Nasim (@noobie_web3) 's Twitter Profile
Nasim

@noobie_web3

cyber security learner

ID: 1176194817346269185

calendar_today23-09-2019 18:01:25

80 Tweet

502 Followers

3,3K Following

Seasides (@seasides_conf) 's Twitter Profile Photo

Have you registered yet for this training on SqlMap by the author and maintainer of SqlMap himself Miroslav Stampar Registrations are open: forms.gle/3uNzXUar7KwKPH… Bug Bounty Village #seasides #infosec

Have you registered yet for this training on SqlMap by the author and maintainer of SqlMap himself <a href="/stamparm/">Miroslav Stampar</a> 

Registrations are open: forms.gle/3uNzXUar7KwKPH…

<a href="/bugbountyvillag/">Bug Bounty Village</a> 

#seasides #infosec
Seasides (@seasides_conf) 's Twitter Profile Photo

We are extremely happy to announce Semgrep as our bronze sponsors. It's an honor for us when security professionals and enterprises' favorite SAST tool chooses to support us.Thank you very much Ella Morales Clint Gibler Isaac Evans

We are extremely happy to announce <a href="/semgrep/">Semgrep</a>  as our bronze sponsors. It's an honor for us when security professionals and enterprises' favorite SAST tool chooses to support us.Thank you very much Ella Morales <a href="/clintgibler/">Clint Gibler</a> <a href="/0xine/">Isaac Evans</a>
Seasides (@seasides_conf) 's Twitter Profile Photo

We are happy to welcome BugDiscover on board as our Bronze sponsor Bugdiscover is a crowd sourced community to secure Indian industries. They provide tailor made solutions to manage Bugbounty programs for organizations A big thanks to the team of Bugdiscover for their support

We are happy to welcome <a href="/bugdiscover_/">BugDiscover</a> on board as our Bronze sponsor

Bugdiscover is a crowd sourced community to secure Indian industries. They provide tailor made solutions to manage Bugbounty programs for organizations

A big thanks to the team of Bugdiscover for their support
Bug Bounty Village (@bugbountyvillag) 's Twitter Profile Photo

We are happy to announce training on Uncovering badness - tracking and tackling domain name abuse by @[email protected]. Register here: forms.gle/9rUyUn1DSaKoPk… #seasides2023 #bugbounty #bugbountyvillage #infosec #cybersecurity #bugbountytips

We are happy to announce training on Uncovering badness - tracking and tackling domain name abuse by <a href="/pswapneel/">@pswapneel@infosec.exchange</a>. 

Register here: forms.gle/9rUyUn1DSaKoPk…

#seasides2023 #bugbounty #bugbountyvillage #infosec #cybersecurity #bugbountytips
Seasides (@seasides_conf) 's Twitter Profile Photo

A good resume is your first step towards a dream job. Read how you can draft a good resume for yourself in the poster attached. Also thank our sponsor Tromzo Harshit Chitalia, Harshil Parikh, Nikhil K. for their support to Seasides. seasides.net/career-booster

A good resume is your first step towards a dream job.

Read how you can draft a good resume for yourself in the poster attached.

Also thank our sponsor <a href="/TromzoSecurity/">Tromzo</a> Harshit Chitalia, Harshil Parikh, Nikhil K. for their support to Seasides.

seasides.net/career-booster
Seasides (@seasides_conf) 's Twitter Profile Photo

We r extremely excited to host an impromptu panel discussion between CISOs and security startup founders. Join us for a candid discussion on why it's difficult for startups to sell security products to CISOs and why CISOs have a tough job evaluating startups.

We r extremely excited to host an impromptu panel discussion between CISOs and security startup founders. Join us for a candid discussion on why it's difficult for startups to sell security products to CISOs and why CISOs have a tough job evaluating startups.
Seasides (@seasides_conf) 's Twitter Profile Photo

If you are looking for some good iOS pentesting tools, you can find them listed in the poster. We would also like to thank our sponsor Enciphers Abhinav Mishra for their support to Seasides. #seasides #infosec

If you are looking for some good iOS pentesting tools, you can find them listed in the poster.

