際際滷shows by User: MihirShah247 / http://www.slideshare.net/images/logo.gif 際際滷shows by User: MihirShah247 / Thu, 05 Mar 2020 11:20:12 GMT 際際滷Share feed for 際際滷shows by User: MihirShah247 Windows custom shellcoding /slideshow/windows-custom-shellcoding/229735413 windowscustomshellcoding-200305112013
This was the slide representation for my training session at OWASP Seasides 2020. This entails all the workflow for the session, but please understand that this is not a lab manual and won't entail the details on Step-by-step execution of the attack. You can find my youtube video pertaining to this session here https://www.youtube.com/watch?v=ZhZAKWpykTo ]]>

This was the slide representation for my training session at OWASP Seasides 2020. This entails all the workflow for the session, but please understand that this is not a lab manual and won't entail the details on Step-by-step execution of the attack. You can find my youtube video pertaining to this session here https://www.youtube.com/watch?v=ZhZAKWpykTo ]]>
Thu, 05 Mar 2020 11:20:12 GMT /slideshow/windows-custom-shellcoding/229735413 MihirShah247@slideshare.net(MihirShah247) Windows custom shellcoding MihirShah247 This was the slide representation for my training session at OWASP Seasides 2020. This entails all the workflow for the session, but please understand that this is not a lab manual and won't entail the details on Step-by-step execution of the attack. You can find my youtube video pertaining to this session here https://www.youtube.com/watch?v=ZhZAKWpykTo <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/windowscustomshellcoding-200305112013-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This was the slide representation for my training session at OWASP Seasides 2020. This entails all the workflow for the session, but please understand that this is not a lab manual and won&#39;t entail the details on Step-by-step execution of the attack. You can find my youtube video pertaining to this session here https://www.youtube.com/watch?v=ZhZAKWpykTo
Windows custom shellcoding from Mihir Shah
]]>
201 0 https://cdn.slidesharecdn.com/ss_thumbnails/windowscustomshellcoding-200305112013-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Seh based attack /slideshow/seh-based-attack/162226204 sehbasedattack-190808062240
This presentation deals with different scenarios in attacking applications vulnerable to Buffer overflow by exploiting the default SEH chain, by the SEH overwrite ]]>

This presentation deals with different scenarios in attacking applications vulnerable to Buffer overflow by exploiting the default SEH chain, by the SEH overwrite ]]>
Thu, 08 Aug 2019 06:22:40 GMT /slideshow/seh-based-attack/162226204 MihirShah247@slideshare.net(MihirShah247) Seh based attack MihirShah247 This presentation deals with different scenarios in attacking applications vulnerable to Buffer overflow by exploiting the default SEH chain, by the SEH overwrite <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/sehbasedattack-190808062240-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This presentation deals with different scenarios in attacking applications vulnerable to Buffer overflow by exploiting the default SEH chain, by the SEH overwrite
Seh based attack from Mihir Shah
]]>
543 2 https://cdn.slidesharecdn.com/ss_thumbnails/sehbasedattack-190808062240-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Kubernetes /MihirShah247/kubernetes-156545379 kubernetes-190720013647
This is the most basic presentation introducing to the concepts of kubernetes this presentation only solves the mundane purpose as a visual aid to the session]]>

This is the most basic presentation introducing to the concepts of kubernetes this presentation only solves the mundane purpose as a visual aid to the session]]>
Sat, 20 Jul 2019 01:36:47 GMT /MihirShah247/kubernetes-156545379 MihirShah247@slideshare.net(MihirShah247) Kubernetes MihirShah247 This is the most basic presentation introducing to the concepts of kubernetes this presentation only solves the mundane purpose as a visual aid to the session <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/kubernetes-190720013647-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This is the most basic presentation introducing to the concepts of kubernetes this presentation only solves the mundane purpose as a visual aid to the session
Kubernetes from Mihir Shah
]]>
225 2 https://cdn.slidesharecdn.com/ss_thumbnails/kubernetes-190720013647-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Post exploitation using powershell /slideshow/post-exploitation-using-powershell/155273158 postexploitationusingpowershell-190713015614
This encompasses different techniques employed by leveraging powershell and attacking the systems in different ways. It is an interesting agglomeration of combined methods in plundering a windows box]]>

