際際滷shows by User: PrakashSuthar1 / http://www.slideshare.net/images/logo.gif 際際滷shows by User: PrakashSuthar1 / Mon, 04 May 2015 04:50:54 GMT 際際滷Share feed for 際際滷shows by User: PrakashSuthar1 Malware analysis /slideshow/malware-analysis-47720165/47720165 malwareanalysislnl-150504045054-conversion-gate01
]]>

]]>
Mon, 04 May 2015 04:50:54 GMT /slideshow/malware-analysis-47720165/47720165 PrakashSuthar1@slideshare.net(PrakashSuthar1) Malware analysis PrakashSuthar1 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/malwareanalysislnl-150504045054-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Malware analysis from Prakashchand Suthar
]]>
4515 1 https://cdn.slidesharecdn.com/ss_thumbnails/malwareanalysislnl-150504045054-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Pentesting with Metasploit /slideshow/pentesting-with-metasploit/29026678 pentestingwithmetasploit-131209011343-phpapp02
Pentesting? What is Pentesting? Why Pentesting? Millions of dollars have been invested in security programs to protect critical infrastructure to prevent data breaches]]>

Pentesting? What is Pentesting? Why Pentesting? Millions of dollars have been invested in security programs to protect critical infrastructure to prevent data breaches]]>
Mon, 09 Dec 2013 01:13:43 GMT /slideshow/pentesting-with-metasploit/29026678 PrakashSuthar1@slideshare.net(PrakashSuthar1) Pentesting with Metasploit PrakashSuthar1 Pentesting? What is Pentesting? Why Pentesting? Millions of dollars have been invested in security programs to protect critical infrastructure to prevent data breaches <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/pentestingwithmetasploit-131209011343-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Pentesting? What is Pentesting? Why Pentesting? Millions of dollars have been invested in security programs to protect critical infrastructure to prevent data breaches
Pentesting with Metasploit from Prakashchand Suthar
]]>
3429 7 https://cdn.slidesharecdn.com/ss_thumbnails/pentestingwithmetasploit-131209011343-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Hacking with Reverse Engineering and Defense against it /slideshow/reverse-code-engineering/29026406 reversecodeengineering-131209010238-phpapp01
]]>

]]>
Mon, 09 Dec 2013 01:02:38 GMT /slideshow/reverse-code-engineering/29026406 PrakashSuthar1@slideshare.net(PrakashSuthar1) Hacking with Reverse Engineering and Defense against it PrakashSuthar1 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/reversecodeengineering-131209010238-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Hacking with Reverse Engineering and Defense against it from Prakashchand Suthar
]]>
4015 3 https://cdn.slidesharecdn.com/ss_thumbnails/reversecodeengineering-131209010238-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
WiFi Secuiry: Attack & Defence /slideshow/wifi-secuiry-attack-defence/24895425 wifisecuiry-attackdefence-130803102019-phpapp01
We all use Wifi today. You know how much money it saves for your smart-phone data usage band-width. Connecting all your computers and gadgets with cables is not just history, even if you attempt it would be impractical! Wifi being so pervasive, also brings along tremendous security implications. Come join us to look into details of Wifi security. How to secure your wifi network? How certain wifi encryption technologies can be hacked? We would prove that with live demos! Join us to reflect on the security aspect of this technology, discuss about it and leave with more confidence about how 'secure' your WiFi access is?]]>

