ºÝºÝߣshows by User: anantshri / http://www.slideshare.net/images/logo.gif ºÝºÝߣshows by User: anantshri / Sun, 14 Nov 2021 14:37:51 GMT ºÝºÝߣShare feed for ºÝºÝߣshows by User: anantshri Diverseccon keynote: My 2 Paisa's on Infosec World /slideshow/diverseccon-keynote-my-2-paisas-on-infosec-world/250647590 diverseccon-keynote-211114143751
My 2 Paisa's on Infosec World #randomthoughts]]>

My 2 Paisa's on Infosec World #randomthoughts]]>
Sun, 14 Nov 2021 14:37:51 GMT /slideshow/diverseccon-keynote-my-2-paisas-on-infosec-world/250647590 anantshri@slideshare.net(anantshri) Diverseccon keynote: My 2 Paisa's on Infosec World anantshri My 2 Paisa's on Infosec World #randomthoughts <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/diverseccon-keynote-211114143751-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> My 2 Paisa&#39;s on Infosec World #randomthoughts
Diverseccon keynote: My 2 Paisa's on Infosec World from Anant Shrivastava
]]>
1697 0 https://cdn.slidesharecdn.com/ss_thumbnails/diverseccon-keynote-211114143751-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Null bhopal Sep 2016: What it Takes to Secure a Web Application /slideshow/null-bhopal-sep-2016-what-it-takes-to-secure-a-web-application/66012128 nullbhopalsep2016whatittakestosecureawebapplication-160914104533
accompanying slides for the session conducted during null bhopal chapter meet on 11th sep 2016]]>

accompanying slides for the session conducted during null bhopal chapter meet on 11th sep 2016]]>
Wed, 14 Sep 2016 10:45:33 GMT /slideshow/null-bhopal-sep-2016-what-it-takes-to-secure-a-web-application/66012128 anantshri@slideshare.net(anantshri) Null bhopal Sep 2016: What it Takes to Secure a Web Application anantshri accompanying slides for the session conducted during null bhopal chapter meet on 11th sep 2016 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/nullbhopalsep2016whatittakestosecureawebapplication-160914104533-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> accompanying slides for the session conducted during null bhopal chapter meet on 11th sep 2016
Null bhopal Sep 2016: What it Takes to Secure a Web Application from Anant Shrivastava
]]>
4118 4 https://cdn.slidesharecdn.com/ss_thumbnails/nullbhopalsep2016whatittakestosecureawebapplication-160914104533-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Android Tamer BH USA 2016 : Arsenal Presentation /slideshow/android-tamer-bh-usa-2016-arsenal-presentation/64675285 bhusaarsenalpresentation-160803220500
Arsenal Demo of Android Tamer presented on 3rd Aug 2016.]]>

Arsenal Demo of Android Tamer presented on 3rd Aug 2016.]]>
Wed, 03 Aug 2016 22:05:00 GMT /slideshow/android-tamer-bh-usa-2016-arsenal-presentation/64675285 anantshri@slideshare.net(anantshri) Android Tamer BH USA 2016 : Arsenal Presentation anantshri Arsenal Demo of Android Tamer presented on 3rd Aug 2016. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/bhusaarsenalpresentation-160803220500-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Arsenal Demo of Android Tamer presented on 3rd Aug 2016.
Android Tamer BH USA 2016 : Arsenal Presentation from Anant Shrivastava
]]>
1900 2 https://cdn.slidesharecdn.com/ss_thumbnails/bhusaarsenalpresentation-160803220500-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Android Tamer: Virtual Machine for Android (Security) Professionals /anantshri/android-tamer-virtual-machine-for-android-security-professionals asia-16-shrivastava-androidtamer-160422163727
Android Tamer is a virtual Machine for Android (Security) Professionals. This presentation was used in Blackhat Asia Arsenal 2016.]]>

