Personal Information
Organization / Workplace
Greater New York City Area United States
Occupation
Sr.Associate, Cybersecurity, Privacy & IT Risk at PwC
Website
http://www.zer0byte.com
About
• OSCP- offensive Security Online "PWB" Training which is hands on training over Backtrack™ Linux distribution for pentesting .
• Handle all aspects of WEP / WPA Protected networks using aircrack-ng suit.
• Able to create a fake/ rouge access point using airbase-ng suit.
• Extensively worked on wireless network based Man In The Middle (MITM) Attacks using pc and mobile devices.
• DNS Spoofing.
• ARP Poisoning
• Capable of bypasing windows Login of windows xp , windows vista and windows 7
• Computer Information Security Testing [Desktops/Servers]
• Web Application Penetration testing
• IP/email tracing
• Social Engineering Attacks
• SQL Injections
• XSS (Cross Site Scripting)
• Wireshark ...
Tags
penetration testing ui for
See more
- Presentations
- Documents
- Infographics
Lateral Movement with PowerShell
kieranjacobsen
•
10 years ago
Pentesting Wireless Networks and Wireless Network Security
Ayoma Wijethunga
•
7 years ago
Hacking wireless networks
Sahil Rai
•
10 years ago
Wi-Fi Technology
Naveen Kumar
•
10 years ago
Hacking Wireless Networks : Null Delhi (November)
Mandeep Jadon
•
8 years ago
Advanced Wi-Fi pentesting
Yunfei Yang
•
6 years ago
Red Team Apocalypse
Beau Bullock
•
6 years ago
Pentesting ReST API
Nutan Kumar Panda
•
7 years ago
Pentesting RESTful webservices
Mohammed A. Imran
•
10 years ago
BSides Roma 2018 - Red team techniques
Guglielmo Scaiola
•
6 years ago
Extracting Credentials From Windows
NetSPI
•
9 years ago
Penetration testing web application web application (in) security
Nahidul Kibria
•
9 years ago
Obfuscating The Empire
Ryan Cobb
•
7 years ago
Top 10 most interesting vulnerabilities and attacks in SAP
ERPScan
•
8 years ago
Defcon - Veil-Pillage
VeilFramework
•
9 years ago
Red vs Blue- Modern Atice Directory Attacks, Detection & Protection by Sean Metcalf
Shakacon
•
8 years ago
BSides Philly Finding a Company's BreakPoint
Andrew McNicol
•
7 years ago
Internal Pentest: from z3r0 to h3r0
marcioalma
•
7 years ago
Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show True Risk
Beau Bullock
•
8 years ago
Pentest Apocalypse - SANSFIRE 2016 Edition
Beau Bullock
•
7 years ago