We would also like to thank our sponsor <a href="/EnciphersLabs/">Enciphers</a> <a href="/0ctac0der/">Abhinav Mishra</a> for their support to Seasides.

#seasides #infosec
Seasides (@seasides_conf) 's Twitter Profile Photo

Wonder how TLS works and what is the difference between TLS 1.2 and TLS 1.3 ? Check out the poster attached to know the same. Also thank our sponsor bugcrowd for their support to Seasides. #seasides #infosec

Wonder how TLS works and what is the difference between TLS 1.2 and TLS 1.3 ?
Check out the poster attached to know the same.

Also thank our sponsor <a href="/Bugcrowd/">bugcrowd</a> for their support to Seasides.

#seasides #infosec
Seasides (@seasides_conf) 's Twitter Profile Photo

We can sense excitement amongst you all for the most loved Hardware Hacking Village. From soldering, drone hacking, firmware hacking, pcb, flipper zero, lock picking, 3d printing, ham radio station : You name it, we have it at #Seasides2023 #seasides #infosec

We can sense excitement amongst you all for the most loved Hardware Hacking Village.

From soldering, drone hacking, firmware hacking, pcb, flipper zero, lock picking, 3d printing, ham radio station : You name it, we have it at #Seasides2023 

#seasides #infosec
bugcrowd (@bugcrowd) 's Twitter Profile Photo

Countdown begins! Just 1 week until the #Seasides Infosec Conference, happening Sept 20-22. Bugcrowd is proud to be a sponsor of Seasides! Don't miss out! tinyurl.com/yc578hua #infosec #cybersecurity

Countdown begins! Just 1 week until the #Seasides Infosec Conference, happening Sept 20-22. Bugcrowd is proud to be a sponsor of <a href="/seasides_conf/">Seasides</a>! Don't miss out! tinyurl.com/yc578hua #infosec #cybersecurity
Seasides (@seasides_conf) 's Twitter Profile Photo

Many security professionals consider Appsecco to be their dream company. What could be more fulfilling than working with people like Big Chief Akash Mahajan & Riyaz Walikar. Listen to CEO, Smita has to say about the company & their association with us. youtu.be/ZlRvvgacXgc?fe…

Many security professionals consider <a href="/appseccouk/">Appsecco</a> to be their dream company. What could be more fulfilling  than working with people like <a href="/BigChiefdotcom/">Big Chief</a> <a href="/makash/">Akash Mahajan</a> &amp; <a href="/riyazwalikar/">Riyaz Walikar</a>. Listen to CEO, Smita has to say about the company &amp; their association with us.
youtu.be/ZlRvvgacXgc?fe…
Enciphers (@encipherslabs) 's Twitter Profile Photo

🏄‍♂️🌴 Surf's up, hackers! Get ready to ride the waves of web application hacking like never before at the Seasides Conference in Goa! 🌊🌞 Akarsh & Vikas from Enciphers , the dynamic duo about to drop some serious knowledge bombs in their "Advance Web Application

🏄‍♂️🌴 Surf's up, hackers! Get ready to ride the waves of web application hacking like never before at the <a href="/seasides_conf/">Seasides</a> Conference in Goa! 🌊🌞

Akarsh &amp; Vikas from <a href="/EnciphersLabs/">Enciphers</a> , the dynamic duo about to drop some serious knowledge bombs in their "Advance Web Application
Seasides (@seasides_conf) 's Twitter Profile Photo

Burp Suite is amongst the most useful tools used by security enthusiasts and bug hunters. Read more about some useful extensions of Burp Suite in the poster attached. Also thank our sponsor Compliance Cow for their support to Seasides. #seasides #infosec

Burp Suite is amongst the most useful tools used by security enthusiasts and bug hunters.

