Acknowledgements

CTF’s:

CTF are known as Capture The Flag competition. CTF’s are game designed for students, and professionals which teaches Information Security by asking them to solve challenges which are created in a safe and enclosed environment. In a regular jeopardy style CTF competition, there are various categories – such as – Web, Mobile, Cryptography, Forensics, Binary (some organizers call it as pwn), Reverse Engineering, Misc. There are usually challenges which vary from different points within such categories. Once, a team or individual solves them, they validate a flag which proves they indeed solved it and receive points. The team with highest points under defined amount of time is declared winner. It is a very fun way to learn cybersecurity within enclosed environment. CTF’s for an Information Security Enthusiast is an equivalent of competitive programming (ACM) for a developer. 🙂

Some of my on-site Highlights:

 

Winner of BSides San Francisco CTF 2019 sponsored by Facebook and Google.

 

Winner of BSides DFW 2018 CTF sponsored by PrevadeLLC. Scored 1000 points, highest ever on that platform

Winner of GCCS – New Delhi, India. (along with romanking98) Award from Indian Prime Minister (Global Conference on Cyber Space) – IT CTF (2017)

 

csawfinal1

Finalist in CSAW CTF 2018 – NYU, Brooklyn (Finished 6th World-wide in Finals, US Rank 3rd in Qualifiers) along with theKidOfArcrania, DarkZephyrus and c4pkirk

Finalist in CSAW CTF 2017 – NYU (Finished 4th in Quals US-wide)

MIT-CTF 2017 (Cambridge, MA)

Bug Hunting:

It’s great to Help Companies and helping world making a safer place. As an ethical security researcher, it is my duty to help companies and firms protect their asset. (Not routinely updated)

https://www.google.com/about/appsecurity/hall-of-fame/distinction/ (Page 22)

https://www.atlassian.com/security/hall-of-fame

https://secure.sony.net/hallofthanks

https://support.apple.com/en-us/HT201536

http://ca.blackberry.com/enterprise/products/incident-response-team.html#security-updates

https://roceteer.com/security

https://www.hackerrank.com/

http://www.intel.com/

https://www.eset.com/

https://recordedfuture.com

http://linkedin.com/

https://transloadit.com/security/

https://support.bitcasa.com/hc/en-us/articles/202210658-How-To-Responsibly-Report-Security-Concerns

https://aha.io/security

http://www.owaspacademy.com/security ( 2 Times)

https://hackerone.com/ruxit/thanks

https://hackerone.com/ubnt/thanks

https://hackerone.com/zomato/thanks

https://hackerone.com/localtapiola/thanks

https://hackerone.com/xero/thanks

https://hackerone.com/badoo/thanks

https://www.avast.com/bug-bounty

https://skytv.custhelp.com/app/answers/detail/a_id/1797/~/responsible-disclosure-guidelines

http://blog.teamtailor.com/vulnerability-and-security-reporting/

http://keen.io/

https://sellfy.com/security/

http://shopclues.com/

http://itiltd-india.com

https://www.onelogin.com/whitehat

https://www.fluxiom.com/security

https://www.passwordboss.com/security/report-an-issue/

http://www.twitch.tv/

http://help.getpocket.com/customer/portal/articles/1225832-pocket-security-overview

http://hosting24.com/

https://www.theemaillaundry.com/responsible-disclosure/

http://www.huawei.com/

https://hackerone.com/brave/thanks