Abhinav Sejpal
Fell in love with the power of software at age 17, and I am still in love. I'm the one your mom warned you about, So be careful and Follow me.
Sensitive information such as the AWS keys, access tokens, SSH keys etc. are often erroneously leaked via the public source code repositories due to accidental git commits. This can be avoided by using pre-commit hooks like “Talisman” which checks for sensitive information in the files before commits or push activity.
DevSecOps (Developer track)
Presented at Accenture Brown Bag
Our full day Humla session will cover the following topics: • Introduction to Android • Android Security Architecture • Android Permission model • Application Sandboxing • Setting up Android Emulator • Setting up a Mobile Pentest Environment • Reverse Engineering - Understanding, patching and debugging smali code • Investigating app permissions through manifest file • Bypassing Android Permissions • Introduction to Drozer • Using Drozer to find and exploit vulnerabilities • Dynamic and static analysis of the application • Classification of vulnerabilities based on “OWASP Top 10 Mobile Risks”
Introduction to Android • Android Architecture • Android Security Architecture • Android Permission model • Application Sandboxing • Setting up Android Emulator • Setting up a Mobile Pentest Environment • Bypassing Android Permissions · Application Analysis · Reverse Engineering · Introduction to Drozer · Using Drozer to find and exploit vulnerabilities · Traffic Interception (Active and Passive) of Android Applications · OWASP Top 10 for Android
The growing consumer demand for smartphones applications, including banking, trading, e-commerce. Stakeholders needs to accept that forthcoming era will be mobile computing centric w.r.t corresponding hugh apps development. As per Gartner prediction, mobile app projects will outnumber PC projects 4-to-1 by middle of 2015. Hacker-Abhinav As we know mobile apps spreading faster than any other consumer technology in history. It’s not surprising that securing mobile apps, particularly around consumer privacy, is moving onto the front page. This needs to be done with highly disciplined mobile apps security expert with mature threat handling matrix, a great toolkits, and experienced mobile applications testers. The Mobile applications often deal with personal identifiable information, credit cards and other sensitive data including IMs & mail client from giant enterprises. I shall be talking pointers which denotes why mobile application hasty development suffering w.r.t security. Session difficulty level: In-depth talks
OWASP Bangalore meet - 28th March 2015 10:00 AM - 2:00 PM Mobile Application Security Testing Overview The Building blocks of Android Apps Live demos w.r.t Android App : Demo 1 - Poor Authorization and Authentication (M5) Demo 2 - Sensitive Information Leakage (M4) Demo 3 – Insecure Data storage (M2) Test factory Arsenal
Overview: Are you web developer / Tester / Architect, why don’t you stop sucking you web app against CSRF attacks? Mission :- This session is on detecting and exploiting CSRF / XSRF issues. At the end of this session, the participant will be able manually identify CSRF / XSRF vulnerabilities in web applications. URL :- http://weekendtesting.com/archives/3843 Agenda :- Introduction What is Cross Side Request Forgery CSRF check & How to test (Iron OWASP , CSRF Finders) Prevention of CSRF attacks Q & A Prerequisite knowledge: Basic Technical knowledge about web application
Mission :- Understand / Learn / Practice OWASP Web Security Vulnerabilities https://www.owasp.org/index.php/Top102013-Top_10 In this session, Attendees will perform hands-on exercises to get a better understanding of the OWASP top ten security threats.
Mission :- Understand / Learn / Practice OWASP Web Security Vulnerabilities https://www.owasp.org/index.php/Top102013-Top_10 In this session, Attendees will perform hands-on exercises to get a better understanding of the OWASP top ten security threats.
Mission :- This session is on detecting and exploiting SQL Injection issues. At the end of this session, the participant will be able manually identify SQL Injection vulnerabilities in web applications.