This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Bangalore/Archives"
m (→2018 Meetings) (Tag: Visual edit) |
m (→2019 Meetings) (Tag: Visual edit) |
||
(23 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
+ | == 2019 Meetings == | ||
+ | ===19 October 2019=== | ||
+ | ===='''Sessions'''==== | ||
+ | *Introduction Burpsuite v2 by '''Anushree priyadarshini''' | ||
+ | *AD Security by '''Iliyas Ahamed''' | ||
+ | *Bash and Recon by '''Imran Parray''' | ||
+ | *Network Recon Techniques by '''Swadhin Kumar''' | ||
+ | *Api Security Top10 by '''Manjunatha''' | ||
+ | RSVP: https://www.meetup.com/OWASP-Bangalore-Chapter/events/265498366 | ||
+ | |||
+ | === 21st September 2019 === | ||
+ | |||
+ | ==== Sessions ==== | ||
+ | * Cryptography Using Python by '''Kaushik ramabhotla''' | ||
+ | * Interactive Application Security Testing by '''Lohith AB''' | ||
+ | * Understanding kerberos by '''santoshjeergi''' | ||
+ | * Overview of ICS Security by '''Sahan''' | ||
+ | * Pentesting GraphQL by '''divyanshu shukla''' | ||
+ | RSVP: https://www.meetup.com/OWASP-Bangalore-Chapter/events/265014877 | ||
+ | |||
+ | === 24th August 2019 === | ||
+ | |||
+ | ==== Sessions ==== | ||
+ | *Basics of information security - PKI and Encryption by '''Bala''' | ||
+ | *Security News bytes by '''Hiren Sadhwani''' | ||
+ | *Demystifying malware analysis of pdf files by '''Lastbench''' | ||
+ | *Journey of Null Bangalore by '''Nikhil P Kulkarni''' | ||
+ | *Assembly language primary by '''Omkar Kumbhar''' | ||
+ | *Application Micro-segmentation by '''ashu m''' | ||
+ | *Introduction to frida by '''Abhishek Jaiswal''' | ||
+ | === 20th July 2019 === | ||
+ | |||
+ | ==== Sessions ==== | ||
+ | * Basics of Revere Engineering by '''Arpit Agarwalla''' | ||
+ | * Security News Bytes by '''Ajith Menon''' | ||
+ | * Dissecting a malware by '''Adib Nagarajan''' | ||
+ | * OWASP top 10 on Web Appication by '''Jay Patel''' | ||
+ | * Made easy Healthcare Security by '''Ajay Pratap SIngh''' | ||
+ | * Psychological Aspect of Social Engineering by '''Ajith Menon''' | ||
+ | |||
+ | === 22nd June 2019 === | ||
+ | |||
+ | ==== Sessions ==== | ||
+ | * Deserialization Attacks by '''Ayush''' | ||
+ | * Buffer Overflow by '''Ashwin Goel''' | ||
+ | * NoSQL Injections by '''Aditya Srinages''' | ||
+ | * Python Sandbox Escapes by '''Suraj''' | ||
+ | * Building Own Authenticator App by '''varun4sec''' | ||
+ | |||
+ | === 18 May 2019 === | ||
+ | ===='''Sessions:'''==== | ||
+ | *XXE Vulnerabilities by '''Puneet Kulkarni''' | ||
+ | *Product Security by '''Pawan Bhandari''' | ||
+ | *DNS Security by '''Sanal''' | ||
+ | *OWASP AppSensor by '''anjana''' | ||
+ | *Fundamentals to Widows Kernel by '''Mihir Shah''' | ||
+ | *Introduction to attacking SAML by '''Suma shambhavi p''' | ||
+ | *Python Cookbook with OSINT by '''Akash Thakur''' | ||
+ | |||
+ | === 27 April 2019 === | ||
+ | |||
+ | ==== Sessions ==== | ||
+ | * Cyber Threat Intelligence by '''Amiya Dutta''' | ||
+ | * Defending from Malicious Adwords by '''Aditya Varma''' | ||
+ | * OWASP Slot by '''Vandana Verma''' | ||
+ | * The world of Security Audits by '''Amit Tripathi''' | ||
+ | * CSP Bypass by '''Pawan Jaiswal''' | ||
+ | * ADHD( Active Directory for Hacker’s Delight) by '''Harsh Thakur''' | ||
+ | |||
+ | === 16 March 2019 === | ||
+ | |||
+ | ==== Sessions ==== | ||
+ | *Beginner Talk - IoT Security Overview by '''AMAR PRUSTY''' | ||
+ | *Defense in Depth for Embedded devices by '''Jiggyasu Sharma''' | ||
+ | *Open Source PnP WAF by '''varun4sec''' | ||
+ | *IT/OT Convergence by '''pratik bhartari''' | ||
+ | *Cracking the Crypto by '''Mihir Shah''' | ||
+ | ===23 February 2019=== | ||
+ | |||
+ | ==== Sessions ==== | ||
+ | *Beginner Talk - TBD by '''Pankaj Kumar Singh''' | ||
+ | *IDS using Snort by '''Shyamsundar Das''' | ||
+ | *Setting up and using VPS Infrastructure for BugBounty and Pen-testing by '''narendra kumar''' | ||
+ | *Honey Encryption by '''Shashwat Kumar''' | ||
+ | *Implementation of Mobile SAST by '''sanjeeva kumar''' | ||
+ | *Malware analysis 101 by '''Adib Nagarajan''' | ||
+ | *Security of automotive networks by '''Sunil Kumar''' | ||
