Bangalore/Archives

Sessions:

 * XXE Vulnerabilities by Puneet Kulkarni
 * Product Security by Pawan Bhandari
 * DNS Security by Sanal
 * OWASP AppSensor by anjana
 * Fundamentals to Widows Kernel by Mihir Shah
 * Introduction to attacking SAML by Suma shambhavi p
 * Python Cookbook with OSINT by Akash Thakur

Sessions

 * Cyber Threat Intelligence by Amiya Dutta
 * Defending from Malicious Adwords by Aditya Varma
 * OWASP Slot by Vandana Verma
 * The world of Security Audits by Amit Tripathi
 * CSP Bypass by Pawan Jaiswal
 * ADHD( Active Directory for Hacker’s Delight) by Harsh Thakur

Sessions

 * Beginner Talk - IoT Security Overview by AMAR PRUSTY
 * Defense in Depth for Embedded devices by Jiggyasu Sharma
 * Open Source PnP WAF by varun4sec
 * IT/OT Convergence by pratik bhartari
 * Cracking the Crypto by Mihir Shah

Sessions

 * Beginner Talk - TBD by Pankaj Kumar Singh
 * IDS using Snort by Shyamsundar Das
 * Setting up and using VPS Infrastructure for BugBounty and Pen-testing by narendra kumar
 * Honey Encryption by Shashwat Kumar
 * Implementation of Mobile SAST by sanjeeva kumar
 * Malware analysis 101 by Adib Nagarajan
 * Security of automotive networks by Sunil Kumar

Sessions

 * Information Security Newsbytes by Nimesh
 * Secret Sharing by Prateek Kumar Nischal
 * OWASP Slot by Vandana Verma & Riyaz Walikar
 * BLE Exploitation by Vaibhav Bedi
 * Big Data Security by 5cr3Amer
 * ArcherySec - Vuln Assessment Management by Anand Tiwari
 * VOIP Security by Himanshu Taragi

Sessions:

 * Wireshark by Varun Sharma
 * Using Burp Macros to Automate Session Handling by Riddhi Shree
 * OWASP Serverless Top 10 by Badshah
 * IP Sec by Bharath
 * Designing security solution for Microservices in Multi-cloud by Neelkamal Singh Gaharwar
 * Industrial Threat Landscape by Biswajit De

Sessions

 * Intro to Browser Security Features by Bharath
 * OWASP ASVS by Vandana Verma
 * Vulnerable Implementation of OAuth 2 by Neelkamal Singh Gaharwar
 * Secure Compilation Options by Bharath
 * Return Oriented Programming ROP by Mihir Shah
 * Job Announcements + Feedback + Next Month Session Planning

Sessions

 * Introduction to Kerberos Protocol by Jignesh Ravindra Pandey
 * 802.11 Security by Shyamsundar Das
 * An introduction to DefectDojo (OWASP Project) by Riyaz Walikar
 * Bodhi Vulnerable Application Demo by AMol NAik
 * Security Q&A
 * Static Malware Analysis by Vikram

02nd October 2018
Speakers: Abhinav & Badhshah

The content includes:
 * What is Frida
 * Demo on hooking
 * How Frida can be used for Android devices
 * Using Frida for bypassing basic defences in Android Apps

Sessions

 * Introduction to SS7 by Harsh thakur
 * Digital Certificates by Debojyoti
 * Health Care Security by Ajay Pratap SIngh
 * OWASP Broken Application & Apache Struts 2 OGNL Vulnerability by Vandana Verma
 * Cryptography for beginners by Riddhi Shree
 * Dynamic Instrumentation in Android by Tony Thomas
 * Owasp A8: Insecure Deserialization by Arun.S

Sessions

 * Basics of Cyrptocurrencies by Place Holder
 * XML External Entity (XXE) Injection Attacks by Jagan Mohan
 * Machine Learning for AppSec by siva srl
 * Canbus - Car Hacking by Kalathil Karthik

