SlideShare une entreprise Scribd logo
1  sur  15
Télécharger pour lire hors ligne
HACKING - BRIDGING THE GAP & GOING
BEYOND TO FIGHT BLACK-HAT
Santhosh Tuppad | Twitter: @santhoshst
I slept at 6 AM this morning & I am still
waking up… Its b33r ;)
SUPER WARNING:
hackingPresentation = {videos: false, pictures:
false, justListeningAndEnjoying: true};
Disclaimers:
#1. What stays here, stays here or dies later.
#2. I am not responsible for how you use this knowledge.
(Don’t mess with me).
#3. I am a super good person on this good planet called
“Earth”. So, believe me.
JUST DO IT: Vote for me with highest points whether you
like it or not. Or else… I don’t know!
sh-3.2# whoami
I have been a great liar, a thief, physical
infrastructure breaker, web application hacker,
mobile apps hacker, kiosk machine basher,
black-hat hacker, white-hat hacker, trainer, security
coach and blah blah blah!
● #WouldYouBeOkay
● Would you be okay if your car speed is controlled by malicious
hacker?
● Would you be okay to send heart rate data of your baby
incorrectly to physician? (Man In the Middle)
● Would you be okay if someone takes control of your CCTVs or
Cameras installed in your home? Would you be okay if...
STATE OF SECURITY IN OUR INDUSTRY?
F***ED UP!
Oh Wait! Let’s practice facing the reality
and stop masking the TRUTH.
WE ARE TOTALLY FUCKED UP!
LIVE HACKING DEMONSTRATION…
Shhhhhh… Don’t tell anyone.
Safe1!
Is this a good password?
What do Black Hat Hackers do anyway?
1. They don’t care about why they want to hack
2. They care about why they want to hack
3. They are driven by intrinsic motivation
4. They hold grudges, hatred, love, and many other different
emotions
5. They don’t fear because of their confidence (but they may
get caught)
6. Intuition, Instincts & Mindset are the weapons / tools they
believe in unlike most of the White Hat Hackers
7. They do all different kinds of bullshit, but it is great.
How do we bridge this gap so that we can fight the black-hat
hackers?
● Work on Mindset
● Think Crime
● Watch Border Patrol, Investigation Netflix Episodes, Border
Security, and also make yourself feel like, “Hell yeah, I am a
criminal”. And watch out for the thought process. Warning: It can
be dangerous, but I think you can do it without committing crime.
● Hack your friends account.
● If your inner guidance is guiding you to do something, then just
do it ;) (Warning: Don’t tell people that I told you this. You are
responsible for whatever you do).
OWASP TOP 10 (Go Beyond Them)
● Authentication
● SQL Injection
● Cross Site Scripting (Javascript Injection)
● Cross Site Request Forgery
● Sensitive Information Disclosure
● Components With Known Vulnerabilities
● Authorisation / Access Control
● And 3 more… (Explore them)
Where? OWASP.ORG
Slides were just for namesake anyways…
WohoooooooOooOOOoooOooo…
Thank you very much.
Points to Remember:
● If you want to talk more about “Software Security” or questions
that needs discussion, please catch me anywhere and let’s go to
Smoking Zone.
● There is no “Silver Bullet” for one question, so let’s talk deeper and
challenge.
● I don’t know what else I need to write here… So, I will stop.

Contenu connexe

Similaire à Hacking - Bridging the Gap And Going Beyond to Fight Black-Hat

Fighting Fake News 2018 Version
Fighting Fake News 2018 VersionFighting Fake News 2018 Version
Fighting Fake News 2018 VersionBrian Housand
 
Griffin Been technology Report
Griffin Been technology ReportGriffin Been technology Report
Griffin Been technology ReportMarq2014
 
15 Security & Privacy Tips for Social Media Safety
15 Security & Privacy Tips for Social Media Safety15 Security & Privacy Tips for Social Media Safety
15 Security & Privacy Tips for Social Media SafetyChad Warner
 
An Imposter's Journey Into InfoSec
An Imposter's Journey Into InfoSecAn Imposter's Journey Into InfoSec
An Imposter's Journey Into InfoSecStu Hirst
 
How to defeat impostor syndrome: confessions of a developer
How to defeat impostor syndrome: confessions of a developerHow to defeat impostor syndrome: confessions of a developer
How to defeat impostor syndrome: confessions of a developerMatteo Bruno
 
Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015Jamie Edmondson
 
Bitc risks and remedies in the home-download
Bitc risks and remedies in the home-downloadBitc risks and remedies in the home-download
Bitc risks and remedies in the home-downloadAndrew Poulton
 
Hpai class 19 - influence tactics - 042720
Hpai   class 19 - influence tactics - 042720Hpai   class 19 - influence tactics - 042720
Hpai class 19 - influence tactics - 042720melendez321
 
Be Open To All Feedback For Maximum Results
Be Open To All Feedback For Maximum ResultsBe Open To All Feedback For Maximum Results
Be Open To All Feedback For Maximum ResultsGeorge Hutton
 
6 Ways to Protect Yourself From Online Catfishing Scams.pdf
6 Ways to Protect  Yourself  From Online  Catfishing Scams.pdf6 Ways to Protect  Yourself  From Online  Catfishing Scams.pdf
6 Ways to Protect Yourself From Online Catfishing Scams.pdfSysvoot Antivirus
 
Imposter Syndrome: Overcoming Self-Doubt in Success
Imposter Syndrome: Overcoming Self-Doubt in SuccessImposter Syndrome: Overcoming Self-Doubt in Success
Imposter Syndrome: Overcoming Self-Doubt in SuccessHeather Downing
 
5c Digital Citizenship
5c Digital Citizenship5c Digital Citizenship
5c Digital CitizenshipAnja Junginger
 
Defcon23 Talk Classify Targets To Make Social Engineering Easier To Achieve
Defcon23 Talk Classify Targets To Make Social Engineering Easier To AchieveDefcon23 Talk Classify Targets To Make Social Engineering Easier To Achieve
Defcon23 Talk Classify Targets To Make Social Engineering Easier To AchieveHeng Guan
 
Privacy isdeadgetoveritredux 10.12.2014
Privacy isdeadgetoveritredux 10.12.2014Privacy isdeadgetoveritredux 10.12.2014
Privacy isdeadgetoveritredux 10.12.2014protected7000
 
2008 Cyber Safety
2008 Cyber Safety2008 Cyber Safety
2008 Cyber Safetyreideva
 
WD GL AI Presentation mk2
WD GL  AI Presentation mk2WD GL  AI Presentation mk2
WD GL AI Presentation mk2Marq2014
 
IAC21: Shedding Light on Dark Patterns.pdf
IAC21: Shedding Light on Dark Patterns.pdfIAC21: Shedding Light on Dark Patterns.pdf
IAC21: Shedding Light on Dark Patterns.pdfNoreen Whysel
 

Similaire à Hacking - Bridging the Gap And Going Beyond to Fight Black-Hat (20)

Fighting Fake News 2018 Version
Fighting Fake News 2018 VersionFighting Fake News 2018 Version
Fighting Fake News 2018 Version
 
Griffin Been technology Report
Griffin Been technology ReportGriffin Been technology Report
Griffin Been technology Report
 
15 Security & Privacy Tips for Social Media Safety
15 Security & Privacy Tips for Social Media Safety15 Security & Privacy Tips for Social Media Safety
15 Security & Privacy Tips for Social Media Safety
 
An Imposter's Journey Into InfoSec
An Imposter's Journey Into InfoSecAn Imposter's Journey Into InfoSec
An Imposter's Journey Into InfoSec
 
What Parents Should Know
What Parents Should KnowWhat Parents Should Know
What Parents Should Know
 
How to defeat impostor syndrome: confessions of a developer
How to defeat impostor syndrome: confessions of a developerHow to defeat impostor syndrome: confessions of a developer
How to defeat impostor syndrome: confessions of a developer
 
Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015
 
Bitc risks and remedies in the home-download
Bitc risks and remedies in the home-downloadBitc risks and remedies in the home-download
Bitc risks and remedies in the home-download
 
Hpai class 19 - influence tactics - 042720
Hpai   class 19 - influence tactics - 042720Hpai   class 19 - influence tactics - 042720
Hpai class 19 - influence tactics - 042720
 
Be Open To All Feedback For Maximum Results
Be Open To All Feedback For Maximum ResultsBe Open To All Feedback For Maximum Results
Be Open To All Feedback For Maximum Results
 