+ | === 19 January 2019 === | ||
+ | |||
+ | ==== Sessions ==== | ||
+ | * Information Security Newsbytes by Nimesh | ||
+ | * Secret Sharing by Prateek Kumar Nischal | ||
+ | * OWASP Slot by Vandana Verma & Riyaz Walikar | ||
+ | * BLE Exploitation by Vaibhav Bedi | ||
+ | * Big Data Security by 5cr3Amer | ||
+ | * ArcherySec - Vuln Assessment Management by Anand Tiwari | ||
+ | * VOIP Security by Himanshu Taragi | ||
==2018 Meetings== | ==2018 Meetings== | ||
+ | |||
+ | === Sessions[edit | edit source === | ||
+ | |||
+ | === 15 December 2018 === | ||
+ | |||
+ | ===='''Sessions:'''==== | ||
+ | *Wireshark by V'''arun Sharma''' | ||
+ | *Using Burp Macros to Automate Session Handling by '''Riddhi Shree''' | ||
+ | *OWASP Serverless Top 10 by '''Badshah''' | ||
+ | *IP Sec by '''Bharath''' | ||
+ | *Designing security solution for Microservices in Multi-cloud by '''Neelkamal Singh Gaharwar''' | ||
+ | *Industrial Threat Landscape by '''Biswajit De''' | ||
+ | === 17 November 2018 === | ||
+ | |||
+ | ==== Sessions ==== | ||
+ | * Intro to Browser Security Features by Bharath | ||
+ | * OWASP ASVS by Vandana Verma | ||
+ | * Vulnerable Implementation of OAuth 2 by Neelkamal Singh Gaharwar | ||
+ | * Secure Compilation Options by Bharath | ||
+ | * Return Oriented Programming ROP by Mihir Shah | ||
+ | * Job Announcements + Feedback + Next Month Session Planning | ||
+ | |||
+ | === 13 October 2018 === | ||
+ | |||
+ | ==== Sessions ==== | ||
+ | * Introduction to Kerberos Protocol by '''Jignesh Ravindra Pandey''' | ||
+ | * 802.11 Security by '''Shyamsundar Das''' | ||
+ | * An introduction to DefectDojo (OWASP Project) by '''Riyaz Walikar''' | ||
+ | * Bodhi Vulnerable Application Demo by '''AMol NAik''' | ||
+ | * Security Q&A | ||
+ | * Static Malware Analysis by '''Vikram''' | ||
+ | |||
+ | === 02nd October 2018 === | ||
+ | '''Speakers''': Abhinav & Badhshah | ||
+ | |||
+ | '''The content includes:''' | ||
+ | * What is Frida | ||
+ | * Demo on hooking | ||
+ | * How Frida can be used for Android devices | ||
+ | * Using Frida for bypassing basic defences in Android Apps | ||
+ | |||
+ | === 15th September 2018 === | ||
+ | |||
+ | ==== Sessions ==== | ||
+ | * Introduction to SS7 by Harsh thakur | ||
+ | * Digital Certificates by Debojyoti | ||
+ | * Health Care Security by Ajay Pratap SIngh | ||
+ | * OWASP Broken Application & Apache Struts 2 OGNL Vulnerability by Vandana Verma | ||
+ | * Cryptography for beginners by Riddhi Shree | ||
+ | * Dynamic Instrumentation in Android by Tony Thomas | ||
+ | * Owasp A8: Insecure Deserialization by Arun.S | ||
+ | |||
+ | ===18th August 2018=== | ||
+ | |||
+ | ==== '''Sessions''' ==== | ||
+ | * Basics of Cyrptocurrencies by Place Holder | ||
+ | * XML External Entity (XXE) Injection Attacks by Jagan Mohan | ||
+ | * Machine Learning for AppSec by siva srl | ||
+ | * Canbus - Car Hacking by Kalathil Karthik | ||
+ | |||
+ | === 14th July 2018 === | ||
+ | |||
+ | ==== '''Sessions''' ==== | ||
+ | * Threat Modelling by '''Sai Reddy''' | ||
+ | * IoT Pentesting -Zigbee by '''Veerababu(Mr-IoT)''' | ||
+ | * OWASP - DevSlop Project by '''Vandana and''' '''Arun.S''' | ||
+ | * JWT 101 by '''Mohammed Akbar Shariff''' | ||
+ | * Responder - Windows Exploitation Tool by '''Aamer Shah''' | ||
+ | |||
+ | === 23rd June 2018 === | ||
+ | |||
+ | ==== '''Sessions''' ==== | ||
+ | * OWASP Top 10 2017 by '''shreyas.n''' | ||
+ | * Getting started with Frida on Android Apps by '''Badshah''' | ||
+ | * Identity Management in modern web apps by '''Riddhi Shree''' | ||
+ | * Breaking into infosec as career by '''sanjeeva kumar''' | ||
+ | * Maintaining Anonymity Online by '''Rajan Fasra''' | ||
+ | |||
===26th May 2018=== | ===26th May 2018=== | ||
===='''Sessions'''==== | ===='''Sessions'''==== |
Latest revision as of 04:50, 31 October 2019
- 1 2019 Meetings
- 2 2018 Meetings
- 2.1 Sessions[edit | edit source
- 2.2 15 December 2018
- 2.3 17 November 2018
- 2.4 13 October 2018
- 2.5 02nd October 2018
- 2.6 15th September 2018
- 2.7 18th August 2018
- 2.8 14th July 2018
- 2.9 23rd June 2018
- 2.10 26th May 2018
- 2.11 21st April 2018
- 2.12 10th March 2018
- 2.13 10th February 2018