Android Tamer is a virtual Machine for Android (Security) Professionals. This presentation was used in Blackhat Asia Arsenal 2016.]]>
Fri, 22 Apr 2016 16:37:27 GMT /anantshri/android-tamer-virtual-machine-for-android-security-professionals anantshri@slideshare.net(anantshri) Android Tamer: Virtual Machine for Android (Security) Professionals anantshri Android Tamer is a virtual Machine for Android (Security) Professionals. This presentation was used in Blackhat Asia Arsenal 2016. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/asia-16-shrivastava-androidtamer-160422163727-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Android Tamer is a virtual Machine for Android (Security) Professionals. This presentation was used in Blackhat Asia Arsenal 2016.
Android Tamer: Virtual Machine for Android (Security) Professionals from Anant Shrivastava
]]>
22653 6 https://cdn.slidesharecdn.com/ss_thumbnails/asia-16-shrivastava-androidtamer-160422163727-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
ºÝºÝߣs null puliya linux basics /slideshow/slides-null-puliya-linux-basics/58527775 slidesnullpuliyalinuxbasics-160221190840
null Puliya session on linux Basics (20th ), a supporter slide deck for the session.]]>

null Puliya session on linux Basics (20th ), a supporter slide deck for the session.]]>
Sun, 21 Feb 2016 19:08:40 GMT /slideshow/slides-null-puliya-linux-basics/58527775 anantshri@slideshare.net(anantshri) ºÝºÝߣs null puliya linux basics anantshri null Puliya session on linux Basics (20th ), a supporter slide deck for the session. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/slidesnullpuliyalinuxbasics-160221190840-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> null Puliya session on linux Basics (20th ), a supporter slide deck for the session.
ºÝºÝߣs null puliya linux basics from Anant Shrivastava
]]>
4025 4 https://cdn.slidesharecdn.com/ss_thumbnails/slidesnullpuliyalinuxbasics-160221190840-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
SSL Pinning and Bypasses: Android and iOS /slideshow/ssl-pinning-and-bypasses-android-and-ios/55360010 sslpinningandbypasses-151121072242-lva1-app6892
How to add SSL Pinning in Android or iOS Application and How to Bypass them. Delivered in November 2015 Null / G4H / OWASP combined monthly meet.]]>

How to add SSL Pinning in Android or iOS Application and How to Bypass them. Delivered in November 2015 Null / G4H / OWASP combined monthly meet.]]>
Sat, 21 Nov 2015 07:22:41 GMT /slideshow/ssl-pinning-and-bypasses-android-and-ios/55360010 anantshri@slideshare.net(anantshri) SSL Pinning and Bypasses: Android and iOS anantshri How to add SSL Pinning in Android or iOS Application and How to Bypass them. Delivered in November 2015 Null / G4H / OWASP combined monthly meet. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/sslpinningandbypasses-151121072242-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> How to add SSL Pinning in Android or iOS Application and How to Bypass them. Delivered in November 2015 Null / G4H / OWASP combined monthly meet.
SSL Pinning and Bypasses: Android and iOS from Anant Shrivastava
]]>
21460 7 https://cdn.slidesharecdn.com/ss_thumbnails/sslpinningandbypasses-151121072242-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Exploiting publically exposed Version Control System /slideshow/exploiting-publically-exposed-version-control-system/52194084 exploitingversioncontrolsystems-150829053634-lva1-app6891
This Demo / talk was focused on exploiting publicly exposed version control system.]]>

This Demo / talk was focused on exploiting publicly exposed version control system.]]>
Sat, 29 Aug 2015 05:36:34 GMT /slideshow/exploiting-publically-exposed-version-control-system/52194084 anantshri@slideshare.net(anantshri) Exploiting publically exposed Version Control System anantshri This Demo / talk was focused on exploiting publicly exposed version control system. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/exploitingversioncontrolsystems-150829053634-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This Demo / talk was focused on exploiting publicly exposed version control system.
Exploiting publically exposed Version Control System from Anant Shrivastava
]]>
5186 7 https://cdn.slidesharecdn.com/ss_thumbnails/exploitingversioncontrolsystems-150829053634-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Understanding The Known: OWASP A9 Using Components With Known Vulnerabilities /slideshow/understanding-the-known-owasp-a9-using-components-with-known-vulnerabilities/51888633 understandingtheknowna9-usingcomponentswithknownvulnerabilities-150821055601-lva1-app6892
c0c0n 2015 Presentation. This talk discussed about the impact of using components with known vulnerabilities along with various tips and tools for software developer or administrator to facilitate identification of vulnerable components.]]>

