Personal Information
Entreprise/Lieu de travail
New Delhi Area, India India
Site Web
www.owasp.org/index.php/Delhi_NCR
À propos
Official Slideshare Account of OWASP Delhi Chapter
Mots-clés
information security
owasp delhi
owasp
#owaspdelhi
informationsecurity
#nulldelhi
nulldelhi
reconnaisance
incident response
application security
cloud security
information technology
webinars
#webinars
#informationsecurity
networksecurity
xss
bitcoins
threat intelligence
appsec
wifi pentesting
software security
cyber crime
owasp chapter meets
owasp delhi meet
webinar
mobilesecurity
#dnstakeover
#dnsrecords
informationsecurityreport
reportwriting
sniffing
datasniffing
ethicalhacking
owaspdelhi
airgaps
#activedirectory
opensource
opensourcetool
networktools
udpservices
udpprobing
udp
#containers
#dockers
#waf #automation
#terraform
#threatintelligence
#threat
detection and response
threat hunting
injection
owasptop10
network security
security
networks
nmap
security group in aws
accessing it aws cli
s2 engine configuration
s3 bucket configuration
iam role
aws security
securing aws
dkim
spf
mail security
email security
null
infosec
dmarc
cloud security views
cloud pentest tool
cloud pentesting
authentication attack api
api pentesting
pentesting rest api
wifi password cracking
wifi security
password cracking
statndardization bodies
internet governance
ietf
hypervisor
injecting code in vm
shell codes
malicious hypervisor
privacy
hacking
incident management
dfir
docker
rat attacks
trojan
rat tools
rat
iot challenges
iot risks
iot security
iot
offence ios app
ios pentesting
defense ios app
quantum computing
qubits
quantum
quantum mechanics
deepweb
deanonymisation
darknet
network discovery
purple teaming
lde_based rootkit
ptrace_based rootkit
rootkits
malware
xss bypass
application firewall
waf evasion
windows mobile application
pentesting windows mobile application
windows
mobile
big data
machine learning
loophole in tor
tor network
anonymous
onion routing
tor
anonymity
post exploitation
windows privilege escalation
privilege escalation
security assurance
digital footprint
tracking user info
diva
damn vulnerable & insecure app
digital currencies
google vrp
google bug hunting
vulnerbailty reporting of google
aws breach
how to audit aws
bucket flaw
cyber awareness
cyber law
android hacking
android penetration testing
log management
siem
android
android security
sast
dast
wireless security
wlan security
wireless
csa
cloud computing
gsm
telecom security
gsm security
sandbox bypass
sandbox
symlinks
cyber security awareness
botnets
Tout plus
- Présentations
- Documents
- Infographies