6 Ways to Protect Yourself From Online Catfishing Scams.pdf
6 Ways to Protect  Yourself  From Online  Catfishing Scams.pdf6 Ways to Protect  Yourself  From Online  Catfishing Scams.pdf
6 Ways to Protect Yourself From Online Catfishing Scams.pdf
 
03 dllo davidlafontaine
03 dllo davidlafontaine03 dllo davidlafontaine
03 dllo davidlafontaine
 
Imposter Syndrome: Overcoming Self-Doubt in Success
Imposter Syndrome: Overcoming Self-Doubt in SuccessImposter Syndrome: Overcoming Self-Doubt in Success
Imposter Syndrome: Overcoming Self-Doubt in Success
 
5c Digital Citizenship
5c Digital Citizenship5c Digital Citizenship
5c Digital Citizenship
 
Defcon23 Talk Classify Targets To Make Social Engineering Easier To Achieve
Defcon23 Talk Classify Targets To Make Social Engineering Easier To AchieveDefcon23 Talk Classify Targets To Make Social Engineering Easier To Achieve
Defcon23 Talk Classify Targets To Make Social Engineering Easier To Achieve
 
Privacy isdeadgetoveritredux 10.12.2014
Privacy isdeadgetoveritredux 10.12.2014Privacy isdeadgetoveritredux 10.12.2014
Privacy isdeadgetoveritredux 10.12.2014
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
2008 Cyber Safety
2008 Cyber Safety2008 Cyber Safety
2008 Cyber Safety
 
WD GL AI Presentation mk2
WD GL  AI Presentation mk2WD GL  AI Presentation mk2
WD GL AI Presentation mk2
 
IAC21: Shedding Light on Dark Patterns.pdf
IAC21: Shedding Light on Dark Patterns.pdfIAC21: Shedding Light on Dark Patterns.pdf
IAC21: Shedding Light on Dark Patterns.pdf
 

Plus de Santhosh Tuppad

Tools are my servants. and I am the master - By Santhosh Tuppad
Tools are my servants. and I am the master - By  Santhosh TuppadTools are my servants. and I am the master - By  Santhosh Tuppad
Tools are my servants. and I am the master - By Santhosh TuppadSanthosh Tuppad
 
Web and mobile security workshop workbook v1 - by santhosh tuppad
Web and mobile security workshop   workbook v1 - by santhosh tuppadWeb and mobile security workshop   workbook v1 - by santhosh tuppad
Web and mobile security workshop workbook v1 - by santhosh tuppadSanthosh Tuppad
 
ExpoQA 2018 - Why software security has gotten worse? And what can we do abou...
ExpoQA 2018 - Why software security has gotten worse? And what can we do abou...ExpoQA 2018 - Why software security has gotten worse? And what can we do abou...
ExpoQA 2018 - Why software security has gotten worse? And what can we do abou...Santhosh Tuppad
 
Testing IoT Security shouldn't fear you if you have got a hacker mindset - By...
Testing IoT Security shouldn't fear you if you have got a hacker mindset - By...Testing IoT Security shouldn't fear you if you have got a hacker mindset - By...
Testing IoT Security shouldn't fear you if you have got a hacker mindset - By...Santhosh Tuppad
 
The BUZZ Word - Entrepreneur. A Perspective of Santhosh Tuppad
The BUZZ Word - Entrepreneur. A Perspective of Santhosh TuppadThe BUZZ Word - Entrepreneur. A Perspective of Santhosh Tuppad
The BUZZ Word - Entrepreneur. A Perspective of Santhosh TuppadSanthosh Tuppad
 
Agile Testing Days Tutorial (Germany) 2017 - Web and Mobile Security Testing...
Agile Testing Days Tutorial  (Germany) 2017 - Web and Mobile Security Testing...Agile Testing Days Tutorial  (Germany) 2017 - Web and Mobile Security Testing...
Agile Testing Days Tutorial (Germany) 2017 - Web and Mobile Security Testing...Santhosh Tuppad
 
Your users are humans and let's live our promise of securing them
Your users are humans and let's live our promise of securing themYour users are humans and let's live our promise of securing them
Your users are humans and let's live our promise of securing themSanthosh Tuppad
 
Test ideas for Login / Authentication and Login Session
Test ideas for Login / Authentication and Login SessionTest ideas for Login / Authentication and Login Session
Test ideas for Login / Authentication and Login SessionSanthosh Tuppad
 
