for extracting credentials from Windows systems. Learn how attackers exploit system memory to retrieve cleartext passwords and NTLM hashes. We will demonstrate how Mimikatz interacts with the system's memory and what tools and techniques are used to detect and defend against credential dumping. This session will provide you with practical insights on how to protect systems from credential theft and bolster your security defenses.

Career Guidance
  • 02:45 - 04:00
  • Steering Commitee
  • ICG, Goa

Career Guidance

Join our career guidance sessions where industry professionals share valuable insights on how to build a successful career in cybersecurity. Whether you’re looking for resume tips, interview strategies, or advice on career paths, we’ve got you covered. You’ll also have the opportunity to network with recruiters and mentors, helping you take the next step in your cybersecurity journey!

Our Team

Chetan Kawley

Chetan Kawley

Team Lead
Lakshay Dubey

Lakshay Dubey

Core Team Member
Sandhra Bino

Sandhra Bino

Core Team Member
Devendra Sinha

Devendra Sinha

Core Team Member
Kushlendra Singh

Kushlendra Singh

Team Member
Shubham Chaudhary

Shubham Chaudhary

Team Member
Jalaj Bhaskar

Jalaj Bhaskar

Team Member
Shreedhar Vantamure

Shreedhar Vantamure

Team Member
Aryan Bhujbal

Aryan Bhujbal

Team Member
Sandeep Biswal

Sandeep Biswal

Team Member
Vinay Sinha

Vinay Sinha

Team Member
Tanish Saxena

Tanish Saxena

Team Member

GET EXPERIENCE

Event Speakers

The SeaSides 2025 speaker lineup features a diverse group of industry experts, seasoned professionals, and cybersecurity researchers who will share their knowledge and insights. Covering a wide range of topics—from threat hunting methodologies to real-world incident response cases—these sessions are designed to equip attendees with practical skills and a deeper understanding of emerging cyber threats.

With a mix of technical deep dives, hands-on demonstrations, and strategic discussions, our speakers will provide valuable perspectives that cater to both beginners and experienced professionals. Expect engaging talks, cutting-edge research, and interactive Q&A sessions that will challenge conventional security approaches.

Stay tuned for the full schedule and session details!