exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 5 of 5 RSS Feed

Files from Chetan Soni

Real NameChetan Soni
Email addressprivate
Websitewww.thechetansoni.com
First Active2013-04-15
Last Active2014-07-01
View User Profile

Personal Background

I am a social-techno-learner who believes in its own efficiency first and then implements with the suggestions of my strong and enthusiastic Team which helps me takes everything into its perfection level.

The young and dynamic personality has not only assisted in solving complex cases but has also played an instrumental role in creating awareness about Information Security and Cyber crimes.

[#] Envato - Hall of Fame
[#] Microsoft - Hall of Fame
[#] Best Speaker of the year - 2013, Award by IIT-Delhi.

What has made me successful is - I make my work less about me, and more about the passion I hold for Security Specialist.


8 In 1 Tips For WordPress Security
Posted Jul 1, 2014
Authored by Chetan Soni

Whitepaper called 8 in 1 Tips for WordPress Security - Their Issues and Their Solutions.

tags | paper
SHA-256 | 9016ef901ae286aa76841dbf8787c4490fd54a4268d03e2d0673f1add41e042a
Hacking ASP/ASPX Websites Manually
Posted Jun 30, 2014
Authored by Chetan Soni

This is a whitepaper that goes into detail on hacking ASP/ASPX websites manually.

tags | paper, asp
SHA-256 | e01e929f0159f35636b57ccb14d23133cee0871e331625923ed2e065e0033b49
Different Rewrite Methods Available With mod_rewrite For Blacklisting
Posted Nov 18, 2013
Authored by Chetan Soni

This whitepaper goes into detail and multiple different ways you can using blacklisting with mod_rewrite.

tags | paper
SHA-256 | 445a092f63671e00d8cffe2e287b941a30901deeac5d0dc5b36b340fe8ad032a
XPATH Injection
Posted Oct 2, 2013
Authored by Chetan Soni

This is a brief whitepaper that covers XPATH injection attacks and use cases.

tags | paper
SHA-256 | 72d2972397b3492bd0d1d375cb0e92be5b5ce54c9372c0809f8b6dc6a39cc58d
Complete WordPress Security
Posted Apr 15, 2013
Authored by Chetan Soni

This is a guide to locking down your WordPress install to help mitigate attacks from hackers and spam drive-bys.

tags | paper
SHA-256 | 2efac95e64577ce6d5cc5b54e43a31ef2cf8c593de04154820ad365a77eb4c84
Page 1 of 1
Back1Next

File Archive:

January 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    0 Files
  • 2
    Jan 2nd
    13 Files
  • 3
    Jan 3rd
    5 Files
  • 4
    Jan 4th
    5 Files
  • 5
    Jan 5th
    9 Files
  • 6
    Jan 6th
    5 Files
  • 7
    Jan 7th
    0 Files
  • 8
    Jan 8th
    0 Files
  • 9
    Jan 9th
    18 Files
  • 10
    Jan 10th
    31 Files
  • 11
    Jan 11th
    30 Files
  • 12
    Jan 12th
    33 Files
  • 13
    Jan 13th
    25 Files
  • 14
    Jan 14th
    0 Files
  • 15
    Jan 15th
    0 Files
  • 16
    Jan 16th
    7 Files
  • 17
    Jan 17th
    25 Files
  • 18
    Jan 18th
    38 Files
  • 19
    Jan 19th
    6 Files
  • 20
    Jan 20th
    21 Files
  • 21
    Jan 21st
    0 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    24 Files
  • 24
    Jan 24th
    68 Files
  • 25
    Jan 25th
    22 Files
  • 26
    Jan 26th
    20 Files
  • 27
    Jan 27th
    17 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close