This encompasses different techniques employed by leveraging powershell and attacking the systems in different ways. It is an interesting agglomeration of combined methods in plundering a windows box]]>
Sat, 13 Jul 2019 01:56:14 GMT /slideshow/post-exploitation-using-powershell/155273158 MihirShah247@slideshare.net(MihirShah247) Post exploitation using powershell MihirShah247 This encompasses different techniques employed by leveraging powershell and attacking the systems in different ways. It is an interesting agglomeration of combined methods in plundering a windows box <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/postexploitationusingpowershell-190713015614-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This encompasses different techniques employed by leveraging powershell and attacking the systems in different ways. It is an interesting agglomeration of combined methods in plundering a windows box
Post exploitation using powershell from Mihir Shah
]]>
256 1 https://cdn.slidesharecdn.com/ss_thumbnails/postexploitationusingpowershell-190713015614-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Securing docker containers /slideshow/securing-docker-containers-155253651/155253651 securingdockercontainers-190712214408
This along with the binaries to be found at my github profiles @ github.com/shahenshah99 is used to present and conduct a hands-on session on securely deploying containers in docker at the time of production]]>

This along with the binaries to be found at my github profiles @ github.com/shahenshah99 is used to present and conduct a hands-on session on securely deploying containers in docker at the time of production]]>
Fri, 12 Jul 2019 21:44:08 GMT /slideshow/securing-docker-containers-155253651/155253651 MihirShah247@slideshare.net(MihirShah247) Securing docker containers MihirShah247 This along with the binaries to be found at my github profiles @ github.com/shahenshah99 is used to present and conduct a hands-on session on securely deploying containers in docker at the time of production <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/securingdockercontainers-190712214408-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This along with the binaries to be found at my github profiles @ github.com/shahenshah99 is used to present and conduct a hands-on session on securely deploying containers in docker at the time of production
Securing docker containers from Mihir Shah
]]>
317 0 https://cdn.slidesharecdn.com/ss_thumbnails/securingdockercontainers-190712214408-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Buffer overflow /slideshow/buffer-overflow-141182101/141182101 bufferoverflow-190418135711
This is in regards with the session that I have been holding at Null Bangalore. This session aims at providing basic understanding of Buffer Overflow to the attendees preparing for OSCP]]>

This is in regards with the session that I have been holding at Null Bangalore. This session aims at providing basic understanding of Buffer Overflow to the attendees preparing for OSCP]]>
Thu, 18 Apr 2019 13:57:11 GMT /slideshow/buffer-overflow-141182101/141182101 MihirShah247@slideshare.net(MihirShah247) Buffer overflow MihirShah247 This is in regards with the session that I have been holding at Null Bangalore. This session aims at providing basic understanding of Buffer Overflow to the attendees preparing for OSCP <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/bufferoverflow-190418135711-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This is in regards with the session that I have been holding at Null Bangalore. This session aims at providing basic understanding of Buffer Overflow to the attendees preparing for OSCP
Buffer overflow from Mihir Shah
]]>
330 4 https://cdn.slidesharecdn.com/ss_thumbnails/bufferoverflow-190418135711-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cracking the crypto /slideshow/cracking-the-crypto/136621338 crackingthecrypto-190315192453
This presentation is in regards with the talk that I gave at null monthly meet. This covers various grounds for covering cryptography. There are numerous ways to attack the methodology of any cryptographic content. The uploaded slides serve the same ]]>

