SlideShare una empresa de Scribd logo
1 de 18
Hack For Security
Web Design, Web Application Security and Digital Inspiration.
When it all was started ?
• In the 2nd semester of the Engineering.

• I have learned about the XSS, SQLI and File
Upload and symlink and rooting.

• That was enough to get the root access in the
server.
I started exploiting vulnerability!

• After learning the stuffs I have started exploiting
the vulnerability of the Pakistani websites as
they where hacking Indian websites!
Why I stopped exploiting vulnerability ?
• One day when I was enjoying my coffee, I
thought exploiting the vulnerability of the
website is bad thing instead I can help the
Indian webmasters to secure their application by
reporting the vulnerability to them! And again I
stopped doing that because most of them didn’t
cared about the website security
They said you have to face our legal
Department !
• As I was reporting the bug to the
webmasters, one of them said that don’t test
your skills on our websites else you have to face
our legal department !!
My Reaction:
• I just said “Okay!”
• What I was willing to say ? If you didn’t patched SQL loophole
then you probably gonna face our legal department !
I have started Blogging !

•Why ???
• I wanted to improve my English language.
• And Warren Buffett once said Never be
depended on Single income source 
Why I have started participating in Bug
Bounty Programs ?
• They Respect the Security Researchers
(Hackers).
• They Give acknowledgements !
• They give cool stuffs that money can’t buy 
I got acknowledged By Apple Inc.
• I have found mixed-content issue in apple.com
and they gave me acknowledgement.
Got acknowledged by Google
• #Finally Dream came true ♥ m/ :)
• I have found XXS vulnerability in Google Art Project
and they have offered me acknowledgement in
Google Honorable mention and $100 as a reward.
PayPal Offered me $500 as a reward 
• I have found Server Miss Configuration in
Paypal.com.au
Again Dream came true 
• #Again accomplished my Dream ♥ m/ :D
• I have found Email Spoofing in Blogger.com
and again they offered acknowledgement in
Google Reward Recipients and $100 as a
reward 
How much I Made ?
• I am a web Entrepreneur and I don’t work for
money 
• I work for respect and my dreams 

• By the way I have made $3095.83
in last 6 months of 2013  !
What if you want me to test your
website for vulnerability ?
• Just contact me @
TheSiddharthSolanki@gmail.com and we
will discuss about it 
About Me:
• Name: Siddharth Solanki
• Security Researcher/Hacker (As they call me! )

• Blogger (By choice :D)
• Engineer (By choice :D)
• Graphics Designer (By choice)
Thanks :
• Thanks to Vasim Belim, Dushyant Vaghela
and Utsav oza, for Being Awesome Friends!

• Thanks to Almighty GOD for making me
Fully, Totally and completely Independent  !
• Thanks to Echai and My college (VVP) for
giving me opportunity to promote my skills!
Questions ?
Let’s be Friends 
@HackForSecurity

/Siddharth.solanki.hfs

/HackForSecurity

/siddharthsolankihfs

/+SiddhartHSolankI

HackForSecurity.com

Más contenido relacionado

La actualidad más candente

How to Avoid Online Marketing Scams and Ripoffs
How to Avoid Online Marketing Scams and RipoffsHow to Avoid Online Marketing Scams and Ripoffs
How to Avoid Online Marketing Scams and RipoffsDavid Christensen
 
All About Author Tags - Meet up #1 - BlogUp Berlin
All About Author Tags - Meet up #1 - BlogUp BerlinAll About Author Tags - Meet up #1 - BlogUp Berlin
All About Author Tags - Meet up #1 - BlogUp BerlinWeHeartHome
 
MarketMix 2013 - Storytelling as Part of Your Content Marketing Plan
MarketMix 2013 - Storytelling as Part of Your Content Marketing PlanMarketMix 2013 - Storytelling as Part of Your Content Marketing Plan
MarketMix 2013 - Storytelling as Part of Your Content Marketing PlanRelaborate
 
How to Establish Social Proof Using Social Love
How to Establish Social Proof Using Social LoveHow to Establish Social Proof Using Social Love
How to Establish Social Proof Using Social LoveRaven Tools
 
Website evaluation
Website evaluationWebsite evaluation
Website evaluationAnn Vega
 
Article Marketing and Content Cheapskates
Article Marketing and Content CheapskatesArticle Marketing and Content Cheapskates
Article Marketing and Content Cheapskatesbtbyrd
 

La actualidad más candente (7)

How to Avoid Online Marketing Scams and Ripoffs
How to Avoid Online Marketing Scams and RipoffsHow to Avoid Online Marketing Scams and Ripoffs
How to Avoid Online Marketing Scams and Ripoffs
 
