際際滷shows by User: OWASPdelhi / http://www.slideshare.net/images/logo.gif 際際滷shows by User: OWASPdelhi / Mon, 15 Jun 2020 10:50:49 GMT 際際滷Share feed for 際際滷shows by User: OWASPdelhi Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resources /slideshow/getting-started-with-hacking-android-ios-apps-tools-techniques-and-resources/235628588 nulltalk-200615105049
Session presented in the Combined [nullDelhi + OWASPDelhi] webinar on 7th July. Watch the webinar here - https://youtu.be/BQWcUjzxJE0 Have you been wondering about how to start in mobile application security, more specifically iOS/Android application security? In this talk, I will try to answer some of the most common questions about getting started in mobile application security testing. Starting from what platform to choose, where to learn, good resources, hardware requirements etc etc. Will also demo you about Mobexler - A Mobile Application Penetration Testing Platform and how you can use it for pentesting of iOS as well as android apps. This talk will be a mix of some demo, and some knowledge.]]>

Session presented in the Combined [nullDelhi + OWASPDelhi] webinar on 7th July. Watch the webinar here - https://youtu.be/BQWcUjzxJE0 Have you been wondering about how to start in mobile application security, more specifically iOS/Android application security? In this talk, I will try to answer some of the most common questions about getting started in mobile application security testing. Starting from what platform to choose, where to learn, good resources, hardware requirements etc etc. Will also demo you about Mobexler - A Mobile Application Penetration Testing Platform and how you can use it for pentesting of iOS as well as android apps. This talk will be a mix of some demo, and some knowledge.]]>
Mon, 15 Jun 2020 10:50:49 GMT /slideshow/getting-started-with-hacking-android-ios-apps-tools-techniques-and-resources/235628588 OWASPdelhi@slideshare.net(OWASPdelhi) Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resources OWASPdelhi Session presented in the Combined [nullDelhi + OWASPDelhi] webinar on 7th July. Watch the webinar here - https://youtu.be/BQWcUjzxJE0 Have you been wondering about how to start in mobile application security, more specifically iOS/Android application security? In this talk, I will try to answer some of the most common questions about getting started in mobile application security testing. Starting from what platform to choose, where to learn, good resources, hardware requirements etc etc. Will also demo you about Mobexler - A Mobile Application Penetration Testing Platform and how you can use it for pentesting of iOS as well as android apps. This talk will be a mix of some demo, and some knowledge. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/nulltalk-200615105049-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Session presented in the Combined [nullDelhi + OWASPDelhi] webinar on 7th July. Watch the webinar here - https://youtu.be/BQWcUjzxJE0 Have you been wondering about how to start in mobile application security, more specifically iOS/Android application security? In this talk, I will try to answer some of the most common questions about getting started in mobile application security testing. Starting from what platform to choose, where to learn, good resources, hardware requirements etc etc. Will also demo you about Mobexler - A Mobile Application Penetration Testing Platform and how you can use it for pentesting of iOS as well as android apps. This talk will be a mix of some demo, and some knowledge.
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resources from OWASP Delhi
]]>
676 0 https://cdn.slidesharecdn.com/ss_thumbnails/nulltalk-200615105049-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Securing dns records from subdomain takeover /slideshow/securing-dns-records-from-subdomain-takeover/235141216 securingdnsrecordsfromsubdomaintakeover-200607122550
Session presented in the Combined [nullDelhi + OWASPDelhi] webinar on 7th July. Watch the webinar here - https://www.youtube.com/watch?v=C0LQJTXFosI The speaker will be speaking upon the following abstract - Basics of DNS records Introduction to DNS record takeovers Different types of DNS takeovers Its impact How to protect DNS records from takeover Demo Q&A This talk will be for product security folks/ people on defending side. The speaker will also be covering the concept behind subdomain takeovers and its impact.]]>

