際際滷shows by User: Adityakamat2 / http://www.slideshare.net/images/logo.gif 際際滷shows by User: Adityakamat2 / Sun, 05 Apr 2020 06:29:09 GMT 際際滷Share feed for 際際滷shows by User: Adityakamat2 Load Balancing Algorithms - Which one to choose? /slideshow/load-balancing-algorithms-which-one-to-choose/231437956 youtube-load-balancing-200405062909
In this presentation, we discuss various load balancing algorithms, their benefits, the places where they will screw you over and which one you should be choosing for your use case.]]>

In this presentation, we discuss various load balancing algorithms, their benefits, the places where they will screw you over and which one you should be choosing for your use case.]]>
Sun, 05 Apr 2020 06:29:09 GMT /slideshow/load-balancing-algorithms-which-one-to-choose/231437956 Adityakamat2@slideshare.net(Adityakamat2) Load Balancing Algorithms - Which one to choose? Adityakamat2 In this presentation, we discuss various load balancing algorithms, their benefits, the places where they will screw you over and which one you should be choosing for your use case. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/youtube-load-balancing-200405062909-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In this presentation, we discuss various load balancing algorithms, their benefits, the places where they will screw you over and which one you should be choosing for your use case.
Load Balancing Algorithms - Which one to choose? from Aditya Kamat
]]>
382 1 https://cdn.slidesharecdn.com/ss_thumbnails/youtube-load-balancing-200405062909-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Spectre and meltdown /Adityakamat2/spectre-and-meltdown-138811529 spectreandmeltdown-190330112954
A detailed session on the basic concepts and three variants of spectre and meltdown.]]>

A detailed session on the basic concepts and three variants of spectre and meltdown.]]>
Sat, 30 Mar 2019 11:29:54 GMT /Adityakamat2/spectre-and-meltdown-138811529 Adityakamat2@slideshare.net(Adityakamat2) Spectre and meltdown Adityakamat2 A detailed session on the basic concepts and three variants of spectre and meltdown. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/spectreandmeltdown-190330112954-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A detailed session on the basic concepts and three variants of spectre and meltdown.
Spectre and meltdown from Aditya Kamat
]]>
285 1 https://cdn.slidesharecdn.com/ss_thumbnails/spectreandmeltdown-190330112954-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cryptography 101 /slideshow/cryptography-101-81897858/81897858 cryptography-101-171111143416
This is a part of python for hackers series conducted at BMSCE in collaboration with IEEE student chapter.]]>

This is a part of python for hackers series conducted at BMSCE in collaboration with IEEE student chapter.]]>
Sat, 11 Nov 2017 14:34:16 GMT /slideshow/cryptography-101-81897858/81897858 Adityakamat2@slideshare.net(Adityakamat2) Cryptography 101 Adityakamat2 This is a part of python for hackers series conducted at BMSCE in collaboration with IEEE student chapter. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cryptography-101-171111143416-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This is a part of python for hackers series conducted at BMSCE in collaboration with IEEE student chapter.
Cryptography 101 from Aditya Kamat
]]>
449 2 https://cdn.slidesharecdn.com/ss_thumbnails/cryptography-101-171111143416-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Web Hacking Series Part 5 /slideshow/web-hacking-series-part-5/75495921 webhackingpart-5-170428092324
I try to cover CSRF,IDOR and file upload vulnerabilities along with their prevention techniques in this presrentation]]>

I try to cover CSRF,IDOR and file upload vulnerabilities along with their prevention techniques in this presrentation]]>
Fri, 28 Apr 2017 09:23:24 GMT /slideshow/web-hacking-series-part-5/75495921 Adityakamat2@slideshare.net(Adityakamat2) Web Hacking Series Part 5 Adityakamat2 I try to cover CSRF,IDOR and file upload vulnerabilities along with their prevention techniques in this presrentation <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/webhackingpart-5-170428092324-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> I try to cover CSRF,IDOR and file upload vulnerabilities along with their prevention techniques in this presrentation
Web Hacking Series Part 5 from Aditya Kamat
]]>
216 3 https://cdn.slidesharecdn.com/ss_thumbnails/webhackingpart-5-170428092324-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Web Hacking Series Part 4 /slideshow/web-hacking-series-part-4/73047807 webhackingpart-4-170311142407
XSS has been covered with various example payloads. Thanks to pentester labs for the exercises. ]]>

XSS has been covered with various example payloads. Thanks to pentester labs for the exercises. ]]>
Sat, 11 Mar 2017 14:24:07 GMT /slideshow/web-hacking-series-part-4/73047807 Adityakamat2@slideshare.net(Adityakamat2) Web Hacking Series Part 4 Adityakamat2 XSS has been covered with various example payloads. Thanks to pentester labs for the exercises. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/webhackingpart-4-170311142407-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> XSS has been covered with various example payloads. Thanks to pentester labs for the exercises.
Web Hacking Series Part 4 from Aditya Kamat
]]>
279 3 https://cdn.slidesharecdn.com/ss_thumbnails/webhackingpart-4-170311142407-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Web hacking series part 3 /slideshow/web-hacking-series-part-3/72048585 webhackingpart-3-170212061121
Sql injection explained in detail]]>

