Personal Information
Cargo
Security Researcher
Setor
Technology / Software / Internet
Site
shaheemirza.com/
Sobre
Hi! I’m a Certified Ethical Hacker (C|EH) who attacks a security system (app/server) on behalf of its owners, seeking vulnerabilities that a malicious hacker could exploit. So typically, my strengths are vulnerability assessment, penetration testing, network designing and implementation.
It’s been more than 5 years I’m into this enthralling industry where everyday I’m exploring, contributing & learning the endless possibilities. So far, I’ve received acknowledgement for security vulnerability report from more than 100+ tech giants & yet loads are on its way.
Marcadores
security
infosec
hacking
hacker
vulnerability
owasp
bug bounty
devopssec
devops
information security
bdnog4
exploit
responsible
disclosure
bdnog
Ver mais
Apresentações
(3)Gostaram
(5)An Underground education
grugq
•
Há 10 anos
Building an InfoSec RedTeam
Dan Vasile
•
Há 10 anos
Difference between OSI Layer & TCP/IP Layer
Netwax Lab
•
Há 9 anos
Hostile Subdomain Takeover by Ankit Prateek
OWASP Delhi
•
Há 7 anos
DNS hijacking using cloud providers – No verification needed
Frans Rosén
•
Há 6 anos
Personal Information
Cargo
Security Researcher
Setor
Technology / Software / Internet
Site
shaheemirza.com/
Sobre
Hi! I’m a Certified Ethical Hacker (C|EH) who attacks a security system (app/server) on behalf of its owners, seeking vulnerabilities that a malicious hacker could exploit. So typically, my strengths are vulnerability assessment, penetration testing, network designing and implementation.
It’s been more than 5 years I’m into this enthralling industry where everyday I’m exploring, contributing & learning the endless possibilities. So far, I’ve received acknowledgement for security vulnerability report from more than 100+ tech giants & yet loads are on its way.
Marcadores
security
infosec
hacking
hacker
vulnerability
owasp
bug bounty
devopssec
devops
information security
bdnog4
exploit
responsible
disclosure
bdnog
Ver mais