Enviar pesquisa
Carregar
Null who and_where (1)
•
Transferir como ODP, PDF
•
1 gostou
•
425 visualizações
Prajwal Panchmahalkar
Seguir
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 16
Baixar agora
Recomendados
NUS-ISS Learning Day 2019-Complying with new IoT cyber security guide
NUS-ISS Learning Day 2019-Complying with new IoT cyber security guide
NUS-ISS
NUS-ISS Learning Day 2019- AI and Cybersecurity – Solution or Threat?
NUS-ISS Learning Day 2019- AI and Cybersecurity – Solution or Threat?
NUS-ISS
AI for security or security for AI - Sergey Gordeychik
AI for security or security for AI - Sergey Gordeychik
Sergey Gordeychik
Intelligent Application Security
Intelligent Application Security
Priyanka Aash
Introduction and a Look at Security Trends
Introduction and a Look at Security Trends
Priyanka Aash
Bankinfonews
Bankinfonews
Vikram Kalkat
Hacking ble smartwatch
Hacking ble smartwatch
idsecconf
5 Things You Should Know About Ethical Hacking
5 Things You Should Know About Ethical Hacking
Koenig Solutions Ltd.
Recomendados
NUS-ISS Learning Day 2019-Complying with new IoT cyber security guide
NUS-ISS Learning Day 2019-Complying with new IoT cyber security guide
NUS-ISS
NUS-ISS Learning Day 2019- AI and Cybersecurity – Solution or Threat?
NUS-ISS Learning Day 2019- AI and Cybersecurity – Solution or Threat?
NUS-ISS
AI for security or security for AI - Sergey Gordeychik
AI for security or security for AI - Sergey Gordeychik
Sergey Gordeychik
Intelligent Application Security
Intelligent Application Security
Priyanka Aash
Introduction and a Look at Security Trends
Introduction and a Look at Security Trends
Priyanka Aash
Bankinfonews
Bankinfonews
Vikram Kalkat
Hacking ble smartwatch
Hacking ble smartwatch
idsecconf
5 Things You Should Know About Ethical Hacking
5 Things You Should Know About Ethical Hacking
Koenig Solutions Ltd.
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...
Burton Lee
Down The Rabbit Hole, From Networker to Security Professional
Down The Rabbit Hole, From Networker to Security Professional
Satria Ady Pradana
Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018
Leslie McFarlin
Preventing Code Leaks & Other Critical Security Risks from Code
Preventing Code Leaks & Other Critical Security Risks from Code
DevOps.com
Cybersecurity: How to Use What We Already Know
Cybersecurity: How to Use What We Already Know
jxyz
Passwords and Fingerprints and Faces—Oh My! Comparing Old and New Authentication
Passwords and Fingerprints and Faces—Oh My! Comparing Old and New Authentication
Priyanka Aash
Case Study on supply chain attack-how an rce in jenkins leads to data breache...
Case Study on supply chain attack-how an rce in jenkins leads to data breache...
idsecconf
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm
Shawn Tuma
Swapnil Goud Tadkal
Swapnil Goud Tadkal
Swapnil Goud Tadkal
Cyber threat intelligence: maturity and metrics
Cyber threat intelligence: maturity and metrics
Mark Arena
[CB20] It is a World Wide Web, but All Politics is Local: Planning to Survive...
[CB20] It is a World Wide Web, but All Politics is Local: Planning to Survive...
CODE BLUE
Cyber Octet Private Limited - Ethical Hacking & Cyber Security Training and S...
Cyber Octet Private Limited - Ethical Hacking & Cyber Security Training and S...
Falgun Rathod
Dancing pigs are real. Aigars Jaundālders. DPA Konference 2014.
