Bangalore/Archives

Sessions
OWASP Bangalore/null/G4H Combined Meet at Citrix R&D, Ulsoor Road.


 * Beginner: iOS Security by Anto Joseph
 * Pentesting Web Services by Praveen Kumar K
 * Setting up VLANs and DMZ by Avradeep Bhattacharya
 * How to track APT Team by Rahul Sasi
 * OWASP Bangalore Session by Riyaz Walikar

Sessions
OWASP Bangalore/null/G4H Combined Meet at Citrix R&D, Ulsoor Road.


 * Honey Pots by Jiggyasu Sharma
 * Mobile Wallets by Suraj Pratap
 * Exploitation with Nmap NSE by Babu Sudhir B
 * Buffer Overflow Introduction by Abhinav Chourasia
 * Dark Arts of Social Engineering by Nutan Kumar Panda

Sessions
OWASP Bangalore/null/G4H Combined Meet at Citrix R&D, Ulsoor Road.


 * ZAP Proxy by TAS
 * Intro to Xposed Framework by Abhinav Chourasia
 * SIEM Architecture by Nishanth Kumar Pathi
 * OWASP Bengaluru Session by Akash Mahajan
 * Radare2 Demo by Anto Joseph

Sessions
OWASP Bangalore/null/G4H Combined Meet at Citrix R&D, Ulsoor Road.


 * ZAP Proxy by TAS
 * Hacking SmartPlugs by Anto Joseph
 * TestCases for WebApplication Security - Forgot Password by Mahendra Nath
 * SSL Pinning and bypasses by Anant Shrivastava
 * Security Issues in DevOps by Shubham Mittal

Sessions
OWASP Bangalore/null/G4H Combined Meet at Citrix R&D, Ulsoor Road.


 * Owasp Mobile Top 10 - M10 : Basics of BurpSuite Proxy by Nishanth Kumar Pathi
 * Bluetooth Security - Ubertooth by Jigar Lad
 * - iOS internals by Abhinav Chourasia
 * Introduction to DevOps Sec by Sandesh
 * HL 72.X (In)Security in Medical devices by Anirudh Duggal

Sessions
OWASP Bangalore/null/G4H Combined Meet at Citrix R&D, Ulsoor Road.


 * Owasp Mobile Top 10 - M10 : Lack of binary Protection by Shivang Desai
 * Demystifying Web Application Firewall by Sarwar Jahan M
 * Django - Bypassing CSRF Protection by Deepam Kanjani
 * RFID hacking by Jayesh
 * #daftnationalencryptionpolicy by Pranesh Prakash

Sessions
OWASP Bangalore/null/G4H Combined Meet at InMobi office.


 * Owasp Mobile Top 10 - M9: Improper Session Handling by Apoorva
 * Exploiting Version Control Systems by Anant Shrivastava
 * Cross Origin Resource Sharing by Ishan Girdhar
 * Android rooting Internals by Anto Joseph
 * Kerberos Golden Ticket by Asish Agarwalla

Sessions
OWASP Bangalore/null/G4H Combined Meet at at Citrix R&D, Ulsoor Road.


 * Demystifying Mobile Top 10 - M8 by Shivang Desai
 * PHP Remote Code Execution by Rahul Sasi
 * Quantum Cryptography by Sidhant Dogra
 * Grinder Tool by AMol NAik
 * Content Security Policy by Riyaz Walikar

Sessions
OWASP Bangalore/null/G4H Combined Meet at at Citrix R&D, Ulsoor Road.


 * OWASP Mobile Top 10 - M7 & M8 by Shivang Desai
 * Venom Demo by Akash Mahajan
 * Threat Intelligence by Jaykumar
 * SAML Single Sign-On (SSO) Service by Tamilvanan
 * Panel Discussion - Social Engineering : What makes it so successful and how to thwart these attacks? by Manasdeep

Sessions
OWASP Special Bangalore Meet at Citrix R&D, Ulsoor Road.


