際際滷shows by User: NSCONCLAVE / http://www.slideshare.net/images/logo.gif 際際滷shows by User: NSCONCLAVE / Fri, 17 Feb 2023 11:15:32 GMT 際際滷Share feed for 際際滷shows by User: NSCONCLAVE RED-TEAM_Conclave /slideshow/redteamconclave/255901185 red-teamconclave-230217111532-1b613dbb
A red team or team red are a group that plays the role of an enemy or competitor to provide security feedback from that perspective.A red-team assessment is similar to a penetration test, but is more targeted.]]>

A red team or team red are a group that plays the role of an enemy or competitor to provide security feedback from that perspective.A red-team assessment is similar to a penetration test, but is more targeted.]]>
Fri, 17 Feb 2023 11:15:32 GMT /slideshow/redteamconclave/255901185 NSCONCLAVE@slideshare.net(NSCONCLAVE) RED-TEAM_Conclave NSCONCLAVE A red team or team red are a group that plays the role of an enemy or competitor to provide security feedback from that perspective.A red-team assessment is similar to a penetration test, but is more targeted. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/red-teamconclave-230217111532-1b613dbb-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A red team or team red are a group that plays the role of an enemy or competitor to provide security feedback from that perspective.A red-team assessment is similar to a penetration test, but is more targeted.
RED-TEAM_Conclave from NSConclave
]]>
140 0 https://cdn.slidesharecdn.com/ss_thumbnails/red-teamconclave-230217111532-1b613dbb-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Create a Custom Plugin in Burp Suite using the Extension /slideshow/create-a-custom-plugin-in-burp-suite-using-the-extension/255727073 burpextension-client-230206135346-a5932a1c
Presentation on - How to create a Custom Plugin in Burp Suite using the Extension]]>

Presentation on - How to create a Custom Plugin in Burp Suite using the Extension]]>
Mon, 06 Feb 2023 13:53:46 GMT /slideshow/create-a-custom-plugin-in-burp-suite-using-the-extension/255727073 NSCONCLAVE@slideshare.net(NSCONCLAVE) Create a Custom Plugin in Burp Suite using the Extension NSCONCLAVE Presentation on - How to create a Custom Plugin in Burp Suite using the Extension <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/burpextension-client-230206135346-a5932a1c-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Presentation on - How to create a Custom Plugin in Burp Suite using the Extension
Create a Custom Plugin in Burp Suite using the Extension from NSConclave
]]>
58 0 https://cdn.slidesharecdn.com/ss_thumbnails/burpextension-client-230206135346-a5932a1c-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
IOT SECURITY ASSESSMENT Pentester's Approach /slideshow/iot-security-assessment-pentesters-approach/255681697 iotsecurityassessmentpentestersapproach-230203121917-c195a34e
Learn the different attack vectors for IoT devices and ways to exploit the vulnerabilities.]]>

Learn the different attack vectors for IoT devices and ways to exploit the vulnerabilities.]]>
Fri, 03 Feb 2023 12:19:17 GMT /slideshow/iot-security-assessment-pentesters-approach/255681697 NSCONCLAVE@slideshare.net(NSCONCLAVE) IOT SECURITY ASSESSMENT Pentester's Approach NSCONCLAVE Learn the different attack vectors for IoT devices and ways to exploit the vulnerabilities. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/iotsecurityassessmentpentestersapproach-230203121917-c195a34e-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Learn the different attack vectors for IoT devices and ways to exploit the vulnerabilities.
IOT SECURITY ASSESSMENT Pentester's Approach from NSConclave
]]>
93 0 https://cdn.slidesharecdn.com/ss_thumbnails/iotsecurityassessmentpentestersapproach-230203121917-c195a34e-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Debugging Android Native Library /slideshow/debugging-android-native-library/255681601 debuggingandroidnativelibrary-230203121017-759bd4c9
These slides were used to explain the concepts such as android's native library, NDK and JNI using which demonstration of native library debugging at runtime was presented in #NSConclave2023.]]>