Dancing pigs are real. Aigars Jaundālders. DPA Konference 2014.
ebuc
From Reversing to Exploitation: Android Application Security in Essence
From Reversing to Exploitation: Android Application Security in Essence
Satria Ady Pradana
Advanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective Responses
NetIQ
Cybersecurity with AI - Ashrith Barthur
Cybersecurity with AI - Ashrith Barthur
Sri Ambati
AI and Security
AI and Security
Anurag Sahay
Improving Mobile Authentication for Public Safety and First Responders
Improving Mobile Authentication for Public Safety and First Responders
Priyanka Aash
AI and ML in Cybersecurity
AI and ML in Cybersecurity
Forcepoint LLC
The 1st Step to Zero Trust: Asset Management for Cybersecurity
The 1st Step to Zero Trust: Asset Management for Cybersecurity
nathan-axonius
W3AF|null
W3AF|null
Prajwal Panchmahalkar
Matriux
Matriux
Prajwal Panchmahalkar
Mais conteúdo relacionado
Mais procurados
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...
Burton Lee
Down The Rabbit Hole, From Networker to Security Professional
Down The Rabbit Hole, From Networker to Security Professional
Satria Ady Pradana
Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018
Leslie McFarlin
Preventing Code Leaks & Other Critical Security Risks from Code
Preventing Code Leaks & Other Critical Security Risks from Code
DevOps.com
Cybersecurity: How to Use What We Already Know
Cybersecurity: How to Use What We Already Know
jxyz
Passwords and Fingerprints and Faces—Oh My! Comparing Old and New Authentication
Passwords and Fingerprints and Faces—Oh My! Comparing Old and New Authentication
Priyanka Aash
Case Study on supply chain attack-how an rce in jenkins leads to data breache...
Case Study on supply chain attack-how an rce in jenkins leads to data breache...
idsecconf
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm
Shawn Tuma
Swapnil Goud Tadkal
Swapnil Goud Tadkal
Swapnil Goud Tadkal
Cyber threat intelligence: maturity and metrics
Cyber threat intelligence: maturity and metrics
Mark Arena
[CB20] It is a World Wide Web, but All Politics is Local: Planning to Survive...
[CB20] It is a World Wide Web, but All Politics is Local: Planning to Survive...
CODE BLUE
Cyber Octet Private Limited - Ethical Hacking & Cyber Security Training and S...
Cyber Octet Private Limited - Ethical Hacking & Cyber Security Training and S...
Falgun Rathod
Dancing pigs are real. Aigars Jaundālders. DPA Konference 2014.
Dancing pigs are real. Aigars Jaundālders. DPA Konference 2014.
ebuc
From Reversing to Exploitation: Android Application Security in Essence
From Reversing to Exploitation: Android Application Security in Essence
Satria Ady Pradana
Advanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective Responses
NetIQ
Cybersecurity with AI - Ashrith Barthur
Cybersecurity with AI - Ashrith Barthur
Sri Ambati
AI and Security
AI and Security
Anurag Sahay
Improving Mobile Authentication for Public Safety and First Responders
Improving Mobile Authentication for Public Safety and First Responders
Priyanka Aash
AI and ML in Cybersecurity
AI and ML in Cybersecurity
Forcepoint LLC
The 1st Step to Zero Trust: Asset Management for Cybersecurity
The 1st Step to Zero Trust: Asset Management for Cybersecurity
nathan-axonius
Mais procurados
(20)
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...
Down The Rabbit Hole, From Networker to Security Professional
Down The Rabbit Hole, From Networker to Security Professional
Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018
Preventing Code Leaks & Other Critical Security Risks from Code
Preventing Code Leaks & Other Critical Security Risks from Code
Cybersecurity: How to Use What We Already Know
Cybersecurity: How to Use What We Already Know
Passwords and Fingerprints and Faces—Oh My! Comparing Old and New Authentication
Passwords and Fingerprints and Faces—Oh My! Comparing Old and New Authentication
Case Study on supply chain attack-how an rce in jenkins leads to data breache...
Case Study on supply chain attack-how an rce in jenkins leads to data breache...
