SlideShare a Scribd company logo
Crawling Web (Darker Way) for Fun and Profit
Section A - Personal Data:
1. Name: Tamaghna Basu
2. Email Address: tamaghna.basu@gmail.com
3. Cell phone: +91 9880307435
4. Brief biography:
Tamaghna Basu, OSCP, GCIH, RHCE, CEH, ECSA, co-founder of
www.weekendsecurity.org, is a security researcher at heart and has been his
main areas of research include Web app security and network pen‐testing,
exploit development, incident handling and cyber forensic. Being a software
developer earlier, he worked in java, .net, ruby etc. and various domains like
finance, insurance, gaming etc. He was the winner of NULLCON 2010's
hacking challenge.
He is a SANS certified mentor for the course – “Sec 504: Hacker Techniques, Exploits and Incident
Handling”. He also presented in other security conferences like NULLCON, C0C0N, OWASP, ISACA
etc. Tamaghna is one of the core members of NULL security community, he facilitates
Chennai/Bangalore NULL Chapter, a frequent speaker of NULL and OWASP meets, conducted
multiple hacking workshops in NULL HUMLA, Bangalore. He is an active member of security
communities like honeynet, NAISG, DSCI, Clubhack etc. He also contributed to security magazines
like Clubhack and ISACA journal. He has achieved various other certifications like Cyber Crime
Investigation, Diploma in Cyber Law etc.
Talks by Tamaghna:
 “Network Forensic” at Ground Zero Summit, 2013 (www.g0s.org)
 “Web Application Security” at ISACA Bangalore 2013
 “ “Public Exploit Held in Private” at OWASP Conference Delhi 2012 (www.2012.owasp.in)
 “Client Side Exploits using PDF” at C0C0N Cochin 2010 (http://is-ra.org/c0c0n/)
 “JSON Fuzzing” at NULLCON Goa 2011(www.nullcon.net)
 “Practical Exploitation” at ISACA Bangalore Chapter 2011
 Information Security, Past, Present and Future” at Amrita College Cochin 2012
Trainings/workshops by Tamaghna:
 Network Forensics : 1 day workshop at Ground Zero Summit, 2013 (www.g0s.org)
 Network Forensics : 1 day workshop at C0C0N Trivandrum September 2013 (http://is-
ra.org/c0c0n/)
 Hackers Versus Developers: 1 day workshop at Clubhack Pune December 2012
(http://www.clubhack.com/)
 Basics of Web Security: 1 day workshop at Payatu/TestYantra Bangalore November 2012
 Basics of Web Hacking: 1 day workshop at Amrita College Cochin September 2012
 Network Forensic: 1 day workshop at C0C0N Trivandrum September 2013 (http://is-
ra.org/c0c0n/)
 Cyber Crime Investigation and Information Warfare : Multiple workshops for govt. agencies
and defense organizations
 Cyber Security Awareness: 1 day workshop in BVB Eng. College, Hubli, 2014
 Ethical Hacking: at Corporates Bangalore 2010-11
Online
 Twitter: @titanlambda
 Linkedin: http://www.linkedin.com/in/tamaghnabasu
 Slideshare: http://slideshare.net/titanlambda/presentations
Section B – Topic details:
1. Title: Crawling Web (Darker Way) for Fun and Profit
2. Brief Description:
Lots of times we talk about targeted attacks where profiling or in general reconnaissance
is critical and most important thing to do very well. Without gathering valid and
appropriate information you might not be able to trigger a successful attack. Here I have
created a web proxy based tool which helps to map the web based on their relevance and
internal references.
What I will be mostly covering in this topic is:
a) How to crawl through web and search through it in automated manner for a
specific interest.
b) How to bypass, or rather postpone captcha which prevents you to do automated
crawling through search engines
c) TOOL RELEASE - Site Mapper : A web proxy based tool which parses through
the web proxy logs after the user is done with browsing and give you hidden,
juicy information about internal servers which the public server refer to while
loading the responses.