These slides were used to explain the concepts such as android's native library, NDK and JNI using which demonstration of native library debugging at runtime was presented in #NSConclave2023.]]>
Fri, 03 Feb 2023 12:10:17 GMT /slideshow/debugging-android-native-library/255681601 NSCONCLAVE@slideshare.net(NSCONCLAVE) Debugging Android Native Library NSCONCLAVE These slides were used to explain the concepts such as android's native library, NDK and JNI using which demonstration of native library debugging at runtime was presented in #NSConclave2023. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/debuggingandroidnativelibrary-230203121017-759bd4c9-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> These slides were used to explain the concepts such as android&#39;s native library, NDK and JNI using which demonstration of native library debugging at runtime was presented in #NSConclave2023.
Debugging Android Native Library from NSConclave
]]>
294 0 https://cdn.slidesharecdn.com/ss_thumbnails/debuggingandroidnativelibrary-230203121017-759bd4c9-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Burp Suite Extension Development /slideshow/burp-suite-extension-development-255681385/255681385 burpsuiteextensiondevelopment-230203115621-d356c1fd
Presentation on - How to create custom Burp Suite extensions using Jython to test the web application / mobile applications with strong encryptions in HTTP requests and responses.]]>

Presentation on - How to create custom Burp Suite extensions using Jython to test the web application / mobile applications with strong encryptions in HTTP requests and responses.]]>
Fri, 03 Feb 2023 11:56:21 GMT /slideshow/burp-suite-extension-development-255681385/255681385 NSCONCLAVE@slideshare.net(NSCONCLAVE) Burp Suite Extension Development NSCONCLAVE Presentation on - How to create custom Burp Suite extensions using Jython to test the web application / mobile applications with strong encryptions in HTTP requests and responses. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/burpsuiteextensiondevelopment-230203115621-d356c1fd-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Presentation on - How to create custom Burp Suite extensions using Jython to test the web application / mobile applications with strong encryptions in HTTP requests and responses.
Burp Suite Extension Development from NSConclave
]]>
245 0 https://cdn.slidesharecdn.com/ss_thumbnails/burpsuiteextensiondevelopment-230203115621-d356c1fd-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Log Analysis /slideshow/log-analysis-234548034/234548034 loganalysis-200525120519
Logs are one of the most valuable assets when it comes to IT system management and monitoring. As they record every action that took place on your network, logs provide the insight you need to spot issues that might impact performance, compliance, and security.]]>

Logs are one of the most valuable assets when it comes to IT system management and monitoring. As they record every action that took place on your network, logs provide the insight you need to spot issues that might impact performance, compliance, and security.]]>
Mon, 25 May 2020 12:05:19 GMT /slideshow/log-analysis-234548034/234548034 NSCONCLAVE@slideshare.net(NSCONCLAVE) Log Analysis NSCONCLAVE Logs are one of the most valuable assets when it comes to IT system management and monitoring. As they record every action that took place on your network, logs provide the insight you need to spot issues that might impact performance, compliance, and security. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/loganalysis-200525120519-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Logs are one of the most valuable assets when it comes to IT system management and monitoring. As they record every action that took place on your network, logs provide the insight you need to spot issues that might impact performance, compliance, and security.
Log Analysis from NSConclave
]]>
951 0 https://cdn.slidesharecdn.com/ss_thumbnails/loganalysis-200525120519-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Regular Expression Injection /slideshow/regular-expression-injection/234408446 regularexpression-200521083758
Learn the basic concepts of Regular Expression Injection.]]>

Learn the basic concepts of Regular Expression Injection.]]>
Thu, 21 May 2020 08:37:58 GMT /slideshow/regular-expression-injection/234408446 NSCONCLAVE@slideshare.net(NSCONCLAVE) Regular Expression Injection NSCONCLAVE Learn the basic concepts of Regular Expression Injection. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/regularexpression-200521083758-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Learn the basic concepts of Regular Expression Injection.
Regular Expression Injection from NSConclave
]]>
825 0 https://cdn.slidesharecdn.com/ss_thumbnails/regularexpression-200521083758-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
HTML5 Messaging (Post Message) /slideshow/html5-messaging-post-message/233920297 html5messagingpostmessage-200514095855
Learn the basic concept of HTTP Post Message and Attack Scenario by Parth Jankharia.]]>

Learn the basic concept of HTTP Post Message and Attack Scenario by Parth Jankharia.]]>
Thu, 14 May 2020 09:58:55 GMT /slideshow/html5-messaging-post-message/233920297 NSCONCLAVE@slideshare.net(NSCONCLAVE) HTML5 Messaging (Post Message) NSCONCLAVE Learn the basic concept of HTTP Post Message and Attack Scenario by Parth Jankharia. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/html5messagingpostmessage-200514095855-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Learn the basic concept of HTTP Post Message and Attack Scenario by Parth Jankharia.
HTML5 Messaging (Post Message) from NSConclave
]]>
882 0 https://cdn.slidesharecdn.com/ss_thumbnails/html5messagingpostmessage-200514095855-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Node.js Deserialization /slideshow/nodejs-deserialization/233341986 node-200507085838
Learn the concepts of Node.js deserialization based attack scenarios.]]>