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm
Swapnil Goud Tadkal
Swapnil Goud Tadkal
Cyber threat intelligence: maturity and metrics
Cyber threat intelligence: maturity and metrics
[CB20] It is a World Wide Web, but All Politics is Local: Planning to Survive...
[CB20] It is a World Wide Web, but All Politics is Local: Planning to Survive...
Cyber Octet Private Limited - Ethical Hacking & Cyber Security Training and S...
Cyber Octet Private Limited - Ethical Hacking & Cyber Security Training and S...
Dancing pigs are real. Aigars Jaundālders. DPA Konference 2014.
Dancing pigs are real. Aigars Jaundālders. DPA Konference 2014.
From Reversing to Exploitation: Android Application Security in Essence
From Reversing to Exploitation: Android Application Security in Essence
Advanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective Responses
Cybersecurity with AI - Ashrith Barthur
Cybersecurity with AI - Ashrith Barthur
AI and Security
AI and Security
Improving Mobile Authentication for Public Safety and First Responders
Improving Mobile Authentication for Public Safety and First Responders
AI and ML in Cybersecurity
AI and ML in Cybersecurity
The 1st Step to Zero Trust: Asset Management for Cybersecurity
The 1st Step to Zero Trust: Asset Management for Cybersecurity
Destaque
W3AF|null
W3AF|null
Prajwal Panchmahalkar
Matriux
Matriux
Prajwal Panchmahalkar
Maanav Jugaad - Social Engineering
Maanav Jugaad - Social Engineering
Prajwal Panchmahalkar
[null]Metapwn - Pwn at a puff by Prajwal Panchmahalkar
[null]Metapwn - Pwn at a puff by Prajwal Panchmahalkar
Prajwal Panchmahalkar
Energy Aware Shortest Path Minded SPIN
Energy Aware Shortest Path Minded SPIN
Prajwal Panchmahalkar
Energy Aware Fault Tolerant SPMS Protocol in Wireless Sensor Networks
Energy Aware Fault Tolerant SPMS Protocol in Wireless Sensor Networks
Prajwal Panchmahalkar
Matriux Leandros - BSidesLV 2013
Matriux Leandros - BSidesLV 2013
Prajwal Panchmahalkar
Destaque
(7)
W3AF|null
W3AF|null
Matriux
Matriux
Maanav Jugaad - Social Engineering
Maanav Jugaad - Social Engineering
[null]Metapwn - Pwn at a puff by Prajwal Panchmahalkar
[null]Metapwn - Pwn at a puff by Prajwal Panchmahalkar
Energy Aware Shortest Path Minded SPIN
Energy Aware Shortest Path Minded SPIN
Energy Aware Fault Tolerant SPMS Protocol in Wireless Sensor Networks
Energy Aware Fault Tolerant SPMS Protocol in Wireless Sensor Networks
Matriux Leandros - BSidesLV 2013
Matriux Leandros - BSidesLV 2013
Semelhante a Null who and_where (1)
Security in the age of open source - Myths and misperceptions
Security in the age of open source - Myths and misperceptions
Tim Mackey
Security and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of things
IRJET Journal
Domain 6 of CEH Wireless Network Hacking.pptx
Domain 6 of CEH Wireless Network Hacking.pptx
Infosectrain3
Peerlyst Delhi NCR Chapter Meet
Peerlyst Delhi NCR Chapter Meet
Abhinav Mishra
Elizabeth Lawler - Devops, security, and compliance working in unison
Elizabeth Lawler - Devops, security, and compliance working in unison
DevSecCon
Asset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt Labs
RedhuntLabs2
Cyber security for Developers
Cyber security for Developers
techtutorus
Role Of Forensic Triage In Cyber Security Trends 2022-UPDATED.pptx
Role Of Forensic Triage In Cyber Security Trends 2022-UPDATED.pptx
Amrit Chhetri
India's Leading Cyber Security Companies_compressed.pdf
India's Leading Cyber Security Companies_compressed.pdf
Insights success media and technology pvt ltd
Why do women love chasing down bad guys?