Session presented in the Combined [nullDelhi + OWASPDelhi] webinar on 7th July. Watch the webinar here - https://www.youtube.com/watch?v=C0LQJTXFosI The speaker will be speaking upon the following abstract - Basics of DNS records Introduction to DNS record takeovers Different types of DNS takeovers Its impact How to protect DNS records from takeover Demo Q&A This talk will be for product security folks/ people on defending side. The speaker will also be covering the concept behind subdomain takeovers and its impact.]]>
Sun, 07 Jun 2020 12:25:50 GMT /slideshow/securing-dns-records-from-subdomain-takeover/235141216 OWASPdelhi@slideshare.net(OWASPdelhi) Securing dns records from subdomain takeover OWASPdelhi Session presented in the Combined [nullDelhi + OWASPDelhi] webinar on 7th July. Watch the webinar here - https://www.youtube.com/watch?v=C0LQJTXFosI The speaker will be speaking upon the following abstract - Basics of DNS records Introduction to DNS record takeovers Different types of DNS takeovers Its impact How to protect DNS records from takeover Demo Q&A This talk will be for product security folks/ people on defending side. The speaker will also be covering the concept behind subdomain takeovers and its impact. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/securingdnsrecordsfromsubdomaintakeover-200607122550-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Session presented in the Combined [nullDelhi + OWASPDelhi] webinar on 7th July. Watch the webinar here - https://www.youtube.com/watch?v=C0LQJTXFosI The speaker will be speaking upon the following abstract - Basics of DNS records Introduction to DNS record takeovers Different types of DNS takeovers Its impact How to protect DNS records from takeover Demo Q&amp;A This talk will be for product security folks/ people on defending side. The speaker will also be covering the concept behind subdomain takeovers and its impact.
Securing dns records from subdomain takeover from OWASP Delhi
]]>
293 0 https://cdn.slidesharecdn.com/ss_thumbnails/securingdnsrecordsfromsubdomaintakeover-200607122550-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Effective Cyber Security Report Writing /slideshow/effective-cyber-security-report-writing/234815530 nulldelhi-reportwriting-200601084209
Session presented in the Combined [nullDelhi + OWASPDelhi] webinar on 31st May. Watch the webinar here - https://www.youtube.com/watch?v=22Hccp-7UDU A person's assessment/ investigation is only as good as the report that supports it. A good quality or effective report is a presentation of you as an assessor, analyst, or consultant. The speaker discusses here the important points to keep in mind while preparing a Cyber Security Report. A must know webinar for all - freshers, professionals, bug bounty hunters and the C- level entities.]]>

Session presented in the Combined [nullDelhi + OWASPDelhi] webinar on 31st May. Watch the webinar here - https://www.youtube.com/watch?v=22Hccp-7UDU A person's assessment/ investigation is only as good as the report that supports it. A good quality or effective report is a presentation of you as an assessor, analyst, or consultant. The speaker discusses here the important points to keep in mind while preparing a Cyber Security Report. A must know webinar for all - freshers, professionals, bug bounty hunters and the C- level entities.]]>
Mon, 01 Jun 2020 08:42:09 GMT /slideshow/effective-cyber-security-report-writing/234815530 OWASPdelhi@slideshare.net(OWASPdelhi) Effective Cyber Security Report Writing OWASPdelhi Session presented in the Combined [nullDelhi + OWASPDelhi] webinar on 31st May. Watch the webinar here - https://www.youtube.com/watch?v=22Hccp-7UDU A person's assessment/ investigation is only as good as the report that supports it. A good quality or effective report is a presentation of you as an assessor, analyst, or consultant. The speaker discusses here the important points to keep in mind while preparing a Cyber Security Report. A must know webinar for all - freshers, professionals, bug bounty hunters and the C- level entities. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/nulldelhi-reportwriting-200601084209-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Session presented in the Combined [nullDelhi + OWASPDelhi] webinar on 31st May. Watch the webinar here - https://www.youtube.com/watch?v=22Hccp-7UDU A person&#39;s assessment/ investigation is only as good as the report that supports it. A good quality or effective report is a presentation of you as an assessor, analyst, or consultant. The speaker discusses here the important points to keep in mind while preparing a Cyber Security Report. A must know webinar for all - freshers, professionals, bug bounty hunters and the C- level entities.
Effective Cyber Security Report Writing from OWASP Delhi
]]>
812 0 https://cdn.slidesharecdn.com/ss_thumbnails/nulldelhi-reportwriting-200601084209-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Data sniffing over Air Gap /OWASPdelhi/data-sniffing-over-airgaps datasniffingoverairgaps-200524113012
Session presented in the Combined [nullDelhi + OWASPDelhi] webinar on 24th May. Watch the webinar here - https://www.youtube.com/watch?v=jmzfdw-UYC0 An air gapped environment is described as computer or network that has no network interfaces, either wired or wireless, connected to outside network. In this case, side channels and proximity are leveraged to eavesdrop air gapped systems. A case study showing practical use case of sniffing is also discussed. Link to the Webinar - https://youtu.be/jmzfdw-UYC0]]>