- 2.14 10th February 2018
- 2.15 20th January 2018
- 3 2017 Meetings
- 4 2016 Meetings
- 5 2015 Meetings
- 6 2014 Meetings
- 7 2013 Meetings
- 8 2012 Meetings
- 9 2011 Meetings
- 10 2010 Meetings
- 11 2009 Meetings
- 12 2008 Meetings
2019 Meetings
19 October 2019
Sessions
- Introduction Burpsuite v2 by Anushree priyadarshini
- AD Security by Iliyas Ahamed
- Bash and Recon by Imran Parray
- Network Recon Techniques by Swadhin Kumar
- Api Security Top10 by Manjunatha
RSVP: https://www.meetup.com/OWASP-Bangalore-Chapter/events/265498366
21st September 2019
Sessions
- Cryptography Using Python by Kaushik ramabhotla
- Interactive Application Security Testing by Lohith AB
- Understanding kerberos by santoshjeergi
- Overview of ICS Security by Sahan
- Pentesting GraphQL by divyanshu shukla
RSVP: https://www.meetup.com/OWASP-Bangalore-Chapter/events/265014877
24th August 2019
Sessions
- Basics of information security - PKI and Encryption by Bala
- Security News bytes by Hiren Sadhwani
- Demystifying malware analysis of pdf files by Lastbench
- Journey of Null Bangalore by Nikhil P Kulkarni
- Assembly language primary by Omkar Kumbhar
- Application Micro-segmentation by ashu m
- Introduction to frida by Abhishek Jaiswal
20th July 2019
Sessions
- Basics of Revere Engineering by Arpit Agarwalla
- Security News Bytes by Ajith Menon
- Dissecting a malware by Adib Nagarajan
- OWASP top 10 on Web Appication by Jay Patel
- Made easy Healthcare Security by Ajay Pratap SIngh
- Psychological Aspect of Social Engineering by Ajith Menon
22nd June 2019
Sessions
- Deserialization Attacks by Ayush
- Buffer Overflow by Ashwin Goel
- NoSQL Injections by Aditya Srinages
- Python Sandbox Escapes by Suraj
- Building Own Authenticator App by varun4sec
18 May 2019
Sessions:
- XXE Vulnerabilities by Puneet Kulkarni
- Product Security by Pawan Bhandari
- DNS Security by Sanal
- OWASP AppSensor by anjana
- Fundamentals to Widows Kernel by Mihir Shah
- Introduction to attacking SAML by Suma shambhavi p
- Python Cookbook with OSINT by Akash Thakur
27 April 2019
Sessions
- Cyber Threat Intelligence by Amiya Dutta
- Defending from Malicious Adwords by Aditya Varma
- OWASP Slot by Vandana Verma
- The world of Security Audits by Amit Tripathi
- CSP Bypass by Pawan Jaiswal
- ADHD( Active Directory for Hacker’s Delight) by Harsh Thakur
16 March 2019
Sessions
- Beginner Talk - IoT Security Overview by AMAR PRUSTY
- Defense in Depth for Embedded devices by Jiggyasu Sharma
- Open Source PnP WAF by varun4sec
- IT/OT Convergence by pratik bhartari
- Cracking the Crypto by Mihir Shah
23 February 2019
Sessions
- Beginner Talk - TBD by Pankaj Kumar Singh
- IDS using Snort by Shyamsundar Das
- Setting up and using VPS Infrastructure for BugBounty and Pen-testing by narendra kumar
- Honey Encryption by Shashwat Kumar
- Implementation of Mobile SAST by sanjeeva kumar
- Malware analysis 101 by Adib Nagarajan
- Security of automotive networks by Sunil Kumar
19 January 2019
Sessions
- Information Security Newsbytes by Nimesh
- Secret Sharing by Prateek Kumar Nischal
- OWASP Slot by Vandana Verma & Riyaz Walikar
- BLE Exploitation by Vaibhav Bedi
- Big Data Security by 5cr3Amer
- ArcherySec - Vuln Assessment Management by Anand Tiwari
- VOIP Security by Himanshu Taragi
2018 Meetings
Sessions[edit | edit source
15 December 2018
Sessions:
- Wireshark by Varun Sharma
- Using Burp Macros to Automate Session Handling by Riddhi Shree
- OWASP Serverless Top 10 by Badshah
- IP Sec by Bharath
- Designing security solution for Microservices in Multi-cloud by Neelkamal Singh Gaharwar
- Industrial Threat Landscape by Biswajit De
17 November 2018
Sessions
- Intro to Browser Security Features by Bharath
- OWASP ASVS by Vandana Verma
- Vulnerable Implementation of OAuth 2 by Neelkamal Singh Gaharwar
- Secure Compilation Options by Bharath
- Return Oriented Programming ROP by Mihir Shah
- Job Announcements + Feedback + Next Month Session Planning
13 October 2018
Sessions
- Introduction to Kerberos Protocol by Jignesh Ravindra Pandey
- 802.11 Security by Shyamsundar Das
- An introduction to DefectDojo (OWASP Project) by Riyaz Walikar
- Bodhi Vulnerable Application Demo by AMol NAik