This presentation is in regards with the talk that I gave at null monthly meet. This covers various grounds for covering cryptography. There are numerous ways to attack the methodology of any cryptographic content. The uploaded slides serve the same ]]>
Fri, 15 Mar 2019 19:24:53 GMT /slideshow/cracking-the-crypto/136621338 MihirShah247@slideshare.net(MihirShah247) Cracking the crypto MihirShah247 This presentation is in regards with the talk that I gave at null monthly meet. This covers various grounds for covering cryptography. There are numerous ways to attack the methodology of any cryptographic content. The uploaded slides serve the same <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/crackingthecrypto-190315192453-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This presentation is in regards with the talk that I gave at null monthly meet. This covers various grounds for covering cryptography. There are numerous ways to attack the methodology of any cryptographic content. The uploaded slides serve the same
Cracking the crypto from Mihir Shah
]]>
336 6 https://cdn.slidesharecdn.com/ss_thumbnails/crackingthecrypto-190315192453-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Stego.ppt /slideshow/stegoppt/129894981 stego-190130200637
This Presentation was for my talk at Null on Steganography using Python. This only serves as a on screen ppt to the talk. In order to understand this in-detail please follow my page to find the code]]>

This Presentation was for my talk at Null on Steganography using Python. This only serves as a on screen ppt to the talk. In order to understand this in-detail please follow my page to find the code]]>
Wed, 30 Jan 2019 20:06:37 GMT /slideshow/stegoppt/129894981 MihirShah247@slideshare.net(MihirShah247) Stego.ppt MihirShah247 This Presentation was for my talk at Null on Steganography using Python. This only serves as a on screen ppt to the talk. In order to understand this in-detail please follow my page to find the code <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/stego-190130200637-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This Presentation was for my talk at Null on Steganography using Python. This only serves as a on screen ppt to the talk. In order to understand this in-detail please follow my page to find the code
Stego.ppt from Mihir Shah
]]>
231 1 https://cdn.slidesharecdn.com/ss_thumbnails/stego-190130200637-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Wi fi pentesting /slideshow/wi-fi-pentesting/129894148 wifipentesting-190130200118
This was my very first talk at OWASP/Null On Wi-Fi pentesting. The 際際滷 check to which has been uploaded here]]>

This was my very first talk at OWASP/Null On Wi-Fi pentesting. The 際際滷 check to which has been uploaded here]]>
Wed, 30 Jan 2019 20:01:18 GMT /slideshow/wi-fi-pentesting/129894148 MihirShah247@slideshare.net(MihirShah247) Wi fi pentesting MihirShah247 This was my very first talk at OWASP/Null On Wi-Fi pentesting. The 際際滷 check to which has been uploaded here <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/wifipentesting-190130200118-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This was my very first talk at OWASP/Null On Wi-Fi pentesting. The 際際滷 check to which has been uploaded here
Wi fi pentesting from Mihir Shah
]]>
133 1 https://cdn.slidesharecdn.com/ss_thumbnails/wifipentesting-190130200118-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Reversing with gdb /slideshow/reversing-with-gdb/128413707 reversingwithgdb-190118174431
This is the slide check that I prepared for Null Pulliya session. I had prepared this presentation with the usage and the depth of coverage of GDB for any typical reverse engineer to have in his/her arsenal]]>

This is the slide check that I prepared for Null Pulliya session. I had prepared this presentation with the usage and the depth of coverage of GDB for any typical reverse engineer to have in his/her arsenal]]>
Fri, 18 Jan 2019 17:44:31 GMT /slideshow/reversing-with-gdb/128413707 MihirShah247@slideshare.net(MihirShah247) Reversing with gdb MihirShah247 This is the slide check that I prepared for Null Pulliya session. I had prepared this presentation with the usage and the depth of coverage of GDB for any typical reverse engineer to have in his/her arsenal <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/reversingwithgdb-190118174431-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This is the slide check that I prepared for Null Pulliya session. I had prepared this presentation with the usage and the depth of coverage of GDB for any typical reverse engineer to have in his/her arsenal
Reversing with gdb from Mihir Shah
]]>
333 1 https://cdn.slidesharecdn.com/ss_thumbnails/reversingwithgdb-190118174431-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
ROP /slideshow/rop-123230720/123230720 rop-181116214735
This presentation goes through different techniques for exploiting and mitigating various buffer overflow vulnerabilities found in programs]]>