Session presented in the Combined [nullDelhi + OWASPDelhi] webinar on 24th May. Watch the webinar here - https://www.youtube.com/watch?v=jmzfdw-UYC0 An air gapped environment is described as computer or network that has no network interfaces, either wired or wireless, connected to outside network. In this case, side channels and proximity are leveraged to eavesdrop air gapped systems. A case study showing practical use case of sniffing is also discussed. Link to the Webinar - https://youtu.be/jmzfdw-UYC0]]>
Sun, 24 May 2020 11:30:12 GMT /OWASPdelhi/data-sniffing-over-airgaps OWASPdelhi@slideshare.net(OWASPdelhi) Data sniffing over Air Gap OWASPdelhi Session presented in the Combined [nullDelhi + OWASPDelhi] webinar on 24th May. Watch the webinar here - https://www.youtube.com/watch?v=jmzfdw-UYC0 An air gapped environment is described as computer or network that has no network interfaces, either wired or wireless, connected to outside network. In this case, side channels and proximity are leveraged to eavesdrop air gapped systems. A case study showing practical use case of sniffing is also discussed. Link to the Webinar - https://youtu.be/jmzfdw-UYC0 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/datasniffingoverairgaps-200524113012-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Session presented in the Combined [nullDelhi + OWASPDelhi] webinar on 24th May. Watch the webinar here - https://www.youtube.com/watch?v=jmzfdw-UYC0 An air gapped environment is described as computer or network that has no network interfaces, either wired or wireless, connected to outside network. In this case, side channels and proximity are leveraged to eavesdrop air gapped systems. A case study showing practical use case of sniffing is also discussed. Link to the Webinar - https://youtu.be/jmzfdw-UYC0
Data sniffing over Air Gap from OWASP Delhi
]]>
372 0 https://cdn.slidesharecdn.com/ss_thumbnails/datasniffingoverairgaps-200524113012-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
UDP Hunter /slideshow/udp-hunter-233591713/233591713 udphunter-200511192240
Combined (NullDelhi + OWASPDelhi) Webinar on UDP Hunter by Savan Gadhiya on 10th May, 2020. For the full video, please visit - https://www.youtube.com/watch?v=yLEL5XrzFyE]]>

Combined (NullDelhi + OWASPDelhi) Webinar on UDP Hunter by Savan Gadhiya on 10th May, 2020. For the full video, please visit - https://www.youtube.com/watch?v=yLEL5XrzFyE]]>
Mon, 11 May 2020 19:22:40 GMT /slideshow/udp-hunter-233591713/233591713 OWASPdelhi@slideshare.net(OWASPdelhi) UDP Hunter OWASPdelhi Combined (NullDelhi + OWASPDelhi) Webinar on UDP Hunter by Savan Gadhiya on 10th May, 2020. For the full video, please visit - https://www.youtube.com/watch?v=yLEL5XrzFyE <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/udphunter-200511192240-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Combined (NullDelhi + OWASPDelhi) Webinar on UDP Hunter by Savan Gadhiya on 10th May, 2020. For the full video, please visit - https://www.youtube.com/watch?v=yLEL5XrzFyE
UDP Hunter from OWASP Delhi
]]>
119 0 https://cdn.slidesharecdn.com/ss_thumbnails/udphunter-200511192240-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Demystifying Container Escapes /slideshow/demystifying-container-escapes-180040181/180040181 docker-escapesnull-owasp28sept2019-191008121849-191008130840
The speaker discussed the docker attack surface. Furthermore, he demonstrated how an attacker can escape the docker container and gain access to the host machine.]]>

The speaker discussed the docker attack surface. Furthermore, he demonstrated how an attacker can escape the docker container and gain access to the host machine.]]>
Tue, 08 Oct 2019 13:08:40 GMT /slideshow/demystifying-container-escapes-180040181/180040181 OWASPdelhi@slideshare.net(OWASPdelhi) Demystifying Container Escapes OWASPdelhi The speaker discussed the docker attack surface. Furthermore, he demonstrated how an attacker can escape the docker container and gain access to the host machine. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/docker-escapesnull-owasp28sept2019-191008121849-191008130840-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The speaker discussed the docker attack surface. Furthermore, he demonstrated how an attacker can escape the docker container and gain access to the host machine.
Demystifying Container Escapes from OWASP Delhi
]]>
349 0 https://cdn.slidesharecdn.com/ss_thumbnails/docker-escapesnull-owasp28sept2019-191008121849-191008130840-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Automating WAF using Terraform /slideshow/automating-waf-using-terraform/163123802 automatingwafusingterraform-190812073047
Companies and organizations have been following many traditional strategies for deploying WAF (web application firewall) in their infrastructure where most of the work is done. manually. Every ACL, every rule entry, every signature, and every other configuration was created and managed by hand. It could have various flaws: flaw of wrong ACL, flaw of accidental misconfiguration, flaw of bad signature, and other various things. The good news is that thanks to the DevOps Rebel Alliance, we now have a better way to do things: Infrastructure-as-Code (IAC). Instead of clicking around a web UI or manually executing commands and setting up rules and configuration, the idea behind IAC is to write code to define, provision, and manage your WAF. You can validate each WAF change through code reviews and automated tests and you can create/use a library of reusable, documented, battle-tested code that makes it easier to scale and evolve your WAF. In this talk by Avinash Jain, we will have a quick on the various concept of what, how and why of "Automating AWS WAF using Terraform". ]]>

