際際滷shows by User: vinothkumar361 / http://www.slideshare.net/images/logo.gif 際際滷shows by User: vinothkumar361 / Sat, 13 Jul 2019 12:08:42 GMT 際際滷Share feed for 際際滷shows by User: vinothkumar361 G suite misconfigurations- Null meet, Chennai /slideshow/g-suite-misconfigurations-null-meet/155349547 gsuitemisconfigurations-nullmeet-190713120842
1. Using Google groups for OSINT. 2. Google groups misconfiguration. 3. Google sites misconfiguration. 4. Join any Google groups in your org account. 5. Automating the test case. ]]>

1. Using Google groups for OSINT. 2. Google groups misconfiguration. 3. Google sites misconfiguration. 4. Join any Google groups in your org account. 5. Automating the test case. ]]>
Sat, 13 Jul 2019 12:08:42 GMT /slideshow/g-suite-misconfigurations-null-meet/155349547 vinothkumar361@slideshare.net(vinothkumar361) G suite misconfigurations- Null meet, Chennai vinothkumar361 1. Using Google groups for OSINT. 2. Google groups misconfiguration. 3. Google sites misconfiguration. 4. Join any Google groups in your org account. 5. Automating the test case. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/gsuitemisconfigurations-nullmeet-190713120842-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> 1. Using Google groups for OSINT. 2. Google groups misconfiguration. 3. Google sites misconfiguration. 4. Join any Google groups in your org account. 5. Automating the test case.
G suite misconfigurations- Null meet, Chennai from vinoth kumar
]]>
605 3 https://cdn.slidesharecdn.com/ss_thumbnails/gsuitemisconfigurations-nullmeet-190713120842-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Github security bug bounty hunting /slideshow/github-security-bug-bounty-hunting/142485947 githubsecurity-bugbountyhunting-190427085337
How to security your org Github account. n|u - The Open security community Chennai Meet Presenter : Vinothkumar Date : 27/04/2019]]>

How to security your org Github account. n|u - The Open security community Chennai Meet Presenter : Vinothkumar Date : 27/04/2019]]>
Sat, 27 Apr 2019 08:53:37 GMT /slideshow/github-security-bug-bounty-hunting/142485947 vinothkumar361@slideshare.net(vinothkumar361) Github security bug bounty hunting vinothkumar361 How to security your org Github account. n|u - The Open security community Chennai Meet Presenter : Vinothkumar Date : 27/04/2019 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/githubsecurity-bugbountyhunting-190427085337-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> How to security your org Github account. n|u - The Open security community Chennai Meet Presenter : Vinothkumar Date : 27/04/2019
Github security bug bounty hunting from vinoth kumar
]]>
1901 6 https://cdn.slidesharecdn.com/ss_thumbnails/githubsecurity-bugbountyhunting-190427085337-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Oauth 2.0 security /slideshow/oauth-20-security/103165798 oauth2-180626174149
OAuth 2.0 Oauth2.0 is an authorization framework for web applications. It permits selective access to a users resource without disclosing the password to the website which asks for the resource. Agenda for the session: What is Oauth 2.0 Oauth 2.0 Terminologies Oauth workflow Exploiting Oauth for fun and profit Reference]]>

OAuth 2.0 Oauth2.0 is an authorization framework for web applications. It permits selective access to a users resource without disclosing the password to the website which asks for the resource. Agenda for the session: What is Oauth 2.0 Oauth 2.0 Terminologies Oauth workflow Exploiting Oauth for fun and profit Reference]]>
Tue, 26 Jun 2018 17:41:49 GMT /slideshow/oauth-20-security/103165798 vinothkumar361@slideshare.net(vinothkumar361) Oauth 2.0 security vinothkumar361 OAuth 2.0 Oauth2.0 is an authorization framework for web applications. It permits selective access to a users resource without disclosing the password to the website which asks for the resource. Agenda for the session: What is Oauth 2.0 Oauth 2.0 Terminologies Oauth workflow Exploiting Oauth for fun and profit Reference <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/oauth2-180626174149-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> OAuth 2.0 Oauth2.0 is an authorization framework for web applications. It permits selective access to a users resource without disclosing the password to the website which asks for the resource. Agenda for the session: What is Oauth 2.0 Oauth 2.0 Terminologies Oauth workflow Exploiting Oauth for fun and profit Reference
Oauth 2.0 security from vinoth kumar
]]>
989 2 https://cdn.slidesharecdn.com/ss_thumbnails/oauth2-180626174149-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Securing your vpc in aws /slideshow/securing-your-vpc-in-aws/88175328 securingyourvpcinaws-180217135723
Agenda for the session. 1. Creating public and private subnets with Elastic IP, Route tables, IGW and NAT Gateways 2. VPC Security components : Security Groups ( SG ), Network Access control list ( NACL ), FlowLogs. 3. Mitigating DDOS. 4. VPC Peering 5. VPC Cleanup]]>

