SlideShare uma empresa Scribd logo
1 de 18
Hack For Security
Web Design, Web Application Security and Digital Inspiration.
When it all was started ?
• In the 2nd semester of the Engineering.

• I have learned about the XSS, SQLI and File
Upload and symlink and rooting.

• That was enough to get the root access in the
server.
I started exploiting vulnerability!

• After learning the stuffs I have started exploiting
the vulnerability of the Pakistani websites as
they where hacking Indian websites!
Why I stopped exploiting vulnerability ?
• One day when I was enjoying my coffee, I
thought exploiting the vulnerability of the
website is bad thing instead I can help the
Indian webmasters to secure their application by
reporting the vulnerability to them! And again I
stopped doing that because most of them didn’t
cared about the website security
They said you have to face our legal
Department !
• As I was reporting the bug to the
webmasters, one of them said that don’t test
your skills on our websites else you have to face
our legal department !!
My Reaction:
• I just said “Okay!”
• What I was willing to say ? If you didn’t patched SQL loophole
then you probably gonna face our legal department !
I have started Blogging !

•Why ???
• I wanted to improve my English language.
• And Warren Buffett once said Never be
depended on Single income source 
Why I have started participating in Bug
Bounty Programs ?
• They Respect the Security Researchers
(Hackers).
• They Give acknowledgements !
• They give cool stuffs that money can’t buy 
I got acknowledged By Apple Inc.
• I have found mixed-content issue in apple.com
and they gave me acknowledgement.
Got acknowledged by Google
• #Finally Dream came true ♥ m/ :)
• I have found XXS vulnerability in Google Art Project
and they have offered me acknowledgement in
Google Honorable mention and $100 as a reward.
PayPal Offered me $500 as a reward 
• I have found Server Miss Configuration in
Paypal.com.au
Again Dream came true 
• #Again accomplished my Dream ♥ m/ :D
• I have found Email Spoofing in Blogger.com
and again they offered acknowledgement in
Google Reward Recipients and $100 as a
reward 
How much I Made ?
• I am a web Entrepreneur and I don’t work for
money 
• I work for respect and my dreams 

• By the way I have made $3095.83
in last 6 months of 2013  !
What if you want me to test your
website for vulnerability ?
• Just contact me @
TheSiddharthSolanki@gmail.com and we
will discuss about it 
About Me:
• Name: Siddharth Solanki
• Security Researcher/Hacker (As they call me! )

• Blogger (By choice :D)
• Engineer (By choice :D)
• Graphics Designer (By choice)
Thanks :
• Thanks to Vasim Belim, Dushyant Vaghela
and Utsav oza, for Being Awesome Friends!

• Thanks to Almighty GOD for making me
Fully, Totally and completely Independent  !
• Thanks to Echai and My college (VVP) for
giving me opportunity to promote my skills!
Questions ?
Let’s be Friends 
@HackForSecurity

/Siddharth.solanki.hfs

/HackForSecurity

/siddharthsolankihfs

/+SiddhartHSolankI

HackForSecurity.com

Mais conteúdo relacionado

Mais procurados

Website evaluation
Website evaluationWebsite evaluation
Website evaluation
Ann Vega
 

Mais procurados (7)

How to Avoid Online Marketing Scams and Ripoffs
How to Avoid Online Marketing Scams and RipoffsHow to Avoid Online Marketing Scams and Ripoffs
How to Avoid Online Marketing Scams and Ripoffs
 
All About Author Tags - Meet up #1 - BlogUp Berlin
All About Author Tags - Meet up #1 - BlogUp BerlinAll About Author Tags - Meet up #1 - BlogUp Berlin
All About Author Tags - Meet up #1 - BlogUp Berlin
 
Backlinks
 Backlinks Backlinks
Backlinks
 
MarketMix 2013 - Storytelling as Part of Your Content Marketing Plan
MarketMix 2013 - Storytelling as Part of Your Content Marketing PlanMarketMix 2013 - Storytelling as Part of Your Content Marketing Plan
MarketMix 2013 - Storytelling as Part of Your Content Marketing Plan
 
How to Establish Social Proof Using Social Love
How to Establish Social Proof Using Social LoveHow to Establish Social Proof Using Social Love
How to Establish Social Proof Using Social Love
 
Website evaluation
Website evaluationWebsite evaluation
Website evaluation
 
Article Marketing and Content Cheapskates
Article Marketing and Content CheapskatesArticle Marketing and Content Cheapskates
Article Marketing and Content Cheapskates
 