- Security Q&A
- Static Malware Analysis by Vikram
02nd October 2018
Speakers: Abhinav & Badhshah
The content includes:
- What is Frida
- Demo on hooking
- How Frida can be used for Android devices
- Using Frida for bypassing basic defences in Android Apps
15th September 2018
Sessions
- Introduction to SS7 by Harsh thakur
- Digital Certificates by Debojyoti
- Health Care Security by Ajay Pratap SIngh
- OWASP Broken Application & Apache Struts 2 OGNL Vulnerability by Vandana Verma
- Cryptography for beginners by Riddhi Shree
- Dynamic Instrumentation in Android by Tony Thomas
- Owasp A8: Insecure Deserialization by Arun.S
18th August 2018
Sessions
- Basics of Cyrptocurrencies by Place Holder
- XML External Entity (XXE) Injection Attacks by Jagan Mohan
- Machine Learning for AppSec by siva srl
- Canbus - Car Hacking by Kalathil Karthik
14th July 2018
Sessions
- Threat Modelling by Sai Reddy
- IoT Pentesting -Zigbee by Veerababu(Mr-IoT)
- OWASP - DevSlop Project by Vandana and Arun.S
- JWT 101 by Mohammed Akbar Shariff
- Responder - Windows Exploitation Tool by Aamer Shah
23rd June 2018
Sessions
- OWASP Top 10 2017 by shreyas.n
- Getting started with Frida on Android Apps by Badshah
- Identity Management in modern web apps by Riddhi Shree
- Breaking into infosec as career by sanjeeva kumar
- Maintaining Anonymity Online by Rajan Fasra
26th May 2018
Sessions
- Burp Suite for Beginners by Vathsala
- Wireless Pentesting by Mihir Shah
- Owasp Projects by Vandana Verma
- AWS Overview + Security by Raghavendran Gopal
- Security Access in Automobile by Debojyoti
21st April 2018
Sessions
- Hardware Hacking by Likith
- Block Chain by Sadhana
- Rest API Pentesting by Sagar
- Report Automation by Zakeer
- Selenium+Zap+Jenkins by Narendra
10th March 2018
Sessions
- Shell on Windows (Bind & Reverse) by MUTHUMOHANPRASATH
- AWS Overview + Security by Raghavendran Gopal
- Understanding WMI by Bharath
- Second order SQL Injection by Anjana
- XML External Entities(XXE) by Kevin Paul
10th February 2018
Sessions
- OWASP Top 10 2017 - The saga of what you need to learn right now - Andrew van der Stock
- OWASP Top 10, Application Security Verification Standard, Andrew's work as OWASP Board Member - Andrew van der Stock
10th February 2018
Sessions
- Scapy for Beginners by Udaykumar
- Java Deserialization by Truptiranjan Nayak
- Android Pentesting for Beginners by Subash
- Getting Started with Bug Bounty by Aamer Shah
20th January 2018
Sessions
- Live Forensics on Windows by Arpan Raval
- Metasploit Basics by Vasanthan
- Pentesting AWS Lambda Functions by Riyaz Walikar
- TPM Basics by Rishi
- Pentesting Docker by Riddhi Shree
- Accelerating your Security Learning by Jayesh Singh Chauhan
2017 Meetings
16th December 2017
Sessions
- Server Side Template Injection by Narendra Kumar
- Annual Review Security Learning 2017 by Akash Mahajan
- Local Priv Escalation on Linux by Tushar Routray
- Rop chaining by Abhinav Chourasia
- [Open Q&A - null Bangalore]
18th November 2017
Sessions
- Firmware Analysis for Beginners by Ramkumar Ganesan
- Introduction to Cryptocurrency by Ajit Hatti
- Mathematical Modelling for NexG & The Algebra of Cryptography by Ali Shabbir
- [Open Q&A - null Bangalore]
14th October 2017
Sessions
- OWASP Cloud Top 10 by Vandana Verma
- Web Cached Deception Attack by Rupali Dash
- Blueborne by Faiz M Khan
- Bashware by Riyaz Walikar
16th September 2017
Sessions
- SSI Injection by Narendra Kumar
- Getting Started with Frida by Satheesh
- Cloud Security Suite by Jayesh
- Security Issues with HTTP/2 by Karthik
26th August 2017
Sessions
- Automating Web Pentesting with ZAP by Bharath
- Exploiting XSS by Aamer Shah
- Breaking the Black Box by Abhinav Chourasia
- Code Review to Threat Modeling by Deepam Kanjani
- Open Q&A by Akash Mahajan & Riyaz Walikar
22nd July 2017
Sessions
- Server Side Request Forgery by Narendra Kumar
- SOP CORS Bypass by Manikandan
- SQLMap by Ali Shabbit
- Pentesting Web Sockets by Riddhi Shree
- Spinning up containers by Akash Mahajan
- Nmap and metasploitable by Mohammed Akbar Shariff
17th June 2017
Sessions
OWASP Bangalore/null/G4H Combined Meet at Sprinklr Solutions Pvt Ltd, Yamalur.
