SlideShare a Scribd company logo
1 of 18
Hack For Security
Web Design, Web Application Security and Digital Inspiration.
When it all was started ?
• In the 2nd semester of the Engineering.

• I have learned about the XSS, SQLI and File
Upload and symlink and rooting.

• That was enough to get the root access in the
server.
I started exploiting vulnerability!

• After learning the stuffs I have started exploiting
the vulnerability of the Pakistani websites as
they where hacking Indian websites!
Why I stopped exploiting vulnerability ?
• One day when I was enjoying my coffee, I
thought exploiting the vulnerability of the
website is bad thing instead I can help the
Indian webmasters to secure their application by
reporting the vulnerability to them! And again I
stopped doing that because most of them didn’t
cared about the website security
They said you have to face our legal
Department !
• As I was reporting the bug to the
webmasters, one of them said that don’t test
your skills on our websites else you have to face
our legal department !!
My Reaction:
• I just said “Okay!”
• What I was willing to say ? If you didn’t patched SQL loophole
then you probably gonna face our legal department !
I have started Blogging !

•Why ???
• I wanted to improve my English language.
• And Warren Buffett once said Never be
depended on Single income source 
Why I have started participating in Bug
Bounty Programs ?
• They Respect the Security Researchers
(Hackers).
• They Give acknowledgements !
• They give cool stuffs that money can’t buy 
I got acknowledged By Apple Inc.
• I have found mixed-content issue in apple.com
and they gave me acknowledgement.
Got acknowledged by Google
• #Finally Dream came true ♥ m/ :)
• I have found XXS vulnerability in Google Art Project
and they have offered me acknowledgement in
Google Honorable mention and $100 as a reward.
PayPal Offered me $500 as a reward 
• I have found Server Miss Configuration in
Paypal.com.au
Again Dream came true 
• #Again accomplished my Dream ♥ m/ :D
• I have found Email Spoofing in Blogger.com
and again they offered acknowledgement in
Google Reward Recipients and $100 as a
reward 
How much I Made ?
• I am a web Entrepreneur and I don’t work for
money 
• I work for respect and my dreams 

• By the way I have made $3095.83
in last 6 months of 2013  !
What if you want me to test your
website for vulnerability ?
• Just contact me @
TheSiddharthSolanki@gmail.com and we
will discuss about it 
About Me:
• Name: Siddharth Solanki
• Security Researcher/Hacker (As they call me! )

• Blogger (By choice :D)
• Engineer (By choice :D)
• Graphics Designer (By choice)
Thanks :
• Thanks to Vasim Belim, Dushyant Vaghela
and Utsav oza, for Being Awesome Friends!

• Thanks to Almighty GOD for making me
Fully, Totally and completely Independent  !
• Thanks to Echai and My college (VVP) for
giving me opportunity to promote my skills!
Questions ?
Let’s be Friends 
@HackForSecurity

/Siddharth.solanki.hfs

/HackForSecurity

/siddharthsolankihfs

/+SiddhartHSolankI

HackForSecurity.com

More Related Content

What's hot

How to Avoid Online Marketing Scams and Ripoffs
How to Avoid Online Marketing Scams and RipoffsHow to Avoid Online Marketing Scams and Ripoffs
How to Avoid Online Marketing Scams and RipoffsDavid Christensen
 
All About Author Tags - Meet up #1 - BlogUp Berlin
All About Author Tags - Meet up #1 - BlogUp BerlinAll About Author Tags - Meet up #1 - BlogUp Berlin
All About Author Tags - Meet up #1 - BlogUp BerlinWeHeartHome
 
MarketMix 2013 - Storytelling as Part of Your Content Marketing Plan
MarketMix 2013 - Storytelling as Part of Your Content Marketing PlanMarketMix 2013 - Storytelling as Part of Your Content Marketing Plan
MarketMix 2013 - Storytelling as Part of Your Content Marketing PlanRelaborate
 
How to Establish Social Proof Using Social Love
How to Establish Social Proof Using Social LoveHow to Establish Social Proof Using Social Love
How to Establish Social Proof Using Social LoveRaven Tools
 
Website evaluation
Website evaluationWebsite evaluation
Website evaluationAnn Vega
 
Article Marketing and Content Cheapskates
Article Marketing and Content CheapskatesArticle Marketing and Content Cheapskates
Article Marketing and Content Cheapskatesbtbyrd
 

What's hot (7)

How to Avoid Online Marketing Scams and Ripoffs
How to Avoid Online Marketing Scams and RipoffsHow to Avoid Online Marketing Scams and Ripoffs
How to Avoid Online Marketing Scams and Ripoffs
 
All About Author Tags - Meet up #1 - BlogUp Berlin
All About Author Tags - Meet up #1 - BlogUp BerlinAll About Author Tags - Meet up #1 - BlogUp Berlin
All About Author Tags - Meet up #1 - BlogUp Berlin
 