Companies and organizations have been following many traditional strategies for deploying WAF (web application firewall) in their infrastructure where most of the work is done. manually. Every ACL, every rule entry, every signature, and every other configuration was created and managed by hand. It could have various flaws: flaw of wrong ACL, flaw of accidental misconfiguration, flaw of bad signature, and other various things. The good news is that thanks to the DevOps Rebel Alliance, we now have a better way to do things: Infrastructure-as-Code (IAC). Instead of clicking around a web UI or manually executing commands and setting up rules and configuration, the idea behind IAC is to write code to define, provision, and manage your WAF. You can validate each WAF change through code reviews and automated tests and you can create/use a library of reusable, documented, battle-tested code that makes it easier to scale and evolve your WAF. In this talk by Avinash Jain, we will have a quick on the various concept of what, how and why of "Automating AWS WAF using Terraform". ]]>
Mon, 12 Aug 2019 07:30:47 GMT /slideshow/automating-waf-using-terraform/163123802 OWASPdelhi@slideshare.net(OWASPdelhi) Automating WAF using Terraform OWASPdelhi Companies and organizations have been following many traditional strategies for deploying WAF (web application firewall) in their infrastructure where most of the work is done. manually. Every ACL, every rule entry, every signature, and every other configuration was created and managed by hand. It could have various flaws: flaw of wrong ACL, flaw of accidental misconfiguration, flaw of bad signature, and other various things. The good news is that thanks to the DevOps Rebel Alliance, we now have a better way to do things: Infrastructure-as-Code (IAC). Instead of clicking around a web UI or manually executing commands and setting up rules and configuration, the idea behind IAC is to write code to define, provision, and manage your WAF. You can validate each WAF change through code reviews and automated tests and you can create/use a library of reusable, documented, battle-tested code that makes it easier to scale and evolve your WAF. In this talk by Avinash Jain, we will have a quick on the various concept of what, how and why of "Automating AWS WAF using Terraform". <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/automatingwafusingterraform-190812073047-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Companies and organizations have been following many traditional strategies for deploying WAF (web application firewall) in their infrastructure where most of the work is done. manually. Every ACL, every rule entry, every signature, and every other configuration was created and managed by hand. It could have various flaws: flaw of wrong ACL, flaw of accidental misconfiguration, flaw of bad signature, and other various things. The good news is that thanks to the DevOps Rebel Alliance, we now have a better way to do things: Infrastructure-as-Code (IAC). Instead of clicking around a web UI or manually executing commands and setting up rules and configuration, the idea behind IAC is to write code to define, provision, and manage your WAF. You can validate each WAF change through code reviews and automated tests and you can create/use a library of reusable, documented, battle-tested code that makes it easier to scale and evolve your WAF. In this talk by Avinash Jain, we will have a quick on the various concept of what, how and why of &quot;Automating AWS WAF using Terraform&quot;.
Automating WAF using Terraform from OWASP Delhi
]]>
392 2 https://cdn.slidesharecdn.com/ss_thumbnails/automatingwafusingterraform-190812073047-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Actionable Threat Intelligence /slideshow/actionable-threat-intelligence-by-chandra-ballabh/163113281 actionablethreatintelligence-updated-190812064235
Discussion on traditional threat intelligence model, explore advanced approaches to reduce manual intervention and convert it into actionable threat intelligence. 際際滷s of the talk delivered by Chandra Ballabh in the August, 2019 Meetup of Combined OWASP Delhi and nullDelhi at Thoughtworks, Delhi]]>

Discussion on traditional threat intelligence model, explore advanced approaches to reduce manual intervention and convert it into actionable threat intelligence. 際際滷s of the talk delivered by Chandra Ballabh in the August, 2019 Meetup of Combined OWASP Delhi and nullDelhi at Thoughtworks, Delhi]]>
Mon, 12 Aug 2019 06:42:35 GMT /slideshow/actionable-threat-intelligence-by-chandra-ballabh/163113281 OWASPdelhi@slideshare.net(OWASPdelhi) Actionable Threat Intelligence OWASPdelhi Discussion on traditional threat intelligence model, explore advanced approaches to reduce manual intervention and convert it into actionable threat intelligence. 際際滷s of the talk delivered by Chandra Ballabh in the August, 2019 Meetup of Combined OWASP Delhi and nullDelhi at Thoughtworks, Delhi <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/actionablethreatintelligence-updated-190812064235-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Discussion on traditional threat intelligence model, explore advanced approaches to reduce manual intervention and convert it into actionable threat intelligence. 際際滷s of the talk delivered by Chandra Ballabh in the August, 2019 Meetup of Combined OWASP Delhi and nullDelhi at Thoughtworks, Delhi
Actionable Threat Intelligence from OWASP Delhi
]]>
287 1 https://cdn.slidesharecdn.com/ss_thumbnails/actionablethreatintelligence-updated-190812064235-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Threat hunting 101 by Sandeep Singh /slideshow/threat-hunting-101-by-sandeep-singh/142516311 threathunting101-190427151258
Getting Started with Threat Hunting (Threat Hunting 101) by Sandeep Singh at the combined null Delhi and OWASP Delhi December meet up]]>