c0c0n 2015 Presentation. This talk discussed about the impact of using components with known vulnerabilities along with various tips and tools for software developer or administrator to facilitate identification of vulnerable components.]]>
Fri, 21 Aug 2015 05:56:01 GMT /slideshow/understanding-the-known-owasp-a9-using-components-with-known-vulnerabilities/51888633 anantshri@slideshare.net(anantshri) Understanding The Known: OWASP A9 Using Components With Known Vulnerabilities anantshri c0c0n 2015 Presentation. This talk discussed about the impact of using components with known vulnerabilities along with various tips and tools for software developer or administrator to facilitate identification of vulnerable components. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/understandingtheknowna9-usingcomponentswithknownvulnerabilities-150821055601-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> c0c0n 2015 Presentation. This talk discussed about the impact of using components with known vulnerabilities along with various tips and tools for software developer or administrator to facilitate identification of vulnerable components.
Understanding The Known: OWASP A9 Using Components With Known Vulnerabilities from Anant Shrivastava
]]>
5246 8 https://cdn.slidesharecdn.com/ss_thumbnails/understandingtheknowna9-usingcomponentswithknownvulnerabilities-150821055601-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Tale of Forgotten Disclosure and Lesson learned /slideshow/tale-of-forgotten-disclosure-and-lesson-learned/48216132 prettyphoto-150516072030-lva1-app6892
Visual version of http://blog.anantshri.info/forgotten_disclosure_dom_xss_prettyphoto The presentation talks about how a disclsoure was forgotten and what we can do to prevent such issues and how to keep a track on Vulnerable components]]>

Visual version of http://blog.anantshri.info/forgotten_disclosure_dom_xss_prettyphoto The presentation talks about how a disclsoure was forgotten and what we can do to prevent such issues and how to keep a track on Vulnerable components]]>
Sat, 16 May 2015 07:20:30 GMT /slideshow/tale-of-forgotten-disclosure-and-lesson-learned/48216132 anantshri@slideshare.net(anantshri) Tale of Forgotten Disclosure and Lesson learned anantshri Visual version of http://blog.anantshri.info/forgotten_disclosure_dom_xss_prettyphoto The presentation talks about how a disclsoure was forgotten and what we can do to prevent such issues and how to keep a track on Vulnerable components <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/prettyphoto-150516072030-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Visual version of http://blog.anantshri.info/forgotten_disclosure_dom_xss_prettyphoto The presentation talks about how a disclsoure was forgotten and what we can do to prevent such issues and how to keep a track on Vulnerable components
Tale of Forgotten Disclosure and Lesson learned from Anant Shrivastava
]]>
13262 1 https://cdn.slidesharecdn.com/ss_thumbnails/prettyphoto-150516072030-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
My tryst with sourcecode review /slideshow/my-tryst-withsourcecodereviewanantc0c0n2014day2/46649631 mytrystwithsourcecodereviewanantc0c0n2014day2-150404234111-conversion-gate01
A presentation detailing our initial experiments in CodeVigilant project presented in c0c0n 2014.]]>

A presentation detailing our initial experiments in CodeVigilant project presented in c0c0n 2014.]]>
Sat, 04 Apr 2015 23:41:11 GMT /slideshow/my-tryst-withsourcecodereviewanantc0c0n2014day2/46649631 anantshri@slideshare.net(anantshri) My tryst with sourcecode review anantshri A presentation detailing our initial experiments in CodeVigilant project presented in c0c0n 2014. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/mytrystwithsourcecodereviewanantc0c0n2014day2-150404234111-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A presentation detailing our initial experiments in CodeVigilant project presented in c0c0n 2014.
My tryst with sourcecode review from Anant Shrivastava
]]>
2587 1 https://cdn.slidesharecdn.com/ss_thumbnails/mytrystwithsourcecodereviewanantc0c0n2014day2-150404234111-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Snake bites : Python for Pentesters /slideshow/snake-bites-python-for-pentesters/46648021 snakebites-150404211416-conversion-gate01
A beginner level presentation made for c0c0n 2013 to talk about some basic modules of python which can be used in routine penetration testing exercises.]]>