We all use Wifi today. You know how much money it saves for your smart-phone data usage band-width. Connecting all your computers and gadgets with cables is not just history, even if you attempt it would be impractical! Wifi being so pervasive, also brings along tremendous security implications. Come join us to look into details of Wifi security. How to secure your wifi network? How certain wifi encryption technologies can be hacked? We would prove that with live demos! Join us to reflect on the security aspect of this technology, discuss about it and leave with more confidence about how 'secure' your WiFi access is?]]>
Sat, 03 Aug 2013 10:20:19 GMT /slideshow/wifi-secuiry-attack-defence/24895425 PrakashSuthar1@slideshare.net(PrakashSuthar1) WiFi Secuiry: Attack & Defence PrakashSuthar1 We all use Wifi today. You know how much money it saves for your smart-phone data usage band-width. Connecting all your computers and gadgets with cables is not just history, even if you attempt it would be impractical! Wifi being so pervasive, also brings along tremendous security implications. Come join us to look into details of Wifi security. How to secure your wifi network? How certain wifi encryption technologies can be hacked? We would prove that with live demos! Join us to reflect on the security aspect of this technology, discuss about it and leave with more confidence about how 'secure' your WiFi access is? <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/wifisecuiry-attackdefence-130803102019-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> We all use Wifi today. You know how much money it saves for your smart-phone data usage band-width. Connecting all your computers and gadgets with cables is not just history, even if you attempt it would be impractical! Wifi being so pervasive, also brings along tremendous security implications. Come join us to look into details of Wifi security. How to secure your wifi network? How certain wifi encryption technologies can be hacked? We would prove that with live demos! Join us to reflect on the security aspect of this technology, discuss about it and leave with more confidence about how &#39;secure&#39; your WiFi access is?
WiFi Secuiry: Attack & Defence from Prakashchand Suthar
]]>
16521 15 https://cdn.slidesharecdn.com/ss_thumbnails/wifisecuiry-attackdefence-130803102019-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Xss talk, attack and defense /slideshow/xss-talk-attack-and-defense/23439324 xsstalkattackanddefense-130624231110-phpapp01
XSS? Sure, we all have heard about - XSS, stands for Cross Site Scripting, but XSS sounds lot more cool, huh? Have your account or website been hacked? Or you sure might have heard about such a compromised account or site from someone? Have you been ever tricked by a website? Have you ever noticed your everyday trusted site behaving abnormally, throwing weird content at you? Nowadays, these are very common incidents. Recently: Pentagon XSS Hack Facebook XSS Hack How hackers do it all? Why the hell do they do it? Would you like to check it out live, do some hands-on? And focus on how to secure against this nasty vulnerability. Come join us to see - HOW IT HAPPENS and MAKE IT HAPPEN YOURSELF.]]>

XSS? Sure, we all have heard about - XSS, stands for Cross Site Scripting, but XSS sounds lot more cool, huh? Have your account or website been hacked? Or you sure might have heard about such a compromised account or site from someone? Have you been ever tricked by a website? Have you ever noticed your everyday trusted site behaving abnormally, throwing weird content at you? Nowadays, these are very common incidents. Recently: Pentagon XSS Hack Facebook XSS Hack How hackers do it all? Why the hell do they do it? Would you like to check it out live, do some hands-on? And focus on how to secure against this nasty vulnerability. Come join us to see - HOW IT HAPPENS and MAKE IT HAPPEN YOURSELF.]]>
Mon, 24 Jun 2013 23:11:09 GMT /slideshow/xss-talk-attack-and-defense/23439324 PrakashSuthar1@slideshare.net(PrakashSuthar1) Xss talk, attack and defense PrakashSuthar1 XSS? Sure, we all have heard about - XSS, stands for Cross Site Scripting, but XSS sounds lot more cool, huh? Have your account or website been hacked? Or you sure might have heard about such a compromised account or site from someone? Have you been ever tricked by a website? Have you ever noticed your everyday trusted site behaving abnormally, throwing weird content at you? Nowadays, these are very common incidents. Recently: Pentagon XSS Hack Facebook XSS Hack How hackers do it all? Why the hell do they do it? Would you like to check it out live, do some hands-on? And focus on how to secure against this nasty vulnerability. Come join us to see - HOW IT HAPPENS and MAKE IT HAPPEN YOURSELF. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/xsstalkattackanddefense-130624231110-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> XSS? Sure, we all have heard about - XSS, stands for Cross Site Scripting, but XSS sounds lot more cool, huh? Have your account or website been hacked? Or you sure might have heard about such a compromised account or site from someone? Have you been ever tricked by a website? Have you ever noticed your everyday trusted site behaving abnormally, throwing weird content at you? Nowadays, these are very common incidents. Recently: Pentagon XSS Hack Facebook XSS Hack How hackers do it all? Why the hell do they do it? Would you like to check it out live, do some hands-on? And focus on how to secure against this nasty vulnerability. Come join us to see - HOW IT HAPPENS and MAKE IT HAPPEN YOURSELF.
Xss talk, attack and defense from Prakashchand Suthar
]]>
21685 7 https://cdn.slidesharecdn.com/ss_thumbnails/xsstalkattackanddefense-130624231110-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-PrakashSuthar1-48x48.jpg?cb=1598023036 https://cdn.slidesharecdn.com/ss_thumbnails/malwareanalysislnl-150504045054-conversion-gate01-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/malware-analysis-47720165/47720165 Malware analysis https://cdn.slidesharecdn.com/ss_thumbnails/pentestingwithmetasploit-131209011343-phpapp02-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/pentesting-with-metasploit/29026678 Pentesting with Metasp... https://cdn.slidesharecdn.com/ss_thumbnails/reversecodeengineering-131209010238-phpapp01-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/reverse-code-engineering/29026406 Hacking with Reverse E...