exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 5 of 5 RSS Feed

Files from Chetan Soni

Real NameChetan Soni
Email addressprivate
Websitewww.thechetansoni.com
First Active2013-04-15
Last Active2014-07-01
View User Profile

Personal Background

I am a social-techno-learner who believes in its own efficiency first and then implements with the suggestions of my strong and enthusiastic Team which helps me takes everything into its perfection level.

The young and dynamic personality has not only assisted in solving complex cases but has also played an instrumental role in creating awareness about Information Security and Cyber crimes.

[#] Envato - Hall of Fame
[#] Microsoft - Hall of Fame
[#] Best Speaker of the year - 2013, Award by IIT-Delhi.

What has made me successful is - I make my work less about me, and more about the passion I hold for Security Specialist.


8 In 1 Tips For WordPress Security
Posted Jul 1, 2014
Authored by Chetan Soni

Whitepaper called 8 in 1 Tips for WordPress Security - Their Issues and Their Solutions.

tags | paper
SHA-256 | 9016ef901ae286aa76841dbf8787c4490fd54a4268d03e2d0673f1add41e042a
Hacking ASP/ASPX Websites Manually
Posted Jun 30, 2014
Authored by Chetan Soni

This is a whitepaper that goes into detail on hacking ASP/ASPX websites manually.

tags | paper, asp
SHA-256 | e01e929f0159f35636b57ccb14d23133cee0871e331625923ed2e065e0033b49
Different Rewrite Methods Available With mod_rewrite For Blacklisting
Posted Nov 18, 2013
Authored by Chetan Soni

This whitepaper goes into detail and multiple different ways you can using blacklisting with mod_rewrite.

tags | paper
SHA-256 | 445a092f63671e00d8cffe2e287b941a30901deeac5d0dc5b36b340fe8ad032a
XPATH Injection
Posted Oct 2, 2013
Authored by Chetan Soni

This is a brief whitepaper that covers XPATH injection attacks and use cases.

tags | paper
SHA-256 | 72d2972397b3492bd0d1d375cb0e92be5b5ce54c9372c0809f8b6dc6a39cc58d
Complete WordPress Security
Posted Apr 15, 2013
Authored by Chetan Soni

This is a guide to locking down your WordPress install to help mitigate attacks from hackers and spam drive-bys.

tags | paper
SHA-256 | 2efac95e64577ce6d5cc5b54e43a31ef2cf8c593de04154820ad365a77eb4c84
Page 1 of 1
Back1Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    0 Files
  • 12
    Jul 12th
    0 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close