Sql injection explained in detail]]>
Sun, 12 Feb 2017 06:11:21 GMT /slideshow/web-hacking-series-part-3/72048585 Adityakamat2@slideshare.net(Adityakamat2) Web hacking series part 3 Adityakamat2 Sql injection explained in detail <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/webhackingpart-3-170212061121-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Sql injection explained in detail
Web hacking series part 3 from Aditya Kamat
]]>
324 4 https://cdn.slidesharecdn.com/ss_thumbnails/webhackingpart-3-170212061121-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Web Hacking series part 2 /Adityakamat2/web-hacking-series-part-2 webhackingpart-2-161112174144
Four major attacks are covered here: -Bypass Authentication Via Authentication Token Manipulation. -Session hijacking. -Brute forcing login pages using burp. -HTTP parameter pollution.]]>

Four major attacks are covered here: -Bypass Authentication Via Authentication Token Manipulation. -Session hijacking. -Brute forcing login pages using burp. -HTTP parameter pollution.]]>
Sat, 12 Nov 2016 17:41:44 GMT /Adityakamat2/web-hacking-series-part-2 Adityakamat2@slideshare.net(Adityakamat2) Web Hacking series part 2 Adityakamat2 Four major attacks are covered here: -Bypass Authentication Via Authentication Token Manipulation. -Session hijacking. -Brute forcing login pages using burp. -HTTP parameter pollution. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/webhackingpart-2-161112174144-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Four major attacks are covered here: -Bypass Authentication Via Authentication Token Manipulation. -Session hijacking. -Brute forcing login pages using burp. -HTTP parameter pollution.
Web Hacking series part 2 from Aditya Kamat
]]>
401 3 https://cdn.slidesharecdn.com/ss_thumbnails/webhackingpart-2-161112174144-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Web Hacking Series Part 1 /slideshow/web-hacking-series-part-1/66645940 webhackingpart-1-161002165937
This is the first part of the web hacking series. It covers some basics and three topics: ~HTMLI ~SQLI to bypass user authentication ~Buffer overflow I used mutillidae for the demo]]>

This is the first part of the web hacking series. It covers some basics and three topics: ~HTMLI ~SQLI to bypass user authentication ~Buffer overflow I used mutillidae for the demo]]>
Sun, 02 Oct 2016 16:59:37 GMT /slideshow/web-hacking-series-part-1/66645940 Adityakamat2@slideshare.net(Adityakamat2) Web Hacking Series Part 1 Adityakamat2 This is the first part of the web hacking series. It covers some basics and three topics: ~HTMLI ~SQLI to bypass user authentication ~Buffer overflow I used mutillidae for the demo <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/webhackingpart-1-161002165937-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This is the first part of the web hacking series. It covers some basics and three topics: ~HTMLI ~SQLI to bypass user authentication ~Buffer overflow I used mutillidae for the demo
Web Hacking Series Part 1 from Aditya Kamat
]]>
452 4 https://cdn.slidesharecdn.com/ss_thumbnails/webhackingpart-1-161002165937-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Web Hacking Intro /slideshow/web-hacking-intro/66645893 webhackingintro-161002165725
Introduction to web hacking series]]>

Introduction to web hacking series]]>
Sun, 02 Oct 2016 16:57:25 GMT /slideshow/web-hacking-intro/66645893 Adityakamat2@slideshare.net(Adityakamat2) Web Hacking Intro Adityakamat2 Introduction to web hacking series <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/webhackingintro-161002165725-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Introduction to web hacking series
Web Hacking Intro from Aditya Kamat
]]>
369 3 https://cdn.slidesharecdn.com/ss_thumbnails/webhackingintro-161002165725-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Exploiting a vulnerability to gain a shell /slideshow/exploiting-a-vulnerability-to-gain-a-shell/64942491 exploitingavulnerabilitytogainashell-160812143336
Exploiting axis2 and apache tomcat to get a shell with basic privileges.]]>

Exploiting axis2 and apache tomcat to get a shell with basic privileges.]]>
Fri, 12 Aug 2016 14:33:36 GMT /slideshow/exploiting-a-vulnerability-to-gain-a-shell/64942491 Adityakamat2@slideshare.net(Adityakamat2) Exploiting a vulnerability to gain a shell Adityakamat2 Exploiting axis2 and apache tomcat to get a shell with basic privileges. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/exploitingavulnerabilitytogainashell-160812143336-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Exploiting axis2 and apache tomcat to get a shell with basic privileges.
Exploiting a vulnerability to gain a shell from Aditya Kamat
]]>
595 6 https://cdn.slidesharecdn.com/ss_thumbnails/exploitingavulnerabilitytogainashell-160812143336-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://public.slidesharecdn.com/v2/images/profile-picture.png https://cdn.slidesharecdn.com/ss_thumbnails/youtube-load-balancing-200405062909-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/load-balancing-algorithms-which-one-to-choose/231437956 Load Balancing Algorit... https://cdn.slidesharecdn.com/ss_thumbnails/spectreandmeltdown-190330112954-thumbnail.jpg?width=320&height=320&fit=bounds Adityakamat2/spectre-and-meltdown-138811529 Spectre and meltdown https://cdn.slidesharecdn.com/ss_thumbnails/cryptography-101-171111143416-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/cryptography-101-81897858/81897858 Cryptography 101