- Hands-On Application Penetration Testing with Burp Suite
- Carlos A. Lozano Dhruv Shah Riyaz Ahemed Walikar
- 420字
- 2021-07-02 12:16:27
About the authors
Carlos A. Lozano is a security consultant with more than 15 years' experience in various security fields. He has worked as a penetration tester, but most of his experience is with security application assessments. He has assessed financial applications, ISC/SCADA systems, and even low-level applications, such as drivers and embedded components. Two
years ago, he started on public and private bug bounty programs and focused on web applications, source code review, and reversing projects. Carlos also works as Chief Operations Officer at Global CyberSec, an information security firm based in Mexico, with operations in the USA and Chile.
Dhruv Shah holds a Masters degree in IT and has 7 years of experience as a specialist in Information Security. He started off as a trainer sensitizing staff in private sector organizations about security issues and what hackers look for when they launch attacks on networks. He, later on, switched his job to carry out penetration testing for Indian government agencies and then for banking clients in the Middle East. He now has extensive experience in penetration testing for Fortune 500 companies involving web and mobile applications, networks, Infra, and Red Team work. In his spare time, he co-authored the book Kali Linux Intrusion and Exploitation and is an active member and moderator of one of the Null chapters in India.
Riyaz Ahemed Walikar is a Web Application Pentester, security evangelist, and researcher. He has been active in the security community for the last 10 years. He is actively involved with vulnerability research in popular web applications and network aware services and has disclosed several security issues in popular software like Apache Archiva, Openfire, and so on. He has found vulnerabilities with popular web applications like Facebook, Twitter, Google, and so on for which he is on the Hall of Fame for most of these services. He has also been a speaker and trainer at several security conferences.
His technical interests lie with programming, bug bounty, malware analysis, breaking web applications, playing CTFs, and penetration testing networks.
- Android應用安全實戰:Frida協議分析
- 攻守道:企業數字業務安全風險與防范
- Metasploit Penetration Testing Cookbook(Third Edition)
- 計算機病毒分析與防范大全(第3版)
- 計算機使用安全與防護
- 安全實戰之滲透測試
- Enterprise Cloud Security and Governance
- SQL Injection Strategies
- 無線傳感器網絡安全與加權復雜網絡抗毀性建模分析
- CTF特訓營:技術詳解、解題方法與競賽技巧
- 實用黑客攻防技術
- Mastering Python for Networking and Security
- 黑客攻擊與防范實戰從入門到精通
- 云計算安全技術與應用
- 2010年中國互聯網網絡安全報告