More Related Content

What's hot

Lecture #22: Web Privacy & Security Breach
Lecture #22: Web Privacy & Security BreachLecture #22: Web Privacy & Security Breach
Lecture #22: Web Privacy & Security Breach
Dr. Ramchandra Mangrulkar
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password Protection
Nikhil D
 
Social media security
Social media securitySocial media security
Social media security
n|u - The Open Security Community
 
Web security presentation
Web security presentationWeb security presentation
Web security presentation
John Staveley
 
Attack chaining for web exploitation
Attack chaining for web exploitationAttack chaining for web exploitation
Attack chaining for web exploitation
n|u - The Open Security Community
 
Cyber Threats
Cyber ThreatsCyber Threats
Cyber Threats
JettySudeepthi
 
Phishing Attacks - Are You Ready to Respond?
Phishing Attacks - Are You Ready to Respond?Phishing Attacks - Are You Ready to Respond?
Phishing Attacks - Are You Ready to Respond?
Splunk
 

What's hot (7)

Lecture #22: Web Privacy & Security Breach
Lecture #22: Web Privacy & Security BreachLecture #22: Web Privacy & Security Breach
Lecture #22: Web Privacy & Security Breach
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password Protection
 
Social media security
Social media securitySocial media security
Social media security
 
Web security presentation
Web security presentationWeb security presentation
Web security presentation
 
Attack chaining for web exploitation
Attack chaining for web exploitationAttack chaining for web exploitation
Attack chaining for web exploitation
 
Cyber Threats
Cyber ThreatsCyber Threats
Cyber Threats
 
Phishing Attacks - Are You Ready to Respond?
Phishing Attacks - Are You Ready to Respond?Phishing Attacks - Are You Ready to Respond?
Phishing Attacks - Are You Ready to Respond?
 

Viewers also liked

Info sec concept paper-Ahmed.Ragab
Info sec concept paper-Ahmed.RagabInfo sec concept paper-Ahmed.Ragab
Info sec concept paper-Ahmed.Ragab
promediakw
 
Info sec concept paper-ahmed.ragab
Info sec concept paper-ahmed.ragabInfo sec concept paper-ahmed.ragab
Info sec concept paper-ahmed.ragabpromediakw
 
Mr. Tamanghana Basu - crawling web (darker way) for fun and profit
Mr. Tamanghana Basu - crawling web (darker way) for fun and profitMr. Tamanghana Basu - crawling web (darker way) for fun and profit
Mr. Tamanghana Basu - crawling web (darker way) for fun and profit
promediakw
 
Communication process with practical example
Communication process with practical exampleCommunication process with practical example
Communication process with practical example
Mohammad Yousif
 
Dr. Ziyad Salloum - Geographical Passwords
Dr. Ziyad Salloum - Geographical PasswordsDr. Ziyad Salloum - Geographical Passwords
Dr. Ziyad Salloum - Geographical Passwords
promediakw
 
Mr. Tamer el - Bahey - Leveraging open source intelligence v1.1
Mr. Tamer el - Bahey - Leveraging open source intelligence v1.1Mr. Tamer el - Bahey - Leveraging open source intelligence v1.1
Mr. Tamer el - Bahey - Leveraging open source intelligence v1.1
promediakw
 
محمد العوفي - تنمية الموارد البشرية الخليجية كمدخل استراتيجي لتحقيق ثروة
  محمد العوفي - تنمية الموارد البشرية الخليجية كمدخل استراتيجي لتحقيق ثروة  محمد العوفي - تنمية الموارد البشرية الخليجية كمدخل استراتيجي لتحقيق ثروة
محمد العوفي - تنمية الموارد البشرية الخليجية كمدخل استراتيجي لتحقيق ثروة
promediakw
 
Eng. salman zafar - Concept of zero wastes and role of material recovery faci...
Eng. salman zafar - Concept of zero wastes and role of material recovery faci...Eng. salman zafar - Concept of zero wastes and role of material recovery faci...
Eng. salman zafar - Concept of zero wastes and role of material recovery faci...
promediakw
 
