exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 5 of 5 RSS Feed

Files from Chetan Soni

Real NameChetan Soni
Email addressprivate
Websitewww.thechetansoni.com
First Active2013-04-15
Last Active2014-07-01
View User Profile

Personal Background

I am a social-techno-learner who believes in its own efficiency first and then implements with the suggestions of my strong and enthusiastic Team which helps me takes everything into its perfection level.

The young and dynamic personality has not only assisted in solving complex cases but has also played an instrumental role in creating awareness about Information Security and Cyber crimes.

[#] Envato - Hall of Fame
[#] Microsoft - Hall of Fame
[#] Best Speaker of the year - 2013, Award by IIT-Delhi.

What has made me successful is - I make my work less about me, and more about the passion I hold for Security Specialist.


8 In 1 Tips For WordPress Security
Posted Jul 1, 2014
Authored by Chetan Soni

Whitepaper called 8 in 1 Tips for WordPress Security - Their Issues and Their Solutions.

tags | paper
SHA-256 | 9016ef901ae286aa76841dbf8787c4490fd54a4268d03e2d0673f1add41e042a
Hacking ASP/ASPX Websites Manually
Posted Jun 30, 2014
Authored by Chetan Soni

This is a whitepaper that goes into detail on hacking ASP/ASPX websites manually.

tags | paper, asp
SHA-256 | e01e929f0159f35636b57ccb14d23133cee0871e331625923ed2e065e0033b49
Different Rewrite Methods Available With mod_rewrite For Blacklisting
Posted Nov 18, 2013
Authored by Chetan Soni

This whitepaper goes into detail and multiple different ways you can using blacklisting with mod_rewrite.

tags | paper
SHA-256 | 445a092f63671e00d8cffe2e287b941a30901deeac5d0dc5b36b340fe8ad032a
XPATH Injection
Posted Oct 2, 2013
Authored by Chetan Soni

This is a brief whitepaper that covers XPATH injection attacks and use cases.

tags | paper
SHA-256 | 72d2972397b3492bd0d1d375cb0e92be5b5ce54c9372c0809f8b6dc6a39cc58d
Complete WordPress Security
Posted Apr 15, 2013
Authored by Chetan Soni

This is a guide to locking down your WordPress install to help mitigate attacks from hackers and spam drive-bys.

tags | paper
SHA-256 | 2efac95e64577ce6d5cc5b54e43a31ef2cf8c593de04154820ad365a77eb4c84
Page 1 of 1
Back1Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close