Getting Started with Threat Hunting (Threat Hunting 101) by Sandeep Singh at the combined null Delhi and OWASP Delhi December meet up]]>
Sat, 27 Apr 2019 15:12:58 GMT /slideshow/threat-hunting-101-by-sandeep-singh/142516311 OWASPdelhi@slideshare.net(OWASPdelhi) Threat hunting 101 by Sandeep Singh OWASPdelhi Getting Started with Threat Hunting (Threat Hunting 101) by Sandeep Singh at the combined null Delhi and OWASP Delhi December meet up <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/threathunting101-190427151258-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Getting Started with Threat Hunting (Threat Hunting 101) by Sandeep Singh at the combined null Delhi and OWASP Delhi December meet up
Threat hunting 101 by Sandeep Singh from OWASP Delhi
]]>
1572 3 https://cdn.slidesharecdn.com/ss_thumbnails/threathunting101-190427151258-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Owasp top 10 vulnerabilities /slideshow/owasp-top-10-vulnerabilities/139070230 owasptop10vulnerabilities-190401144805
Session on OWASP Top 10 Vulnerabilities presented by Aarti Bala and Saman Fatima. The session covered the below 4 vulnerabilities - Injection, Sensitive Data Exposure Cross Site Scripting Insufficient Logging and Monitoring]]>

Session on OWASP Top 10 Vulnerabilities presented by Aarti Bala and Saman Fatima. The session covered the below 4 vulnerabilities - Injection, Sensitive Data Exposure Cross Site Scripting Insufficient Logging and Monitoring]]>
Mon, 01 Apr 2019 14:48:04 GMT /slideshow/owasp-top-10-vulnerabilities/139070230 OWASPdelhi@slideshare.net(OWASPdelhi) Owasp top 10 vulnerabilities OWASPdelhi Session on OWASP Top 10 Vulnerabilities presented by Aarti Bala and Saman Fatima. The session covered the below 4 vulnerabilities - Injection, Sensitive Data Exposure Cross Site Scripting Insufficient Logging and Monitoring <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/owasptop10vulnerabilities-190401144805-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Session on OWASP Top 10 Vulnerabilities presented by Aarti Bala and Saman Fatima. The session covered the below 4 vulnerabilities - Injection, Sensitive Data Exposure Cross Site Scripting Insufficient Logging and Monitoring
Owasp top 10 vulnerabilities from OWASP Delhi
]]>
5074 1 https://cdn.slidesharecdn.com/ss_thumbnails/owasptop10vulnerabilities-190401144805-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Recon with Nmap /slideshow/recon-with-nmap/132051512 reconwithnmap-feb2019-190216172853
Feb 2019 - "Recon with Nmap" Session by Nikhil Raj and Jayvardhan Singh]]>

Feb 2019 - "Recon with Nmap" Session by Nikhil Raj and Jayvardhan Singh]]>
Sat, 16 Feb 2019 17:28:53 GMT /slideshow/recon-with-nmap/132051512 OWASPdelhi@slideshare.net(OWASPdelhi) Recon with Nmap OWASPdelhi Feb 2019 - "Recon with Nmap" Session by Nikhil Raj and Jayvardhan Singh <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/reconwithnmap-feb2019-190216172853-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Feb 2019 - &quot;Recon with Nmap&quot; Session by Nikhil Raj and Jayvardhan Singh
Recon with Nmap from OWASP Delhi
]]>
1864 2 https://cdn.slidesharecdn.com/ss_thumbnails/reconwithnmap-feb2019-190216172853-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Securing AWS environments by Ankit Giri /slideshow/securing-aws-environments-by-ankit-giri/116635555 6ikzxruatc6nx81h6cme-signature-fd42ff1ee67e15790f91a3bf1b92528666dfe00d944b291d80dd2d268f07b3af-poli-180926073128
Lets create a Complete, end to end web application architecture ]]>