Agenda for the session. 1. Creating public and private subnets with Elastic IP, Route tables, IGW and NAT Gateways 2. VPC Security components : Security Groups ( SG ), Network Access control list ( NACL ), FlowLogs. 3. Mitigating DDOS. 4. VPC Peering 5. VPC Cleanup]]>
Sat, 17 Feb 2018 13:57:23 GMT /slideshow/securing-your-vpc-in-aws/88175328 vinothkumar361@slideshare.net(vinothkumar361) Securing your vpc in aws vinothkumar361 Agenda for the session. 1. Creating public and private subnets with Elastic IP, Route tables, IGW and NAT Gateways 2. VPC Security components : Security Groups ( SG ), Network Access control list ( NACL ), FlowLogs. 3. Mitigating DDOS. 4. VPC Peering 5. VPC Cleanup <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/securingyourvpcinaws-180217135723-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Agenda for the session. 1. Creating public and private subnets with Elastic IP, Route tables, IGW and NAT Gateways 2. VPC Security components : Security Groups ( SG ), Network Access control list ( NACL ), FlowLogs. 3. Mitigating DDOS. 4. VPC Peering 5. VPC Cleanup
Securing your vpc in aws from vinoth kumar
]]>
1015 1 https://cdn.slidesharecdn.com/ss_thumbnails/securingyourvpcinaws-180217135723-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Yet another talk on bug bounty /slideshow/yet-another-talk-on-bug-bounty/78402178 yetanothertalkonbugbounty-170731061755
What is bug bounty How to start with bug bounty My career as a bug bounty hunter Advantages of participating in bug bounty programs Advantages of conducting a bug bounty program Disappointments in bug bounty Popular bug bounty platforms Tips and resources ]]>

What is bug bounty How to start with bug bounty My career as a bug bounty hunter Advantages of participating in bug bounty programs Advantages of conducting a bug bounty program Disappointments in bug bounty Popular bug bounty platforms Tips and resources ]]>
Mon, 31 Jul 2017 06:17:55 GMT /slideshow/yet-another-talk-on-bug-bounty/78402178 vinothkumar361@slideshare.net(vinothkumar361) Yet another talk on bug bounty vinothkumar361 What is bug bounty How to start with bug bounty My career as a bug bounty hunter Advantages of participating in bug bounty programs Advantages of conducting a bug bounty program Disappointments in bug bounty Popular bug bounty platforms Tips and resources <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/yetanothertalkonbugbounty-170731061755-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> What is bug bounty How to start with bug bounty My career as a bug bounty hunter Advantages of participating in bug bounty programs Advantages of conducting a bug bounty program Disappointments in bug bounty Popular bug bounty platforms Tips and resources
Yet another talk on bug bounty from vinoth kumar
]]>
541 3 https://cdn.slidesharecdn.com/ss_thumbnails/yetanothertalkonbugbounty-170731061755-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
API Security - Null meet /slideshow/api-security-null-meet/76157422 apisecurity-nullmeet-170520142833
XSS / HTML Injection Authorization and Authentication Sensitive information disclosure CORS Misconfiguration API's over HTTP CSRF HTTP Verb tampering Fuzzing / Boundary Checks API Rate limiting API Key Compromise]]>