- DNS for Pentesters Beginners by Bharath
- Cool domain hacks by 5cr3Amer
- Overview of Big Data Security by Vandana
- Talk on LFI/RFI by Shruthi
- Talk on LFI/RFI by Faiz M Khan
20th May 2017
Sessions
OWASP Bangalore/null/G4H Combined Meet at Sprinklr Solutions Pvt Ltd, Yamalur.
- Cloud Sec 101 by Bhavin Parmar
- DNS Firewall by Anirudda Biyani
- PCI DSS Compliance by Saumya Vishnoi
- Crunch by Aamer Shah
- Hashcat with Examples by Ashritha
- Wannacry by Riyaz Walikar
- Windows Forensics by Rajan Fasra
22nd April 2017
Sessions
OWASP Bangalore/null/G4H Combined Meet at Sprinklr Solutions Pvt Ltd, Yamalur.
- Impacket Tools by Riyaz Walikar
- Hacking Blutooth by Arun Magesh
- Number Theory & Cryptography by Debojyoti
- Exploiting Buffer Overflow vulnerability by Riddhi Shree
- IoT Security 101 by Jitendra Kumar
- Working with Exploit Kits by Gajendra Kumar
18th March 2017
Sessions
OWASP Bangalore/null/G4H Combined Meet at Citrix R&D, Ulsoor Road.
- Poodle Vulnerability by Samit Anwer
- Datasploit Demo by Shubham Mittal
- Mod Security Demo by Shruthi Kamath
- Apache Struts RCE - CVE-2017-5638 by Riyaz Walikar
- Containers and Virtualization security by Subash
- Insearch of IoT Devices by Priyal Viroja
18th February 2017
Sessions
OWASP Bangalore/null/G4H Combined Meet at Citrix R&D, Ulsoor Road.
- Basics of Binary Fuzzing by abhishikt v v
- Concepts of Proxy Chains by Aamer Shah
- SSL Pinning by Nikhil P Kulkarni
- Nmap and Nikto 101 by Ramnath
- Attacking Databases by Jagan Mohan
21st January 2017
Sessions
OWASP Bangalore/null/G4H Combined Meet at Citrix R&D, Ulsoor Road.
- Metasploit Demo for Beginners by Ramnath
- Buffer Overflow Exploitation by Gajendra Kumar
- OWASP Top 10 IOT by veerababu.p
- Threat Intelligence by Praful Kalla
- Accelerating Your Security Learning in 2017 by Akash Mahajan
2016 Meetings
17th December 2016
Sessions
OWASP Bangalore/null/G4H Combined Meet at Citrix R&D, Ulsoor Road.
- iOS pentesting for beginners by Arun.S
- Tool Demo - Pwntools by Chandrapal
- Tor Internals and Hidden Services - Part II by Gabbar
- Malware Reverse Engineering by Mohammed Danish Amber
- Bug Bounty Trade Secrets by Nishtha
- Pentesting of IPv6 networks by Bharath
19th November 2016
Sessions
OWASP Bangalore/null/G4H Combined Meet at Citrix R&D, Ulsoor Road.
- Android Security For Beginners by Lokesh Ranjan
- Introduction to VPN Security by shreedhar
- Demo on Netcat by Rahul R
- Case studies of Authentication and Authorization bypass by Sarwar Jahan M
- Tor Internals and Hidden Services by Gabbar
- Software defined radio by veerababu.p
16th October 2016
Sessions
OWASP Bangalore/null/G4H Combined Meet at Citrix R&D, Ulsoor Road.
- Using Hydra by Sankalp Bastakoti
- Demo of Net Hunter by Prashanth Sivarajan
- Packet Analysis by Basaveswar
- Approach to Bug Bounty Program by Rohan Birtia
- Pentesting Rest API by Nutan Kumar Panda
10th September 2016
Sessions
OWASP Bangalore/null/G4H Combined Meet at Citrix R&D, Ulsoor Road.
- iOS App Runtine Analysis by Swaroop Yermalkar
- Bypassing Corporate Security by Aamer Shah
- IOT Exploitation - II by Abhinav Chourasia
- Using Hydra by Sankalp Bastakoti
- G4H Talk by AMol NAik
13th August 2016
Sessions
OWASP Bangalore/null/G4H Combined Meet at Roadrunnr, T floor
- Exploiting a vulnerability to gain a shell by Aditya
- An Introdcution to Trusted Platform Module by Nayna
- Panel Talk on Information Security by Jagan Mohan
- Encryption in Security by Kartik Lalan
- Buffer Overflow detection with Immunity by Pratik Shah
- Security of Healthcare systems by Anirudh duggal
- IOT Exploitation by Bharath
16th July 2016
Sessions
OWASP Bangalore/null/G4H Combined Meet at Citrix R&D, Ulsoor Road.