This presentation goes through different techniques for exploiting and mitigating various buffer overflow vulnerabilities found in programs]]>
Fri, 16 Nov 2018 21:47:35 GMT /slideshow/rop-123230720/123230720 MihirShah247@slideshare.net(MihirShah247) ROP MihirShah247 This presentation goes through different techniques for exploiting and mitigating various buffer overflow vulnerabilities found in programs <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/rop-181116214735-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This presentation goes through different techniques for exploiting and mitigating various buffer overflow vulnerabilities found in programs
ROP from Mihir Shah
]]>
88 1 https://cdn.slidesharecdn.com/ss_thumbnails/rop-181116214735-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Return Oriented Programming - ROP /slideshow/return-oriented-programming-rop-123191501/123191501 rop-181116161508
This Presentation goes through many techniques regarding the mitigation and ways to exploit the stack using Return Oriented Programming ]]>

This Presentation goes through many techniques regarding the mitigation and ways to exploit the stack using Return Oriented Programming ]]>
Fri, 16 Nov 2018 16:15:08 GMT /slideshow/return-oriented-programming-rop-123191501/123191501 MihirShah247@slideshare.net(MihirShah247) Return Oriented Programming - ROP MihirShah247 This Presentation goes through many techniques regarding the mitigation and ways to exploit the stack using Return Oriented Programming <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/rop-181116161508-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This Presentation goes through many techniques regarding the mitigation and ways to exploit the stack using Return Oriented Programming
Return Oriented Programming - ROP from Mihir Shah
]]>
481 3 https://cdn.slidesharecdn.com/ss_thumbnails/rop-181116161508-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
PMKID ATTACK!! /slideshow/pmkid-sa/121063898 pmkidattack-181029121451
This is a simple presentation that I prepared for the humla session at Null]]>

This is a simple presentation that I prepared for the humla session at Null]]>
Mon, 29 Oct 2018 12:14:51 GMT /slideshow/pmkid-sa/121063898 MihirShah247@slideshare.net(MihirShah247) PMKID ATTACK!! MihirShah247 This is a simple presentation that I prepared for the humla session at Null <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/pmkidattack-181029121451-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This is a simple presentation that I prepared for the humla session at Null
PMKID ATTACK!! from Mihir Shah
]]>
116 1 https://cdn.slidesharecdn.com/ss_thumbnails/pmkidattack-181029121451-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
OAuth 2.0 /slideshow/oauth-20-118181090/118181090 oauth2-181004185446
This is the presentation for the OAuth protocol which i talked about at Null Humla Session on 6th of October.]]>

This is the presentation for the OAuth protocol which i talked about at Null Humla Session on 6th of October.]]>
Thu, 04 Oct 2018 18:54:46 GMT /slideshow/oauth-20-118181090/118181090 MihirShah247@slideshare.net(MihirShah247) OAuth 2.0 MihirShah247 This is the presentation for the OAuth protocol which i talked about at Null Humla Session on 6th of October. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/oauth2-181004185446-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This is the presentation for the OAuth protocol which i talked about at Null Humla Session on 6th of October.
OAuth 2.0 from Mihir Shah
]]>
343 1 https://cdn.slidesharecdn.com/ss_thumbnails/oauth2-181004185446-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-MihirShah247-48x48.jpg?cb=1652315228 I make things, I break things and I make things that break things about.me/shahenshah https://cdn.slidesharecdn.com/ss_thumbnails/windowscustomshellcoding-200305112013-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/windows-custom-shellcoding/229735413 Windows custom shellco... https://cdn.slidesharecdn.com/ss_thumbnails/sehbasedattack-190808062240-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/seh-based-attack/162226204 Seh based attack https://cdn.slidesharecdn.com/ss_thumbnails/kubernetes-190720013647-thumbnail.jpg?width=320&height=320&fit=bounds MihirShah247/kubernetes-156545379 Kubernetes