Dr. S. Neelamani - Scrap tires as wave barriers in the marine environmnet ana...
Dr. S. Neelamani - Scrap tires as wave barriers in the marine environmnet ana...Dr. S. Neelamani - Scrap tires as wave barriers in the marine environmnet ana...
Dr. S. Neelamani - Scrap tires as wave barriers in the marine environmnet ana...
promediakw
 
Dr shirish naik - Decentralized wastewater treatment systems
Dr shirish naik - Decentralized wastewater treatment systemsDr shirish naik - Decentralized wastewater treatment systems
Dr shirish naik - Decentralized wastewater treatment systems
promediakw
 
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
promediakw
 
Dr. Faten Al-Attar - Green building and waste management
Dr. Faten Al-Attar - Green building and waste managementDr. Faten Al-Attar - Green building and waste management
Dr. Faten Al-Attar - Green building and waste management
promediakw
 
أمل الرشدان -التحسين المستمر بروميديا
  أمل الرشدان -التحسين المستمر بروميديا  أمل الرشدان -التحسين المستمر بروميديا
أمل الرشدان -التحسين المستمر بروميديا
promediakw
 
وليد حمود ورقة الأمانة العامة
  وليد حمود ورقة الأمانة العامة  وليد حمود ورقة الأمانة العامة
وليد حمود ورقة الأمانة العامة
promediakw
 
Eng. ch. rama krushna chary drilling waste management
Eng. ch. rama krushna chary  drilling waste managementEng. ch. rama krushna chary  drilling waste management
Eng. ch. rama krushna chary drilling waste management
promediakw
 
إنجح في التوظيف ميلاد حدشيتي
إنجح في التوظيف  ميلاد حدشيتيإنجح في التوظيف  ميلاد حدشيتي
إنجح في التوظيف ميلاد حدشيتي
promediakw
 
د. محمد كمال
د. محمد كمال د. محمد كمال
د. محمد كمال
promediakw
 
2د. محمد كمال
2د. محمد كمال 2د. محمد كمال
2د. محمد كمال
promediakw
 
Dr. Ahmad Abdul Hay Agwa - Offshore drilling waste treatments & risk manageme...
Dr. Ahmad Abdul Hay Agwa - Offshore drilling waste treatments & risk manageme...Dr. Ahmad Abdul Hay Agwa - Offshore drilling waste treatments & risk manageme...
Dr. Ahmad Abdul Hay Agwa - Offshore drilling waste treatments & risk manageme...
promediakw
 
ورقة عمل المؤتمر الخليجي الثاني بالكويت تقديم دكتور عنتر سليمان
ورقة عمل المؤتمر الخليجي الثاني بالكويت تقديم دكتور عنتر سليمانورقة عمل المؤتمر الخليجي الثاني بالكويت تقديم دكتور عنتر سليمان
ورقة عمل المؤتمر الخليجي الثاني بالكويت تقديم دكتور عنتر سليمان
promediakw
 

Viewers also liked (20)

Info sec concept paper-Ahmed.Ragab
Info sec concept paper-Ahmed.RagabInfo sec concept paper-Ahmed.Ragab
Info sec concept paper-Ahmed.Ragab
 
Info sec concept paper-ahmed.ragab
Info sec concept paper-ahmed.ragabInfo sec concept paper-ahmed.ragab
Info sec concept paper-ahmed.ragab
 
Mr. Tamanghana Basu - crawling web (darker way) for fun and profit
Mr. Tamanghana Basu - crawling web (darker way) for fun and profitMr. Tamanghana Basu - crawling web (darker way) for fun and profit
Mr. Tamanghana Basu - crawling web (darker way) for fun and profit
 
Communication process with practical example
Communication process with practical exampleCommunication process with practical example
Communication process with practical example
 
Dr. Ziyad Salloum - Geographical Passwords
Dr. Ziyad Salloum - Geographical PasswordsDr. Ziyad Salloum - Geographical Passwords
Dr. Ziyad Salloum - Geographical Passwords
 