Why do women love chasing down bad guys?
SITA
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Emrah Alpa, CISSP CEH CCSK
Career guidance talk it makaut_ppt_sabyasachi mukhopadhyay
Career guidance talk it makaut_ppt_sabyasachi mukhopadhyay
Sabyasachi Mukhopadhyay
Zero Trust and Data Security
Zero Trust and Data Security
Career Communications Group
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Black Duck by Synopsys
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Keith Kraus
Who owns Software Security
Who owns Software Security
devObjective
Who Owns Software Security?
Who Owns Software Security?
ColdFusionConference
Codes of Ethics and the Ethics of Code
Codes of Ethics and the Ethics of Code
Mark Underwood
IDS+Honeypots Making Security Simple
IDS+Honeypots Making Security Simple
Gregory Hanis
Ten security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard of
Adrian Sanabria
Semelhante a Null who and_where (1)
(20)
Security in the age of open source - Myths and misperceptions
Security in the age of open source - Myths and misperceptions
Security and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of things
Domain 6 of CEH Wireless Network Hacking.pptx
Domain 6 of CEH Wireless Network Hacking.pptx
Peerlyst Delhi NCR Chapter Meet
Peerlyst Delhi NCR Chapter Meet
Elizabeth Lawler - Devops, security, and compliance working in unison
Elizabeth Lawler - Devops, security, and compliance working in unison
Asset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt Labs
Cyber security for Developers
Cyber security for Developers
Role Of Forensic Triage In Cyber Security Trends 2022-UPDATED.pptx
Role Of Forensic Triage In Cyber Security Trends 2022-UPDATED.pptx
India's Leading Cyber Security Companies_compressed.pdf
India's Leading Cyber Security Companies_compressed.pdf
Why do women love chasing down bad guys?
Why do women love chasing down bad guys?
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Career guidance talk it makaut_ppt_sabyasachi mukhopadhyay
Career guidance talk it makaut_ppt_sabyasachi mukhopadhyay
Zero Trust and Data Security
Zero Trust and Data Security
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Who owns Software Security
Who owns Software Security
Who Owns Software Security?
Who Owns Software Security?
Codes of Ethics and the Ethics of Code
Codes of Ethics and the Ethics of Code
IDS+Honeypots Making Security Simple
IDS+Honeypots Making Security Simple
Ten security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard of
Mais de Prajwal Panchmahalkar
Fault tolerant energy aware data dissemination protocol in WSN
Fault tolerant energy aware data dissemination protocol in WSN
Prajwal Panchmahalkar
Energy aware efficient geographic routing in lossy wireless Networks
Energy aware efficient geographic routing in lossy wireless Networks
Prajwal Panchmahalkar
An analysis of a facebook spam exploited through browser addons
An analysis of a facebook spam exploited through browser addons
Prajwal Panchmahalkar
[null]Iso 27001 a business view
[null]Iso 27001 a business view
Prajwal Panchmahalkar
[null] Iso 27001 a business view by Sripathi
[null] Iso 27001 a business view by Sripathi
Prajwal Panchmahalkar
Facebook Attacks By dinesh
Facebook Attacks By dinesh
Prajwal Panchmahalkar
Brute force
Brute force
Prajwal Panchmahalkar
Network concepts
Network concepts
Prajwal Panchmahalkar
Security
Security
Prajwal Panchmahalkar
Mais de Prajwal Panchmahalkar
(9)
Fault tolerant energy aware data dissemination protocol in WSN
Fault tolerant energy aware data dissemination protocol in WSN
Energy aware efficient geographic routing in lossy wireless Networks
Energy aware efficient geographic routing in lossy wireless Networks
An analysis of a facebook spam exploited through browser addons
An analysis of a facebook spam exploited through browser addons
[null]Iso 27001 a business view
[null]Iso 27001 a business view
[null] Iso 27001 a business view by Sripathi
[null] Iso 27001 a business view by Sripathi
Facebook Attacks By dinesh
Facebook Attacks By dinesh
Brute force
Brute force
Network concepts
Network concepts
Security
Security
Null who and_where (1)
1.