All About Author Tags - Meet up #1 - BlogUp Berlin
All About Author Tags - Meet up #1 - BlogUp BerlinAll About Author Tags - Meet up #1 - BlogUp Berlin
All About Author Tags - Meet up #1 - BlogUp Berlin
 
Backlinks
 Backlinks Backlinks
Backlinks
 
MarketMix 2013 - Storytelling as Part of Your Content Marketing Plan
MarketMix 2013 - Storytelling as Part of Your Content Marketing PlanMarketMix 2013 - Storytelling as Part of Your Content Marketing Plan
MarketMix 2013 - Storytelling as Part of Your Content Marketing Plan
 
How to Establish Social Proof Using Social Love
How to Establish Social Proof Using Social LoveHow to Establish Social Proof Using Social Love
How to Establish Social Proof Using Social Love
 
Website evaluation
Website evaluationWebsite evaluation
Website evaluation
 
Article Marketing and Content Cheapskates
Article Marketing and Content CheapskatesArticle Marketing and Content Cheapskates
Article Marketing and Content Cheapskates
 

Destacado

Anti Hack Solution
Anti Hack Solution Anti Hack Solution
Anti Hack Solution Naved Ahmed
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical HackingDivyank Jindal
 
[DevDay 2016] Anti hacking on game development - Speaker: Khanh Le – Program...
 [DevDay 2016] Anti hacking on game development - Speaker: Khanh Le – Program... [DevDay 2016] Anti hacking on game development - Speaker: Khanh Le – Program...
[DevDay 2016] Anti hacking on game development - Speaker: Khanh Le – Program...DevDay.org
 
Tsunami warning system
Tsunami warning systemTsunami warning system
Tsunami warning systemVIBHOR RATHI
 
Blue Eyes ppt
Blue Eyes pptBlue Eyes ppt
Blue Eyes pptdeepu427
 
SUPER CAPACITOR
SUPER CAPACITORSUPER CAPACITOR
SUPER CAPACITORjestin joy
 
Ethical hacking & Information Security
Ethical hacking & Information SecurityEthical hacking & Information Security
Ethical hacking & Information SecurityAjay Dhamija
 
The Big Bang Theory
The Big Bang TheoryThe Big Bang Theory
The Big Bang Theoryrose_aries15
 

Destacado (9)

Anti Hack Solution
Anti Hack Solution Anti Hack Solution
Anti Hack Solution
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical Hacking
 
[DevDay 2016] Anti hacking on game development - Speaker: Khanh Le – Program...
 [DevDay 2016] Anti hacking on game development - Speaker: Khanh Le – Program... [DevDay 2016] Anti hacking on game development - Speaker: Khanh Le – Program...
[DevDay 2016] Anti hacking on game development - Speaker: Khanh Le – Program...
 
Tsunami warning system
Tsunami warning systemTsunami warning system
Tsunami warning system
 
Blue Eyes ppt
Blue Eyes pptBlue Eyes ppt
Blue Eyes ppt
 
SUPER CAPACITOR
SUPER CAPACITORSUPER CAPACITOR
SUPER CAPACITOR
 
Dc motor
Dc motor Dc motor
Dc motor
 
Ethical hacking & Information Security
Ethical hacking & Information SecurityEthical hacking & Information Security
Ethical hacking & Information Security
 
The Big Bang Theory
The Big Bang TheoryThe Big Bang Theory
The Big Bang Theory
 

Similar a Hack for security

Known SEO. No SEO - A more powerful approach to SEO
Known SEO. No SEO - A more powerful approach to SEOKnown SEO. No SEO - A more powerful approach to SEO
Known SEO. No SEO - A more powerful approach to SEOAnnkur Agarwal
 
Infosec Sucks - and its not because of he people.
Infosec Sucks - and its not because of he people.Infosec Sucks - and its not because of he people.
Infosec Sucks - and its not because of he people.Dan Murray
 
Google is Watching You: How Google Spies on Search Behavior to Rank Websites
Google is Watching You: How Google Spies on Search Behavior to Rank WebsitesGoogle is Watching You: How Google Spies on Search Behavior to Rank Websites
Google is Watching You: How Google Spies on Search Behavior to Rank WebsitesJohn Crenshaw
 
How to Start a Company
How to Start a CompanyHow to Start a Company
How to Start a CompanyChristina Cyr
 
New Age Marketing
New Age MarketingNew Age Marketing
New Age MarketingSean Si
 
Sucuri Webinar: How to clean hacked WordPress sites
Sucuri Webinar: How to clean hacked WordPress sitesSucuri Webinar: How to clean hacked WordPress sites
Sucuri Webinar: How to clean hacked WordPress sitesSucuri
 
Evil User Stories - Improve Your Application Security
Evil User Stories - Improve Your Application SecurityEvil User Stories - Improve Your Application Security
Evil User Stories - Improve Your Application SecurityAnne Oikarinen
 