Mr. Tamer el - Bahey - Leveraging open source intelligence v1.1
Mr. Tamer el - Bahey - Leveraging open source intelligence v1.1Mr. Tamer el - Bahey - Leveraging open source intelligence v1.1
Mr. Tamer el - Bahey - Leveraging open source intelligence v1.1
 
محمد العوفي - تنمية الموارد البشرية الخليجية كمدخل استراتيجي لتحقيق ثروة
  محمد العوفي - تنمية الموارد البشرية الخليجية كمدخل استراتيجي لتحقيق ثروة  محمد العوفي - تنمية الموارد البشرية الخليجية كمدخل استراتيجي لتحقيق ثروة
محمد العوفي - تنمية الموارد البشرية الخليجية كمدخل استراتيجي لتحقيق ثروة
 
Eng. salman zafar - Concept of zero wastes and role of material recovery faci...
Eng. salman zafar - Concept of zero wastes and role of material recovery faci...Eng. salman zafar - Concept of zero wastes and role of material recovery faci...
Eng. salman zafar - Concept of zero wastes and role of material recovery faci...
 
Dr. S. Neelamani - Scrap tires as wave barriers in the marine environmnet ana...
Dr. S. Neelamani - Scrap tires as wave barriers in the marine environmnet ana...Dr. S. Neelamani - Scrap tires as wave barriers in the marine environmnet ana...
Dr. S. Neelamani - Scrap tires as wave barriers in the marine environmnet ana...
 
Dr shirish naik - Decentralized wastewater treatment systems
Dr shirish naik - Decentralized wastewater treatment systemsDr shirish naik - Decentralized wastewater treatment systems
Dr shirish naik - Decentralized wastewater treatment systems
 
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
 
Dr. Faten Al-Attar - Green building and waste management
Dr. Faten Al-Attar - Green building and waste managementDr. Faten Al-Attar - Green building and waste management
Dr. Faten Al-Attar - Green building and waste management
 
أمل الرشدان -التحسين المستمر بروميديا
  أمل الرشدان -التحسين المستمر بروميديا  أمل الرشدان -التحسين المستمر بروميديا
أمل الرشدان -التحسين المستمر بروميديا
 
وليد حمود ورقة الأمانة العامة
  وليد حمود ورقة الأمانة العامة  وليد حمود ورقة الأمانة العامة
وليد حمود ورقة الأمانة العامة
 
Eng. ch. rama krushna chary drilling waste management
Eng. ch. rama krushna chary  drilling waste managementEng. ch. rama krushna chary  drilling waste management
Eng. ch. rama krushna chary drilling waste management
 
إنجح في التوظيف ميلاد حدشيتي
إنجح في التوظيف  ميلاد حدشيتيإنجح في التوظيف  ميلاد حدشيتي
إنجح في التوظيف ميلاد حدشيتي
 
د. محمد كمال
د. محمد كمال د. محمد كمال
د. محمد كمال
 
2د. محمد كمال
2د. محمد كمال 2د. محمد كمال
2د. محمد كمال
 
Dr. Ahmad Abdul Hay Agwa - Offshore drilling waste treatments & risk manageme...
Dr. Ahmad Abdul Hay Agwa - Offshore drilling waste treatments & risk manageme...Dr. Ahmad Abdul Hay Agwa - Offshore drilling waste treatments & risk manageme...
Dr. Ahmad Abdul Hay Agwa - Offshore drilling waste treatments & risk manageme...
 
ورقة عمل المؤتمر الخليجي الثاني بالكويت تقديم دكتور عنتر سليمان
ورقة عمل المؤتمر الخليجي الثاني بالكويت تقديم دكتور عنتر سليمانورقة عمل المؤتمر الخليجي الثاني بالكويت تقديم دكتور عنتر سليمان
ورقة عمل المؤتمر الخليجي الثاني بالكويت تقديم دكتور عنتر سليمان
 

Similar to Talk proposal crawling web (darker way) for fun and profit

So... you want to be a security consultant
So... you want to be a security consultant So... you want to be a security consultant
So... you want to be a security consultant abnmi
 