Backlinks
 Backlinks Backlinks
Backlinks
 
MarketMix 2013 - Storytelling as Part of Your Content Marketing Plan
MarketMix 2013 - Storytelling as Part of Your Content Marketing PlanMarketMix 2013 - Storytelling as Part of Your Content Marketing Plan
MarketMix 2013 - Storytelling as Part of Your Content Marketing Plan
 
How to Establish Social Proof Using Social Love
How to Establish Social Proof Using Social LoveHow to Establish Social Proof Using Social Love
How to Establish Social Proof Using Social Love
 
Website evaluation
Website evaluationWebsite evaluation
Website evaluation
 
Article Marketing and Content Cheapskates
Article Marketing and Content CheapskatesArticle Marketing and Content Cheapskates
Article Marketing and Content Cheapskates
 

Viewers also liked

Anti Hack Solution
Anti Hack Solution Anti Hack Solution
Anti Hack Solution Naved Ahmed
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical HackingDivyank Jindal
 
[DevDay 2016] Anti hacking on game development - Speaker: Khanh Le – Program...
 [DevDay 2016] Anti hacking on game development - Speaker: Khanh Le – Program... [DevDay 2016] Anti hacking on game development - Speaker: Khanh Le – Program...
[DevDay 2016] Anti hacking on game development - Speaker: Khanh Le – Program...DevDay.org
 
Tsunami warning system
Tsunami warning systemTsunami warning system
Tsunami warning systemVIBHOR RATHI
 
Blue Eyes ppt
Blue Eyes pptBlue Eyes ppt
Blue Eyes pptdeepu427
 
SUPER CAPACITOR
SUPER CAPACITORSUPER CAPACITOR
SUPER CAPACITORjestin joy
 
Ethical hacking & Information Security
Ethical hacking & Information SecurityEthical hacking & Information Security
Ethical hacking & Information SecurityAjay Dhamija
 
The Big Bang Theory
The Big Bang TheoryThe Big Bang Theory
The Big Bang Theoryrose_aries15
 

Viewers also liked (9)

Anti Hack Solution
Anti Hack Solution Anti Hack Solution
Anti Hack Solution
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical Hacking
 
[DevDay 2016] Anti hacking on game development - Speaker: Khanh Le – Program...
 [DevDay 2016] Anti hacking on game development - Speaker: Khanh Le – Program... [DevDay 2016] Anti hacking on game development - Speaker: Khanh Le – Program...
[DevDay 2016] Anti hacking on game development - Speaker: Khanh Le – Program...
 
Tsunami warning system
Tsunami warning systemTsunami warning system
Tsunami warning system
 
Blue Eyes ppt
Blue Eyes pptBlue Eyes ppt
Blue Eyes ppt
 
SUPER CAPACITOR
SUPER CAPACITORSUPER CAPACITOR
SUPER CAPACITOR
 
Dc motor
Dc motor Dc motor
Dc motor
 
Ethical hacking & Information Security
Ethical hacking & Information SecurityEthical hacking & Information Security
Ethical hacking & Information Security
 
The Big Bang Theory
The Big Bang TheoryThe Big Bang Theory
The Big Bang Theory
 

Similar to Hack for security

Known SEO. No SEO - A more powerful approach to SEO
Known SEO. No SEO - A more powerful approach to SEOKnown SEO. No SEO - A more powerful approach to SEO
Known SEO. No SEO - A more powerful approach to SEOAnnkur Agarwal
 
Infosec Sucks - and its not because of he people.
Infosec Sucks - and its not because of he people.Infosec Sucks - and its not because of he people.
Infosec Sucks - and its not because of he people.Dan Murray
 
Google is Watching You: How Google Spies on Search Behavior to Rank Websites
Google is Watching You: How Google Spies on Search Behavior to Rank WebsitesGoogle is Watching You: How Google Spies on Search Behavior to Rank Websites
Google is Watching You: How Google Spies on Search Behavior to Rank WebsitesJohn Crenshaw
 
How to Start a Company
How to Start a CompanyHow to Start a Company
How to Start a CompanyChristina Cyr
 
New Age Marketing
New Age MarketingNew Age Marketing
New Age MarketingSean Si
 
Sucuri Webinar: How to clean hacked WordPress sites
Sucuri Webinar: How to clean hacked WordPress sitesSucuri Webinar: How to clean hacked WordPress sites
Sucuri Webinar: How to clean hacked WordPress sitesSucuri
 
Evil User Stories - Improve Your Application Security
Evil User Stories - Improve Your Application SecurityEvil User Stories - Improve Your Application Security
Evil User Stories - Improve Your Application SecurityAnne Oikarinen
 