 * OWASP Top 10 with demos from basics to intermediate levels by Akash Mahajan & Riyaz Walikar
 * Questions & Answers for AppSec Security Questions by Akash Mahajan & Riyaz Walikar

Sessions
OWASP Special Bangalore Meet at Microsoft Technology Center


 * OWASP Top 10 from basics to intermediate levels by Akash Mahajan
 * Questions & Answers for AppSec Security Questions by Akash Mahajan
 * Guidance from a corporate recruiter on clearing interviews by Pooja Srinivas (Corporate Technical Recruiter)

Sessions
OWASP Bangalore/null/G4H Combined Meet at Philips Innovation Campus


 * Security Monitoring using SIEM by Rishabh Gupta
 * Medical Device Security by Anirudh Duggal
 * Tale of Forgotten disclosure and lesson's learned by Anant Shrivastava
 * SSL Scanning by Rupali Dash
 * XSS and Phishing Hybrid Attack _ Skit by Satish

Sessions
OWASP Bangalore/null/G4H Combined Meet at InMobi Office


 * Demystifying Captchas - Beginner Session by Udit Gupta
 * Infosec Initiative by Apoorva
 * Security Certifications by Manasdeep
 * IE Memory Protections by Abhisek Datta
 * Recon-ng by Nutan Kumar Panda
 * Debate - Net Neutrality by Sandesh

Sessions
OWASP Bangalore/null/G4H Combined Meet at InMobi Office


 * Introduction to Computer forensics by Adarsh Agarwal
 * Packet Crafting in Scapy by Bharath
 * VoIP Pentesting by Arun Mane
 * Getting Started with HTTP2 by Akash Mahajan
 * Build Time Security by Mohammed Tanveer

Sessions
OWASP Bangalore/null/G4H Combined Meet at InMobi Office


 * OWASP A4 - Insecure Direct Object Reference by Chandrakant
 * Mobile Forensics by Rupam Bhattacharya
 * Encoding Basics by Satish
 * Hacking Tizen (Demo) by Ajin Abraham
 * Attacks on Android Webview (Demo) by Sachinraj Shetty

Sessions
OWASP Bangalore/null/G4H Combined Meet at Sapient Office


 * OWASP Top 10 - OWASP Top 10 Vandana
 * Basics on TCP/IP - Akash
 * SIEM Overview - Raghavendran Gopal
 * nmap Demo (Idle/Stealth scan) - Rahul Yadav
 * Burp Automated Workflows - Mahendra Nath

Sessions
OWASP Bangalore/null/G4H Combined Meet at InMobi Office
 * HTTP Basics Demo - Akash Mahajan
 * - Vandana
 * Introduction to Memory Exploits - Mahendra Nath
 * Attacking Web Proxies - Rahul Sasi
 * OWTF Tool demo - Anant Shrivastava

Sessions
OWASP Banglore Workshop
 * Xtreme Web Hacking - 2014 by Riyaz Walikar

Sessions
OWASP Bangalore/null/G4H Combined Meet at Paypal Office
 * Reflective and Stored XSS - Rakesh
 * News Bytes - Basaveswar
 * Intro to Threat Modeling - Shivendra
 * OWASP ZAP Tool Demo - Marudhamaran Gunasekaran
 * Fuzzing Asynchronous Protocols built over Websockets - Lavakumar Kuppan

Sessions
OWASP Bangalore Special Meet at Paypal Office
 * Hack Like a Pro Workshop - Jayesh Singh Chauhan
 * Breaking ECB Crypto using Burp Suite - Akash Mahajan

Sessions
OWASP Bangalore/null/G4H Combined Meet at InMobi Technologies
 * Mobile Top 10 for beginners - Anant Shrivastava
 * Windows Post Exploitation techniques - Riyaz Walikar
 * PCI DSS v3.0 : Protecting Cardholder data - Manasdeep
 * SHODAN - Bharath
 * Matriux - Narayanan Subramaniam

Sessions
OWASP Bangalore/null/G4H Combined Meet at InMobi Technologies
 * OWASP Mobile Security Risk Series - Anant Shrivastava
 * Social Engineering and its importance during Security Audits - Manasdeep
 * HTTP Response Splitting - Sharath
 * ZAP Proxy - Rupam Bhattacharya

Sessions
OWASP Bangalore/null/G4H Combined Meet at EMC Corporation
 * OWASP Mobile Security - Anant Shrivastava
 * XML Injection - AMol NAik
 * Are you a Host for Malware? - Abhijeth
 * Burp Advanced - Harshal Jamdade

