- What is DDOS
- Types of DDOS
- How to perform DDOS using httperf, ab, goldeneye slow httpd test analysis of attack
Currently serving as Manager for vulnerability management at one of the largest infrastructure in india i.e Reliance Jio Infocomm Limited, Proven IT-Security specialist with having more than dozen of exploit published online in 0day.today, exploitdb, packetstorm, securityweek, author of few 0day and CVE, Author of K-auth authentication system and I-IPS (software appliance for IPS/IDS for small and large scale organization),Listed in few hall of fames like Apple, Nokia etc, conducted N number of VA/WA/PT for Reputed client, Implemented SIEM/SOC at large Media House, expertise in log analysis, scripting, technical audit, Linux, windows, Areas of interest in Information Security domain are: Buffer Overflows, exploitation, Reverse Engineering, Shell coding, Tool building, Malware analysis and IDS. Active Participant in Null community, designed CTF which was still unbreakable, Earlier working as Sr.Security analyst at network intelligence India Pvt .Ltd prior to security 3 years of extensive experience in administration.
||Security enthusiastic || Love Coding reverse engineering Exploitation || Security analyst || Linux
Starts at Saturday March 14 2015, 12:46 PM. The sessions runs for 29 minutes.