The Brainy Way to Build Your Community - Roger Dooley
The Brainy Way to Build Your Community - Roger DooleyThe Brainy Way to Build Your Community - Roger Dooley
The Brainy Way to Build Your Community - Roger DooleyFeverBee Limited
 
Account Entrapment - Forcing a Victim into an Attacker’s Account
Account Entrapment - Forcing a Victim into an Attacker’s AccountAccount Entrapment - Forcing a Victim into an Attacker’s Account
Account Entrapment - Forcing a Victim into an Attacker’s AccountDenim Group
 
State of Internet Marketing 2013
State of Internet Marketing 2013State of Internet Marketing 2013
State of Internet Marketing 2013Blurbpoint
 
Maximizing Your Virtual Assistant for Realtors
Maximizing Your Virtual Assistant for RealtorsMaximizing Your Virtual Assistant for Realtors
Maximizing Your Virtual Assistant for RealtorsRichard Smith
 
Nir goldshlager Killing a bug bounty program - twice Hack In The Box 2012
Nir goldshlager Killing a bug bounty program - twice Hack In The Box 2012Nir goldshlager Killing a bug bounty program - twice Hack In The Box 2012
Nir goldshlager Killing a bug bounty program - twice Hack In The Box 2012Nir Goldshlager
 
Seven Core Competency Framework of a WordPress Pro
Seven Core Competency Framework of a WordPress ProSeven Core Competency Framework of a WordPress Pro
Seven Core Competency Framework of a WordPress ProNew Tricks
 
How to Bootstrap a Startup?
How to Bootstrap a Startup?How to Bootstrap a Startup?
How to Bootstrap a Startup?Abdo Riani
 
Everyday Seo by Tom Veltri
Everyday Seo by Tom VeltriEveryday Seo by Tom Veltri
Everyday Seo by Tom VeltriConvergeSouth
 
Web + Social Media + Cyber Security for Lawyers
Web + Social Media + Cyber Security for LawyersWeb + Social Media + Cyber Security for Lawyers
Web + Social Media + Cyber Security for LawyersJoshua Weaver
 
How to Overcome Sales Call Reluctance- Webinar slide deck
How to Overcome Sales Call Reluctance- Webinar slide deckHow to Overcome Sales Call Reluctance- Webinar slide deck
How to Overcome Sales Call Reluctance- Webinar slide deckeGrabber
 

Similar to Hack for security (20)

Known SEO. No SEO - A more powerful approach to SEO
Known SEO. No SEO - A more powerful approach to SEOKnown SEO. No SEO - A more powerful approach to SEO
Known SEO. No SEO - A more powerful approach to SEO
 
Infosec Sucks - and its not because of he people.
Infosec Sucks - and its not because of he people.Infosec Sucks - and its not because of he people.
Infosec Sucks - and its not because of he people.
 
Google is Watching You: How Google Spies on Search Behavior to Rank Websites
Google is Watching You: How Google Spies on Search Behavior to Rank WebsitesGoogle is Watching You: How Google Spies on Search Behavior to Rank Websites
Google is Watching You: How Google Spies on Search Behavior to Rank Websites
 
How to Start a Company
How to Start a CompanyHow to Start a Company
How to Start a Company
 
Social Media for Eyecare Professionals
Social Media for Eyecare ProfessionalsSocial Media for Eyecare Professionals
Social Media for Eyecare Professionals
 
New Age Marketing
New Age MarketingNew Age Marketing
New Age Marketing
 
Sucuri Webinar: How to clean hacked WordPress sites
Sucuri Webinar: How to clean hacked WordPress sitesSucuri Webinar: How to clean hacked WordPress sites
Sucuri Webinar: How to clean hacked WordPress sites
 
Evil User Stories - Improve Your Application Security
Evil User Stories - Improve Your Application SecurityEvil User Stories - Improve Your Application Security
Evil User Stories - Improve Your Application Security
 
The Brainy Way to Build Your Community - Roger Dooley
The Brainy Way to Build Your Community - Roger DooleyThe Brainy Way to Build Your Community - Roger Dooley
The Brainy Way to Build Your Community - Roger Dooley
 
Account entrapment
Account entrapmentAccount entrapment
Account entrapment
 
Account Entrapment - Forcing a Victim into an Attacker’s Account
Account Entrapment - Forcing a Victim into an Attacker’s AccountAccount Entrapment - Forcing a Victim into an Attacker’s Account
Account Entrapment - Forcing a Victim into an Attacker’s Account
 
State of Internet Marketing 2013
State of Internet Marketing 2013State of Internet Marketing 2013
State of Internet Marketing 2013
 
Maximizing Your Virtual Assistant for Realtors
Maximizing Your Virtual Assistant for RealtorsMaximizing Your Virtual Assistant for Realtors
Maximizing Your Virtual Assistant for Realtors
 
