Hi All,
Announcing the upcoming OWASP Delhi Chapter May meetup on May 25, 2019 (Saturday) - 10:30 am onwards.
Note - All OWASP chapter meets are free and open to everyone. Prior RSVP is mandatory in order to be allowed to attend the meet.
Note - This is a combined null Delhi and OWASP Delhi meet up
More Details and RSVP here: https://null.co.in/events/601-delhi-null-delhi-meet-25-may-2019-combined-null-owasp-meetup Details: https://www.owasp.org/index.php/Delhi_NCRAgenda:10:30 am - 10:45 am: Introductions and Chapter Updates
10:45 am - 11:00 am:
News Bytes & Discussions on Latest Infosec happenings by Hanut Arora11:00 am - 12:00 pm:
Effective Use of Burp Plugins by Manish Rohilla12:00 pm - 12:15 pm: Networking Breaks
12:15 pm - 01:00 pm:
Wireshark for Network Analysis by Aatish Kunal01:00 pm - 01:30 pm:
Owning your pc from an innocuous USB by Aseem01:30 pm - 01:45 pm: Feedback and Next Meet Discussion
When: May 25, 2019 (Saturday) - 10:30 am onward (Please be on time)
Where: Airtel Center
Plot No 16, Udyog Vihar Phase IV,
Gurgaon - 122001
Landmark: Airtel Office location is Atlas Chowk
Nearest Metro Station:- IFFCO Chowk Metro / MG Road Metro / IndusInd Bank Rapid Metro Station
- Auto available from above Metro Station
Google Maps -
https://goo.gl/9ZBVMw
Abstracts:
-----------------
Effective Use of Burp Plugins by Manish Rohilla: The purpose of the talk is to explain the usage of burp in an effective manner to improve the efficiency of penetration testing.
Following topics will be covered during the session.
Burp Session Handling for automated scans using Macros.
Scanning Individual Parameters
Auto repeater
SQLite
Replicator (Optional)
Logger++
Web Cache Deception
WPScanner
JWT
Domain hunter
and many other relevant extensions...
Wireshark for Network Analysis: The talk would cover the overview of Wireshark. It will be followed by an introduction to its features such as Colorization, display filters, exporting packets. The speaker will be talking about traffic analysis using TCP, DNS, ICMP, DHCP and some advanced features using VOIP analysis, WLAN Analysis and Network Forensics.
Owning your pc from an innocuous USB by Aseem: The Speaker will be addressing the following -
1) What is a Bad USB attack?
2) Attack Vectors: Available hardware and what we are going to use in the demo
3) A brief introduction to HID, Reverse Shells and Metasploit
4) The methodology of rubber ducky attack.
5) Conclude the session by a Demo
thanks