- Beginners Talk on Physical Securty by Manasdeep
- Android Security by Kartik Lalan
- Automated Information Gathering Using Recon-ng by narendra kumar sharma
- Node JS Security by Madhu Akula
- Security Intelligence by Raghavendran Gopal
- Platform Security using intel SGX by Pradyumna Padhan
- Linux Privilege Escalation techniques by Jagan Mohan
- Twitter Bug Hunt by Avinash
- Introduction to Web Application Firewalls by Chandrapal
11th June 2016
Sessions
OWASP Bangalore/null/G4H Combined Meet at Citrix R&D, Ulsoor Road.
- Android Security - Beginners - Part 3 by Jitendra Kumar
- Targeted Attacks by Rahul Choudhary
- Targeted Attacks by Ashwin Vamshi
- SQL Injection to shell by Krithika M. M
- Case studies of recent network attacks by Devanshu Agarwal
- How I pwned you online by Nutan Kumar Panda
- An introduction to Single Sign On (with Demo) by Lakshmikiran
- Windows Privilege Escalation Techniques by Riyaz Walikar
- etasploit basics and db usage by Arun S.
14th May 2016
Sessions
OWASP Bangalore/null/G4H Combined Meet at Akamai, Salarpuria Softzone.
- Android Security - Beginners - Part 2 by Jitendra Kumar
- Cloud Security by Akash Mahajan
- CSRF in depth by Abhinav Chourasia
- Basics of PKI by Nikhil K
- Cross Site Scripting vs Content Security Policy by Kaushal Banninthaya
16th April 2016
Sessions
OWASP Bangalore/null/G4H Combined Meet at Citrix R&D, Ulsoor Road.
- Android Security - Beginners - Part 1 by Jitendra Kumar
- Advanced XSS by Avinash Varma
- Understanding DLL Injection by Neeraj.R.Godkhindi
- Introduction to Machine Learning in Security by Nikhil P Kulkarni
- Introduction to ModSecurity by Rahul Choudhary
19th March 2016
Sessions
OWASP Bangalore/null/G4H Combined Meet at Citrix R&D, Ulsoor Road.
- Beginners: Netcat: Swiss Army Knife by Chandrapal
- iOS Security : Part2 by Anto Joseph
- Snort by Shubhra Verma
- G4H : Browser Exploitation by Amol Naik
- An introduction to XXE attacks - OWASP Bangalore Session by Samit Anwer
20th February 2016
Sessions
OWASP Bangalore/null/G4H Combined Meet at Citrix R&D, Ulsoor Road.
- Beginner: iOS Security by Anto Joseph
- Pentesting Web Services by Praveen Kumar K
- Setting up VLANs and DMZ by Avradeep Bhattacharya
- How to track APT Team by Rahul Sasi
- OWASP Bangalore Session by Riyaz Walikar
16th January 2016
Sessions
OWASP Bangalore/null/G4H Combined Meet at Citrix R&D, Ulsoor Road.
- Honey Pots by Jiggyasu Sharma
- Mobile Wallets by Suraj Pratap
- Exploitation with Nmap NSE by Babu Sudhir B
- Buffer Overflow Introduction by Abhinav Chourasia
- Dark Arts of Social Engineering by Nutan Kumar Panda
2015 Meetings
12th December 2015
Sessions
OWASP Bangalore/null/G4H Combined Meet at Citrix R&D, Ulsoor Road.
- ZAP Proxy by TAS
- Intro to Xposed Framework by Abhinav Chourasia
- SIEM Architecture by Nishanth Kumar Pathi
- OWASP Bengaluru Session by Akash Mahajan
- Radare2 Demo by Anto Joseph
21st November 2015
Sessions
OWASP Bangalore/null/G4H Combined Meet at Citrix R&D, Ulsoor Road.
- ZAP Proxy by TAS
- Hacking SmartPlugs by Anto Joseph
- TestCases for WebApplication Security - Forgot Password by Mahendra Nath
- SSL Pinning and bypasses by Anant Shrivastava
- Security Issues in DevOps by Shubham Mittal
17th October 2015
Sessions
OWASP Bangalore/null/G4H Combined Meet at Citrix R&D, Ulsoor Road.
- Owasp Mobile Top 10 - M10 : Basics of BurpSuite Proxy by Nishanth Kumar Pathi
- Bluetooth Security - Ubertooth by Jigar Lad
- - iOS internals by Abhinav Chourasia
- Introduction to DevOps Sec by Sandesh
- HL 72.X (In)Security in Medical devices by Anirudh Duggal
27th September 2015
Sessions
OWASP Bangalore/null/G4H Combined Meet at Citrix R&D, Ulsoor Road.
- Owasp Mobile Top 10 - M10 : Lack of binary Protection by Shivang Desai
- Demystifying Web Application Firewall by Sarwar Jahan M
- Django - Bypassing CSRF Protection by Deepam Kanjani
- RFID hacking by Jayesh
- #daftnationalencryptionpolicy by Pranesh Prakash
29th August 2015
Sessions
OWASP Bangalore/null/G4H Combined Meet at InMobi office.