Nir goldshlager Killing a bug bounty program - twice Hack In The Box 2012
Nir goldshlager Killing a bug bounty program - twice Hack In The Box 2012Nir goldshlager Killing a bug bounty program - twice Hack In The Box 2012
Nir goldshlager Killing a bug bounty program - twice Hack In The Box 2012
 
Seven Core Competency Framework of a WordPress Pro
Seven Core Competency Framework of a WordPress ProSeven Core Competency Framework of a WordPress Pro
Seven Core Competency Framework of a WordPress Pro
 
How to Bootstrap a Startup?
How to Bootstrap a Startup?How to Bootstrap a Startup?
How to Bootstrap a Startup?
 
Everyday Seo by Tom Veltri
Everyday Seo by Tom VeltriEveryday Seo by Tom Veltri
Everyday Seo by Tom Veltri
 
Web + Social Media + Cyber Security for Lawyers
Web + Social Media + Cyber Security for LawyersWeb + Social Media + Cyber Security for Lawyers
Web + Social Media + Cyber Security for Lawyers
 
How to Overcome Sales Call Reluctance- Webinar slide deck
How to Overcome Sales Call Reluctance- Webinar slide deckHow to Overcome Sales Call Reluctance- Webinar slide deck
How to Overcome Sales Call Reluctance- Webinar slide deck
 
SEMA: shifting gears back_to_business - Corey Perlman Presentation
SEMA: shifting gears back_to_business - Corey Perlman Presentation SEMA: shifting gears back_to_business - Corey Perlman Presentation
SEMA: shifting gears back_to_business - Corey Perlman Presentation
 

Recently uploaded

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 

Recently uploaded (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

Hack for security

  • 1. Hack For Security Web Design, Web Application Security and Digital Inspiration.
  • 2. When it all was started ? • In the 2nd semester of the Engineering. • I have learned about the XSS, SQLI and File Upload and symlink and rooting. • That was enough to get the root access in the server.
  • 3. I started exploiting vulnerability! • After learning the stuffs I have started exploiting the vulnerability of the Pakistani websites as they where hacking Indian websites!
  • 4. Why I stopped exploiting vulnerability ? • One day when I was enjoying my coffee, I thought exploiting the vulnerability of the website is bad thing instead I can help the Indian webmasters to secure their application by reporting the vulnerability to them! And again I stopped doing that because most of them didn’t cared about the website security
  • 5. They said you have to face our legal Department ! • As I was reporting the bug to the webmasters, one of them said that don’t test your skills on our websites else you have to face our legal department !!
  • 6. My Reaction: • I just said “Okay!” • What I was willing to say ? If you didn’t patched SQL loophole then you probably gonna face our legal department !
  • 7. I have started Blogging ! •Why ??? • I wanted to improve my English language. • And Warren Buffett once said Never be depended on Single income source 
  • 8. Why I have started participating in Bug Bounty Programs ? • They Respect the Security Researchers (Hackers). • They Give acknowledgements ! • They give cool stuffs that money can’t buy 
  • 9. I got acknowledged By Apple Inc. • I have found mixed-content issue in apple.com and they gave me acknowledgement.
  • 10. Got acknowledged by Google • #Finally Dream came true ♥ m/ :) • I have found XXS vulnerability in Google Art Project and they have offered me acknowledgement in Google Honorable mention and $100 as a reward.
  • 11. PayPal Offered me $500 as a reward  • I have found Server Miss Configuration in Paypal.com.au
  • 12. Again Dream came true  • #Again accomplished my Dream ♥ m/ :D • I have found Email Spoofing in Blogger.com and again they offered acknowledgement in Google Reward Recipients and $100 as a reward 
  • 13. How much I Made ? • I am a web Entrepreneur and I don’t work for money  • I work for respect and my dreams  • By the way I have made $3095.83 in last 6 months of 2013  !
  • 14. What if you want me to test your website for vulnerability ? • Just contact me @ TheSiddharthSolanki@gmail.com and we will discuss about it 
  • 15. About Me: • Name: Siddharth Solanki • Security Researcher/Hacker (As they call me! ) • Blogger (By choice :D) • Engineer (By choice :D) • Graphics Designer (By choice)
  • 16. Thanks : • Thanks to Vasim Belim, Dushyant Vaghela and Utsav oza, for Being Awesome Friends! • Thanks to Almighty GOD for making me Fully, Totally and completely Independent  ! • Thanks to Echai and My college (VVP) for giving me opportunity to promote my skills!
  • 18. Let’s be Friends  @HackForSecurity /Siddharth.solanki.hfs /HackForSecurity /siddharthsolankihfs /+SiddhartHSolankI HackForSecurity.com