• Save
Narain   exploring web vulnerabilities
Upcoming SlideShare
Loading in...5
×
 

Narain exploring web vulnerabilities

on

  • 216 views

These are the slides that i had presented during "Braindigit 9th National Conference2013 "

These are the slides that i had presented during "Braindigit 9th National Conference2013 "

Statistics

Views

Total Views
216
Views on SlideShare
216
Embed Views
0

Actions

Likes
0
Downloads
0
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Narain   exploring web vulnerabilities Narain exploring web vulnerabilities Presentation Transcript

  • Purpose Of This Presentation For Awareness in Software QualityStrictly not for wrong use, not to damage or harm any one’s intellectual property
  • Vote of thanks• ITS Nepal• BRAINDIGIT IT Solution• OWASP• OWASP Nepal• SQA Professionals
  • Overview• Introduction• Stats on attack site• Top Tools• Demo vulnerability scanning• Analysis of report
  • Nearly 11K Attack sites arediscovered monthly
  • • Nearly 150 K Infected sites are• Discovered Monthly• I.e. nearly 5000 sites are infected daily• I.e. nearly 3 sites are infected per minute
  • After all• No software is 100% bug free, so is the web.• Difference is in level of security maintained.
  • Lock Demonstration1st lock is the simplest lock that can be broken easily and by huge mass of people(x).2nd lock is bit more complex and can be broken by(x-10,000) no of people.3rd lock is most complex and can be broken by few people on earth lets say 2 people
  • Familiar words
  • Tools
  • Demo• With joomscan Check “narain-joomscan.pptx” for slidesrelated to joomscan.• With Acunetix Check “narain- acunetix.pptx” for slidesrelated to acunetix
  • LET’S ANALYSISTHE REOPRT WE HAVE NOW
  • The Hard Part Analysing the report of Automation (15-500 pgs)Analysing False Positives and Negatives (everything seems true) N Fixing The Holes
  • Web securityDoesnt only depend on Security of servers Or Security of Application But to Whole Echo System of WEBLet’s Try More with our little knowledge
  • Thanking You