Lets create a Complete, end to end web application architecture ]]>
Wed, 26 Sep 2018 07:31:28 GMT /slideshow/securing-aws-environments-by-ankit-giri/116635555 OWASPdelhi@slideshare.net(OWASPdelhi) Securing AWS environments by Ankit Giri OWASPdelhi Lets create a Complete, end to end web application architecture <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/6ikzxruatc6nx81h6cme-signature-fd42ff1ee67e15790f91a3bf1b92528666dfe00d944b291d80dd2d268f07b3af-poli-180926073128-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Lets create a Complete, end to end web application architecture
Securing AWS environments by Ankit Giri from OWASP Delhi
]]>
221 3 https://cdn.slidesharecdn.com/ss_thumbnails/6ikzxruatc6nx81h6cme-signature-fd42ff1ee67e15790f91a3bf1b92528666dfe00d944b291d80dd2d268f07b3af-poli-180926073128-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
DMARC Overview /slideshow/dmarc-overview/99356033 dmarcoverview-nullmeet-180529092303
OWASP & Null Delhi May chapter meet's session on DMARC Overview (Domain Based Message Authentication, Reporting, and Conformance)]]>

OWASP & Null Delhi May chapter meet's session on DMARC Overview (Domain Based Message Authentication, Reporting, and Conformance)]]>
Tue, 29 May 2018 09:23:03 GMT /slideshow/dmarc-overview/99356033 OWASPdelhi@slideshare.net(OWASPdelhi) DMARC Overview OWASPdelhi OWASP & Null Delhi May chapter meet's session on DMARC Overview (Domain Based Message Authentication, Reporting, and Conformance) <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/dmarcoverview-nullmeet-180529092303-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> OWASP &amp; Null Delhi May chapter meet&#39;s session on DMARC Overview (Domain Based Message Authentication, Reporting, and Conformance)
DMARC Overview from OWASP Delhi
]]>
1647 1 https://cdn.slidesharecdn.com/ss_thumbnails/dmarcoverview-nullmeet-180529092303-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cloud assessments by :- Aakash Goel /slideshow/cloud-assessments-by-aakash-goel/91934085 cloudassessments-owasp-180326100327
What to test? Shared responsibility Cloud pentest Cloud pentest automated tool Security views Technical jargons ]]>

What to test? Shared responsibility Cloud pentest Cloud pentest automated tool Security views Technical jargons ]]>
Mon, 26 Mar 2018 10:03:27 GMT /slideshow/cloud-assessments-by-aakash-goel/91934085 OWASPdelhi@slideshare.net(OWASPdelhi) Cloud assessments by :- Aakash Goel OWASPdelhi What to test? Shared responsibility Cloud pentest Cloud pentest automated tool Security views Technical jargons <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cloudassessments-owasp-180326100327-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> What to test? Shared responsibility Cloud pentest Cloud pentest automated tool Security views Technical jargons
Cloud assessments by :- Aakash Goel from OWASP Delhi
]]>
314 1 https://cdn.slidesharecdn.com/ss_thumbnails/cloudassessments-owasp-180326100327-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Pentesting Rest API's by :- Gaurang Bhatnagar /slideshow/pentesting-rest-apis-by-gaurang-bhatnagar/91933883 apitesting-180326100107
Brief overview of API Fingerprinting & Discovering API Authentication attacks on API (JWT) Authorization attacks on API (OAuth) Bruteforce attacks on API Attacking Dev/Staging API Traditional attacks]]>

Brief overview of API Fingerprinting & Discovering API Authentication attacks on API (JWT) Authorization attacks on API (OAuth) Bruteforce attacks on API Attacking Dev/Staging API Traditional attacks]]>
Mon, 26 Mar 2018 10:01:07 GMT /slideshow/pentesting-rest-apis-by-gaurang-bhatnagar/91933883 OWASPdelhi@slideshare.net(OWASPdelhi) Pentesting Rest API's by :- Gaurang Bhatnagar OWASPdelhi Brief overview of API Fingerprinting & Discovering API Authentication attacks on API (JWT) Authorization attacks on API (OAuth) Bruteforce attacks on API Attacking Dev/Staging API Traditional attacks <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/apitesting-180326100107-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Brief overview of API Fingerprinting &amp; Discovering API Authentication attacks on API (JWT) Authorization attacks on API (OAuth) Bruteforce attacks on API Attacking Dev/Staging API Traditional attacks
Pentesting Rest API's by :- Gaurang Bhatnagar from OWASP Delhi
]]>
6421 6 https://cdn.slidesharecdn.com/ss_thumbnails/apitesting-180326100107-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Wireless security beyond password cracking by Mohit Ranjan /slideshow/wireless-security-beyond-password-cracking-by-mohit-ranjan/91758136 nullowasptalk-180324041429
Network attacks in wired Lan environments Protection in wired Lan Layout of modern networks ( wired + wireless ) Difference between wired and wireless security Most powerful situation to acquire in any network Wireless attacks Why NTP ? Captive portal attacks Conclusion and some wild thoughts For complete data to perform this attack please go to the Github link below: https://github.com/mohitrajain/Wireless_security_beyond_password_cracking]]>

