Akash Mahajan
San Francisco, California, United States
18K followers
500+ connections
About
The coming AI age will accelerate technology and cloud adoption to levels most of us…
Articles by Akash
Activity
18K followers
Experience
Licenses & Certifications
Publications
-
Security Automation with Ansible 2
Packt Pub
Security automation is one of the most interesting skills to have nowadays. Ansible allows you to write automation procedures once and use them across your entire infrastructure. This book will teach you the best way to use Ansible for seemingly complex tasks by using the various building blocks available and creating solutions that are easy to teach others, store for later, perform version control on, and repeat.
Other authorsSee publication -
Burp Suite Essentials
PacktPub
See publicationThis book aims to impart the skills of a professional Burp user to empower you to successfully perform various kinds of tests on any web application of your choice. It begins by acquainting you with Burp Suite on various operating systems and showing you how to customize the settings for maximum performance. You will then get to grips with SSH port forwarding and SOCKS-based proxies. You will also get hands-on experience in leveraging the features of Burp tools such as Target, Proxy, Intruder…
This book aims to impart the skills of a professional Burp user to empower you to successfully perform various kinds of tests on any web application of your choice. It begins by acquainting you with Burp Suite on various operating systems and showing you how to customize the settings for maximum performance. You will then get to grips with SSH port forwarding and SOCKS-based proxies. You will also get hands-on experience in leveraging the features of Burp tools such as Target, Proxy, Intruder, Scanner, Repeater, Spider, Sequencer, Decoder, and more. You will then move on to searching, extracting, and matching patterns for requests and responses, and you will learn how to work with upstream proxies and SSL certificates. Next, you will dive into the world of Burp Extensions and also learn how to write simple extensions of your own in Java, Python, and Ruby.
As a professional tester, you will need to be able to report your work, safeguard it, and sometimes even extend the tools that you are using; you will learn how to do all this in the concluding chapters of this book.
-
Is your website insecure?
Healthy Code Magazine
See publicationBuilding websites are easy. Building an insecure website is easy, and building a secure website is easy as well. The tough part, however, is being able to tell when you are developing an insecure website.
This article will explain in simple language how to tell if you are building an insecure website. -
Introduction to HTTP Response Headers for Security
Infosec Institute
See publicationModern Web applications require modern and upgraded defences. As the Web applications have become more sophisticated, so have the Web browsers. This in turn has spurned newer attacks and consequently defences. We looked at some of the new HTTP response headers being used to protect Web users from various kinds of attacks.
Courses
-
Bachelors in Information Technology
-
-
Landmark Education
-
Projects
-
Penetration Testing for Aptean Software India
Web application Penetration Testing of Enterprise CRM Product.
-
Training conducted for Freecharge.in developers on Secure Web Prgramming
Trained the developers and devops folks of Freecharge in Secure Web Programming 101
-
Security Testing for Airpush India
Worked with the Airpush team for doing security testing.
-
Application Security Consultant for Think & Learn Pvt Ltd
- Present
Blackbox Security Testing, Guidance and Recommendations on Application Security Risks and Approaches, Security Assurance
Mobile Device Security Testing
Android Security Testing
Android Security Architecture
Content Security and Guidance
AWS Security and Monitoring
Secure Network Infrastructure -
Security Consultant for MoveInSync Tech. Sol. Pvt Ltd.
-
Security testing of various platforms, consulting on security of servers, applications, network penetration testing, web application security testing, product security strategies.
-
Security Testing for Zimplee
-
Tested the infrastructure for the company to ensure the infrastrucutre was hardened and secure before they launch new offerings.
-
Web Security Training with Payatu Technologies for Test Yantra Software Solutions
-
Conducted a 4 day training at Test Yantra with Payatu Technologies.
Conducted Web Security Testing Training for 13 experienced testers.
-
Web Security Consultant as Contractor for IKP Centre for Technologies in Public Health
-
Security Code Review, Infrastructure Security Audit.
Recommendations on securing application and user data. -
Web Application Security Consultant for XISMAT Consulting
-
Web Application Security Testing
-
Web Application Security Consultant as Freelancer for July Systems
-
Web Application Security Consulting, testing and training.
-
Web Security Consultant for Software AG
-
Worked with the application team to guide them on doing blackbox testing for web applications using open source tools, backtrack linux and burp suite pro. Answererd their questions about web security testing, security assessment of web applications and associated web services.
-
Web Security Training for Nokia
-
Trained 15 developers and testers in
- Security Development Lifecycle
- Basics of TCP/IP
- Basics of HTTP
- Security Principles
- OWASP Top 10
- Finding and testing for
+ Cross Site Scripting bugs (XSS)
+ SQL Injection ( SQLi)
+ Cross Site Request Forgery (CSRF)
+ And other risks
- Bluetooth and mobile device security
- Cryptography -
Security Consultant for InstaColl
-
Evaluated the server infrastructure on the cloud.
Tested the RIA based web application for security.
Recommended certain additional technical processes to ensure reliability and continuing security. -
Security Code Auditor for BigFish
-
Security Code Audit for a contest based web application built in a popular PHP framework.
The security code audit allows them to get their code assessed for security issues and nix them before the web application is deployed.
-
Linux Security Consultant for Picsean Media
-
Worked on Setting up their production and development server. Hardened CentOS server with LAMP stack.
Backup processes, secure Apache web server, PHP, MySQL.
Worked on setting up automated backups to the AWS cloud. -
Security Consultant, Web Forensic Analysis, Secure Code Auditing for Multiplex Systems Pvt. Ltd.
-
Incident Handling
Worked with them to analyse web server logs, audited web application code a for leading international e-commerce website. -
Secure Web App Dev, Webappsec testing for a consumer web2.0 site
-
Working on a web 2.0 startup going to launch in Jan 2009. I did the complete backend, database and security of the web application.
-
Security Consultant for Kieon Consulting
-
Incident Handling
Web Application Security Reviews
Training on Securing PHP/ ASP.net applications
Secure IIS Server Configuration -
Technical Consultant for Centre for the Study of Culture and Society
-
Worked with their system administrator on web server configuration, router configuration, mail server configuration. Migration to google apps platform and training
-
Webmaster/Web Developer for Collobration Platform using Opencore for Headstart Network Foundation
-
Implemented an open source project collaboration tool called opencore which is built on top of Zope/Plone.
Installed and configured the web server, mail server, domain management, application server.
Customized the application as per requirements. -
Secure Web Application Development + SMS API for Numo Solutions
-
Doing multiple product implementations for Numo Solutions including a web based SMS API and web application.
Managing web server and other security solutions. -
Virtualization Consultant at Comat Technologies
-
Worked on the following for Comat
1. Hybrid systems running Linux as host OS and Windows 9X running on a physical partition
2. Project Automation and Scripting -
Barcamp Bangalore
-
Barcamps are un-conferences. They are everything a conference is not - there is no set agenda, there are no speakers, there is no structure. Somehow, almost magically, a beautiful structure emerges in every Barcamp and by the end of the day everyone is left with an amazing memories.
Other creatorsSee project -
Mentor for iAccelerator 2008 at CIIE IIM Ahmedabad
-
Mentor for Computer Security Sessions at iAccelerator2008. A program for startups at CIIE IIM Ahmedabad.
Honors & Awards
-
Best Workshop at HSTC2014
HSTC
My Insecurity In The Cloud workshop was awarded as the best workshop of the conference.
Organizations
-
OWASP
OWASP Bangalore Chapter Lead
Recommendations received
35 people have recommended Akash
Join now to viewOther similar profiles
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top content