I work as a security consultant at Payatu Technologies.
A Certified Ethical Hacker and a Licensed Penetration Tester from EC Council.
Member of Null - The open security community, presented talks on various information security related topics and have also conducted hands-on sessions on web application and mobile security. Have provided training on web security and ethical hacking.
Sneha: I work at Payatu Technologies Pvt.Ltd. A Certified Ethical Hacker and a Licensed Penetration Tester from EC Council. Also an active member of null Pune Chapter and have presented talks on various information security related topics during the local null meets(Pune chapter). I have also conducted and attended various seminars/workshops on web security and ethical hacking and also on mobile application security and secure coding.Conducted CTF (Capture the flag) challenges and related workshops.My area of interest lies in Web application and mobile application security,fuzzing, Artificial Intelligence, playing at bug bounty programs. Rutwij: Security Consultant @ Payatu Technologies Pvt. Ltd, Pune. Responsible for performing security assessments of Android/ iOS/ Windows phone/ tablet applications. Active null Pune member. Interest lies in Mobile device security research, mobile application security research, Artificial Intelligence, Neural networks and stuff, conducting and attending technical workshops and conferences, bug bounty programmes, robotics, knowledge gaining and sharing. Non professional interests are trekking, sports, mentoring students at academic level. Cya'll @ FUDCon ! Cheers !
- Android Introduction
- Android Architecture
- Android File system
- Android Security & Kernel
- Linux kernel based protections
- Android OS specific protections
- Permission modules
- Application Components
- Reverse engineering
- ADB- Android Debug Bridge
- SSL pinning bypass
- Signing applications for android
- Penetration testing
- Burp suite (proxy)
- Application hooking using Introspy.
- Exploiting android using Metasploit.
- Application analysis
- Analyze data at rest
- Intercept data
- OWASP Top 10
- Mobile forensics
- Reporting Bugs
- Laptop: Linux environment preferred (BYOD).
- Comfortable with android smartphone or tablet.
- Basic Linux and ADB commands.
- Self-learning and an enthusiastic attitude.
- Rooted android devices/ emulators.
Note: All other tools/apps will be provided during training hours.