Sessions

 * Threat Modelling by Sai Reddy
 * IoT Pentesting -Zigbee by Veerababu(Mr-IoT)
 * OWASP - DevSlop Project by Vandana and Arun.S
 * JWT 101 by Mohammed Akbar Shariff
 * Responder - Windows Exploitation Tool by Aamer Shah

Sessions

 * OWASP Top 10 2017 by shreyas.n
 * Getting started with Frida on Android Apps by Badshah
 * Identity Management in modern web apps by Riddhi Shree
 * Breaking into infosec as career by sanjeeva kumar
 * Maintaining Anonymity Online by Rajan Fasra

Sessions

 * Burp Suite for Beginners by Vathsala
 * Wireless Pentesting by Mihir Shah
 * Owasp Projects by Vandana Verma
 * AWS Overview + Security by Raghavendran Gopal
 * Security Access in Automobile by Debojyoti

Sessions

 * Hardware Hacking by Likith
 * Block Chain by Sadhana
 * Rest API Pentesting by Sagar
 * Report Automation by Zakeer
 * Selenium+Zap+Jenkins by Narendra

Sessions

 * Shell on Windows (Bind & Reverse) by MUTHUMOHANPRASATH
 * AWS Overview + Security by Raghavendran Gopal
 * Understanding WMI by Bharath
 * Second order SQL Injection by Anjana
 * XML External Entities(XXE) by Kevin Paul

Sessions

 * OWASP Top 10 2017 - The saga of what you need to learn right now - Andrew van der Stock
 * OWASP Top 10, Application Security Verification Standard, Andrew's work as OWASP Board Member - Andrew van der Stock

Sessions

 * Scapy for Beginners by Udaykumar
 * Java Deserialization by Truptiranjan Nayak
 * Android Pentesting for Beginners by Subash
 * Getting Started with Bug Bounty by Aamer Shah

Sessions

 * Live Forensics on Windows by Arpan Raval
 * Metasploit Basics by Vasanthan
 * Pentesting AWS Lambda Functions by Riyaz Walikar
 * TPM Basics by Rishi
 * Pentesting Docker by Riddhi Shree
 * Accelerating your Security Learning by Jayesh Singh Chauhan

Sessions

 * Server Side Template Injection by Narendra Kumar
 * Annual Review Security Learning 2017 by Akash Mahajan
 * Local Priv Escalation on Linux by Tushar Routray
 * Rop chaining by Abhinav Chourasia
 * [Open Q&A - null Bangalore]

Sessions

 * Firmware Analysis for Beginners by Ramkumar Ganesan
 * Introduction to Cryptocurrency by Ajit Hatti
 * Mathematical Modelling for NexG & The Algebra of Cryptography by Ali Shabbir
 * [Open Q&A - null Bangalore]

Sessions

 * OWASP Cloud Top 10 by Vandana Verma
 * Web Cached Deception Attack by Rupali Dash
 * Blueborne by Faiz M Khan
 * Bashware by Riyaz Walikar

Sessions

 * SSI Injection by Narendra Kumar
 * Getting Started with Frida by Satheesh
 * Cloud Security Suite by Jayesh
 * Security Issues with HTTP/2 by Karthik

Sessions

 * Automating Web Pentesting with ZAP by Bharath
 * Exploiting XSS by Aamer Shah
 * Breaking the Black Box by Abhinav Chourasia
 * Code Review to Threat Modeling by Deepam Kanjani
 * Open Q&A by Akash Mahajan & Riyaz Walikar

Sessions

 * Server Side Request Forgery by Narendra Kumar
 * SOP CORS Bypass by Manikandan
 * SQLMap by Ali Shabbit
 * Pentesting Web Sockets by Riddhi Shree
 * Spinning up containers by Akash Mahajan
 * Nmap and metasploitable by Mohammed Akbar Shariff

Sessions
OWASP Bangalore/null/G4H Combined Meet at Sprinklr Solutions Pvt Ltd, Yamalur.