The Brainy Way to Build Your Community - Roger Dooley
The Brainy Way to Build Your Community - Roger DooleyThe Brainy Way to Build Your Community - Roger Dooley
The Brainy Way to Build Your Community - Roger DooleyFeverBee Limited
 
Account Entrapment - Forcing a Victim into an Attacker’s Account
Account Entrapment - Forcing a Victim into an Attacker’s AccountAccount Entrapment - Forcing a Victim into an Attacker’s Account
Account Entrapment - Forcing a Victim into an Attacker’s AccountDenim Group
 
State of Internet Marketing 2013
State of Internet Marketing 2013State of Internet Marketing 2013
State of Internet Marketing 2013Blurbpoint
 
Maximizing Your Virtual Assistant for Realtors
Maximizing Your Virtual Assistant for RealtorsMaximizing Your Virtual Assistant for Realtors
Maximizing Your Virtual Assistant for RealtorsRichard Smith
 
Nir goldshlager Killing a bug bounty program - twice Hack In The Box 2012
Nir goldshlager Killing a bug bounty program - twice Hack In The Box 2012Nir goldshlager Killing a bug bounty program - twice Hack In The Box 2012
Nir goldshlager Killing a bug bounty program - twice Hack In The Box 2012Nir Goldshlager
 
Seven Core Competency Framework of a WordPress Pro
Seven Core Competency Framework of a WordPress ProSeven Core Competency Framework of a WordPress Pro
Seven Core Competency Framework of a WordPress ProNew Tricks
 
How to Bootstrap a Startup?
How to Bootstrap a Startup?How to Bootstrap a Startup?
How to Bootstrap a Startup?Abdo Riani
 
Everyday Seo by Tom Veltri
Everyday Seo by Tom VeltriEveryday Seo by Tom Veltri
Everyday Seo by Tom VeltriConvergeSouth
 
Web + Social Media + Cyber Security for Lawyers
Web + Social Media + Cyber Security for LawyersWeb + Social Media + Cyber Security for Lawyers
Web + Social Media + Cyber Security for LawyersJoshua Weaver
 
How to Overcome Sales Call Reluctance- Webinar slide deck
How to Overcome Sales Call Reluctance- Webinar slide deckHow to Overcome Sales Call Reluctance- Webinar slide deck
How to Overcome Sales Call Reluctance- Webinar slide deckeGrabber
 

Similar a Hack for security (20)

Known SEO. No SEO - A more powerful approach to SEO
Known SEO. No SEO - A more powerful approach to SEOKnown SEO. No SEO - A more powerful approach to SEO
Known SEO. No SEO - A more powerful approach to SEO
 
Infosec Sucks - and its not because of he people.
Infosec Sucks - and its not because of he people.Infosec Sucks - and its not because of he people.
Infosec Sucks - and its not because of he people.
 
Google is Watching You: How Google Spies on Search Behavior to Rank Websites
Google is Watching You: How Google Spies on Search Behavior to Rank WebsitesGoogle is Watching You: How Google Spies on Search Behavior to Rank Websites
Google is Watching You: How Google Spies on Search Behavior to Rank Websites
 
How to Start a Company
How to Start a CompanyHow to Start a Company
How to Start a Company
 
Social Media for Eyecare Professionals
Social Media for Eyecare ProfessionalsSocial Media for Eyecare Professionals
Social Media for Eyecare Professionals
 
New Age Marketing
New Age MarketingNew Age Marketing
New Age Marketing
 
Sucuri Webinar: How to clean hacked WordPress sites
Sucuri Webinar: How to clean hacked WordPress sitesSucuri Webinar: How to clean hacked WordPress sites
Sucuri Webinar: How to clean hacked WordPress sites
 
Evil User Stories - Improve Your Application Security
Evil User Stories - Improve Your Application SecurityEvil User Stories - Improve Your Application Security
Evil User Stories - Improve Your Application Security
 
The Brainy Way to Build Your Community - Roger Dooley
The Brainy Way to Build Your Community - Roger DooleyThe Brainy Way to Build Your Community - Roger Dooley
The Brainy Way to Build Your Community - Roger Dooley
 
Account entrapment
Account entrapmentAccount entrapment
Account entrapment
 
Account Entrapment - Forcing a Victim into an Attacker’s Account
Account Entrapment - Forcing a Victim into an Attacker’s AccountAccount Entrapment - Forcing a Victim into an Attacker’s Account
Account Entrapment - Forcing a Victim into an Attacker’s Account
 
State of Internet Marketing 2013
State of Internet Marketing 2013State of Internet Marketing 2013
State of Internet Marketing 2013
 