- Owasp Mobile Top 10 - M9: Improper Session Handling by Apoorva
- Exploiting Version Control Systems by Anant Shrivastava
- Cross Origin Resource Sharing by Ishan Girdhar
- Android rooting Internals by Anto Joseph
- Kerberos Golden Ticket by Asish Agarwalla
25th July 2015
Sessions
OWASP Bangalore/null/G4H Combined Meet at at Citrix R&D, Ulsoor Road.
- Demystifying Mobile Top 10 - M8 by Shivang Desai
- PHP Remote Code Execution by Rahul Sasi
- Quantum Cryptography by Sidhant Dogra
- Grinder Tool by AMol NAik
- Content Security Policy by Riyaz Walikar
20th June 2015
Sessions
OWASP Bangalore/null/G4H Combined Meet at at Citrix R&D, Ulsoor Road.
- OWASP Mobile Top 10 - M7 & M8 by Shivang Desai
- Venom Demo by Akash Mahajan
- Threat Intelligence by Jaykumar
- SAML Single Sign-On (SSO) Service by Tamilvanan
- Panel Discussion - Social Engineering : What makes it so successful and how to thwart these attacks? by Manasdeep
6th June 2015
Sessions
OWASP Special Bangalore Meet at Citrix R&D, Ulsoor Road.
- OWASP Top 10 with demos from basics to intermediate levels by Akash Mahajan & Riyaz Walikar
- Questions & Answers for AppSec Security Questions by Akash Mahajan & Riyaz Walikar
30th May 2015
Sessions
OWASP Special Bangalore Meet at Microsoft Technology Center
- OWASP Top 10 from basics to intermediate levels by Akash Mahajan
- Questions & Answers for AppSec Security Questions by Akash Mahajan
- Guidance from a corporate recruiter on clearing interviews by Pooja Srinivas (Corporate Technical Recruiter)
16th May 2015
Sessions
OWASP Bangalore/null/G4H Combined Meet at Philips Innovation Campus
- Security Monitoring using SIEM by Rishabh Gupta
- Medical Device Security by Anirudh Duggal
- Tale of Forgotten disclosure and lesson's learned by Anant Shrivastava
- SSL Scanning by Rupali Dash
- XSS and Phishing Hybrid Attack _ Skit by Satish
25th April 2015
Sessions
OWASP Bangalore/null/G4H Combined Meet at InMobi Office
- Demystifying Captchas - Beginner Session by Udit Gupta
- Infosec Initiative by Apoorva
- Security Certifications by Manasdeep
- IE Memory Protections by Abhisek Datta
- Recon-ng by Nutan Kumar Panda
- Debate - Net Neutrality by Sandesh
21st March 2015
Sessions
OWASP Bangalore/null/G4H Combined Meet at InMobi Office
- Introduction to Computer forensics by Adarsh Agarwal
- Packet Crafting in Scapy by Bharath
- VoIP Pentesting by Arun Mane
- Getting Started with HTTP2 by Akash Mahajan
- Build Time Security by Mohammed Tanveer
21st February 2015
Sessions
OWASP Bangalore/null/G4H Combined Meet at InMobi Office
- OWASP A4 - Insecure Direct Object Reference by Chandrakant
- Mobile Forensics by Rupam Bhattacharya
- Encoding Basics by Satish
- Hacking Tizen (Demo) by Ajin Abraham
- Attacks on Android Webview (Demo) by Sachinraj Shetty
17th January 2015
Sessions
OWASP Bangalore/null/G4H Combined Meet at Sapient Office
- OWASP Top 10 - OWASP Top 10 Vandana
- Basics on TCP/IP - Akash
- SIEM Overview - Raghavendran Gopal
- nmap Demo (Idle/Stealth scan) - Rahul Yadav
- Burp Automated Workflows - Mahendra Nath
2014 Meetings
13th December 2014
Sessions
OWASP Bangalore/null/G4H Combined Meet at InMobi Office
- HTTP Basics Demo - Akash Mahajan
- - Vandana
- Introduction to Memory Exploits - Mahendra Nath
- Attacking Web Proxies - Rahul Sasi
- OWTF Tool demo - Anant Shrivastava
29th November 2014
Sessions
OWASP Banglore Workshop
- Xtreme Web Hacking - 2014 by Riyaz Walikar
22nd November 2014
Sessions
OWASP Bangalore/null/G4H Combined Meet at Paypal Office
- Reflective and Stored XSS - Rakesh
- News Bytes - Basaveswar
- Intro to Threat Modeling - Shivendra
- OWASP ZAP Tool Demo - Marudhamaran Gunasekaran
- Fuzzing Asynchronous Protocols built over Websockets - Lavakumar Kuppan
15th November 2014
Sessions
OWASP Bangalore Special Meet at Paypal Office
- Hack Like a Pro Workshop - Jayesh Singh Chauhan
- Breaking ECB Crypto using Burp Suite - Akash Mahajan
18th October 2014
Sessions
OWASP Bangalore/null/G4H Combined Meet at InMobi Technologies
- Mobile Top 10 for beginners - Anant Shrivastava
- Windows Post Exploitation techniques - Riyaz Walikar
- PCI DSS v3.0 : Protecting Cardholder data - Manasdeep
- SHODAN - Bharath
- Matriux - Narayanan Subramaniam
20th September 2014
Sessions
OWASP Bangalore/null/G4H Combined Meet at InMobi Technologies
- OWASP Mobile Security Risk Series - Anant Shrivastava
- Social Engineering and its importance during Security Audits - Manasdeep
- HTTP Response Splitting - Sharath