XSS / HTML Injection Authorization and Authentication Sensitive information disclosure CORS Misconfiguration API's over HTTP CSRF HTTP Verb tampering Fuzzing / Boundary Checks API Rate limiting API Key Compromise]]>
Sat, 20 May 2017 14:28:33 GMT /slideshow/api-security-null-meet/76157422 vinothkumar361@slideshare.net(vinothkumar361) API Security - Null meet vinothkumar361 XSS / HTML Injection Authorization and Authentication Sensitive information disclosure CORS Misconfiguration API's over HTTP CSRF HTTP Verb tampering Fuzzing / Boundary Checks API Rate limiting API Key Compromise <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/apisecurity-nullmeet-170520142833-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> XSS / HTML Injection Authorization and Authentication Sensitive information disclosure CORS Misconfiguration API&#39;s over HTTP CSRF HTTP Verb tampering Fuzzing / Boundary Checks API Rate limiting API Key Compromise
API Security - Null meet from vinoth kumar
]]>
2145 4 https://cdn.slidesharecdn.com/ss_thumbnails/apisecurity-nullmeet-170520142833-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
AWS security - NULL meet chennai /slideshow/aws-security-null-meet-chennai/73346693 awssecurity-nullchennai-170320105358
At the end of this presentation, audience will be aware of the following topics. 1. Introduction to AWS 2. Accessing AWS console via cli. 3. Launching and logging into an EC2 instance 4. Creating a S3 bucket and uploading an image. 5. Security misconfigurations in S3 bucket. 6. Subdomain takeover via S3 bucket. 7. Hardcoded AWS credentials in github. 8. Aasna AWS credentials leak using pixel flood attack 9. Murder in the cloud - Codespace hack]]>

At the end of this presentation, audience will be aware of the following topics. 1. Introduction to AWS 2. Accessing AWS console via cli. 3. Launching and logging into an EC2 instance 4. Creating a S3 bucket and uploading an image. 5. Security misconfigurations in S3 bucket. 6. Subdomain takeover via S3 bucket. 7. Hardcoded AWS credentials in github. 8. Aasna AWS credentials leak using pixel flood attack 9. Murder in the cloud - Codespace hack]]>
Mon, 20 Mar 2017 10:53:58 GMT /slideshow/aws-security-null-meet-chennai/73346693 vinothkumar361@slideshare.net(vinothkumar361) AWS security - NULL meet chennai vinothkumar361 At the end of this presentation, audience will be aware of the following topics. 1. Introduction to AWS 2. Accessing AWS console via cli. 3. Launching and logging into an EC2 instance 4. Creating a S3 bucket and uploading an image. 5. Security misconfigurations in S3 bucket. 6. Subdomain takeover via S3 bucket. 7. Hardcoded AWS credentials in github. 8. Aasna AWS credentials leak using pixel flood attack 9. Murder in the cloud - Codespace hack <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/awssecurity-nullchennai-170320105358-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> At the end of this presentation, audience will be aware of the following topics. 1. Introduction to AWS 2. Accessing AWS console via cli. 3. Launching and logging into an EC2 instance 4. Creating a S3 bucket and uploading an image. 5. Security misconfigurations in S3 bucket. 6. Subdomain takeover via S3 bucket. 7. Hardcoded AWS credentials in github. 8. Aasna AWS credentials leak using pixel flood attack 9. Murder in the cloud - Codespace hack
AWS security - NULL meet chennai from vinoth kumar
]]>
1191 3 https://cdn.slidesharecdn.com/ss_thumbnails/awssecurity-nullchennai-170320105358-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Introduction to Bigdata and HADOOP /slideshow/introduction-to-bigdata-and-hadoop-60470342/60470342 bigdata-160404191816
Getting started with Big data and HADOOP Framework Target Audience : Beginner. ]]>

Getting started with Big data and HADOOP Framework Target Audience : Beginner. ]]>
Mon, 04 Apr 2016 19:18:16 GMT /slideshow/introduction-to-bigdata-and-hadoop-60470342/60470342 vinothkumar361@slideshare.net(vinothkumar361) Introduction to Bigdata and HADOOP vinothkumar361 Getting started with Big data and HADOOP Framework Target Audience : Beginner. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/bigdata-160404191816-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Getting started with Big data and HADOOP Framework Target Audience : Beginner.
Introduction to Bigdata and HADOOP from vinoth kumar
]]>
1049 7 https://cdn.slidesharecdn.com/ss_thumbnails/bigdata-160404191816-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-vinothkumar361-48x48.jpg?cb=1563019669 tutorgeeks.blogspot.in/ https://cdn.slidesharecdn.com/ss_thumbnails/gsuitemisconfigurations-nullmeet-190713120842-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/g-suite-misconfigurations-null-meet/155349547 G suite misconfigurati... https://cdn.slidesharecdn.com/ss_thumbnails/githubsecurity-bugbountyhunting-190427085337-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/github-security-bug-bounty-hunting/142485947 Github security bug ... https://cdn.slidesharecdn.com/ss_thumbnails/oauth2-180626174149-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/oauth-20-security/103165798 Oauth 2.0 security