
Vulncon is India’s fastest-growing technical cybersecurity conference, focused on core research, offensive security, and practical innovation.
In an evolving threat landscape, we emphasize deep technical knowledge, real-world case studies, and meaningful industry dialogue. Our platform brings together researchers, practitioners, and security leaders to exchange insights that directly address current security challenges.
Our Vision
To advance the technical foundations of cybersecurity with a strong focus on offensive security in a rapidly changing threat environment.
Our Mission
To bridge the gap between security leaders and practitioners by fostering collaboration, knowledge sharing, and actionable research.
Vulncon is designed to strengthen the security community through substance, clarity, and technical depth.

Modern threat actors don't rely on a single persistence mechanism — they weaponize time itself.
From autorun entries and scheduled tasks to registry-based triggers, Git hooks, IoT callbacks, and logic-driven execution chains, sophisticated malware quietly spreads across heterogeneous environments and activates under carefully crafted conditions.
These artefacts surface across laptops, servers, mobile devices, embedded systems, and cloud-connected infrastructure, leaving investigators with the difficult task of reconstructing a coherent chain of infection from fragmented evidence.
This workshop explores how investigators can automatically correlate and reconstruct those events by building a lightweight forensic timeline engine in Go.
Participants will implement a lightweight, cross-platform forensic tooling pipeline capable of:
Timeline reconstruction in DFIR and how malware leverages time-based execution.
Go fundamentals, static binaries, concurrency, and filesystem handling.
Persistence artefacts, propagation techniques, and investigative indicators.
Normalizing formats, sorting events, and generating timelines.
Clock skew, timezone inconsistencies, and anti-forensic behaviour.
Reconstructing a simulated multi-device infection chain using Go tooling.
Discussion around extending the tooling, integrating it into DFIR workflows, and handling real-world investigative challenges.
Participants are encouraged to continue evolving the prototype into custom forensic pipelines tailored to their own environments.
In January 2026, Microsoft did something the security community had quietly been waiting for: it assigned CVE-2026-21520 to an indirect prompt injection in Copilot Studio. It was the first time a major vendor formally tracked a prompt injection in an agentic platform as a CVE — a watershed moment that signaled prompt injection is no longer a research curiosity but a vulnerability class your incident response team must now own.
The problem: nobody has written the IR playbook for it.
This 2-hour hands-on workshop walks security practitioners through the full lifecycle of an AI agent compromise — from the attacker's perspective and from the defender's. We exploit CVE-2026-2256 live on stage against a vulnerable MS-Agent deployment, demonstrating how attacker-controlled content in a single document can pivot through an LLM's tool-calling logic into arbitrary shell command execution as the agent's host process.
We then flip the perspective: given log data from a compromised agent, how do you reconstruct what happened? What evidence must be preserved? How do you attribute an action when the "user" is non-deterministic? When can you trust the agent again?
Drawing on BlackPerl DFIR's incident response work, we present a structured playbook covering the six gaps in current AI agent telemetry, an evidence preservation checklist for agentic incidents, and a containment workflow that does not destroy forensic state.
Attendees leave with a working understanding of the agentic attack surface, a hands-on reproduction of two real 2026 CVEs, and a practical IR framework they can adapt for their own AI deployments.
This is the talk we wish existed when our first agent compromise engagement landed on our desk.
Participants will work through a complete AI-agent compromise lifecycle including:
Framing the problem. Why January 15, 2026 was the moment AI agent security became an enterprise IR discipline. Walkthrough of CVE-2026-21520 and the architectural confused-deputy problem at the heart of the agent vulnerability class. Introduction of OWASP ASI01 (Agent Goal Hijack) and the lethal-trifecta model.
No demo in this module — this is the conceptual scaffold for the rest of the session.
Hands-on reproduction of CVE-2026-2256 against a vulnerable MS-Agent v1.5.2 deployment running in a sandboxed container. We walk the attack chain in five stages:
Attendees following along reproduce the chain in their own container.
15-minute structured break. Attendees who hit lab issues get one-on-one help. Open questions on Modules 1–2 answered.
We take the compromised lab from Module 2 and ask: now what? Walkthrough of the six telemetry gaps that block effective incident response in current agent deployments:
For each gap, we show the corresponding artifact in the compromised lab, what is captured today, and what is missing.
The constructive half of the talk. We present a structured playbook covering:
The playbook is delivered as a single-page reference card distributed to all attendees.
Five-minute close: three concrete detection engineering recommendations for SOC teams running agents in production today. Q&A continues offline at the BlackPerl table in the village area.
Participants leave with a practical understanding of the AI-agent attack surface, incident response workflows, and evidence preservation requirements for modern agentic environments.
The session concludes with actionable guidance for detection engineering, AI security operations, and enterprise readiness for autonomous systems.
Building together, growing together
VULNCON 2026 Pitch-A-Thon
Discovering the next wave of cybersecurity innovation
Partners in Strategic Security
Strengthening the Security Community
Uniting industry voices for stronger security
Choose the perfect pass for your cybersecurity journey at Vulncon 2026
All prices are exclusive of GST. Limited seats available. Book early to save more! 🚀
Enhance your Vulncon conference by adding a hands-on training by our strategic partner Byt3con Trainings. When you book them together, you unlock a heavily discounted rate on your conference ticket.
3-Day Training + Conference Pass
3-Day Training + Conference Pass
3-Day Training + Conference Pass

Sr Cybersecurity Consultant @ Thales

Associate Vice President @ Z47

Chairman, CXOCywayz

Co-Founder @ AuthenticOne

Co-Founder @ CloudSEK

Women Tech Leader

Vice President, Engineering - EASM @ Fortinet