Cyber Security Workshop @SPIT- 3rd October 2015
Cyber Security Workshop @SPIT- 3rd October 2015Cyber Security Workshop @SPIT- 3rd October 2015
Cyber Security Workshop @SPIT- 3rd October 2015
Nilesh Sapariya
 
Why do women love chasing down bad guys?
Why do women love chasing down bad guys? Why do women love chasing down bad guys?
Why do women love chasing down bad guys?
SITA
 
Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019
Kimberley Dray
 
Internet Security Essay
Internet Security EssayInternet Security Essay
Internet Security Essay
Best Online Paper Writing Service
 
ISACA TT Training Week Course Outline 2013 (final)
ISACA TT Training Week Course Outline 2013 (final)ISACA TT Training Week Course Outline 2013 (final)
ISACA TT Training Week Course Outline 2013 (final)tntsa1972
 
Internet and PC safety - for CIS PTA - 19 Jan 2011
Internet and PC safety - for CIS PTA - 19 Jan 2011Internet and PC safety - for CIS PTA - 19 Jan 2011
Internet and PC safety - for CIS PTA - 19 Jan 2011
PasocoPteLtd
 
Secure Application Development Training
Secure Application Development TrainingSecure Application Development Training
Secure Application Development Trainingpivotalsecurity
 
Seceon 2023 Cybersecurity Predictions by Seceon Thought Leadership - Seceon.pptx
Seceon 2023 Cybersecurity Predictions by Seceon Thought Leadership - Seceon.pptxSeceon 2023 Cybersecurity Predictions by Seceon Thought Leadership - Seceon.pptx
Seceon 2023 Cybersecurity Predictions by Seceon Thought Leadership - Seceon.pptx
CompanySeceon
 
CYBER SECURITY WORKSHOP (Only For Educational Purpose)
CYBER SECURITY WORKSHOP (Only For Educational Purpose)CYBER SECURITY WORKSHOP (Only For Educational Purpose)
CYBER SECURITY WORKSHOP (Only For Educational Purpose)
Chanaka Lasantha
 
Who owns Software Security
Who owns Software SecurityWho owns Software Security
Who owns Software Security
devObjective
 
Who Owns Software Security?
Who Owns Software Security?Who Owns Software Security?
Who Owns Software Security?
ColdFusionConference
 
Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021
Amrit Chhetri
 
Role Of Forensic Triage In Cyber Security Trends 2022-UPDATED.pptx
Role Of Forensic Triage In Cyber Security Trends 2022-UPDATED.pptxRole Of Forensic Triage In Cyber Security Trends 2022-UPDATED.pptx
Role Of Forensic Triage In Cyber Security Trends 2022-UPDATED.pptx
Amrit Chhetri
 
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
Avansa Mid- en Zuidwest
 
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...
Cloud Security Alliance Lviv Chapter
 

Similar to Talk proposal crawling web (darker way) for fun and profit (20)

Contents
ContentsContents
Contents
 
So... you want to be a security consultant
So... you want to be a security consultant So... you want to be a security consultant
So... you want to be a security consultant
 
Cyber Security Workshop @SPIT- 3rd October 2015
Cyber Security Workshop @SPIT- 3rd October 2015Cyber Security Workshop @SPIT- 3rd October 2015
Cyber Security Workshop @SPIT- 3rd October 2015
 
Security Resume
Security ResumeSecurity Resume
Security Resume
 
Why do women love chasing down bad guys?
Why do women love chasing down bad guys? Why do women love chasing down bad guys?
Why do women love chasing down bad guys?
 
Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019
 
Internet Security Essay
Internet Security EssayInternet Security Essay
Internet Security Essay
 
ISACA TT Training Week Course Outline 2013 (final)
ISACA TT Training Week Course Outline 2013 (final)ISACA TT Training Week Course Outline 2013 (final)
ISACA TT Training Week Course Outline 2013 (final)
 
Internet and PC safety - for CIS PTA - 19 Jan 2011
Internet and PC safety - for CIS PTA - 19 Jan 2011Internet and PC safety - for CIS PTA - 19 Jan 2011
Internet and PC safety - for CIS PTA - 19 Jan 2011
 
Secure Application Development Training
Secure Application Development TrainingSecure Application Development Training
Secure Application Development Training
 
Null who and_where (1)
Null who and_where (1)Null who and_where (1)
Null who and_where (1)
 
Seceon 2023 Cybersecurity Predictions by Seceon Thought Leadership - Seceon.pptx
Seceon 2023 Cybersecurity Predictions by Seceon Thought Leadership - Seceon.pptxSeceon 2023 Cybersecurity Predictions by Seceon Thought Leadership - Seceon.pptx
Seceon 2023 Cybersecurity Predictions by Seceon Thought Leadership - Seceon.pptx
 
CYBER SECURITY WORKSHOP (Only For Educational Purpose)
CYBER SECURITY WORKSHOP (Only For Educational Purpose)CYBER SECURITY WORKSHOP (Only For Educational Purpose)
CYBER SECURITY WORKSHOP (Only For Educational Purpose)
 
Who owns Software Security
Who owns Software SecurityWho owns Software Security
Who owns Software Security
 
Who Owns Software Security?
Who Owns Software Security?Who Owns Software Security?
Who Owns Software Security?
 
Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021
 
Mohammed Alghenaim CV
Mohammed Alghenaim CVMohammed Alghenaim CV
Mohammed Alghenaim CV
 
Role Of Forensic Triage In Cyber Security Trends 2022-UPDATED.pptx
Role Of Forensic Triage In Cyber Security Trends 2022-UPDATED.pptxRole Of Forensic Triage In Cyber Security Trends 2022-UPDATED.pptx
Role Of Forensic Triage In Cyber Security Trends 2022-UPDATED.pptx
 
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
 
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...
 

More from promediakw

دور التدريب فى تحقيق الميزة التنافسية محمد عمرو صادق
دور التدريب فى تحقيق الميزة التنافسية  محمد عمرو صادق دور التدريب فى تحقيق الميزة التنافسية  محمد عمرو صادق
دور التدريب فى تحقيق الميزة التنافسية محمد عمرو صادق
promediakw
 
الكوتشنج الوظيفي مؤتمر الموارد البشرية الخليجي- أحمد مجدي
الكوتشنج الوظيفي مؤتمر الموارد البشرية الخليجي- أحمد مجدي الكوتشنج الوظيفي مؤتمر الموارد البشرية الخليجي- أحمد مجدي
الكوتشنج الوظيفي مؤتمر الموارد البشرية الخليجي- أحمد مجدي
promediakw
 
بناء الثقافة الوظيفية - محمد كمال
  بناء الثقافة الوظيفية - محمد كمال   بناء الثقافة الوظيفية - محمد كمال
بناء الثقافة الوظيفية - محمد كمال
promediakw
 
مؤتمر النفايات
مؤتمر النفاياتمؤتمر النفايات
مؤتمر النفايات
promediakw
 
Dr. Abdul Rehman Khan - Rehabilitation of an industrial mercury contaminated ...
Dr. Abdul Rehman Khan - Rehabilitation of an industrial mercury contaminated ...Dr. Abdul Rehman Khan - Rehabilitation of an industrial mercury contaminated ...
Dr. Abdul Rehman Khan - Rehabilitation of an industrial mercury contaminated ...
promediakw
 
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
promediakw
 
Mr. Naveed Ahmed - Security threats & gaps in kuwait
Mr. Naveed Ahmed - Security threats & gaps in kuwaitMr. Naveed Ahmed - Security threats & gaps in kuwait
Mr. Naveed Ahmed - Security threats & gaps in kuwait
promediakw
 
Mr. Roland Abi Najem - Security
Mr. Roland Abi Najem - SecurityMr. Roland Abi Najem - Security
Mr. Roland Abi Najem - Security
promediakw
 
Dr. Maher salameh - new age of data analytics
Dr. Maher salameh   - new age of data analyticsDr. Maher salameh   - new age of data analytics
Dr. Maher salameh - new age of data analytics
promediakw
 