Read more about some useful extensions of Burp Suite in the poster attached.

Also thank our sponsor Compliance Cow for their support to Seasides.

#seasides #infosec
Seasides (@seasides_conf) 's Twitter Profile Photo

Unrestricted file upload is a vulnerability that occurs due to insufficient or improper file -type validation controls being implemented prior to files being uploaded. Read more about it in the poster attached. Also thank our sponsor Semgrep Clint Gibler @0xinertiacreep

Unrestricted file upload is a vulnerability that occurs due to insufficient or improper file -type validation controls being implemented prior to files being uploaded.

Read more about it in the poster attached.

Also thank our sponsor <a href="/semgrep/">Semgrep</a> <a href="/clintgibler/">Clint Gibler</a> @0xinertiacreep
Seasides (@seasides_conf) 's Twitter Profile Photo

XML external entity injection (XXE) is a security vulnerability that allows a threat actor to inject unsafe XML entities into a web application that processes XML data. Read more about it in the poster attached. Also thank our sponsor BugDiscover for their support to Seasides.

XML external entity injection (XXE) is a security vulnerability that allows a threat actor to inject unsafe XML entities into a web application that processes XML data.

Read more about it in the poster attached.
Also thank our sponsor <a href="/bugdiscover_/">BugDiscover</a> for their support to Seasides.
Seasides (@seasides_conf) 's Twitter Profile Photo

Web Cache Deception is an attack in which an attacker deceives a caching proxy into improperly storing private information sent over the internet and gaining unauthorized access to that cached data. Read more about it in the poster attached. Also thank our sponsor HackerOne

Web Cache Deception is an attack in which an attacker deceives a caching proxy into improperly storing private information sent over the internet and gaining unauthorized access to that cached data.

Read more about it in the poster attached.
Also thank our sponsor <a href="/Hacker0x01/">HackerOne</a>
Seasides (@seasides_conf) 's Twitter Profile Photo

A server-side template injection attack (SSTI) is when a threat actor exploits a template's native syntax and injects malicious payloads into the template. Read more about it in the poster attached. Also thank our sponsor Justin Thyme David Melamed, PhD Shahar Peled for their support

A server-side template injection attack (SSTI) is when a threat actor exploits a template's native syntax and injects malicious payloads into the template.

Read more about it in the poster attached.
Also thank our sponsor <a href="/jit_io/">Justin Thyme</a>
<a href="/dvdmelamed/">David Melamed, PhD</a> <a href="/PeledShahar/">Shahar Peled</a> for their support
Seasides (@seasides_conf) 's Twitter Profile Photo

Unrestricted access to sensitive business flows occurs when API endpoints do not restrict functionality when used excessively, exploiting gaps in business logic. Read more about it in the poster attached. Also thank our sponsor @DeepFactor_inc Kiran Kamity for their support.

Unrestricted access to sensitive business flows occurs when API endpoints do not restrict functionality when used excessively, exploiting gaps in business logic.

Read more about it in the poster attached.
Also thank our sponsor @DeepFactor_inc <a href="/kirankamity/">Kiran Kamity</a> for their support.
CAPTURE THE BUG (@capturethebugs) 's Twitter Profile Photo

Hackers get ready 🚀 We’re dropping some exclusive swag at Security BSides Ahmedabad and you don’t want to miss out on our limited edition tees! 😎 Want one? It’s easy 1️⃣ Follow us 2️⃣ Retweet 3️⃣ Drop a comment on who you're most excited to meet! More coming your way soon🔥 #StayTuned

Hackers get ready 🚀

We’re dropping some exclusive swag at <a href="/bsidesahmedabad/">Security BSides Ahmedabad</a> and you don’t want to miss out on our limited edition tees! 😎

Want one? It’s easy
1️⃣ Follow us 2️⃣ Retweet 3️⃣ Drop a comment on who you're most excited to meet!

More coming your way soon🔥 
#StayTuned