Narain   exploring web vulnerabilities
Purpose Of This Presentation
    For Awareness in Software Quality

Strictly not for wrong use, not to damage or
           harm any one’s intellectual
                   property
Vote of thanks
•   ITS Nepal
•   BRAINDIGIT IT Solution
•   OWASP
•   OWASP Nepal
•   SQA Professionals
Overview
•   Introduction
•   Stats on attack site
•   Top Tools
•   Demo vulnerability scanning
•   Analysis of report
Narain   exploring web vulnerabilities
Nearly 11K Attack sites are
discovered monthly
•   Nearly 150 K Infected sites are
•   Discovered Monthly
•   I.e. nearly 5000 sites are infected daily
•   I.e. nearly 3 sites are infected per minute
Narain   exploring web vulnerabilities
After all
• No software is 100% bug free, so is the web.
• Difference is in level of security maintained.
Lock Demonstration




1st lock is the simplest lock that can be broken easily and by huge mass of people(x).
2nd lock is bit more complex and can be broken by(x-10,000) no of people.
3rd lock is most complex and can be broken by few people on earth lets say 2 people
Familiar words
Tools
Demo
• With joomscan
      Check “narain-joomscan.pptx” for slides
related to joomscan.
• With Acunetix
     Check “narain- acunetix.pptx” for slides
related to acunetix
LET’S ANALYSIS
THE REOPRT WE HAVE NOW
The Hard Part
 Analysing the report of Automation
                 (15-500 pgs)
Analysing False Positives and Negatives
          (everything seems true)
                      N
                  Fixing
               The Holes
Web security
Doesn't only depend on Security of servers
        Or Security of Application
                  But to
     Whole Echo System of WEB


Let’s Try More with our
    little knowledge
Thanking You

More Related Content

PPTX
Exploring web vulnerabilities
PPTX
Te chnical presentation networkexploits and security
PDF
UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware
PPTX
Proofing against malware
PDF
Basics of Meterpreter Evasion
PPTX
IT Security Basics For Managers
PPTX
Nessus-Vulnerability Tester
PDF
Ransomware is Coming to a Desktop Near You
Exploring web vulnerabilities
Te chnical presentation networkexploits and security
UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware
Proofing against malware
Basics of Meterpreter Evasion
IT Security Basics For Managers
Nessus-Vulnerability Tester
Ransomware is Coming to a Desktop Near You

What's hot (20)

PPT
Bruteforce basic presentation_file - linx
PPT
CISSA Lightning Talk - Building a Malware Analysis Lab on a Budget
PDF
What you need to know about ExPetr ransomware
PPT
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. Ltd
PDF
Threat detection with 0 cost
PPTX
Why we are getting better at catching nation-state sponsored malware
PDF
Get Smart about Ransomware: Protect Yourself and Organization
PPTX
Metasploit
PPTX
Threat Hunting with Splunk
ODP
What is keylogger
PDF
What is keylogger
PDF
Hijacking Softwares for fun and profit
PDF
Understanding CryptoLocker (Ransomware) with a Case Study
PDF
Nessus Software
PDF
Threat Hunting with Splunk
PDF
Threat Hunting with Splunk
PDF
Enterprise Vulnerability Management - ZeroNights16
PDF
Some PowerShell Goodies
PPTX
BSA2016 - Honeypots for Network Security Monitoring
PPTX
HackerOne, Security Meetup 4 декабря 2014, Mail.Ru Group
Bruteforce basic presentation_file - linx
CISSA Lightning Talk - Building a Malware Analysis Lab on a Budget
What you need to know about ExPetr ransomware
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. Ltd
Threat detection with 0 cost
Why we are getting better at catching nation-state sponsored malware
Get Smart about Ransomware: Protect Yourself and Organization
Metasploit
Threat Hunting with Splunk
What is keylogger
What is keylogger
Hijacking Softwares for fun and profit
Understanding CryptoLocker (Ransomware) with a Case Study
Nessus Software
Threat Hunting with Splunk
Threat Hunting with Splunk
Enterprise Vulnerability Management - ZeroNights16
Some PowerShell Goodies
BSA2016 - Honeypots for Network Security Monitoring
HackerOne, Security Meetup 4 декабря 2014, Mail.Ru Group
Ad

