SlideShare a Scribd company logo
Hack For Security
Web Design, Web Application Security and Digital Inspiration.
When it all was started ?
• In the 2nd semester of the Engineering.

• I have learned about the XSS, SQLI and File
Upload and symlink and rooting.

• That was enough to get the root access in the
server.
I started exploiting vulnerability!

• After learning the stuffs I have started exploiting
the vulnerability of the Pakistani websites as
they where hacking Indian websites!
Why I stopped exploiting vulnerability ?
• One day when I was enjoying my coffee, I
thought exploiting the vulnerability of the
website is bad thing instead I can help the
Indian webmasters to secure their application by
reporting the vulnerability to them! And again I
stopped doing that because most of them didn’t
cared about the website security
They said you have to face our legal
Department !
• As I was reporting the bug to the
webmasters, one of them said that don’t test
your skills on our websites else you have to face
our legal department !!
My Reaction:
• I just said “Okay!”
• What I was willing to say ? If you didn’t patched SQL loophole
then you probably gonna face our legal department !
I have started Blogging !

•Why ???
• I wanted to improve my English language.
• And Warren Buffett once said Never be
depended on Single income source 
Why I have started participating in Bug
Bounty Programs ?
• They Respect the Security Researchers
(Hackers).
• They Give acknowledgements !
• They give cool stuffs that money can’t buy 
I got acknowledged By Apple Inc.
• I have found mixed-content issue in apple.com
and they gave me acknowledgement.
Got acknowledged by Google
• #Finally Dream came true ♥ m/ :)
• I have found XXS vulnerability in Google Art Project
and they have offered me acknowledgement in
Google Honorable mention and $100 as a reward.
PayPal Offered me $500 as a reward 
• I have found Server Miss Configuration in
Paypal.com.au
Again Dream came true 
• #Again accomplished my Dream ♥ m/ :D
• I have found Email Spoofing in Blogger.com
and again they offered acknowledgement in
Google Reward Recipients and $100 as a
reward 
How much I Made ?
• I am a web Entrepreneur and I don’t work for
money 
• I work for respect and my dreams 

• By the way I have made $3095.83
in last 6 months of 2013  !
What if you want me to test your
website for vulnerability ?
• Just contact me @
TheSiddharthSolanki@gmail.com and we
will discuss about it 
About Me:
• Name: Siddharth Solanki
• Security Researcher/Hacker (As they call me! )

• Blogger (By choice :D)
• Engineer (By choice :D)
• Graphics Designer (By choice)
Thanks :
• Thanks to Vasim Belim, Dushyant Vaghela
and Utsav oza, for Being Awesome Friends!

• Thanks to Almighty GOD for making me
Fully, Totally and completely Independent  !
• Thanks to Echai and My college (VVP) for
giving me opportunity to promote my skills!
Questions ?
Let’s be Friends 
@HackForSecurity

/Siddharth.solanki.hfs

/HackForSecurity

/siddharthsolankihfs

/+SiddhartHSolankI

HackForSecurity.com

More Related Content

PPTX
Article Submitter
PPTX
Website Traffic
ODP
Google Authorship Bugs and Problems
ODP
Using Your Blog to Build Links Through Interviews
PPTX
SEO Brass Tacks - Getting SEO Right
PPTX
Sustainable SEO Critical Thinking Required
PPTX
How to Create Social Media Visuals That Engage & Convert
PPTX
Proof That Article Submissions Work
Article Submitter
Website Traffic
Google Authorship Bugs and Problems
Using Your Blog to Build Links Through Interviews
SEO Brass Tacks - Getting SEO Right
Sustainable SEO Critical Thinking Required
How to Create Social Media Visuals That Engage & Convert
Proof That Article Submissions Work

What's hot (7)

PPTX
How to Avoid Online Marketing Scams and Ripoffs
PPTX
All About Author Tags - Meet up #1 - BlogUp Berlin
PDF
Backlinks
PPTX
MarketMix 2013 - Storytelling as Part of Your Content Marketing Plan
PDF
How to Establish Social Proof Using Social Love
PPT
Website evaluation
PPTX
Article Marketing and Content Cheapskates
How to Avoid Online Marketing Scams and Ripoffs
All About Author Tags - Meet up #1 - BlogUp Berlin
Backlinks
MarketMix 2013 - Storytelling as Part of Your Content Marketing Plan
How to Establish Social Proof Using Social Love
Website evaluation
Article Marketing and Content Cheapskates

Viewers also liked (9)

PPTX
Anti Hack Solution
PPSX
Information Security and Ethical Hacking
PPT
[DevDay 2016] Anti hacking on game development - Speaker: Khanh Le – Program...
PPTX
Tsunami warning system
PPT
Blue Eyes ppt
PPTX
SUPER CAPACITOR
PPTX
Dc motor
PDF
Ethical hacking & Information Security
PPTX
The Big Bang Theory
Anti Hack Solution
Information Security and Ethical Hacking
[DevDay 2016] Anti hacking on game development - Speaker: Khanh Le – Program...
Tsunami warning system
Blue Eyes ppt
SUPER CAPACITOR
Dc motor
Ethical hacking & Information Security
The Big Bang Theory

Similar to Hack for security (20)