A beginner level presentation made for c0c0n 2013 to talk about some basic modules of python which can be used in routine penetration testing exercises.]]>
Sat, 04 Apr 2015 21:14:16 GMT /slideshow/snake-bites-python-for-pentesters/46648021 anantshri@slideshare.net(anantshri) Snake bites : Python for Pentesters anantshri A beginner level presentation made for c0c0n 2013 to talk about some basic modules of python which can be used in routine penetration testing exercises. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/snakebites-150404211416-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A beginner level presentation made for c0c0n 2013 to talk about some basic modules of python which can be used in routine penetration testing exercises.
Snake bites : Python for Pentesters from Anant Shrivastava
]]>
3111 2 https://cdn.slidesharecdn.com/ss_thumbnails/snakebites-150404211416-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
OWASP Bangalore : OWTF demo : 13 Dec 2014 /slideshow/owasp-bangalore-owtf-demo-13-dec-2014/42671534 owaspowtfdemodec2014bangalore-141213074150-conversion-gate02
This slide deck used as part of the OWASP OWTF demo session during combined monthly meet for OWASP, null, Garage4Hackers]]>

This slide deck used as part of the OWASP OWTF demo session during combined monthly meet for OWASP, null, Garage4Hackers]]>
Sat, 13 Dec 2014 07:41:50 GMT /slideshow/owasp-bangalore-owtf-demo-13-dec-2014/42671534 anantshri@slideshare.net(anantshri) OWASP Bangalore : OWTF demo : 13 Dec 2014 anantshri This slide deck used as part of the OWASP OWTF demo session during combined monthly meet for OWASP, null, Garage4Hackers <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/owaspowtfdemodec2014bangalore-141213074150-conversion-gate02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This slide deck used as part of the OWASP OWTF demo session during combined monthly meet for OWASP, null, Garage4Hackers
OWASP Bangalore : OWTF demo : 13 Dec 2014 from Anant Shrivastava
]]>
4652 3 https://cdn.slidesharecdn.com/ss_thumbnails/owaspowtfdemodec2014bangalore-141213074150-conversion-gate02-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Owasp Mobile Risk Series : M4 : Unintended Data Leakage /slideshow/owasp-risk-series-m4/40429856 owaspriskseries-m4-141018073212-conversion-gate01
This presentation is part of a series focused on OWASP Mobile Top 10 : We discussed about what is data leakage, places where data could be leaked. sample /examples of data leakage and how it differes from M2: Insecure data storage.]]>

This presentation is part of a series focused on OWASP Mobile Top 10 : We discussed about what is data leakage, places where data could be leaked. sample /examples of data leakage and how it differes from M2: Insecure data storage.]]>
Sat, 18 Oct 2014 07:32:12 GMT /slideshow/owasp-risk-series-m4/40429856 anantshri@slideshare.net(anantshri) Owasp Mobile Risk Series : M4 : Unintended Data Leakage anantshri This presentation is part of a series focused on OWASP Mobile Top 10 : We discussed about what is data leakage, places where data could be leaked. sample /examples of data leakage and how it differes from M2: Insecure data storage. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/owaspriskseries-m4-141018073212-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This presentation is part of a series focused on OWASP Mobile Top 10 : We discussed about what is data leakage, places where data could be leaked. sample /examples of data leakage and how it differes from M2: Insecure data storage.
Owasp Mobile Risk Series : M4 : Unintended Data Leakage from Anant Shrivastava
]]>
40294 2 https://cdn.slidesharecdn.com/ss_thumbnails/owaspriskseries-m4-141018073212-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection /slideshow/owasp-mobile-risk-series-m3-insecure-transport-layer/39313497 owaspriskseries-m3-140920015525-phpapp01
This Session will focus on Mobile Top 10 2014-M3 : Insufficient Transport Layer protection. We will try to understand Transport Layer, Transport layer security (TLS), insecurities in TLS/SSL, and how this affects the overall security of Mobile Devices as well as what kind of protection can be applied and how this can be identified..]]>