 * DNS for Pentesters Beginners by Bharath
 * Cool domain hacks by 5cr3Amer
 * Overview of Big Data Security by Vandana
 * Talk on LFI/RFI by Shruthi
 * Talk on LFI/RFI by Faiz M Khan

Sessions
OWASP Bangalore/null/G4H Combined Meet at Sprinklr Solutions Pvt Ltd, Yamalur.


 * Cloud Sec 101 by Bhavin Parmar
 * DNS Firewall by Anirudda Biyani
 * PCI DSS Compliance by Saumya Vishnoi
 * Crunch by Aamer Shah
 * Hashcat with Examples by Ashritha
 * Wannacry by Riyaz Walikar
 * Windows Forensics by Rajan Fasra

Sessions
OWASP Bangalore/null/G4H Combined Meet at Sprinklr Solutions Pvt Ltd, Yamalur.


 * Impacket Tools by Riyaz Walikar
 * Hacking Blutooth by Arun Magesh
 * Number Theory & Cryptography by Debojyoti
 * Exploiting Buffer Overflow vulnerability by Riddhi Shree
 * IoT Security 101 by Jitendra Kumar
 * Working with Exploit Kits by Gajendra Kumar

Sessions
OWASP Bangalore/null/G4H Combined Meet at Citrix R&D, Ulsoor Road.


 * Poodle Vulnerability by Samit Anwer
 * Datasploit Demo by Shubham Mittal
 * Mod Security Demo by Shruthi Kamath
 * Apache Struts RCE - CVE-2017-5638 by Riyaz Walikar
 * Containers and Virtualization security by Subash
 * Insearch of IoT Devices by Priyal Viroja

Sessions
OWASP Bangalore/null/G4H Combined Meet at Citrix R&D, Ulsoor Road.


 * Basics of Binary Fuzzing by abhishikt v v
 * Concepts of Proxy Chains by 	Aamer Shah
 * SSL Pinning by Nikhil P Kulkarni
 * Nmap and Nikto 101 by Ramnath
 * Attacking Databases by Jagan Mohan

Sessions
OWASP Bangalore/null/G4H Combined Meet at Citrix R&D, Ulsoor Road.


 * Metasploit Demo for Beginners by Ramnath
 * Buffer Overflow Exploitation by Gajendra Kumar
 * OWASP Top 10 IOT by veerababu.p
 * Threat Intelligence by Praful Kalla
 * Accelerating Your Security Learning in 2017 by Akash Mahajan

Sessions
OWASP Bangalore/null/G4H Combined Meet at Citrix R&D, Ulsoor Road.


 * iOS pentesting for beginners by 	Arun.S
 * Tool Demo - Pwntools by Chandrapal
 * Tor Internals and Hidden Services - Part II by Gabbar
 * Malware Reverse Engineering by Mohammed Danish Amber
 * Bug Bounty Trade Secrets by Nishtha
 * Pentesting of IPv6 networks by Bharath

Sessions
OWASP Bangalore/null/G4H Combined Meet at Citrix R&D, Ulsoor Road.


 * Android Security For Beginners by Lokesh Ranjan
 * Introduction to VPN Security by shreedhar
 * Demo on Netcat by Rahul R
 * Case studies of Authentication and Authorization bypass by Sarwar Jahan M
 * Tor Internals and Hidden Services by Gabbar
 * Software defined radio by veerababu.p

Sessions
OWASP Bangalore/null/G4H Combined Meet at Citrix R&D, Ulsoor Road.


 * Using Hydra by Sankalp Bastakoti
 * Demo of Net Hunter by Prashanth Sivarajan
 * Packet Analysis by Basaveswar
 * Approach to Bug Bounty Program by Rohan Birtia
 * Pentesting Rest API by Nutan Kumar Panda

Sessions
OWASP Bangalore/null/G4H Combined Meet at Citrix R&D, Ulsoor Road.