Dr. Omar Ali Alibrahim - Ssl talk
Dr. Omar Ali Alibrahim - Ssl talkDr. Omar Ali Alibrahim - Ssl talk
Dr. Omar Ali Alibrahim - Ssl talk
promediakw
 
Dr. Saleh Al - Najem - Social Media Ananlytics for national_security
Dr. Saleh Al - Najem - Social Media Ananlytics for national_securityDr. Saleh Al - Najem - Social Media Ananlytics for national_security
Dr. Saleh Al - Najem - Social Media Ananlytics for national_security
promediakw
 
Dr. Basel Al - Othman - Live mobilehacking
Dr. Basel Al - Othman - Live mobilehackingDr. Basel Al - Othman - Live mobilehacking
Dr. Basel Al - Othman - Live mobilehacking
promediakw
 
Dr. Almerindo Graziano - log maturity-compressed
Dr. Almerindo Graziano - log maturity-compressedDr. Almerindo Graziano - log maturity-compressed
Dr. Almerindo Graziano - log maturity-compressed
promediakw
 

More from promediakw (13)

دور التدريب فى تحقيق الميزة التنافسية محمد عمرو صادق
دور التدريب فى تحقيق الميزة التنافسية  محمد عمرو صادق دور التدريب فى تحقيق الميزة التنافسية  محمد عمرو صادق
دور التدريب فى تحقيق الميزة التنافسية محمد عمرو صادق
 
الكوتشنج الوظيفي مؤتمر الموارد البشرية الخليجي- أحمد مجدي
الكوتشنج الوظيفي مؤتمر الموارد البشرية الخليجي- أحمد مجدي الكوتشنج الوظيفي مؤتمر الموارد البشرية الخليجي- أحمد مجدي
الكوتشنج الوظيفي مؤتمر الموارد البشرية الخليجي- أحمد مجدي
 
بناء الثقافة الوظيفية - محمد كمال
  بناء الثقافة الوظيفية - محمد كمال   بناء الثقافة الوظيفية - محمد كمال
بناء الثقافة الوظيفية - محمد كمال
 
مؤتمر النفايات
مؤتمر النفاياتمؤتمر النفايات
مؤتمر النفايات
 
Dr. Abdul Rehman Khan - Rehabilitation of an industrial mercury contaminated ...
Dr. Abdul Rehman Khan - Rehabilitation of an industrial mercury contaminated ...Dr. Abdul Rehman Khan - Rehabilitation of an industrial mercury contaminated ...
Dr. Abdul Rehman Khan - Rehabilitation of an industrial mercury contaminated ...
 
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
 
Mr. Naveed Ahmed - Security threats & gaps in kuwait
Mr. Naveed Ahmed - Security threats & gaps in kuwaitMr. Naveed Ahmed - Security threats & gaps in kuwait
Mr. Naveed Ahmed - Security threats & gaps in kuwait
 
Mr. Roland Abi Najem - Security
Mr. Roland Abi Najem - SecurityMr. Roland Abi Najem - Security
Mr. Roland Abi Najem - Security
 
Dr. Maher salameh - new age of data analytics
Dr. Maher salameh   - new age of data analyticsDr. Maher salameh   - new age of data analytics
Dr. Maher salameh - new age of data analytics
 
Dr. Omar Ali Alibrahim - Ssl talk
Dr. Omar Ali Alibrahim - Ssl talkDr. Omar Ali Alibrahim - Ssl talk
Dr. Omar Ali Alibrahim - Ssl talk
 
Dr. Saleh Al - Najem - Social Media Ananlytics for national_security
Dr. Saleh Al - Najem - Social Media Ananlytics for national_securityDr. Saleh Al - Najem - Social Media Ananlytics for national_security
Dr. Saleh Al - Najem - Social Media Ananlytics for national_security
 
Dr. Basel Al - Othman - Live mobilehacking
Dr. Basel Al - Othman - Live mobilehackingDr. Basel Al - Othman - Live mobilehacking
Dr. Basel Al - Othman - Live mobilehacking
 
