This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Bangalore/Archives"
(→Sessions) |
(→Sessions) |
||
Line 8: | Line 8: | ||
* [http://swachalit.null.co.in/event_sessions/170-intro-to-threat-modeling Intro to Threat Modeling - Shivendra] | * [http://swachalit.null.co.in/event_sessions/170-intro-to-threat-modeling Intro to Threat Modeling - Shivendra] | ||
* [http://swachalit.null.co.in/event_sessions/171-owasp-zap-tool-demo OWASP ZAP Tool Demo - Marudhamaran Gunasekaran] | * [http://swachalit.null.co.in/event_sessions/171-owasp-zap-tool-demo OWASP ZAP Tool Demo - Marudhamaran Gunasekaran] | ||
+ | * [http://swachalit.null.co.in/event_sessions/171-owasp-zap-tool-demo OWASP ZAP Tool Demo - Anant Shrivastava] | ||
* Fuzzing Asynchronous Protocols built over Websockets - Lavakumar Kuppan | * Fuzzing Asynchronous Protocols built over Websockets - Lavakumar Kuppan | ||
Revision as of 13:40, 26 November 2014
- 1 2014 Meetings
- 2 2013 Meetings
- 3 2012 Meetings
- 4 2011 Meetings
- 5 2010 Meetings
- 6 2009 Meetings
- 7 2008 Meetings
2014 Meetings
22nd November 2014
Sessions
OWASP Bangalore/null/G4H Combined Meet at Paypal Office
- Reflective and Stored XSS - Rakesh
- News Bytes - Basaveswar
- Intro to Threat Modeling - Shivendra
- OWASP ZAP Tool Demo - Marudhamaran Gunasekaran
- OWASP ZAP Tool Demo - Anant Shrivastava
- Fuzzing Asynchronous Protocols built over Websockets - Lavakumar Kuppan
15th November 2014
Sessions
OWASP Bangalore Special Meet at Paypal Office
- Hack Like a Pro Workshop - Jayesh Singh Chauhan
- Breaking ECB Crypto using Burp Suite - Akash Mahajan
18th October 2014
Sessions
OWASP Bangalore/null/G4H Combined Meet at InMobi Technologies
- Mobile Top 10 for beginners - Anant Shrivastava
- Windows Post Exploitation techniques - Riyaz Walikar
- PCI DSS v3.0 : Protecting Cardholder data - Manasdeep
- SHODAN - Bharath
- Matriux - Narayanan Subramaniam
20th September 2014
Sessions
OWASP Bangalore/null/G4H Combined Meet at InMobi Technologies
- OWASP Mobile Security Risk Series - Anant Shrivastava
- Social Engineering and its importance during Security Audits - Manasdeep
- HTTP Response Splitting - Sharath
- ZAP Proxy - Rupam Bhattacharya
30th August 2014
Sessions
OWASP Bangalore/null/G4H Combined Meet at EMC Corporation
- OWASP Mobile Security - Anant Shrivastava
- XML Injection - AMol NAik
- Are you a Host for Malware? - Abhijeth
- Burp Advanced - Harshal Jamdade
19th July 2014
Sessions
OWASP Bangalore/null/G4H Combined Meet at Thoughtworks
- Working with Web Goat Vulnerable Application - Jagan Mohan
- OWASP Comprehensive, Lightweight Application Security Process - Akash Mahajan
- Open Source Intelligence (OSINT) with Maltego - Nutan Kumar Panda
- Win 8 Mobile App Pen-testing - Anant Tiwari
14th June 2014
OWASP Bangalore/null/G4H Combined Meet at Thoughtworks
Sessions
- OWASP Mobile Top 10 - Part 2 Anant Shrivastava
- Security News Bytes Nishanth Kumar
- Abeer Banerjee
- Browser Exploitation Framework BeEF Prashanth Sivarajan
- ESAPI (The OWASP Enterprise Security API) Sathish
24th May 2014
OWASP Bangalore/null/G4H Combined Meet at Thoughtworks
Sessions
- OWASP Mobile Top 10 - Part 1 Pushkar Pashupat
- NEWS Bytes Anant Shrivastava
- Web-Service (SOAP) Exploitation Rahul Sasi
- Metasploit Demo Rupam Bhattacharya
- Web App Security - The Good Parts Akash Mahajan
8th Feb 2014
Special OWASP Meet is a workshop by Justin Searle (His Profile) on 8th of Feb 2014.
Workshop A Systematic Method for Manual Web Pentesting by Justin Searle
Come have a taste of the official Samurai-WTF Web Testing Framework training course offered at Black Hat and OWASP conferences. During this workshop, we'll do a quick overview of the web pen-testing methodology, then the instructors will lead you through the process of testing and exploiting web applications. The primary emphasis of this workshop is teaching you how to integrate SamuraiWTF tools into your own manual testing procedures to improve your overall pentest workflow.
18th January 2014
- Web Application Security for Beginners: DOM Based XSS – Jayesh Singh
- Automated Source code review using Fortify – Rupam Bhattacharya
- Struts Validation Framework: Part 2 – Satish
- Security Onion – Nishanth Kumar
- Web Application Security: The pitfalls and the brickwalls, a developer perspective – Vamsi Krishna
2013 Meetings
14th December 2013
- Web Application Security For Beginners by Jayesh Singh
- Overview of ISO 27001 by Rupam Bhattacharya
- XSS - From injection to root by Abeer Banerjee
- Struts Validation Framework by Satish
2012 Meetings
1st November 2012
Topic: Python For Web Penetration Testing
Author: by Justin Searle
Description: Basic Python scripting to automate tasks for penetration testing.
2011 Meetings
2010 Meetings
2009 Meetings
3rd October 2009
Topic: Web 2.0 Security
Author: by KV Prashant
Description:Web 2.0 Security
5th Sep 2009
Topic: SSL Cipher Enumeration
Author: by Gursev
Description:SSL Cipher Enumeration
5th Sep 2009
Topic: Cookie Replay Attacks
Author: Ravi Gopal
Description:Overview and Live Demo of Cookie replay attacks
Topic: 2. Cloud Security
Author: Shashidhar
Description:Overview of Cloud Security
12 July2009
Topic: Turning Firefox Into Ultimate Hacking Tool(SecFox) Part - II
Author: Rajiv Vishwa
Description: Talk on tweaking Firefox with various addons and doing some customizations so that it can be used to perform vulnerability assessments on various websites.
07 Jun 2009
Topic: Turning Firefox Into Ultimate Hacking Tool(SecFox)
Author: Rajiv Vishwa
Description: Talk on tweaking Firefox with various addons and doing some customizations so that it can be used to perform vulnerability assessments on various websites.
07 Mar 2009
Topic: Hackers Secret
Author: Sharmishta Gupta
Description: Headsup on OWASP top vulnerabilities and introduction to Webgoat application.
02 Feb 2009
Attendees: 13 Members
Topic: Cracking applications with OllyDbg debugger(Demo)
Author: Rajiv Vishwa
Description: Session on debugging standalone executables to pin point security holes which is otherwise exploited by crackers to patch the pro version to freeware. Couple of tiny applications which requires keys for activation are cracked during the session.
2008 Meetings
14 Dec 2008
Topic: Access Control Mechanisms
Author : Sundar
Description: Overview on different types of access control schemes and its usages.
Comments: The main agenda for the meet has been a presentation on "Access Controls" by Sundar. It was informative and lead to a good discussion on the topic. The meet lasted for over an hour and has seen good acceptance by members who attended.