Maximizing Your Virtual Assistant for Realtors
Maximizing Your Virtual Assistant for RealtorsMaximizing Your Virtual Assistant for Realtors
Maximizing Your Virtual Assistant for Realtors
 
Nir goldshlager Killing a bug bounty program - twice Hack In The Box 2012
Nir goldshlager Killing a bug bounty program - twice Hack In The Box 2012Nir goldshlager Killing a bug bounty program - twice Hack In The Box 2012
Nir goldshlager Killing a bug bounty program - twice Hack In The Box 2012
 
Seven Core Competency Framework of a WordPress Pro
Seven Core Competency Framework of a WordPress ProSeven Core Competency Framework of a WordPress Pro
Seven Core Competency Framework of a WordPress Pro
 
How to Bootstrap a Startup?
How to Bootstrap a Startup?How to Bootstrap a Startup?
How to Bootstrap a Startup?
 
Everyday Seo by Tom Veltri
Everyday Seo by Tom VeltriEveryday Seo by Tom Veltri
Everyday Seo by Tom Veltri
 
Web + Social Media + Cyber Security for Lawyers
Web + Social Media + Cyber Security for LawyersWeb + Social Media + Cyber Security for Lawyers
Web + Social Media + Cyber Security for Lawyers
 
How to Overcome Sales Call Reluctance- Webinar slide deck
How to Overcome Sales Call Reluctance- Webinar slide deckHow to Overcome Sales Call Reluctance- Webinar slide deck
How to Overcome Sales Call Reluctance- Webinar slide deck
 
SEMA: shifting gears back_to_business - Corey Perlman Presentation
SEMA: shifting gears back_to_business - Corey Perlman Presentation SEMA: shifting gears back_to_business - Corey Perlman Presentation
SEMA: shifting gears back_to_business - Corey Perlman Presentation
 

Último

Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 

Último (20)

Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 

Hack for security

  • 1. Hack For Security Web Design, Web Application Security and Digital Inspiration.
  • 2. When it all was started ? • In the 2nd semester of the Engineering. • I have learned about the XSS, SQLI and File Upload and symlink and rooting. • That was enough to get the root access in the server.
  • 3. I started exploiting vulnerability! • After learning the stuffs I have started exploiting the vulnerability of the Pakistani websites as they where hacking Indian websites!
  • 4. Why I stopped exploiting vulnerability ? • One day when I was enjoying my coffee, I thought exploiting the vulnerability of the website is bad thing instead I can help the Indian webmasters to secure their application by reporting the vulnerability to them! And again I stopped doing that because most of them didn’t cared about the website security
  • 5. They said you have to face our legal Department ! • As I was reporting the bug to the webmasters, one of them said that don’t test your skills on our websites else you have to face our legal department !!
  • 6. My Reaction: • I just said “Okay!” • What I was willing to say ? If you didn’t patched SQL loophole then you probably gonna face our legal department !
  • 7. I have started Blogging ! •Why ??? • I wanted to improve my English language. • And Warren Buffett once said Never be depended on Single income source 
  • 8. Why I have started participating in Bug Bounty Programs ? • They Respect the Security Researchers (Hackers). • They Give acknowledgements ! • They give cool stuffs that money can’t buy 
  • 9. I got acknowledged By Apple Inc. • I have found mixed-content issue in apple.com and they gave me acknowledgement.
  • 10. Got acknowledged by Google • #Finally Dream came true ♥ m/ :) • I have found XXS vulnerability in Google Art Project and they have offered me acknowledgement in Google Honorable mention and $100 as a reward.
  • 11. PayPal Offered me $500 as a reward  • I have found Server Miss Configuration in Paypal.com.au
  • 12. Again Dream came true  • #Again accomplished my Dream ♥ m/ :D • I have found Email Spoofing in Blogger.com and again they offered acknowledgement in Google Reward Recipients and $100 as a reward 
  • 13. How much I Made ? • I am a web Entrepreneur and I don’t work for money  • I work for respect and my dreams  • By the way I have made $3095.83 in last 6 months of 2013  !
  • 14. What if you want me to test your website for vulnerability ? • Just contact me @ TheSiddharthSolanki@gmail.com and we will discuss about it 
  • 15. About Me: • Name: Siddharth Solanki • Security Researcher/Hacker (As they call me! ) • Blogger (By choice :D) • Engineer (By choice :D) • Graphics Designer (By choice)
  • 16. Thanks : • Thanks to Vasim Belim, Dushyant Vaghela and Utsav oza, for Being Awesome Friends! • Thanks to Almighty GOD for making me Fully, Totally and completely Independent  ! • Thanks to Echai and My college (VVP) for giving me opportunity to promote my skills!
  • 18. Let’s be Friends  @HackForSecurity /Siddharth.solanki.hfs /HackForSecurity /siddharthsolankihfs /+SiddhartHSolankI HackForSecurity.com