Sessions
OWASP Bangalore/null/G4H Combined Meet at Thoughtworks
 * Working with Web Goat Vulnerable Application - Jagan Mohan
 * OWASP Comprehensive, Lightweight Application Security Process - Akash Mahajan
 * Open Source Intelligence (OSINT) with Maltego - Nutan Kumar Panda
 * Win 8 Mobile App Pen-testing - Anant Tiwari

14th June 2014
OWASP Bangalore/null/G4H Combined Meet at Thoughtworks

Sessions

 * OWASP Mobile Top 10 - Part 2 Anant Shrivastava
 * Security News Bytes Nishanth Kumar
 * Abeer Banerjee
 * Browser Exploitation Framework BeEF Prashanth Sivarajan
 * ESAPI (The OWASP Enterprise Security API) Sathish

24th May 2014
OWASP Bangalore/null/G4H Combined Meet at Thoughtworks

Sessions

 * OWASP Mobile Top 10 - Part 1 Pushkar Pashupat
 * NEWS Bytes Anant Shrivastava
 * Web-Service (SOAP) Exploitation Rahul Sasi
 * Metasploit Demo Rupam Bhattacharya
 * Web App Security - The Good Parts Akash Mahajan

8th Feb 2014
Special OWASP Meet is a workshop by Justin Searle (His Profile) on 8th of Feb 2014.

Workshop A Systematic Method for Manual Web Pentesting by Justin Searle
Come have a taste of the official Samurai-WTF Web Testing Framework training course offered at Black Hat and OWASP conferences. During this workshop, we'll do a quick overview of the web pen-testing methodology, then the instructors will lead you through the process of testing and exploiting web applications. The primary emphasis of this workshop is teaching you how to integrate SamuraiWTF tools into your own manual testing procedures to improve your overall pentest workflow.

18th January 2014
http://null.co.in/2014/01/10/null-bangalore-january-2014-combined-meet-with-owaspg4hsecurityxploded-saturday-18th-january-2014-thoughtworks/]


 * Web Application Security for Beginners: DOM Based XSS – Jayesh Singh
 * Automated Source code review using Fortify – Rupam Bhattacharya
 * Struts Validation Framework: Part 2 – Satish
 * Security Onion – Nishanth Kumar
 * Web Application Security: The pitfalls and the brickwalls, a developer perspective – Vamsi Krishna

14th December 2013
More details about the talks


 * Web Application Security For Beginners by Jayesh Singh
 * Overview of ISO 27001 by Rupam Bhattacharya
 * XSS - From injection to root by Abeer Banerjee
 * Struts Validation Framework by Satish

1st November 2012
Topic: Python For Web Penetration Testing Author: by Justin Searle Description: Basic Python scripting to automate tasks for penetration testing.

3rd October 2009
Topic: Web 2.0 Security Author: by KV Prashant Description:Web 2.0 Security

5th Sep 2009
Topic: SSL Cipher Enumeration Author: by Gursev Description:SSL Cipher Enumeration

5th Sep 2009
Topic: Cookie Replay Attacks Author: Ravi Gopal Description:Overview and Live Demo of Cookie replay attacks Topic: 2. Cloud Security Author: Shashidhar Description:Overview of Cloud Security

12 July2009
Topic: Turning Firefox Into Ultimate Hacking Tool(SecFox) Part - II Author: Rajiv Vishwa Description: Talk on tweaking Firefox with various addons and doing some customizations so that it can be used to perform vulnerability assessments on various websites.

07 Jun 2009
Topic: Turning Firefox Into Ultimate Hacking Tool(SecFox) Author: Rajiv Vishwa Description: Talk on tweaking Firefox with various addons and doing some customizations so that it can be used to perform vulnerability assessments on various websites.

07 Mar 2009
Topic: Hackers Secret Author: Sharmishta Gupta Description: Headsup on OWASP top vulnerabilities and introduction to Webgoat application.

02 Feb 2009
Attendees: 13 Members Topic: Cracking applications with OllyDbg debugger(Demo) Author: Rajiv Vishwa Description: Session on debugging standalone executables to pin point security holes which is otherwise exploited by crackers to patch the pro version to freeware. Couple of tiny applications which requires keys for activation are cracked during the session.

14 Dec 2008
Topic: Access Control Mechanisms Author : Sundar Description: Overview on different types of access control schemes and its usages. Comments: The main agenda for the meet has been a presentation on "Access Controls" by Sundar. It was informative and lead to a good discussion on the topic. The meet lasted for over an hour and has seen good acceptance by members who attended.