Destaque

Blue Eyes ppt
Blue Eyes pptBlue Eyes ppt
Blue Eyes ppt
deepu427
 

Destaque (9)

Anti Hack Solution
Anti Hack Solution Anti Hack Solution
Anti Hack Solution
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical Hacking
 
[DevDay 2016] Anti hacking on game development - Speaker: Khanh Le – Program...
 [DevDay 2016] Anti hacking on game development - Speaker: Khanh Le – Program... [DevDay 2016] Anti hacking on game development - Speaker: Khanh Le – Program...
[DevDay 2016] Anti hacking on game development - Speaker: Khanh Le – Program...
 
Tsunami warning system
Tsunami warning systemTsunami warning system
Tsunami warning system
 
Blue Eyes ppt
Blue Eyes pptBlue Eyes ppt
Blue Eyes ppt
 
SUPER CAPACITOR
SUPER CAPACITORSUPER CAPACITOR
SUPER CAPACITOR
 
Dc motor
Dc motor Dc motor
Dc motor
 
Ethical hacking & Information Security
Ethical hacking & Information SecurityEthical hacking & Information Security
Ethical hacking & Information Security
 
The Big Bang Theory
The Big Bang TheoryThe Big Bang Theory
The Big Bang Theory
 

Semelhante a Hack for security

State of Internet Marketing 2013
State of Internet Marketing 2013State of Internet Marketing 2013
State of Internet Marketing 2013
Blurbpoint
 
Maximizing Your Virtual Assistant for Realtors
Maximizing Your Virtual Assistant for RealtorsMaximizing Your Virtual Assistant for Realtors
Maximizing Your Virtual Assistant for Realtors
Richard Smith
 

Semelhante a Hack for security (20)

Known SEO. No SEO - A more powerful approach to SEO
Known SEO. No SEO - A more powerful approach to SEOKnown SEO. No SEO - A more powerful approach to SEO
Known SEO. No SEO - A more powerful approach to SEO
 
Infosec Sucks - and its not because of he people.
Infosec Sucks - and its not because of he people.Infosec Sucks - and its not because of he people.
Infosec Sucks - and its not because of he people.
 
Google is Watching You: How Google Spies on Search Behavior to Rank Websites
Google is Watching You: How Google Spies on Search Behavior to Rank WebsitesGoogle is Watching You: How Google Spies on Search Behavior to Rank Websites
Google is Watching You: How Google Spies on Search Behavior to Rank Websites
 
How to Start a Company
How to Start a CompanyHow to Start a Company
How to Start a Company
 
Social Media for Eyecare Professionals
Social Media for Eyecare ProfessionalsSocial Media for Eyecare Professionals
Social Media for Eyecare Professionals
 
New Age Marketing
New Age MarketingNew Age Marketing
New Age Marketing
 
Sucuri Webinar: How to clean hacked WordPress sites
Sucuri Webinar: How to clean hacked WordPress sitesSucuri Webinar: How to clean hacked WordPress sites
Sucuri Webinar: How to clean hacked WordPress sites
 
Evil User Stories - Improve Your Application Security
Evil User Stories - Improve Your Application SecurityEvil User Stories - Improve Your Application Security
Evil User Stories - Improve Your Application Security
 
The Brainy Way to Build Your Community - Roger Dooley
The Brainy Way to Build Your Community - Roger DooleyThe Brainy Way to Build Your Community - Roger Dooley
The Brainy Way to Build Your Community - Roger Dooley
 
Account entrapment
Account entrapmentAccount entrapment
Account entrapment
 
Account Entrapment - Forcing a Victim into an Attacker’s Account
Account Entrapment - Forcing a Victim into an Attacker’s AccountAccount Entrapment - Forcing a Victim into an Attacker’s Account
Account Entrapment - Forcing a Victim into an Attacker’s Account
 
State of Internet Marketing 2013
State of Internet Marketing 2013State of Internet Marketing 2013
State of Internet Marketing 2013
 
Maximizing Your Virtual Assistant for Realtors
Maximizing Your Virtual Assistant for RealtorsMaximizing Your Virtual Assistant for Realtors
Maximizing Your Virtual Assistant for Realtors
 
Nir goldshlager Killing a bug bounty program - twice Hack In The Box 2012
Nir goldshlager Killing a bug bounty program - twice Hack In The Box 2012Nir goldshlager Killing a bug bounty program - twice Hack In The Box 2012
Nir goldshlager Killing a bug bounty program - twice Hack In The Box 2012
 
Seven Core Competency Framework of a WordPress Pro
Seven Core Competency Framework of a WordPress ProSeven Core Competency Framework of a WordPress Pro
Seven Core Competency Framework of a WordPress Pro
 
How to Bootstrap a Startup?
How to Bootstrap a Startup?How to Bootstrap a Startup?
How to Bootstrap a Startup?
 
