Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
Getting Started in Infosec
Search
skypatil
April 15, 2022
Technology
0
26
Getting Started in Infosec
Getting Started in Infosec
skypatil
April 15, 2022
Tweet
Share
More Decks by skypatil
See All by skypatil
How to get started into BUG BOUNTIES
skypatil
0
93
Other Decks in Technology
See All in Technology
山手線一周のパフォーマンス改善
suzukahr
0
110
FastAPIでのasync defとdefの使い分け
takashi1029
6
1.8k
ITエンジニアとして知っておいてほしい、電子メールという大きな穴
logica0419
2
300
Assisted reorganization of data structures
ennael
PRO
0
210
スクラム導入の舞台裏:QAエンジニアがスクラムマスターになるまで
bubo1201
0
110
【ログ分析勉強会】EDR ログで内部不正を検出できるのか、Copilot に聞いてみた
hssh2_bin
2
270
10Xでのデータ基盤の変遷とこれから: データマネジメントのリアル 〜BtoB企業3社の歩みとこれから〜
10xinc
6
1.2k
たった一人で始めた音楽制作が気がついたら会社公認の部活動になっていた話〜組織の垣根を超えるコラボレーションを実現するには〜 / On-KAG-bu
piyonakajima
0
150
Renovate ではじめる運用レスなライブラリ更新 / 令和最新版 他人に自慢したいヤバいCI/CD LT会 @ yabaibuki.dev #2
ponkio_o
PRO
1
130
Hazard pointers with reference counter
ennael
PRO
0
110
【swonet.conf_】NOCメンバーが語るSTMの実態!! ~ShowNetから若者への贈り物~
shownet
PRO
0
230
つよつよリーダーが 抜けたらどうする? 〜ナビタイムのAgile⽀援組織の変遷〜
navitimejapan
PRO
22
13k
Featured
See All Featured
Bash Introduction
62gerente
608
210k
Atom: Resistance is Futile
akmur
261
25k
The Brand Is Dead. Long Live the Brand.
mthomps
53
38k
Visualization
eitanlees
143
15k
A Philosophy of Restraint
colly
202
16k
Art, The Web, and Tiny UX
lynnandtonic
295
20k
Speed Design
sergeychernyshev
22
460
Statistics for Hackers
jakevdp
796
220k
[RailsConf 2023] Rails as a piece of cake
palkan
49
4.7k
Helping Users Find Their Own Way: Creating Modern Search Experiences
danielanewman
29
2.2k
The Psychology of Web Performance [Beyond Tellerrand 2023]
tammyeverts
38
2.1k
Bootstrapping a Software Product
garrettdimon
PRO
304
110k
Transcript
Akash Patil GETTING STARTED IN INFOSEC Starting our journey
Who am i? Hackerone, Bugcrowd & YesWeHack and VDPS Ethical
Hacker / Bug Bounty Hunter Qseap Infotech Pvt Ltd Information Security Consultant Professional Keyboard Player Graphic Designer
Item 1 Item 2 Item 3 Item 4 Item 5
50 40 30 20 10 0 What is Information Security Becoming a bigger role in daily life. Protecting information assets from unauthorized access, modification, disruption, or any other Unwanted behaviour
Categories of Information Security Network Security Application Security Web Thick-Client
Mobile Security Infrastructure Security Physical Security Cloud Security Automative Security
None
HOW DO I GET INVOLVED? Lets Start
The Hacker Playbook 1 Web Application 101 2 The Web
Application Hackers Handbook 3 Burp Suite Essentials 4 Books
The Hacker News 1 Youtube 2 Google 3 Facebook 4
News
Medium 1 PentesterLand 2 Bug Reader 3 Security Blogs 4
Blogs/Podcasts
1 2 3 4 Create Account Follow peoples in the
industry Participate in the discussion Twitter
Information Security Community The people involved in Information Security Work
for many different companies Collaborate Network Share Information Educate
Certifications CompTIA A+ Network+ Security+ Offensive Security CISSP /eLearn /
TCM OSCP/OSWE eJPT eWAPT PNPT
Overview of Penetration Testing Timeline Given time to test the
application Grey Box / Black Box / White Box Provided by the Client Report Genration Report Writing
Tools Basic Tools Burpsuite Linux Open Source
@skypatil98 twitter
[email protected]
Email Address linkedin.com/in/akashpatil98/ Linkedin Thank you! Feel
free to approach us if you have any questions. https://akashpatil.me Website