Hackers of India
Home
Timeline
Books
Tools
Focus Area
🤝
Contribute
🗺️
RoadMap
ℹ️
About
☀️
🌙
Shreeraj Shah
📹 Dynamic Video Playlist
30
Talks
1
Books
Focus Areas
Penetration Testing (21)
•
Web Application Security (18)
•
Security Operations & Defense (14)
•
Application Security (6)
•
DevSecOps (6)
•
Vulnerability Management (5)
•
Network Security (4)
Timeline
(*Experimental)
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
Penetration Testing
Web Application Security
Security Operations & Defense
Application Security
DevSecOps
Vulnerability Management
Network Security
Malware Analysis
Reverse Engineering
Cloud Security
Hacktivity
Jump to:
2012 (6)
|
2011 (2)
|
2010 (4)
|
2009 (4)
|
2008 (5)
|
2007 (4)
|
2005 (3)
|
2004 (1)
|
2003 (1)
|
2002 (1)
---- 2012 ----
2012/12/06
Talk
Penetration Testing
Blackhat
:
HTML5 top 10 threats – Stealth Attack and Silent Exploits
2012/10/26
Talk
Web Application Security
App Sec Usa
:
XSS & CSRF with HTML5 - Attack, Exploit and Defense
2012/10/11
Talk
Penetration Testing
Hitb Sec Conf
:
XSS & CSRF strike back – Powered by HTML5
2012/08/29
Talk
Penetration Testing
Owasp App Sec India
:
Find me if you can Smart fuzzing and discovery!
2012/07/26
Talk
Penetration Testing
Blackhat
:
HTML5 top 10 threats – Stealth Attack and Silent Exploits
2012/03/14
Talk
Penetration Testing
Blackhat
:
HTML5 top 10 threats – Stealth Attack and Silent Exploits
---- 2011 ----
2011/08/03
Talk
Malware Analysis
Blackhat
:
Reverse Engineering Browser Components: Dissecting and Hacking Silverlight, HTML 5 and Flex
2011/05/20
Talk
Penetration Testing
Hitb Sec Conf
:
Next Generation Web Attacks – HTML 5, DOM(L3) and XHR(L2)
---- 2010 ----
2010/10/13
Talk
Penetration Testing
Hitb Sec Conf
:
Hacking a Browser’s DOM – Exploiting Ajax and RIA
2010/07/29
Talk
Penetration Testing
Blackhat
:
Hacking Browser’s DOM - Exploiting Ajax and RIA
2010/07/01
Talk
Penetration Testing
Hitb Sec Conf
:
Top 10 Web 2.0 Attacks and Exploits
2010/06/18
Talk
Malware Analysis
Syscan
:
REVERSE ENGINEERING WEB 2.0 APPLICATIONS
---- 2009 ----
2009/11/18
Talk
Cloud Security
Securitybyte
:
Cloud Hacking – Distributed Attack & Exploit Platform
2009/05/19
Talk
Security Operations & Defense
Syscan
:
Securing Enterprise Applications
2009/05/19
Talk
Security Operations & Defense
Syscan
:
Securing Applications at Gateway with Web Application Firewalls
2009/04/22
Talk
Security Operations & Defense
Hitb Sec Conf
:
Application Defense Tactics & Strategies - WAF at the Gateway
---- 2008 ----
2008/11/13
Talk
Penetration Testing
Deepsec
:
Game of Web 2.0 Security - Attacking Next Generation Apps
2008/10/29
Talk
Security Operations & Defense
Hitb Sec Conf
:
Top 10 Web 2.0 Attacks
2008/08/20
Talk
Penetration Testing
Owasp App Sec India
:
Web 2.0 Attacks - Next Generation Threats on the Rise
2008/04/16
Talk
Security Operations & Defense
Hitb Sec Conf
:
Securing Next Generation Applications – Scan, Detect and Mitigate
2008/02/20
Talk
Penetration Testing
Blackhat
:
Scanning Applications 2.0 - Next Generation Scan, Attacks and Tools
---- 2007 ----
2007/12/09
Talk
Penetration Testing
Clubhack
:
Hacking Web 2.0 Art and Science of Vulnerability Detection
2007/11/20
Talk
Web Application Security
Deepsec
:
Web 2.0 Application Kung-Fu - Securing Ajax & Web Services
2007/09/06
Talk
Penetration Testing
Hitb Sec Conf
:
Hacking Ajax and Web Services – Next Generation Web Attacks on the Rise
2007/04/05
Talk
Penetration Testing
Hitb Sec Conf
:
WEB 2.0 Hacking – Defending Ajax and Web Services
---- 2005 ----
2005/09/26
Talk
Security Operations & Defense
Hitb Sec Conf
:
Web hacking Kung-Fu and Art of Defense
2005/06/10
Talk
Syscan
:
.Net Web Security-Attack And Defense
2005/04/12
Talk
Security Operations & Defense
Hitb Sec Conf
:
Web Application Kung-Fu, The Art of Defense
---- 2004 ----
2004/10/06
Talk
Penetration Testing
Hitb Sec Conf
:
Web Services - Attacks and Defense Strategies, Methods and Tools
---- 2003 ----
2003/12/12
Talk
Security Operations & Defense
Hitb Sec Conf
:
Defending Web Applications: Strategies, methods and practices
---- 2002 ----
2002/08/18
Book
Addison Wesley Professional:
Web Hacking: Attacks and Defense
-
Saumil Shah
,
Shreeraj Shah
,
Stuart MC Clure