Viewers also liked (18)

PPTX
Svejk en las películas
PPSX
Mis primeros pasos
PDF
Anthony Spero Generic Resume
PPTX
Busqueda avanzanda
PPT
Furniture houseware store
PDF
Reglement jeu
DOCX
Rubrica entre pares (1)
PDF
Certificado prepa
PPS
Política y Redes Sociales
PPTX
Comercio electrónico liceth
PDF
καταλογος μοτιβο
PPTX
Lenguajes De Programación
PPT
Ultimate
PPTX
Всеукраїнський тиждень дитячого читання 2016 Вишнівська ЗОШ I-III ступенів №3
PPTX
BIOS SETUP
PPTX
Vigilancia epidemiológica en Guatemala
PPTX
Juan ramon jiménez
PDF
Problems faced by both the interviewer and the interviewee during an intervie...
Svejk en las películas
Mis primeros pasos
Anthony Spero Generic Resume
Busqueda avanzanda
Furniture houseware store
Reglement jeu
Rubrica entre pares (1)
Certificado prepa
Política y Redes Sociales
Comercio electrónico liceth
καταλογος μοτιβο
Lenguajes De Programación
Ultimate
Всеукраїнський тиждень дитячого читання 2016 Вишнівська ЗОШ I-III ступенів №3
BIOS SETUP
Vigilancia epidemiológica en Guatemala
Juan ramon jiménez
Problems faced by both the interviewer and the interviewee during an intervie...
Ad

Similar to Narain exploring web vulnerabilities (20)

PDF
DEF CON 23 - Wesley McGrew - i hunt penetration testers
PPTX
Creating Havoc using Human Interface Device
PPTX
Malware Most Wanted: Security Ecosystem
PDF
Ceh v8 labs module 08 sniffers
PPTX
Splunk Enterprise for InfoSec Hands-On Breakout Session
PPTX
WatchGuard - Cryptolocker en het gevecht tegen IT 's grootste vijand - Orbid ...
PDF
Ceh v8 labs module 03 scanning networks
PDF
Ceh v8 labs module 03 scanning networks
PPTX
Webinar on identifying, preventing and securing against the unidentifiable at...
PDF
Secure Because Math: A Deep-Dive on Machine Learning-Based Monitoring (#Secur...
PPTX
Green Custard Friday Talk 19: Chaos Engineering
PPTX
Mitigating worm attacks
PPTX
Alexandros Papanikolaou PROmis
PDF
Cyber Kill Chain vs. Cyber Criminals
PDF
Metasploit Computer security testing tool
PPTX
Finalppt metasploit
PPT
Sp Security 101 Primer 2 1
PDF
Pentesting Tools to Find Bugs Before Hackers | CyberPro Magazine
PDF
Vulnerability scanning report by Tareq Hanaysha
PPTX
Wie Sie Ransomware aufspüren und was Sie dagegen machen können
DEF CON 23 - Wesley McGrew - i hunt penetration testers
Creating Havoc using Human Interface Device
Malware Most Wanted: Security Ecosystem
Ceh v8 labs module 08 sniffers
Splunk Enterprise for InfoSec Hands-On Breakout Session
WatchGuard - Cryptolocker en het gevecht tegen IT 's grootste vijand - Orbid ...
Ceh v8 labs module 03 scanning networks
Ceh v8 labs module 03 scanning networks
Webinar on identifying, preventing and securing against the unidentifiable at...
Secure Because Math: A Deep-Dive on Machine Learning-Based Monitoring (#Secur...
Green Custard Friday Talk 19: Chaos Engineering
Mitigating worm attacks
Alexandros Papanikolaou PROmis
Cyber Kill Chain vs. Cyber Criminals
Metasploit Computer security testing tool
Finalppt metasploit
Sp Security 101 Primer 2 1
Pentesting Tools to Find Bugs Before Hackers | CyberPro Magazine
Vulnerability scanning report by Tareq Hanaysha
Wie Sie Ransomware aufspüren und was Sie dagegen machen können