Dr. Almerindo Graziano - log maturity-compressed
Dr. Almerindo Graziano - log maturity-compressedDr. Almerindo Graziano - log maturity-compressed
Dr. Almerindo Graziano - log maturity-compressed
 

Talk proposal crawling web (darker way) for fun and profit

  • 1. Crawling Web (Darker Way) for Fun and Profit Section A - Personal Data: 1. Name: Tamaghna Basu 2. Email Address: tamaghna.basu@gmail.com 3. Cell phone: +91 9880307435 4. Brief biography: Tamaghna Basu, OSCP, GCIH, RHCE, CEH, ECSA, co-founder of www.weekendsecurity.org, is a security researcher at heart and has been his main areas of research include Web app security and network pen‐testing, exploit development, incident handling and cyber forensic. Being a software developer earlier, he worked in java, .net, ruby etc. and various domains like finance, insurance, gaming etc. He was the winner of NULLCON 2010's hacking challenge. He is a SANS certified mentor for the course – “Sec 504: Hacker Techniques, Exploits and Incident Handling”. He also presented in other security conferences like NULLCON, C0C0N, OWASP, ISACA etc. Tamaghna is one of the core members of NULL security community, he facilitates Chennai/Bangalore NULL Chapter, a frequent speaker of NULL and OWASP meets, conducted multiple hacking workshops in NULL HUMLA, Bangalore. He is an active member of security communities like honeynet, NAISG, DSCI, Clubhack etc. He also contributed to security magazines like Clubhack and ISACA journal. He has achieved various other certifications like Cyber Crime Investigation, Diploma in Cyber Law etc. Talks by Tamaghna:  “Network Forensic” at Ground Zero Summit, 2013 (www.g0s.org)  “Web Application Security” at ISACA Bangalore 2013  “ “Public Exploit Held in Private” at OWASP Conference Delhi 2012 (www.2012.owasp.in)  “Client Side Exploits using PDF” at C0C0N Cochin 2010 (http://is-ra.org/c0c0n/)  “JSON Fuzzing” at NULLCON Goa 2011(www.nullcon.net)  “Practical Exploitation” at ISACA Bangalore Chapter 2011  Information Security, Past, Present and Future” at Amrita College Cochin 2012 Trainings/workshops by Tamaghna:  Network Forensics : 1 day workshop at Ground Zero Summit, 2013 (www.g0s.org)  Network Forensics : 1 day workshop at C0C0N Trivandrum September 2013 (http://is- ra.org/c0c0n/)  Hackers Versus Developers: 1 day workshop at Clubhack Pune December 2012 (http://www.clubhack.com/)  Basics of Web Security: 1 day workshop at Payatu/TestYantra Bangalore November 2012  Basics of Web Hacking: 1 day workshop at Amrita College Cochin September 2012  Network Forensic: 1 day workshop at C0C0N Trivandrum September 2013 (http://is- ra.org/c0c0n/)  Cyber Crime Investigation and Information Warfare : Multiple workshops for govt. agencies and defense organizations
  • 2.  Cyber Security Awareness: 1 day workshop in BVB Eng. College, Hubli, 2014  Ethical Hacking: at Corporates Bangalore 2010-11 Online  Twitter: @titanlambda  Linkedin: http://www.linkedin.com/in/tamaghnabasu  Slideshare: http://slideshare.net/titanlambda/presentations Section B – Topic details: 1. Title: Crawling Web (Darker Way) for Fun and Profit 2. Brief Description: Lots of times we talk about targeted attacks where profiling or in general reconnaissance is critical and most important thing to do very well. Without gathering valid and appropriate information you might not be able to trigger a successful attack. Here I have created a web proxy based tool which helps to map the web based on their relevance and internal references. What I will be mostly covering in this topic is: a) How to crawl through web and search through it in automated manner for a specific interest. b) How to bypass, or rather postpone captcha which prevents you to do automated crawling through search engines c) TOOL RELEASE - Site Mapper : A web proxy based tool which parses through the web proxy logs after the user is done with browsing and give you hidden, juicy information about internal servers which the public server refer to while loading the responses.