This Session will focus on Mobile Top 10 2014-M3 : Insufficient Transport Layer protection. We will try to understand Transport Layer, Transport layer security (TLS), insecurities in TLS/SSL, and how this affects the overall security of Mobile Devices as well as what kind of protection can be applied and how this can be identified..]]>
Sat, 20 Sep 2014 01:55:25 GMT /slideshow/owasp-mobile-risk-series-m3-insecure-transport-layer/39313497 anantshri@slideshare.net(anantshri) Owasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection anantshri This Session will focus on Mobile Top 10 2014-M3 : Insufficient Transport Layer protection. We will try to understand Transport Layer, Transport layer security (TLS), insecurities in TLS/SSL, and how this affects the overall security of Mobile Devices as well as what kind of protection can be applied and how this can be identified.. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/owaspriskseries-m3-140920015525-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This Session will focus on Mobile Top 10 2014-M3 : Insufficient Transport Layer protection. We will try to understand Transport Layer, Transport layer security (TLS), insecurities in TLS/SSL, and how this affects the overall security of Mobile Devices as well as what kind of protection can be applied and how this can be identified..
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection from Anant Shrivastava
]]>
40541 2 https://cdn.slidesharecdn.com/ss_thumbnails/owaspriskseries-m3-140920015525-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014 /anantshri/owasp-38811149 nullbangalorem2owaspmobileaug2014-140908012919-phpapp02
This presentation talks about OWASP Mobile Risk M2 i.e. Insecure Data Storage. The agenda of the presentation is to understand the Data Storage and effect of insecure data storage. Then it also had demo's of known insecure data storage flaws. Methods to identify this flaw and various precautions that a developer should take to prevent this flaw. The presentation was done as part of null/OWASP/G4H Monthly Meet ]]>

This presentation talks about OWASP Mobile Risk M2 i.e. Insecure Data Storage. The agenda of the presentation is to understand the Data Storage and effect of insecure data storage. Then it also had demo's of known insecure data storage flaws. Methods to identify this flaw and various precautions that a developer should take to prevent this flaw. The presentation was done as part of null/OWASP/G4H Monthly Meet ]]>
Mon, 08 Sep 2014 01:29:19 GMT /anantshri/owasp-38811149 anantshri@slideshare.net(anantshri) Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014 anantshri This presentation talks about OWASP Mobile Risk M2 i.e. Insecure Data Storage. The agenda of the presentation is to understand the Data Storage and effect of insecure data storage. Then it also had demo's of known insecure data storage flaws. Methods to identify this flaw and various precautions that a developer should take to prevent this flaw. The presentation was done as part of null/OWASP/G4H Monthly Meet <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/nullbangalorem2owaspmobileaug2014-140908012919-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This presentation talks about OWASP Mobile Risk M2 i.e. Insecure Data Storage. The agenda of the presentation is to understand the Data Storage and effect of insecure data storage. Then it also had demo&#39;s of known insecure data storage flaws. Methods to identify this flaw and various precautions that a developer should take to prevent this flaw. The presentation was done as part of null/OWASP/G4H Monthly Meet
Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014 from Anant Shrivastava
]]>
40998 1 https://cdn.slidesharecdn.com/ss_thumbnails/nullbangalorem2owaspmobileaug2014-140908012919-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
When the internet bleeded : RootConf 2014 /slideshow/when-the-internet-bleeded-rootconf-2014/34791920 whentheinternetbleeded-140517002910-phpapp02
Presentation on Heartbleed and other SSL / TLS issues. presented at RootConf 2014]]>

Presentation on Heartbleed and other SSL / TLS issues. presented at RootConf 2014]]>
Sat, 17 May 2014 00:29:10 GMT /slideshow/when-the-internet-bleeded-rootconf-2014/34791920 anantshri@slideshare.net(anantshri) When the internet bleeded : RootConf 2014 anantshri Presentation on Heartbleed and other SSL / TLS issues. presented at RootConf 2014 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/whentheinternetbleeded-140517002910-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Presentation on Heartbleed and other SSL / TLS issues. presented at RootConf 2014
When the internet bleeded : RootConf 2014 from Anant Shrivastava
]]>
2262 2 https://cdn.slidesharecdn.com/ss_thumbnails/whentheinternetbleeded-140517002910-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Raspberry pi Beginners Session /slideshow/raspberry-pi-final/27285543 raspberrypifinal-131017040520-phpapp01
]]>

]]>
Thu, 17 Oct 2013 04:05:19 GMT /slideshow/raspberry-pi-final/27285543 anantshri@slideshare.net(anantshri) Raspberry pi Beginners Session anantshri <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/raspberrypifinal-131017040520-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Raspberry pi Beginners Session from Anant Shrivastava
]]>
5124 4 https://cdn.slidesharecdn.com/ss_thumbnails/raspberrypifinal-131017040520-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Career In Information security /slideshow/career-in-information-security/13024195 slideshare-careerinfosec-120522032137-phpapp02
This Presentation tries to provide a insider view on various career opportunities for new budding talents in the field of information security.]]>

