This page will list events in my public life that i would like to catalogue
HITB Cyber Week Dubai: Red Team Village
Talk on Cloud Storage and Moderating Panel Discussion on Red Teaming
BlackHat USA 2019
Presentation: DevSecOps: What Why and How
Training Advanced Infrastructure Hacking
Blackhat Asia 2019
A high level talk on "DevSecOps" @ Executive Summit.
DevSecOps What Why and How during the main Track
2 Day Training on Advanced Infrastructure Hacking
BlogPost: Hunting the Delegation Access
looking at ways to automatically identify delegation access using a powershell script.
InfoSec Campus Interview
Freewheeling discussion around opensource and my projects including androidtamer and null study groups
BlackHat and DefCon USA 2017
BlackHat Training: Advanced Infrastructure Hacking
Blackhat Arsenal: AndroidTamer
DefCon: Recon Village
Defcon DemoLabs: AndroidTamer
What it takes to defend an application
Article: Android or CyanogenMod, which is more secure?
An Article discussing Android Security in context of various ROM's in market
BlackHat Asia 2016
BlackHat Arsenal: AndroidTamer
Training: Advanced Infrastructure Hacking
Exploiting Version Control Systems
Article How secure is Android?
A take on android security in the wake of webview vulnerability in android
OWASP Mobile Top 10: M4 Unintended Data Leakage
OWASP Mobile Top 10: M3 Insecure Transport Layer
OWASP Mobile Top 10: M2 Insecure Data Storage
BlogPost: Pentesting Web Service with anti CSRF token using BurpPro
pentesting web app with per request session id as anti CSRF token
RootConf 2014: When the internet Bleeded
Talk on heartbleed issues, risks and prevention steps
Talk: an adhoc talk on how to use android devices for basic pentesting operations.
Training: Deep Dive Android
Whitepaper : Security Issues in Android Custom ROM's
This paper focuses on custom rom’s and check for security misconfiguration’s which could yield to device compromise.
First International Security Conference Talk
Security Issues in Android Custom ROM's
Whitepaper: Web Application finger printing
How to detect application frameworks, current shortcomings in approach. enhancement and prevention techniques.