Everyday Seo by Tom Veltri
Everyday Seo by Tom VeltriEveryday Seo by Tom Veltri
Everyday Seo by Tom Veltri
 
Web + Social Media + Cyber Security for Lawyers
Web + Social Media + Cyber Security for LawyersWeb + Social Media + Cyber Security for Lawyers
Web + Social Media + Cyber Security for Lawyers
 
How to Overcome Sales Call Reluctance- Webinar slide deck
How to Overcome Sales Call Reluctance- Webinar slide deckHow to Overcome Sales Call Reluctance- Webinar slide deck
How to Overcome Sales Call Reluctance- Webinar slide deck
 
SEMA: shifting gears back_to_business - Corey Perlman Presentation
SEMA: shifting gears back_to_business - Corey Perlman Presentation SEMA: shifting gears back_to_business - Corey Perlman Presentation
SEMA: shifting gears back_to_business - Corey Perlman Presentation
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 

Hack for security

  • 1. Hack For Security Web Design, Web Application Security and Digital Inspiration.
  • 2. When it all was started ? • In the 2nd semester of the Engineering. • I have learned about the XSS, SQLI and File Upload and symlink and rooting. • That was enough to get the root access in the server.
  • 3. I started exploiting vulnerability! • After learning the stuffs I have started exploiting the vulnerability of the Pakistani websites as they where hacking Indian websites!
  • 4. Why I stopped exploiting vulnerability ? • One day when I was enjoying my coffee, I thought exploiting the vulnerability of the website is bad thing instead I can help the Indian webmasters to secure their application by reporting the vulnerability to them! And again I stopped doing that because most of them didn’t cared about the website security
  • 5. They said you have to face our legal Department ! • As I was reporting the bug to the webmasters, one of them said that don’t test your skills on our websites else you have to face our legal department !!
  • 6. My Reaction: • I just said “Okay!” • What I was willing to say ? If you didn’t patched SQL loophole then you probably gonna face our legal department !
  • 7. I have started Blogging ! •Why ??? • I wanted to improve my English language. • And Warren Buffett once said Never be depended on Single income source 
  • 8. Why I have started participating in Bug Bounty Programs ? • They Respect the Security Researchers (Hackers). • They Give acknowledgements ! • They give cool stuffs that money can’t buy 
  • 9. I got acknowledged By Apple Inc. • I have found mixed-content issue in apple.com and they gave me acknowledgement.
  • 10. Got acknowledged by Google • #Finally Dream came true ♥ m/ :) • I have found XXS vulnerability in Google Art Project and they have offered me acknowledgement in Google Honorable mention and $100 as a reward.
  • 11. PayPal Offered me $500 as a reward  • I have found Server Miss Configuration in Paypal.com.au
  • 12. Again Dream came true  • #Again accomplished my Dream ♥ m/ :D • I have found Email Spoofing in Blogger.com and again they offered acknowledgement in Google Reward Recipients and $100 as a reward 
  • 13. How much I Made ? • I am a web Entrepreneur and I don’t work for money  • I work for respect and my dreams  • By the way I have made $3095.83 in last 6 months of 2013  !
  • 14. What if you want me to test your website for vulnerability ? • Just contact me @ TheSiddharthSolanki@gmail.com and we will discuss about it 
  • 15. About Me: • Name: Siddharth Solanki • Security Researcher/Hacker (As they call me! ) • Blogger (By choice :D) • Engineer (By choice :D) • Graphics Designer (By choice)
  • 16. Thanks : • Thanks to Vasim Belim, Dushyant Vaghela and Utsav oza, for Being Awesome Friends! • Thanks to Almighty GOD for making me Fully, Totally and completely Independent  ! • Thanks to Echai and My college (VVP) for giving me opportunity to promote my skills!
  • 18. Let’s be Friends  @HackForSecurity /Siddharth.solanki.hfs /HackForSecurity /siddharthsolankihfs /+SiddhartHSolankI HackForSecurity.com