This Presentation tries to provide a insider view on various career opportunities for new budding talents in the field of information security.]]>
Tue, 22 May 2012 03:21:34 GMT /slideshow/career-in-information-security/13024195 anantshri@slideshare.net(anantshri) Career In Information security anantshri This Presentation tries to provide a insider view on various career opportunities for new budding talents in the field of information security. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/slideshare-careerinfosec-120522032137-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This Presentation tries to provide a insider view on various career opportunities for new budding talents in the field of information security.
Career In Information security from Anant Shrivastava
]]>
5149 9 https://cdn.slidesharecdn.com/ss_thumbnails/slideshare-careerinfosec-120522032137-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
WhitePaper : Security issues in android custom rom /slideshow/whitepaper-security-issues-in-android-custom-rom/9723927 securityissuesinandroidcustomrom-paper-111016181419-phpapp02
This paper attempts to look behind the wheels of android and keeping special focus on custom rom’s and basically check for security misconfiguration’s which could yield to device compromise, which may result in malware infection or data theft.]]>

This paper attempts to look behind the wheels of android and keeping special focus on custom rom’s and basically check for security misconfiguration’s which could yield to device compromise, which may result in malware infection or data theft.]]>
Sun, 16 Oct 2011 18:14:16 GMT /slideshow/whitepaper-security-issues-in-android-custom-rom/9723927 anantshri@slideshare.net(anantshri) WhitePaper : Security issues in android custom rom anantshri This paper attempts to look behind the wheels of android and keeping special focus on custom rom’s and basically check for security misconfiguration’s which could yield to device compromise, which may result in malware infection or data theft. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/securityissuesinandroidcustomrom-paper-111016181419-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This paper attempts to look behind the wheels of android and keeping special focus on custom rom’s and basically check for security misconfiguration’s which could yield to device compromise, which may result in malware infection or data theft.
WhitePaper : Security issues in android custom rom from Anant Shrivastava
]]>
1764 4 https://cdn.slidesharecdn.com/ss_thumbnails/securityissuesinandroidcustomrom-paper-111016181419-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Security Issues in Android Custom ROM /slideshow/security-issues-in-android-custom-rom/9723906 cocon-slides-111016181141-phpapp01
This paper attempts to look behind the wheels of android and keeping special focus on custom rom’s and basically check for security misconfiguration’s which could yield to device compromise, which may result in malware infection or data theft.]]>

This paper attempts to look behind the wheels of android and keeping special focus on custom rom’s and basically check for security misconfiguration’s which could yield to device compromise, which may result in malware infection or data theft.]]>
Sun, 16 Oct 2011 18:11:39 GMT /slideshow/security-issues-in-android-custom-rom/9723906 anantshri@slideshare.net(anantshri) Security Issues in Android Custom ROM anantshri This paper attempts to look behind the wheels of android and keeping special focus on custom rom’s and basically check for security misconfiguration’s which could yield to device compromise, which may result in malware infection or data theft. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cocon-slides-111016181141-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This paper attempts to look behind the wheels of android and keeping special focus on custom rom’s and basically check for security misconfiguration’s which could yield to device compromise, which may result in malware infection or data theft.
Security Issues in Android Custom ROM from Anant Shrivastava
]]>
3520 5 https://cdn.slidesharecdn.com/ss_thumbnails/cocon-slides-111016181141-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-anantshri-48x48.jpg?cb=1677961134 IT Professional With 14+ years of corporate exposure ranging from the Application Security, Application Development and Systems and Servers Administration. Started my career as a Systems and Servers Administrator, Moving forward to focus towards security products, eventually moving fully into Information Security in my last two jobs. I have strong inclinations towards Web Application and mobile security domains, projects section will outline my efforts on these domains anantshri.info https://cdn.slidesharecdn.com/ss_thumbnails/diverseccon-keynote-211114143751-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/diverseccon-keynote-my-2-paisas-on-infosec-world/250647590 Diverseccon keynote: M... https://cdn.slidesharecdn.com/ss_thumbnails/nullbhopalsep2016whatittakestosecureawebapplication-160914104533-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/null-bhopal-sep-2016-what-it-takes-to-secure-a-web-application/66012128 Null bhopal Sep 2016: ... https://cdn.slidesharecdn.com/ss_thumbnails/bhusaarsenalpresentation-160803220500-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/android-tamer-bh-usa-2016-arsenal-presentation/64675285 Android Tamer BH USA 2...