 * iOS App Runtine Analysis by Swaroop Yermalkar
 * Bypassing Corporate Security by Aamer Shah
 * IOT Exploitation - II by Abhinav Chourasia
 * Using Hydra by Sankalp Bastakoti
 * G4H Talk by AMol NAik

Sessions
OWASP Bangalore/null/G4H Combined Meet at Roadrunnr, T floor


 * Exploiting a vulnerability to gain a shell by Aditya
 * An Introdcution to Trusted Platform Module by Nayna
 * Panel Talk on Information Security by Jagan Mohan
 * Encryption in Security by Kartik Lalan
 * Buffer Overflow detection with Immunity by Pratik Shah
 * Security of Healthcare systems by Anirudh duggal
 * IOT Exploitation by Bharath

Sessions
OWASP Bangalore/null/G4H Combined Meet at Citrix R&D, Ulsoor Road.


 * Beginners Talk on Physical Securty by Manasdeep
 * Android Security by Kartik Lalan
 * Automated Information Gathering Using Recon-ng by narendra kumar sharma
 * Node JS Security by Madhu Akula
 * Security Intelligence by Raghavendran Gopal
 * Platform Security using intel SGX by Pradyumna Padhan
 * Linux Privilege Escalation techniques by Jagan Mohan
 * Twitter Bug Hunt by Avinash
 * Introduction to Web Application Firewalls by Chandrapal

Sessions
OWASP Bangalore/null/G4H Combined Meet at Citrix R&D, Ulsoor Road.


 * Android Security - Beginners - Part 3 by Jitendra Kumar
 * Targeted Attacks by Rahul Choudhary
 * Targeted Attacks by Ashwin Vamshi
 * SQL Injection to shell by Krithika M. M
 * Case studies of recent network attacks by Devanshu Agarwal
 * How I pwned you online by Nutan Kumar Panda
 * An introduction to Single Sign On (with Demo) by Lakshmikiran
 * Windows Privilege Escalation Techniques by Riyaz Walikar
 * etasploit basics and db usage by Arun S.

Sessions
OWASP Bangalore/null/G4H Combined Meet at Akamai, Salarpuria Softzone.


 * Android Security - Beginners - Part 2 by Jitendra Kumar
 * Cloud Security by Akash Mahajan
 * CSRF in depth by Abhinav Chourasia
 * Basics of PKI by Nikhil K
 * Cross Site Scripting vs Content Security Policy by Kaushal Banninthaya

Sessions
OWASP Bangalore/null/G4H Combined Meet at Citrix R&D, Ulsoor Road.


 * Android Security - Beginners - Part 1 by Jitendra Kumar
 * Advanced XSS by Avinash Varma
 * Understanding DLL Injection by Neeraj.R.Godkhindi
 * Introduction to Machine Learning in Security by Nikhil P Kulkarni
 * Introduction to ModSecurity by Rahul Choudhary

Sessions
OWASP Bangalore/null/G4H Combined Meet at Citrix R&D, Ulsoor Road.


 * Beginners: Netcat: Swiss Army Knife by Chandrapal
 * iOS Security : Part2 by Anto Joseph
 * Snort by Shubhra Verma
 * G4H : Browser Exploitation by Amol Naik
 * An introduction to XXE attacks - OWASP Bangalore Session by Samit Anwer

Sessions
OWASP Bangalore/null/G4H Combined Meet at Citrix R&D, Ulsoor Road.


 * Beginner: iOS Security by Anto Joseph
 * Pentesting Web Services by Praveen Kumar K
 * Setting up VLANs and DMZ by Avradeep Bhattacharya
 * How to track APT Team by Rahul Sasi
 * OWASP Bangalore Session by Riyaz Walikar

Sessions
OWASP Bangalore/null/G4H Combined Meet at Citrix R&D, Ulsoor Road.


 * Honey Pots by Jiggyasu Sharma
 * Mobile Wallets by Suraj Pratap
 * Exploitation with Nmap NSE by Babu Sudhir B
 * Buffer Overflow Introduction by Abhinav Chourasia
 * Dark Arts of Social Engineering by Nutan Kumar Panda

Sessions
OWASP Bangalore/null/G4H Combined Meet at Citrix R&D, Ulsoor Road.