Learn the concepts of Node.js deserialization based attack scenarios.]]>
Thu, 07 May 2020 08:58:38 GMT /slideshow/nodejs-deserialization/233341986 NSCONCLAVE@slideshare.net(NSCONCLAVE) Node.js Deserialization NSCONCLAVE Learn the concepts of Node.js deserialization based attack scenarios. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/node-200507085838-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Learn the concepts of Node.js deserialization based attack scenarios.
Node.js Deserialization from NSConclave
]]>
1594 0 https://cdn.slidesharecdn.com/ss_thumbnails/node-200507085838-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
RIA Cross Domain Policy /NSCONCLAVE/ria-cross-domain-policy-233129339 riacrossdomainpolicy-200504063150
Learn the basic concept of Cross-Domain Policy]]>

Learn the basic concept of Cross-Domain Policy]]>
Mon, 04 May 2020 06:31:50 GMT /NSCONCLAVE/ria-cross-domain-policy-233129339 NSCONCLAVE@slideshare.net(NSCONCLAVE) RIA Cross Domain Policy NSCONCLAVE Learn the basic concept of Cross-Domain Policy <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/riacrossdomainpolicy-200504063150-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Learn the basic concept of Cross-Domain Policy
RIA Cross Domain Policy from NSConclave
]]>
836 0 https://cdn.slidesharecdn.com/ss_thumbnails/riacrossdomainpolicy-200504063150-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
LDAP Injection /slideshow/ldap-injection-232756814/232756814 ldapinjection-200428083344
Understand the web server architecture with LDAP server and what impact LDAP injection can cause. ]]>

Understand the web server architecture with LDAP server and what impact LDAP injection can cause. ]]>
Tue, 28 Apr 2020 08:33:43 GMT /slideshow/ldap-injection-232756814/232756814 NSCONCLAVE@slideshare.net(NSCONCLAVE) LDAP Injection NSCONCLAVE Understand the web server architecture with LDAP server and what impact LDAP injection can cause. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ldapinjection-200428083344-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Understand the web server architecture with LDAP server and what impact LDAP injection can cause.
LDAP Injection from NSConclave
]]>
767 0 https://cdn.slidesharecdn.com/ss_thumbnails/ldapinjection-200428083344-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Python Deserialization Attacks /slideshow/python-deserialization-attacks/232748615 pythondeserializationattacks-200428050956
Learn how Deserialization tends to vulnerability and which python modules are vulnerable to deserialization attacks.]]>

Learn how Deserialization tends to vulnerability and which python modules are vulnerable to deserialization attacks.]]>
Tue, 28 Apr 2020 05:09:56 GMT /slideshow/python-deserialization-attacks/232748615 NSCONCLAVE@slideshare.net(NSCONCLAVE) Python Deserialization Attacks NSCONCLAVE Learn how Deserialization tends to vulnerability and which python modules are vulnerable to deserialization attacks. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/pythondeserializationattacks-200428050956-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Learn how Deserialization tends to vulnerability and which python modules are vulnerable to deserialization attacks.
Python Deserialization Attacks from NSConclave
]]>
1070 0 https://cdn.slidesharecdn.com/ss_thumbnails/pythondeserializationattacks-200428050956-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Sandboxing /slideshow/sandboxing-232565855/232565855 sandboxing-200424085538
Understand how sandboxing works and techniques about how the latest malware evades the sandboxing.]]>

Understand how sandboxing works and techniques about how the latest malware evades the sandboxing.]]>
Fri, 24 Apr 2020 08:55:38 GMT /slideshow/sandboxing-232565855/232565855 NSCONCLAVE@slideshare.net(NSCONCLAVE) Sandboxing NSCONCLAVE Understand how sandboxing works and techniques about how the latest malware evades the sandboxing. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/sandboxing-200424085538-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Understand how sandboxing works and techniques about how the latest malware evades the sandboxing.
Sandboxing from NSConclave
]]>
391 0 https://cdn.slidesharecdn.com/ss_thumbnails/sandboxing-200424085538-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
NoSql Injection /slideshow/nosql-injection/232565680 nosqlinjection-200424085204
Let's review some code and understand how advanced injection attack NoSQLi occurs.]]>