Passion is a free spirit, only you can cage it.
Passion is a free spirit, only you can cage it.Passion is a free spirit, only you can cage it.
Passion is a free spirit, only you can cage it.Santhosh Tuppad
 
Software Testing - Heuristics Cheat Sheet
Software Testing - Heuristics Cheat SheetSoftware Testing - Heuristics Cheat Sheet
Software Testing - Heuristics Cheat SheetSanthosh Tuppad
 
Santhosh tuppad romanian testing conference 2017 - keynote presentation
Santhosh tuppad   romanian testing conference 2017 - keynote presentationSanthosh tuppad   romanian testing conference 2017 - keynote presentation
Santhosh tuppad romanian testing conference 2017 - keynote presentationSanthosh Tuppad
 
Santhosh Tuppad - Profile - Entrepreneur - Software Tester - Ethical Hacker -...
Santhosh Tuppad - Profile - Entrepreneur - Software Tester - Ethical Hacker -...Santhosh Tuppad - Profile - Entrepreneur - Software Tester - Ethical Hacker -...
Santhosh Tuppad - Profile - Entrepreneur - Software Tester - Ethical Hacker -...Santhosh Tuppad
 
Santhosh tuppad - A journey that is fascinating and will be more fascinating ...
Santhosh tuppad - A journey that is fascinating and will be more fascinating ...Santhosh tuppad - A journey that is fascinating and will be more fascinating ...
Santhosh tuppad - A journey that is fascinating and will be more fascinating ...Santhosh Tuppad
 

Plus de Santhosh Tuppad (13)

Tools are my servants. and I am the master - By Santhosh Tuppad
Tools are my servants. and I am the master - By  Santhosh TuppadTools are my servants. and I am the master - By  Santhosh Tuppad
Tools are my servants. and I am the master - By Santhosh Tuppad
 
Web and mobile security workshop workbook v1 - by santhosh tuppad
Web and mobile security workshop   workbook v1 - by santhosh tuppadWeb and mobile security workshop   workbook v1 - by santhosh tuppad
Web and mobile security workshop workbook v1 - by santhosh tuppad
 
ExpoQA 2018 - Why software security has gotten worse? And what can we do abou...
ExpoQA 2018 - Why software security has gotten worse? And what can we do abou...ExpoQA 2018 - Why software security has gotten worse? And what can we do abou...
ExpoQA 2018 - Why software security has gotten worse? And what can we do abou...
 
Testing IoT Security shouldn't fear you if you have got a hacker mindset - By...
Testing IoT Security shouldn't fear you if you have got a hacker mindset - By...Testing IoT Security shouldn't fear you if you have got a hacker mindset - By...
Testing IoT Security shouldn't fear you if you have got a hacker mindset - By...
 
The BUZZ Word - Entrepreneur. A Perspective of Santhosh Tuppad
The BUZZ Word - Entrepreneur. A Perspective of Santhosh TuppadThe BUZZ Word - Entrepreneur. A Perspective of Santhosh Tuppad
The BUZZ Word - Entrepreneur. A Perspective of Santhosh Tuppad
 
Agile Testing Days Tutorial (Germany) 2017 - Web and Mobile Security Testing...
Agile Testing Days Tutorial  (Germany) 2017 - Web and Mobile Security Testing...Agile Testing Days Tutorial  (Germany) 2017 - Web and Mobile Security Testing...
Agile Testing Days Tutorial (Germany) 2017 - Web and Mobile Security Testing...
 
Your users are humans and let's live our promise of securing them
Your users are humans and let's live our promise of securing themYour users are humans and let's live our promise of securing them
Your users are humans and let's live our promise of securing them
 
Test ideas for Login / Authentication and Login Session
Test ideas for Login / Authentication and Login SessionTest ideas for Login / Authentication and Login Session
Test ideas for Login / Authentication and Login Session
 
Passion is a free spirit, only you can cage it.
Passion is a free spirit, only you can cage it.Passion is a free spirit, only you can cage it.
Passion is a free spirit, only you can cage it.
 