Network attacks in wired Lan environments Protection in wired Lan Layout of modern networks ( wired + wireless ) Difference between wired and wireless security Most powerful situation to acquire in any network Wireless attacks Why NTP ? Captive portal attacks Conclusion and some wild thoughts For complete data to perform this attack please go to the Github link below: https://github.com/mohitrajain/Wireless_security_beyond_password_cracking]]>
Sat, 24 Mar 2018 04:14:29 GMT /slideshow/wireless-security-beyond-password-cracking-by-mohit-ranjan/91758136 OWASPdelhi@slideshare.net(OWASPdelhi) Wireless security beyond password cracking by Mohit Ranjan OWASPdelhi Network attacks in wired Lan environments Protection in wired Lan Layout of modern networks ( wired + wireless ) Difference between wired and wireless security Most powerful situation to acquire in any network Wireless attacks Why NTP ? Captive portal attacks Conclusion and some wild thoughts For complete data to perform this attack please go to the Github link below: https://github.com/mohitrajain/Wireless_security_beyond_password_cracking <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/nullowasptalk-180324041429-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Network attacks in wired Lan environments Protection in wired Lan Layout of modern networks ( wired + wireless ) Difference between wired and wireless security Most powerful situation to acquire in any network Wireless attacks Why NTP ? Captive portal attacks Conclusion and some wild thoughts For complete data to perform this attack please go to the Github link below: https://github.com/mohitrajain/Wireless_security_beyond_password_cracking
Wireless security beyond password cracking by Mohit Ranjan from OWASP Delhi
]]>
158 1 https://cdn.slidesharecdn.com/ss_thumbnails/nullowasptalk-180324041429-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
IETF's Role and Mandate in Internet Governance by Mohit Batra /slideshow/ietfs-role-and-mandate-in-internet-governance-by-mohit-batra/86503945 ietfmohit-180122071555
1. Internet Governance (IG) Primer 2. I-* Organizations 3. IANA function -Names, Numbers and Protocol Parameters 4. IANA Transition 5. WHOIS for names and numbers 6. Need for Standardization and Standardization Bodies 7. How IETF Works 8. TLS Protocol 9. Increasing Indian participation in global Internet Governance activities and structures]]>

1. Internet Governance (IG) Primer 2. I-* Organizations 3. IANA function -Names, Numbers and Protocol Parameters 4. IANA Transition 5. WHOIS for names and numbers 6. Need for Standardization and Standardization Bodies 7. How IETF Works 8. TLS Protocol 9. Increasing Indian participation in global Internet Governance activities and structures]]>
Mon, 22 Jan 2018 07:15:55 GMT /slideshow/ietfs-role-and-mandate-in-internet-governance-by-mohit-batra/86503945 OWASPdelhi@slideshare.net(OWASPdelhi) IETF's Role and Mandate in Internet Governance by Mohit Batra OWASPdelhi 1. Internet Governance (IG) Primer 2. I-* Organizations 3. IANA function -Names, Numbers and Protocol Parameters 4. IANA Transition 5. WHOIS for names and numbers 6. Need for Standardization and Standardization Bodies 7. How IETF Works 8. TLS Protocol 9. Increasing Indian participation in global Internet Governance activities and structures <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ietfmohit-180122071555-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> 1. Internet Governance (IG) Primer 2. I-* Organizations 3. IANA function -Names, Numbers and Protocol Parameters 4. IANA Transition 5. WHOIS for names and numbers 6. Need for Standardization and Standardization Bodies 7. How IETF Works 8. TLS Protocol 9. Increasing Indian participation in global Internet Governance activities and structures
IETF's Role and Mandate in Internet Governance by Mohit Batra from OWASP Delhi
]]>
535 4 https://cdn.slidesharecdn.com/ss_thumbnails/ietfmohit-180122071555-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Malicious Hypervisor - Virtualization in Shellcodes by Adhokshaj Mishra /OWASPdelhi/malicious-hypervisor-virtualization-in-shellcodes-by-adhokshaj-mishra malicioushypervisor-170515100000
Agenda Hypervisor : what, how and why? Hypervisor in linux Capsule course on hypervisor (Intel VT-x, AMD - V, KVM) Spawning a bare-bone VM Injection code in VM I/O Between Host and Guest Converting C Code to Shellcode]]>