2.
a.k.a “@”
3.
4.
A non-profit
initiative.
5.
6.
Responsible vulnerability disclosure.
7.
8.
1070+ and
growing members.
9.
Organize security awareness
camps.
10.
Monthly meets in
all chapters
11.
Research and Software
Projects .
12.
13.
Members from
IPS , defense services and Business Executives.
14.
Speakers at famous
security conferences like BlackHat , Defcon, Xcon , clubhack to name a few.
15.
Have disclosed
vulnerabilities to many organizations and vendors.
16.
Regularly assist
police cyber crime cell in technology related cases and cyber forensics investigation.
17.
18.
Infosys
19.
State Bank of
India – S.B Road, Pune
20.
Credit Suisse, Pune
21.
Saras Baug Study
circle of Chartered
22.
Accountants, Pune
23.
BITS, Goa
24.
SICSR, Pune
25.
Cummins College of
Engineering
26.
MIT Engineering college
27.
SCIT Institute
28.
I2IT
29.
Goa Engineering College
30.
31.
Bangalore –
Akash Mahajan, Simran, aka_at_null.co.in, s_at_null.co.in
32.
Mumbai –
Bipin, om_at_null.co.in
33.
Delhi –
Rockey_at_null.co.in
34.
Bhopal –
Yogesh, code_at_null.co.in
35.
Hyderabad –
Prajwal, Imran(To Be)
36.
Chennai –
Coming Soon...
37.
38.
Responsible vulnerability disclosures
39.
Projects – Tools/Utilities
40.
Presentations on various
subjects
41.
Member Blog on
security
42.
Meet and Camp
details
43.
44.
100% Community managed.
45.
Project Managers and
Leads identified from the Memberbase though open volunteering.
46.
47.
Indian vendors hard
of hearing
48.
Any type of
vulnerability
49.
Disclose immediately to
vendor and CERT-IN
50.
Wait for vendor
response.
51.
Disclose on the
website.
52.
Contact: Keeda_ at
_null.co.in
53.
54.
Free service for
all.
55.
http://jobs.nullcon.net.
56.
Contact jobs_ at
_null.co.in
57.
58.
Spiderpig – PDF
javascript fuzzer, by Sachin Shinde
59.
EyePee – Recon
tool, By @
60.
Kunsa – Web
App fingerprinting tool, By Corrupt
61.
Bsqlbf – Blind
SQLi tool, By Sumit Sidharth
62.
63.
GeoLocation
64.
Query Blacklist Servers
65.
Whois Information
66.
DNS Information
67.
Kunsa DEMO!!
68.
69.
An initiative by
null – The open security community.
70.
Vendor neutral.
71.
72.
CXOs/Business Execs
73.
Engineers/Developers/QA/Consultants/Students
74.
IT Vendors
75.
Senior Officials from
NASSCOM , Data Security Council of India ( DSCI )
76.
Defense Personnel
77.
IPS/Cyber cell officers
78.
79.
Date: Feb 20XX
80.
Tracks – Gurukool
(1 Hr) and Turbo (10-20 mins) Tech-Talks
81.
Desi Jugaad Section
– Auto-rickshaw Meter hacking (Live Demo)
82.
Panel Discussion
83.
Battle Underground -
Live Hacking Challenge
84.
85.
Miles and miles
to go before we sleep!!
86.
ZERO Support from
organizations
87.
88.
Office space
89.
Moolah
90.
Old Hardware, software
91.
Your Kids toys,
Blankets...
92.
Baixar agora