Hack 2 Xplore | The Technical Session on Cyber Security
My session will be on OWASP Top 10 vulnerabilities MS SQLI DIOS, query injection with live smart hacking techniques CMS exploitation ( WordPress, woocommerce Exploitation ). vulnerability assessment & live hacking techniques ( SQLi, CSRF, XSS etc ). The other things I will demonstrate will be bug bounty with live techniques & research ( Live Bugs in Google Web Apps ) and PCI DSS compliance & PA DSS compliance intro to SIEM live exploitation in web apps of reputed organizations
Objective of the session:
To Influence & Inspire Tech Aspirants towards Cyber Threats & it’s Importance, along with the Ideology to fix & implement the Cyber Security for preventing it.
Who can attend this session?
Testers, Developers, DBA, Any Professionals etc.
What all will be covered in the session?
– OWASP Top 10 Vulnerabilities
– MS SQLI DIOS Query Injection Live Smart Hacking Techniques
– CMS Exploitation ( WordPress, woocommerce Exploitation ) Vulnerability Assessment & Live Hacking Techniques ( SQLi, CSRF, XSS etc )
– Bug Bounty Live Techniques & Research ( Live Bugs in Google Web Apps )
– PCI DSS Compliance & PA DSS Compliance Intro to SIEM Live Exploitation in Web apps of Reputed Organisations
Benefits/Take away for the attendees:
Huge Idea & Knowledge
Pre-requisites to attend the session:
Interest to learn cyber security and Live Smart Hacking Techniques.
Deepak Kumar Nath
CEO & Founder, Global Tech Promoters
The Leading Ethical Hacker, Cyber Security Professional, Innovative Entrepreneur, Corporate Trainer, Tedx Speaker, Growth Hacker. The Security Researcher who found Bugs & rewarded with Hall of fames from Microsoft, Facebook, Blackberry, Sony, Mastercard and many more companies. Awarded with Youth of Odisha and Youngest Innovative Entrepreneur of Odisha. Trained all most 35000+ students, Professionals, Developers, IPS Officers, Police Officers etc. He is Certified Ethical Hacker, Certified EC-Council Instructor, Certified CISCO Instructor, Certified Penetration Testing Engineer, CISSO, Certified CISCO Cyberops Expert, and many more.