Agenda Hypervisor : what, how and why? Hypervisor in linux Capsule course on hypervisor (Intel VT-x, AMD - V, KVM) Spawning a bare-bone VM Injection code in VM I/O Between Host and Guest Converting C Code to Shellcode]]>
Mon, 15 May 2017 10:00:00 GMT /OWASPdelhi/malicious-hypervisor-virtualization-in-shellcodes-by-adhokshaj-mishra OWASPdelhi@slideshare.net(OWASPdelhi) Malicious Hypervisor - Virtualization in Shellcodes by Adhokshaj Mishra OWASPdelhi Agenda Hypervisor : what, how and why? Hypervisor in linux Capsule course on hypervisor (Intel VT-x, AMD - V, KVM) Spawning a bare-bone VM Injection code in VM I/O Between Host and Guest Converting C Code to Shellcode <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/malicioushypervisor-170515100000-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Agenda Hypervisor : what, how and why? Hypervisor in linux Capsule course on hypervisor (Intel VT-x, AMD - V, KVM) Spawning a bare-bone VM Injection code in VM I/O Between Host and Guest Converting C Code to Shellcode
Malicious Hypervisor - Virtualization in Shellcodes by Adhokshaj Mishra from OWASP Delhi
]]>
534 3 https://cdn.slidesharecdn.com/ss_thumbnails/malicioushypervisor-170515100000-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
ICS Security 101 by Sandeep Singh /slideshow/ics-security-101-by-sandeep-singh/73623568 icssecurity101-170325034938
ICS Security 101 by Sandeep Singh @ Combined null Delhi & OWASP Delhi March 2017 Meetup]]>

ICS Security 101 by Sandeep Singh @ Combined null Delhi & OWASP Delhi March 2017 Meetup]]>
Sat, 25 Mar 2017 03:49:38 GMT /slideshow/ics-security-101-by-sandeep-singh/73623568 OWASPdelhi@slideshare.net(OWASPdelhi) ICS Security 101 by Sandeep Singh OWASPdelhi ICS Security 101 by Sandeep Singh @ Combined null Delhi & OWASP Delhi March 2017 Meetup <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/icssecurity101-170325034938-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> ICS Security 101 by Sandeep Singh @ Combined null Delhi &amp; OWASP Delhi March 2017 Meetup
ICS Security 101 by Sandeep Singh from OWASP Delhi
]]>
1654 6 https://cdn.slidesharecdn.com/ss_thumbnails/icssecurity101-170325034938-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Thwarting The Surveillance in Online Communication by Adhokshaj Mishra /slideshow/thwarting-the-surveillance-in-online-communication-by-adhokshaj-mishra/73258864 dclko-170317162955
Thwarting The Surveillance in Online Communication by Adhokshaj Mishra @ Combined null Delhi and OWASP Delhi February 2017 meet ]]>

Thwarting The Surveillance in Online Communication by Adhokshaj Mishra @ Combined null Delhi and OWASP Delhi February 2017 meet ]]>
Fri, 17 Mar 2017 16:29:55 GMT /slideshow/thwarting-the-surveillance-in-online-communication-by-adhokshaj-mishra/73258864 OWASPdelhi@slideshare.net(OWASPdelhi) Thwarting The Surveillance in Online Communication by Adhokshaj Mishra OWASPdelhi Thwarting The Surveillance in Online Communication by Adhokshaj Mishra @ Combined null Delhi and OWASP Delhi February 2017 meet <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/dclko-170317162955-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Thwarting The Surveillance in Online Communication by Adhokshaj Mishra @ Combined null Delhi and OWASP Delhi February 2017 meet
Thwarting The Surveillance in Online Communication by Adhokshaj Mishra from OWASP Delhi
]]>
435 3 https://cdn.slidesharecdn.com/ss_thumbnails/dclko-170317162955-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-OWASPdelhi-48x48.jpg?cb=1652512237 Official 際際滷share Account of OWASP Delhi Chapter www.owasp.org/index.php/Delhi_NCR https://cdn.slidesharecdn.com/ss_thumbnails/nulltalk-200615105049-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/getting-started-with-hacking-android-ios-apps-tools-techniques-and-resources/235628588 Getting Started With H... https://cdn.slidesharecdn.com/ss_thumbnails/securingdnsrecordsfromsubdomaintakeover-200607122550-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/securing-dns-records-from-subdomain-takeover/235141216 Securing dns records f... https://cdn.slidesharecdn.com/ss_thumbnails/nulldelhi-reportwriting-200601084209-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/effective-cyber-security-report-writing/234815530 Effective Cyber Securi...