Recently uploaded (20)

PPTX
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
PPTX
Introduction to pro and eukaryotes and differences.pptx
PDF
LIFE & LIVING TRILOGY- PART (1) WHO ARE WE.pdf
PDF
BP 505 T. PHARMACEUTICAL JURISPRUDENCE (UNIT 2).pdf
PDF
semiconductor packaging in vlsi design fab
PDF
Empowerment Technology for Senior High School Guide
PDF
Journal of Dental Science - UDMY (2020).pdf
PDF
LIFE & LIVING TRILOGY - PART (3) REALITY & MYSTERY.pdf
PDF
HVAC Specification 2024 according to central public works department
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
PPTX
Computer Architecture Input Output Memory.pptx
PDF
Complications of Minimal Access-Surgery.pdf
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
PDF
IP : I ; Unit I : Preformulation Studies
PDF
Skin Care and Cosmetic Ingredients Dictionary ( PDFDrive ).pdf
PDF
LIFE & LIVING TRILOGY - PART - (2) THE PURPOSE OF LIFE.pdf
PPTX
DRUGS USED FOR HORMONAL DISORDER, SUPPLIMENTATION, CONTRACEPTION, & MEDICAL T...
PDF
AI-driven educational solutions for real-life interventions in the Philippine...
PDF
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
PDF
Literature_Review_methods_ BRACU_MKT426 course material
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
Introduction to pro and eukaryotes and differences.pptx
LIFE & LIVING TRILOGY- PART (1) WHO ARE WE.pdf
BP 505 T. PHARMACEUTICAL JURISPRUDENCE (UNIT 2).pdf
semiconductor packaging in vlsi design fab
Empowerment Technology for Senior High School Guide
Journal of Dental Science - UDMY (2020).pdf
LIFE & LIVING TRILOGY - PART (3) REALITY & MYSTERY.pdf
HVAC Specification 2024 according to central public works department
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
Computer Architecture Input Output Memory.pptx
Complications of Minimal Access-Surgery.pdf
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
IP : I ; Unit I : Preformulation Studies
Skin Care and Cosmetic Ingredients Dictionary ( PDFDrive ).pdf
LIFE & LIVING TRILOGY - PART - (2) THE PURPOSE OF LIFE.pdf
DRUGS USED FOR HORMONAL DISORDER, SUPPLIMENTATION, CONTRACEPTION, & MEDICAL T...
AI-driven educational solutions for real-life interventions in the Philippine...
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
Literature_Review_methods_ BRACU_MKT426 course material

Narain exploring web vulnerabilities

  • 2. Purpose Of This Presentation For Awareness in Software Quality Strictly not for wrong use, not to damage or harm any one’s intellectual property
  • 3. Vote of thanks • ITS Nepal • BRAINDIGIT IT Solution • OWASP • OWASP Nepal • SQA Professionals
  • 4. Overview • Introduction • Stats on attack site • Top Tools • Demo vulnerability scanning • Analysis of report
  • 6. Nearly 11K Attack sites are discovered monthly
  • 7. Nearly 150 K Infected sites are • Discovered Monthly • I.e. nearly 5000 sites are infected daily • I.e. nearly 3 sites are infected per minute
  • 9. After all • No software is 100% bug free, so is the web. • Difference is in level of security maintained.
  • 10. Lock Demonstration 1st lock is the simplest lock that can be broken easily and by huge mass of people(x). 2nd lock is bit more complex and can be broken by(x-10,000) no of people. 3rd lock is most complex and can be broken by few people on earth lets say 2 people
  • 12. Tools
  • 13. Demo • With joomscan Check “narain-joomscan.pptx” for slides related to joomscan. • With Acunetix Check “narain- acunetix.pptx” for slides related to acunetix
  • 15. The Hard Part Analysing the report of Automation (15-500 pgs) Analysing False Positives and Negatives (everything seems true) N Fixing The Holes
  • 16. Web security Doesn't only depend on Security of servers Or Security of Application But to Whole Echo System of WEB Let’s Try More with our little knowledge