 * ZAP Proxy by TAS
 * Intro to Xposed Framework by Abhinav Chourasia
 * SIEM Architecture by Nishanth Kumar Pathi
 * OWASP Bengaluru Session by Akash Mahajan
 * Radare2 Demo by Anto Joseph

Sessions
OWASP Bangalore/null/G4H Combined Meet at Citrix R&D, Ulsoor Road.


 * ZAP Proxy by TAS
 * Hacking SmartPlugs by Anto Joseph
 * TestCases for WebApplication Security - Forgot Password by Mahendra Nath
 * SSL Pinning and bypasses by Anant Shrivastava
 * Security Issues in DevOps by Shubham Mittal

Sessions
OWASP Bangalore/null/G4H Combined Meet at Citrix R&D, Ulsoor Road.


 * Owasp Mobile Top 10 - M10 : Basics of BurpSuite Proxy by Nishanth Kumar Pathi
 * Bluetooth Security - Ubertooth by Jigar Lad
 * - iOS internals by Abhinav Chourasia
 * Introduction to DevOps Sec by Sandesh
 * HL 72.X (In)Security in Medical devices by Anirudh Duggal

Sessions
OWASP Bangalore/null/G4H Combined Meet at Citrix R&D, Ulsoor Road.


 * Owasp Mobile Top 10 - M10 : Lack of binary Protection by Shivang Desai
 * Demystifying Web Application Firewall by Sarwar Jahan M
 * Django - Bypassing CSRF Protection by Deepam Kanjani
 * RFID hacking by Jayesh
 * #daftnationalencryptionpolicy by Pranesh Prakash

Sessions
OWASP Bangalore/null/G4H Combined Meet at InMobi office.


 * Owasp Mobile Top 10 - M9: Improper Session Handling by Apoorva
 * Exploiting Version Control Systems by Anant Shrivastava
 * Cross Origin Resource Sharing by Ishan Girdhar
 * Android rooting Internals by Anto Joseph
 * Kerberos Golden Ticket by Asish Agarwalla

Sessions
OWASP Bangalore/null/G4H Combined Meet at at Citrix R&D, Ulsoor Road.


 * Demystifying Mobile Top 10 - M8 by Shivang Desai
 * PHP Remote Code Execution by Rahul Sasi
 * Quantum Cryptography by Sidhant Dogra
 * Grinder Tool by AMol NAik
 * Content Security Policy by Riyaz Walikar

Sessions
OWASP Bangalore/null/G4H Combined Meet at at Citrix R&D, Ulsoor Road.


 * OWASP Mobile Top 10 - M7 & M8 by Shivang Desai
 * Venom Demo by Akash Mahajan
 * Threat Intelligence by Jaykumar
 * SAML Single Sign-On (SSO) Service by Tamilvanan
 * Panel Discussion - Social Engineering : What makes it so successful and how to thwart these attacks? by Manasdeep

Sessions
OWASP Special Bangalore Meet at Citrix R&D, Ulsoor Road.


 * OWASP Top 10 with demos from basics to intermediate levels by Akash Mahajan & Riyaz Walikar
 * Questions & Answers for AppSec Security Questions by Akash Mahajan & Riyaz Walikar

Sessions
OWASP Special Bangalore Meet at Microsoft Technology Center


 * OWASP Top 10 from basics to intermediate levels by Akash Mahajan
 * Questions & Answers for AppSec Security Questions by Akash Mahajan
 * Guidance from a corporate recruiter on clearing interviews by Pooja Srinivas (Corporate Technical Recruiter)

Sessions
OWASP Bangalore/null/G4H Combined Meet at Philips Innovation Campus


 * Security Monitoring using SIEM by Rishabh Gupta
 * Medical Device Security by Anirudh Duggal
 * Tale of Forgotten disclosure and lesson's learned by Anant Shrivastava
 * SSL Scanning by Rupali Dash
 * XSS and Phishing Hybrid Attack _ Skit by Satish