PPTX
Hacking (cs192 report )
PDF
The 2018 Hacker Report: Insights on the hacker mindset, who they are, and the...
PPTX
Cyber crime &_info_security
PPTX
How Hacking Works - Web Edtiton - shareable.pptx
PPTX
Nbt con december-2014-slides
PPTX
Nbt con december-2014-slides
PPT
PPTX
So You Want to be a Hacker?
PPTX
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PPTX
Ethical hacking
PPTX
hacking
PPTX
Corp Web Risks and Concerns
PPTX
Security testing for web developers
PDF
web application security
PPTX
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
PPTX
Thoughts on Defensive Development for Sitecore
PPT
Web Application Hacking 2004
PPTX
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
PDF
Things that go bump on the web - Web Application Security
PPTX
The hardcore stuff i hack, experiences from past VAPT assignments
Hacking (cs192 report )
The 2018 Hacker Report: Insights on the hacker mindset, who they are, and the...
Cyber crime &_info_security
How Hacking Works - Web Edtiton - shareable.pptx
Nbt con december-2014-slides
Nbt con december-2014-slides
So You Want to be a Hacker?
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
Ethical hacking
hacking
Corp Web Risks and Concerns
Security testing for web developers
web application security
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Thoughts on Defensive Development for Sitecore
Web Application Hacking 2004
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
Things that go bump on the web - Web Application Security
The hardcore stuff i hack, experiences from past VAPT assignments

Recently uploaded (20)

PDF
Getting Started with Data Integration: FME Form 101
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Architecture types and enterprise applications.pdf
PPTX
Web Crawler for Trend Tracking Gen Z Insights.pptx
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PPTX
The various Industrial Revolutions .pptx
PDF
DP Operators-handbook-extract for the Mautical Institute
PPTX
Benefits of Physical activity for teenagers.pptx
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PPTX
Tartificialntelligence_presentation.pptx
PPTX
Modernising the Digital Integration Hub
Getting Started with Data Integration: FME Form 101
Group 1 Presentation -Planning and Decision Making .pptx
Architecture types and enterprise applications.pdf
Web Crawler for Trend Tracking Gen Z Insights.pptx
Zenith AI: Advanced Artificial Intelligence
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
The various Industrial Revolutions .pptx
DP Operators-handbook-extract for the Mautical Institute
Benefits of Physical activity for teenagers.pptx
1 - Historical Antecedents, Social Consideration.pdf
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Univ-Connecticut-ChatGPT-Presentaion.pdf
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
A contest of sentiment analysis: k-nearest neighbor versus neural network
A novel scalable deep ensemble learning framework for big data classification...
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
Taming the Chaos: How to Turn Unstructured Data into Decisions
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Tartificialntelligence_presentation.pptx
Modernising the Digital Integration Hub

Hack for security

  • 1. Hack For Security Web Design, Web Application Security and Digital Inspiration.
  • 2. When it all was started ? • In the 2nd semester of the Engineering. • I have learned about the XSS, SQLI and File Upload and symlink and rooting. • That was enough to get the root access in the server.
  • 3. I started exploiting vulnerability! • After learning the stuffs I have started exploiting the vulnerability of the Pakistani websites as they where hacking Indian websites!
  • 4. Why I stopped exploiting vulnerability ? • One day when I was enjoying my coffee, I thought exploiting the vulnerability of the website is bad thing instead I can help the Indian webmasters to secure their application by reporting the vulnerability to them! And again I stopped doing that because most of them didn’t cared about the website security
  • 5. They said you have to face our legal Department ! • As I was reporting the bug to the webmasters, one of them said that don’t test your skills on our websites else you have to face our legal department !!
  • 6. My Reaction: • I just said “Okay!” • What I was willing to say ? If you didn’t patched SQL loophole then you probably gonna face our legal department !
  • 7. I have started Blogging ! •Why ??? • I wanted to improve my English language. • And Warren Buffett once said Never be depended on Single income source 
  • 8. Why I have started participating in Bug Bounty Programs ? • They Respect the Security Researchers (Hackers). • They Give acknowledgements ! • They give cool stuffs that money can’t buy 
  • 9. I got acknowledged By Apple Inc. • I have found mixed-content issue in apple.com and they gave me acknowledgement.
  • 10. Got acknowledged by Google • #Finally Dream came true ♥ m/ :) • I have found XXS vulnerability in Google Art Project and they have offered me acknowledgement in Google Honorable mention and $100 as a reward.
  • 11. PayPal Offered me $500 as a reward  • I have found Server Miss Configuration in Paypal.com.au
  • 12. Again Dream came true  • #Again accomplished my Dream ♥ m/ :D • I have found Email Spoofing in Blogger.com and again they offered acknowledgement in Google Reward Recipients and $100 as a reward 
  • 13. How much I Made ? • I am a web Entrepreneur and I don’t work for money  • I work for respect and my dreams  • By the way I have made $3095.83 in last 6 months of 2013  !
  • 14. What if you want me to test your website for vulnerability ? • Just contact me @ TheSiddharthSolanki@gmail.com and we will discuss about it 
  • 15. About Me: • Name: Siddharth Solanki • Security Researcher/Hacker (As they call me! ) • Blogger (By choice :D) • Engineer (By choice :D) • Graphics Designer (By choice)
  • 16. Thanks : • Thanks to Vasim Belim, Dushyant Vaghela and Utsav oza, for Being Awesome Friends! • Thanks to Almighty GOD for making me Fully, Totally and completely Independent  ! • Thanks to Echai and My college (VVP) for giving me opportunity to promote my skills!
  • 18. Let’s be Friends  @HackForSecurity /Siddharth.solanki.hfs /HackForSecurity /siddharthsolankihfs /+SiddhartHSolankI HackForSecurity.com