Let's review some code and understand how advanced injection attack NoSQLi occurs.]]>
Fri, 24 Apr 2020 08:52:04 GMT /slideshow/nosql-injection/232565680 NSCONCLAVE@slideshare.net(NSCONCLAVE) NoSql Injection NSCONCLAVE Let's review some code and understand how advanced injection attack NoSQLi occurs. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/nosqlinjection-200424085204-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Let&#39;s review some code and understand how advanced injection attack NoSQLi occurs.
NoSql Injection from NSConclave
]]>
540 0 https://cdn.slidesharecdn.com/ss_thumbnails/nosqlinjection-200424085204-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Thick Client Testing Advanced /slideshow/thick-client-testing-advanced-232249137/232249137 thickclienttestingadvacned-200419060740
Let's get started with a deep dive into advanced techniques by capturing the request and reversing the application.]]>

Let's get started with a deep dive into advanced techniques by capturing the request and reversing the application.]]>
Sun, 19 Apr 2020 06:07:40 GMT /slideshow/thick-client-testing-advanced-232249137/232249137 NSCONCLAVE@slideshare.net(NSCONCLAVE) Thick Client Testing Advanced NSCONCLAVE Let's get started with a deep dive into advanced techniques by capturing the request and reversing the application. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/thickclienttestingadvacned-200419060740-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Let&#39;s get started with a deep dive into advanced techniques by capturing the request and reversing the application.
Thick Client Testing Advanced from NSConclave
]]>
322 0 https://cdn.slidesharecdn.com/ss_thumbnails/thickclienttestingadvacned-200419060740-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Thick Client Testing Basics /slideshow/thick-client-testing-basics-232249136/232249136 thickclienttestingbasics-200419060737
Understand the basic difference between the thick and thin client applications and learn the techniques to capture the application traffic.]]>

Understand the basic difference between the thick and thin client applications and learn the techniques to capture the application traffic.]]>
Sun, 19 Apr 2020 06:07:37 GMT /slideshow/thick-client-testing-basics-232249136/232249136 NSCONCLAVE@slideshare.net(NSCONCLAVE) Thick Client Testing Basics NSCONCLAVE Understand the basic difference between the thick and thin client applications and learn the techniques to capture the application traffic. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/thickclienttestingbasics-200419060737-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Understand the basic difference between the thick and thin client applications and learn the techniques to capture the application traffic.
Thick Client Testing Basics from NSConclave
]]>
385 0 https://cdn.slidesharecdn.com/ss_thumbnails/thickclienttestingbasics-200419060737-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Markdown /slideshow/markdown-232107247/232107247 markdown-200416095256
Make effective markdown visual with a well-known editor.]]>

Make effective markdown visual with a well-known editor.]]>
Thu, 16 Apr 2020 09:52:56 GMT /slideshow/markdown-232107247/232107247 NSCONCLAVE@slideshare.net(NSCONCLAVE) Markdown NSCONCLAVE Make effective markdown visual with a well-known editor. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/markdown-200416095256-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Make effective markdown visual with a well-known editor.
Markdown from NSConclave
]]>
180 0 https://cdn.slidesharecdn.com/ss_thumbnails/markdown-200416095256-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Docker 101 /slideshow/docker-101-231961714/231961714 docker101-200414080545
This session is a part of the #TechieThursday initiative from Net-Square for the internal team. In this webinar, we discussed several introductory topics including: The difference between containers and VMs Defined key Docker terminology that beginners should familiarize themselves with Learned how to get started with docker with a hands-on demo]]>

This session is a part of the #TechieThursday initiative from Net-Square for the internal team. In this webinar, we discussed several introductory topics including: The difference between containers and VMs Defined key Docker terminology that beginners should familiarize themselves with Learned how to get started with docker with a hands-on demo]]>
Tue, 14 Apr 2020 08:05:45 GMT /slideshow/docker-101-231961714/231961714 NSCONCLAVE@slideshare.net(NSCONCLAVE) Docker 101 NSCONCLAVE This session is a part of the #TechieThursday initiative from Net-Square for the internal team. In this webinar, we discussed several introductory topics including: The difference between containers and VMs Defined key Docker terminology that beginners should familiarize themselves with Learned how to get started with docker with a hands-on demo <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/docker101-200414080545-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This session is a part of the #TechieThursday initiative from Net-Square for the internal team. In this webinar, we discussed several introductory topics including: The difference between containers and VMs Defined key Docker terminology that beginners should familiarize themselves with Learned how to get started with docker with a hands-on demo
Docker 101 from NSConclave
]]>
150 0 https://cdn.slidesharecdn.com/ss_thumbnails/docker101-200414080545-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Security Architecture Consulting - Hiren Shah /slideshow/security-architecture-consulting-hiren-shah/226688503 securityarchitectureconsulting-200201190106
In modern age it has become crucial to perform secure architecture review along with regular pentest practice. Application architecture review can be defined as reviewing the current security controls in the application architecture. This helps a user to identify potential security flaws at an early stage and mitigate them before starting the development stage.]]>

