Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
Getting Started in Infosec
Search
skypatil
April 15, 2022
Technology
0
45
Getting Started in Infosec
Getting Started in Infosec
skypatil
April 15, 2022
Tweet
Share
More Decks by skypatil
See All by skypatil
How to get started into BUG BOUNTIES
skypatil
0
140
Other Decks in Technology
See All in Technology
今日から使える AWS Step Functions 小技集 / AWS Step Functions Tips
kinunori
7
650
内部品質・フロー効率・コミュニケーションコストを悪化させ現場を苦しめかねない16の組織設計アンチパターン[超簡易版] / 16 Organization Design Anti-Patterns for Software Development
mtx2s
2
200
Post-AIコーディング時代のエンジニア生存戦略
shinoyu
0
250
us-east-1 の障害が 起きると なぜ ソワソワするのか
miu_crescent
PRO
2
790
開発者から見たLLMの進化 202511
ny7760
1
170
Black Hat USA 2025 Recap ~ クラウドセキュリティ編 ~
kyohmizu
0
520
メタプログラミングRuby問題集の活用
willnet
2
770
Introducing RFC9111 / YAPC::Fukuoka 2025
k1low
1
210
コード1ミリもわからないけど Claude CodeでFigjamプラグインを作った話
abokadotyann
1
160
Pythonで構築する全国市町村ナレッジグラフ: GraphRAGを用いた意味的地域検索への応用
negi111111
8
3.4k
LINE公式アカウントの技術スタックと開発の裏側
lycorptech_jp
PRO
0
350
開発者が知っておきたい複雑さの正体/where-the-complexity-comes-from
hanhan1978
6
2.4k
Featured
See All Featured
RailsConf 2023
tenderlove
30
1.3k
For a Future-Friendly Web
brad_frost
180
10k
Intergalactic Javascript Robots from Outer Space
tanoku
273
27k
Distributed Sagas: A Protocol for Coordinating Microservices
caitiem20
333
22k
A designer walks into a library…
pauljervisheath
210
24k
Exploring the Power of Turbo Streams & Action Cable | RailsConf2023
kevinliebholz
36
6.1k
Visualizing Your Data: Incorporating Mongo into Loggly Infrastructure
mongodb
48
9.8k
Balancing Empowerment & Direction
lara
5
740
The Power of CSS Pseudo Elements
geoffreycrofte
80
6k
Docker and Python
trallard
46
3.6k
Why Our Code Smells
bkeepers
PRO
340
57k
Creating an realtime collaboration tool: Agile Flush - .NET Oxford
marcduiker
34
2.3k
Transcript
Akash Patil GETTING STARTED IN INFOSEC Starting our journey
Who am i? Hackerone, Bugcrowd & YesWeHack and VDPS Ethical
Hacker / Bug Bounty Hunter Qseap Infotech Pvt Ltd Information Security Consultant Professional Keyboard Player Graphic Designer
Item 1 Item 2 Item 3 Item 4 Item 5
50 40 30 20 10 0 What is Information Security Becoming a bigger role in daily life. Protecting information assets from unauthorized access, modification, disruption, or any other Unwanted behaviour
Categories of Information Security Network Security Application Security Web Thick-Client
Mobile Security Infrastructure Security Physical Security Cloud Security Automative Security
None
HOW DO I GET INVOLVED? Lets Start
The Hacker Playbook 1 Web Application 101 2 The Web
Application Hackers Handbook 3 Burp Suite Essentials 4 Books
The Hacker News 1 Youtube 2 Google 3 Facebook 4
News
Medium 1 PentesterLand 2 Bug Reader 3 Security Blogs 4
Blogs/Podcasts
1 2 3 4 Create Account Follow peoples in the
industry Participate in the discussion Twitter
Information Security Community The people involved in Information Security Work
for many different companies Collaborate Network Share Information Educate
Certifications CompTIA A+ Network+ Security+ Offensive Security CISSP /eLearn /
TCM OSCP/OSWE eJPT eWAPT PNPT
Overview of Penetration Testing Timeline Given time to test the
application Grey Box / Black Box / White Box Provided by the Client Report Genration Report Writing
Tools Basic Tools Burpsuite Linux Open Source
@skypatil98 twitter
[email protected]
Email Address linkedin.com/in/akashpatil98/ Linkedin Thank you! Feel
free to approach us if you have any questions. https://akashpatil.me Website