Sessions
OWASP Bangalore/null/G4H Combined Meet at InMobi Office


 * Demystifying Captchas - Beginner Session by Udit Gupta
 * Infosec Initiative by Apoorva
 * Security Certifications by Manasdeep
 * IE Memory Protections by Abhisek Datta
 * Recon-ng by Nutan Kumar Panda
 * Debate - Net Neutrality by Sandesh

Sessions
OWASP Bangalore/null/G4H Combined Meet at InMobi Office


 * Introduction to Computer forensics by Adarsh Agarwal
 * Packet Crafting in Scapy by Bharath
 * VoIP Pentesting by Arun Mane
 * Getting Started with HTTP2 by Akash Mahajan
 * Build Time Security by Mohammed Tanveer

Sessions
OWASP Bangalore/null/G4H Combined Meet at InMobi Office


 * OWASP A4 - Insecure Direct Object Reference by Chandrakant
 * Mobile Forensics by Rupam Bhattacharya
 * Encoding Basics by Satish
 * Hacking Tizen (Demo) by Ajin Abraham
 * Attacks on Android Webview (Demo) by Sachinraj Shetty

Sessions
OWASP Bangalore/null/G4H Combined Meet at Sapient Office


 * OWASP Top 10 - OWASP Top 10 Vandana
 * Basics on TCP/IP - Akash
 * SIEM Overview - Raghavendran Gopal
 * nmap Demo (Idle/Stealth scan) - Rahul Yadav
 * Burp Automated Workflows - Mahendra Nath

Sessions
OWASP Bangalore/null/G4H Combined Meet at InMobi Office
 * HTTP Basics Demo - Akash Mahajan
 * - Vandana
 * Introduction to Memory Exploits - Mahendra Nath
 * Attacking Web Proxies - Rahul Sasi
 * OWTF Tool demo - Anant Shrivastava

Sessions
OWASP Banglore Workshop
 * Xtreme Web Hacking - 2014 by Riyaz Walikar

Sessions
OWASP Bangalore/null/G4H Combined Meet at Paypal Office
 * Reflective and Stored XSS - Rakesh
 * News Bytes - Basaveswar
 * Intro to Threat Modeling - Shivendra
 * OWASP ZAP Tool Demo - Marudhamaran Gunasekaran
 * Fuzzing Asynchronous Protocols built over Websockets - Lavakumar Kuppan

Sessions
OWASP Bangalore Special Meet at Paypal Office
 * Hack Like a Pro Workshop - Jayesh Singh Chauhan
 * Breaking ECB Crypto using Burp Suite - Akash Mahajan

Sessions
OWASP Bangalore/null/G4H Combined Meet at InMobi Technologies
 * Mobile Top 10 for beginners - Anant Shrivastava
 * Windows Post Exploitation techniques - Riyaz Walikar
 * PCI DSS v3.0 : Protecting Cardholder data - Manasdeep
 * SHODAN - Bharath
 * Matriux - Narayanan Subramaniam

Sessions
OWASP Bangalore/null/G4H Combined Meet at InMobi Technologies
 * OWASP Mobile Security Risk Series - Anant Shrivastava
 * Social Engineering and its importance during Security Audits - Manasdeep
 * HTTP Response Splitting - Sharath
 * ZAP Proxy - Rupam Bhattacharya

Sessions
OWASP Bangalore/null/G4H Combined Meet at EMC Corporation
 * OWASP Mobile Security - Anant Shrivastava
 * XML Injection - AMol NAik
 * Are you a Host for Malware? - Abhijeth
 * Burp Advanced - Harshal Jamdade

Sessions
OWASP Bangalore/null/G4H Combined Meet at Thoughtworks
 * Working with Web Goat Vulnerable Application - Jagan Mohan
 * OWASP Comprehensive, Lightweight Application Security Process - Akash Mahajan
 * Open Source Intelligence (OSINT) with Maltego - Nutan Kumar Panda
 * Win 8 Mobile App Pen-testing - Anant Tiwari