In modern age it has become crucial to perform secure architecture review along with regular pentest practice. Application architecture review can be defined as reviewing the current security controls in the application architecture. This helps a user to identify potential security flaws at an early stage and mitigate them before starting the development stage.]]>
Sat, 01 Feb 2020 19:01:06 GMT /slideshow/security-architecture-consulting-hiren-shah/226688503 NSCONCLAVE@slideshare.net(NSCONCLAVE) Security Architecture Consulting - Hiren Shah NSCONCLAVE In modern age it has become crucial to perform secure architecture review along with regular pentest practice. Application architecture review can be defined as reviewing the current security controls in the application architecture. This helps a user to identify potential security flaws at an early stage and mitigate them before starting the development stage. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/securityarchitectureconsulting-200201190106-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In modern age it has become crucial to perform secure architecture review along with regular pentest practice. Application architecture review can be defined as reviewing the current security controls in the application architecture. This helps a user to identify potential security flaws at an early stage and mitigate them before starting the development stage.
Security Architecture Consulting - Hiren Shah from NSConclave
]]>
145 0 https://cdn.slidesharecdn.com/ss_thumbnails/securityarchitectureconsulting-200201190106-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
OSINT: Open Source Intelligence - Rohan Braganza /slideshow/osint-open-source-intelligence-rohan-braganza/226140540 osintnsconclavejan2020-200130125556
Speaker is going to conduct hands-on training on how an individual can use Open-source intelligence (OSINT) to collect data from publicly available sources. Speaker will showcase tools and techniques used in collecting information from the public sources. https://nsconclave.net-square.com/advanced-reconnaissance-using-OSINT.html]]>

Speaker is going to conduct hands-on training on how an individual can use Open-source intelligence (OSINT) to collect data from publicly available sources. Speaker will showcase tools and techniques used in collecting information from the public sources. https://nsconclave.net-square.com/advanced-reconnaissance-using-OSINT.html]]>
Thu, 30 Jan 2020 12:55:56 GMT /slideshow/osint-open-source-intelligence-rohan-braganza/226140540 NSCONCLAVE@slideshare.net(NSCONCLAVE) OSINT: Open Source Intelligence - Rohan Braganza NSCONCLAVE Speaker is going to conduct hands-on training on how an individual can use Open-source intelligence (OSINT) to collect data from publicly available sources. Speaker will showcase tools and techniques used in collecting information from the public sources. https://nsconclave.net-square.com/advanced-reconnaissance-using-OSINT.html <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/osintnsconclavejan2020-200130125556-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Speaker is going to conduct hands-on training on how an individual can use Open-source intelligence (OSINT) to collect data from publicly available sources. Speaker will showcase tools and techniques used in collecting information from the public sources. https://nsconclave.net-square.com/advanced-reconnaissance-using-OSINT.html
OSINT: Open Source Intelligence - Rohan Braganza from NSConclave
]]>
857 0 https://cdn.slidesharecdn.com/ss_thumbnails/osintnsconclavejan2020-200130125556-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-NSCONCLAVE-48x48.jpg?cb=1677920632 NSConclave is an Information Security Conference & Training event organized by Net Square Solutions Pvt Ltd. #nsconclave #netsquare #cybersecurity #infosec #conference nsconclave.net-square.com/ https://cdn.slidesharecdn.com/ss_thumbnails/red-teamconclave-230217111532-1b613dbb-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/redteamconclave/255901185 RED-TEAM_Conclave https://cdn.slidesharecdn.com/ss_thumbnails/burpextension-client-230206135346-a5932a1c-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/create-a-custom-plugin-in-burp-suite-using-the-extension/255727073 Create a Custom Plugin... https://cdn.slidesharecdn.com/ss_thumbnails/iotsecurityassessmentpentestersapproach-230203121917-c195a34e-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/iot-security-assessment-pentesters-approach/255681697 IOT SECURITY ASSESSMEN...