- ZAP Proxy - Rupam Bhattacharya
30th August 2014
Sessions
OWASP Bangalore/null/G4H Combined Meet at EMC Corporation
- OWASP Mobile Security - Anant Shrivastava
- XML Injection - AMol NAik
- Are you a Host for Malware? - Abhijeth
- Burp Advanced - Harshal Jamdade
19th July 2014
Sessions
OWASP Bangalore/null/G4H Combined Meet at Thoughtworks
- Working with Web Goat Vulnerable Application - Jagan Mohan
- OWASP Comprehensive, Lightweight Application Security Process - Akash Mahajan
- Open Source Intelligence (OSINT) with Maltego - Nutan Kumar Panda
- Win 8 Mobile App Pen-testing - Anant Tiwari
14th June 2014
OWASP Bangalore/null/G4H Combined Meet at Thoughtworks
Sessions
- OWASP Mobile Top 10 - Part 2 Anant Shrivastava
- Security News Bytes Nishanth Kumar
- Abeer Banerjee
- Browser Exploitation Framework BeEF Prashanth Sivarajan
- ESAPI (The OWASP Enterprise Security API) Sathish
24th May 2014
OWASP Bangalore/null/G4H Combined Meet at Thoughtworks
Sessions
- OWASP Mobile Top 10 - Part 1 Pushkar Pashupat
- NEWS Bytes Anant Shrivastava
- Web-Service (SOAP) Exploitation Rahul Sasi
- Metasploit Demo Rupam Bhattacharya
- Web App Security - The Good Parts Akash Mahajan
8th Feb 2014
Special OWASP Meet is a workshop by Justin Searle (His Profile) on 8th of Feb 2014.
Workshop A Systematic Method for Manual Web Pentesting by Justin Searle
Come have a taste of the official Samurai-WTF Web Testing Framework training course offered at Black Hat and OWASP conferences. During this workshop, we'll do a quick overview of the web pen-testing methodology, then the instructors will lead you through the process of testing and exploiting web applications. The primary emphasis of this workshop is teaching you how to integrate SamuraiWTF tools into your own manual testing procedures to improve your overall pentest workflow.
18th January 2014
- Web Application Security for Beginners: DOM Based XSS – Jayesh Singh
- Automated Source code review using Fortify – Rupam Bhattacharya
- Struts Validation Framework: Part 2 – Satish
- Security Onion – Nishanth Kumar
- Web Application Security: The pitfalls and the brickwalls, a developer perspective – Vamsi Krishna
2013 Meetings
14th December 2013
- Web Application Security For Beginners by Jayesh Singh
- Overview of ISO 27001 by Rupam Bhattacharya
- XSS - From injection to root by Abeer Banerjee
- Struts Validation Framework by Satish
2012 Meetings
1st November 2012
Topic: Python For Web Penetration Testing
Author: by Justin Searle
Description: Basic Python scripting to automate tasks for penetration testing.
2011 Meetings
2010 Meetings
2009 Meetings
3rd October 2009
Topic: Web 2.0 Security
Author: by KV Prashant
Description:Web 2.0 Security
5th Sep 2009
Topic: SSL Cipher Enumeration
Author: by Gursev
Description:SSL Cipher Enumeration
5th Sep 2009
Topic: Cookie Replay Attacks
Author: Ravi Gopal
Description:Overview and Live Demo of Cookie replay attacks
Topic: 2. Cloud Security
Author: Shashidhar
Description:Overview of Cloud Security
12 July2009
Topic: Turning Firefox Into Ultimate Hacking Tool(SecFox) Part - II
Author: Rajiv Vishwa
Description: Talk on tweaking Firefox with various addons and doing some customizations so that it can be used to perform vulnerability assessments on various websites.
07 Jun 2009
Topic: Turning Firefox Into Ultimate Hacking Tool(SecFox)
Author: Rajiv Vishwa
Description: Talk on tweaking Firefox with various addons and doing some customizations so that it can be used to perform vulnerability assessments on various websites.
07 Mar 2009
Topic: Hackers Secret
Author: Sharmishta Gupta
Description: Headsup on OWASP top vulnerabilities and introduction to Webgoat application.
02 Feb 2009
Attendees: 13 Members
Topic: Cracking applications with OllyDbg debugger(Demo)
Author: Rajiv Vishwa
Description: Session on debugging standalone executables to pin point security holes which is otherwise exploited by crackers to patch the pro version to freeware. Couple of tiny applications which requires keys for activation are cracked during the session.
2008 Meetings
14 Dec 2008
Topic: Access Control Mechanisms
Author : Sundar
Description: Overview on different types of access control schemes and its usages.
Comments: The main agenda for the meet has been a presentation on "Access Controls" by Sundar. It was informative and lead to a good discussion on the topic. The meet lasted for over an hour and has seen good acceptance by members who attended.