14th June 2014
OWASP Bangalore/null/G4H Combined Meet at Thoughtworks

Sessions

 * OWASP Mobile Top 10 - Part 2 Anant Shrivastava
 * Security News Bytes Nishanth Kumar
 * Abeer Banerjee
 * Browser Exploitation Framework BeEF Prashanth Sivarajan
 * ESAPI (The OWASP Enterprise Security API) Sathish

24th May 2014
OWASP Bangalore/null/G4H Combined Meet at Thoughtworks

Sessions

 * OWASP Mobile Top 10 - Part 1 Pushkar Pashupat
 * NEWS Bytes Anant Shrivastava
 * Web-Service (SOAP) Exploitation Rahul Sasi
 * Metasploit Demo Rupam Bhattacharya
 * Web App Security - The Good Parts Akash Mahajan

8th Feb 2014
Special OWASP Meet is a workshop by Justin Searle (His Profile) on 8th of Feb 2014.

Workshop A Systematic Method for Manual Web Pentesting by Justin Searle
Come have a taste of the official Samurai-WTF Web Testing Framework training course offered at Black Hat and OWASP conferences. During this workshop, we'll do a quick overview of the web pen-testing methodology, then the instructors will lead you through the process of testing and exploiting web applications. The primary emphasis of this workshop is teaching you how to integrate SamuraiWTF tools into your own manual testing procedures to improve your overall pentest workflow.

18th January 2014
http://null.co.in/2014/01/10/null-bangalore-january-2014-combined-meet-with-owaspg4hsecurityxploded-saturday-18th-january-2014-thoughtworks/]


 * Web Application Security for Beginners: DOM Based XSS – Jayesh Singh
 * Automated Source code review using Fortify – Rupam Bhattacharya
 * Struts Validation Framework: Part 2 – Satish
 * Security Onion – Nishanth Kumar
 * Web Application Security: The pitfalls and the brickwalls, a developer perspective – Vamsi Krishna

14th December 2013
More details about the talks


 * Web Application Security For Beginners by Jayesh Singh
 * Overview of ISO 27001 by Rupam Bhattacharya
 * XSS - From injection to root by Abeer Banerjee
 * Struts Validation Framework by Satish

1st November 2012
Topic: Python For Web Penetration Testing Author: by Justin Searle Description: Basic Python scripting to automate tasks for penetration testing.

3rd October 2009
Topic: Web 2.0 Security Author: by KV Prashant Description:Web 2.0 Security

5th Sep 2009
Topic: SSL Cipher Enumeration Author: by Gursev Description:SSL Cipher Enumeration

5th Sep 2009
Topic: Cookie Replay Attacks Author: Ravi Gopal Description:Overview and Live Demo of Cookie replay attacks Topic: 2. Cloud Security Author: Shashidhar Description:Overview of Cloud Security

12 July2009
Topic: Turning Firefox Into Ultimate Hacking Tool(SecFox) Part - II Author: Rajiv Vishwa Description: Talk on tweaking Firefox with various addons and doing some customizations so that it can be used to perform vulnerability assessments on various websites.

07 Jun 2009
Topic: Turning Firefox Into Ultimate Hacking Tool(SecFox) Author: Rajiv Vishwa Description: Talk on tweaking Firefox with various addons and doing some customizations so that it can be used to perform vulnerability assessments on various websites.

07 Mar 2009
Topic: Hackers Secret Author: Sharmishta Gupta Description: Headsup on OWASP top vulnerabilities and introduction to Webgoat application.

02 Feb 2009
Attendees: 13 Members Topic: Cracking applications with OllyDbg debugger(Demo) Author: Rajiv Vishwa Description: Session on debugging standalone executables to pin point security holes which is otherwise exploited by crackers to patch the pro version to freeware. Couple of tiny applications which requires keys for activation are cracked during the session.

14 Dec 2008
Topic: Access Control Mechanisms Author : Sundar Description: Overview on different types of access control schemes and its usages. Comments: The main agenda for the meet has been a presentation on "Access Controls" by Sundar. It was informative and lead to a good discussion on the topic. The meet lasted for over an hour and has seen good acceptance by members who attended.