Software Testing - Heuristics Cheat Sheet
Software Testing - Heuristics Cheat SheetSoftware Testing - Heuristics Cheat Sheet
Software Testing - Heuristics Cheat Sheet
 
Santhosh tuppad romanian testing conference 2017 - keynote presentation
Santhosh tuppad   romanian testing conference 2017 - keynote presentationSanthosh tuppad   romanian testing conference 2017 - keynote presentation
Santhosh tuppad romanian testing conference 2017 - keynote presentation
 
Santhosh Tuppad - Profile - Entrepreneur - Software Tester - Ethical Hacker -...
Santhosh Tuppad - Profile - Entrepreneur - Software Tester - Ethical Hacker -...Santhosh Tuppad - Profile - Entrepreneur - Software Tester - Ethical Hacker -...
Santhosh Tuppad - Profile - Entrepreneur - Software Tester - Ethical Hacker -...
 
Santhosh tuppad - A journey that is fascinating and will be more fascinating ...
Santhosh tuppad - A journey that is fascinating and will be more fascinating ...Santhosh tuppad - A journey that is fascinating and will be more fascinating ...
Santhosh tuppad - A journey that is fascinating and will be more fascinating ...
 

Dernier

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 

Dernier (20)

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

Hacking - Bridging the Gap And Going Beyond to Fight Black-Hat

  • 1. HACKING - BRIDGING THE GAP & GOING BEYOND TO FIGHT BLACK-HAT Santhosh Tuppad | Twitter: @santhoshst I slept at 6 AM this morning & I am still waking up… Its b33r ;)
  • 2. SUPER WARNING: hackingPresentation = {videos: false, pictures: false, justListeningAndEnjoying: true};
  • 3. Disclaimers: #1. What stays here, stays here or dies later. #2. I am not responsible for how you use this knowledge. (Don’t mess with me). #3. I am a super good person on this good planet called “Earth”. So, believe me. JUST DO IT: Vote for me with highest points whether you like it or not. Or else… I don’t know!
  • 4. sh-3.2# whoami I have been a great liar, a thief, physical infrastructure breaker, web application hacker, mobile apps hacker, kiosk machine basher, black-hat hacker, white-hat hacker, trainer, security coach and blah blah blah!
  • 5. ● #WouldYouBeOkay ● Would you be okay if your car speed is controlled by malicious hacker? ● Would you be okay to send heart rate data of your baby incorrectly to physician? (Man In the Middle) ● Would you be okay if someone takes control of your CCTVs or Cameras installed in your home? Would you be okay if...
  • 6. STATE OF SECURITY IN OUR INDUSTRY?
  • 8. Oh Wait! Let’s practice facing the reality and stop masking the TRUTH. WE ARE TOTALLY FUCKED UP!
  • 10. Safe1! Is this a good password?
  • 11. What do Black Hat Hackers do anyway? 1. They don’t care about why they want to hack 2. They care about why they want to hack 3. They are driven by intrinsic motivation 4. They hold grudges, hatred, love, and many other different emotions 5. They don’t fear because of their confidence (but they may get caught) 6. Intuition, Instincts & Mindset are the weapons / tools they believe in unlike most of the White Hat Hackers 7. They do all different kinds of bullshit, but it is great.
  • 12. How do we bridge this gap so that we can fight the black-hat hackers? ● Work on Mindset ● Think Crime ● Watch Border Patrol, Investigation Netflix Episodes, Border Security, and also make yourself feel like, “Hell yeah, I am a criminal”. And watch out for the thought process. Warning: It can be dangerous, but I think you can do it without committing crime. ● Hack your friends account. ● If your inner guidance is guiding you to do something, then just do it ;) (Warning: Don’t tell people that I told you this. You are responsible for whatever you do).
  • 13. OWASP TOP 10 (Go Beyond Them) ● Authentication ● SQL Injection ● Cross Site Scripting (Javascript Injection) ● Cross Site Request Forgery ● Sensitive Information Disclosure ● Components With Known Vulnerabilities ● Authorisation / Access Control ● And 3 more… (Explore them) Where? OWASP.ORG
  • 14. Slides were just for namesake anyways… WohoooooooOooOOOoooOooo… Thank you very much.
  • 15. Points to Remember: ● If you want to talk more about “Software Security” or questions that needs discussion, please catch me anywhere and let’s go to Smoking Zone. ● There is no “Silver Bullet” for one question, so let’s talk deeper and challenge. ● I don’t know what else I need to write here… So, I will stop.