Publications

I make my work less about me, and more about the passion I hold for Security Specialist.

For any kind of help or query, please mail at chetansoni@live.com


Capturing of HTTP protocol packets in a wireless network

Authors: Chetan Soni and Gurpreet Singh Walia | International Journal of Electronics Communication and Computer Engineering | 1st May, 2013.

The word wide revolution in wireless technology is changing our lives in term of the way we learn and use. Wireless Networks fit into this because the technology has been around long enough and can provide various benefits for development in this area.The main objective of this paper is to create a fake access point in a wireless network and transfer the fake ARP (Address Resolution Protocol) Packets on the same Wi-Fi Network in which users are connected and the name of fake access point also known as ESSID (Extended Service Set Identification) is same as the name of the wireless network. So when a fake access point is created with same wireless network name then the user gets disconnected to original network and connects with the fake access point, so all the traffic goes through out your network and you can hijack the details, important information, and secret credentials of that user which is connected to your fake access point network.


Complete WordPress Security

Author: Chetan Soni | Packet Storm Security | 15th April, 2013

This is a guide to locking down your WordPress install to help mitigate attacks from hackers and spam drive-bys.


XPATH Injection

Authors: Chetan Soni | Packet Storm Security | 2nd October, 2013.

This is a brief whitepaper that covers XPATH Injection attacks and use cases.


Different Rewrite Methods Available With mod_rewrite For Blacklisting

Author: Chetan Soni | Packet Storm Security | 18th November, 2013.

This whitepaper goes into detail and multiple different ways you can using blacklisting with mod_rewrite.


Hacking ASP/ASPX Websites Manually

Author: Chetan Soni | Packet Storm Security | 30th June, 2014.

This is a whitepaper that goes into detail on hacking ASP/ASPX websites manually.


8 in 1 Tips for WordPress Security

Author: Chetan Soni | Packet Storm Security | 1st July, 2014.

Whitepaper called 8 in 1 Tips for WordPress Security – Their Issues and Their Solutions.


Challenges Faced By Cloud Security

Author: Chetan Soni | Cloud Tweaks | 25th March, 2014.

Security professionals still need to deal with the architectural flaws of the cloud computing model so that cloud computing can be made more reliable and trustworthy.


10 Useful Cloud Security Tools – Part 1

Author: Chetan Soni | Cloud Tweaks | 26th March, 2014.

Cloud computing has become a business solution for many organizational problems. But there are security risks involved with using cloud servers: service providers generally only take responsibility of keeping systems up, and they neglect security at many ends. Therefore, it is important that clouds are properly penetration (pen) tested and secured to ensure proper security of user data.


10 Useful Cloud Security Tools – Part 2

Author: Chetan Soni | Cloud Tweaks | 27th March, 2014.

Cloud services like Amazon Elastic Cloud and IBM SmartCloud are revolutionizing the way IT organizations deal with online infrastructure. There are many benefits to cloud computing, but there are also serious security concerns. Yesterday, I revealed 5 helpful tools for enhancing cloud security.


Concerns with Cloud Security

Author: Chetan Soni | Cloud Tweaks | 31st March, 2014.

Cloud security is an evolving sub-domain of information security dedicated to the protection of data, applications and infrastructure values associated with cloud computing. It incorporates a broad set of policies that are driven by the security procedures for providing maximum level of assurance for customers of cloud services.


WordPress Security Plugin Recommendations

Author: Chetan Soni | Cloud Tweaks | 3rd April, 2014.

WordPress is a widely used website platform used by millions of people around the world. WordPress is popular because it provides an extremely easy platform for application developers to use to create convenient layouts. But because of its popularity, WordPress is frequently the target of attacks by hackers.


WordPress Hosting Security Tips

Author: Chetan Soni | Cloud Tweaks | 8th April, 2014.

If you have a WordPress website, you may be concerned about the security of your website. In the following article, I will supply you with some tips you can use to ensure your website is secure. Nothing is more important to website management than security. If you haven’t taken steps to secure your WordPress website yet, this task should be at the top of your to-do list.


Crack WPA2-PSK Wi-Fi with Automated Python Script – Fluxion Part 1

Author: Chetan Soni | Yeah Hub | 25th March, 2017.

As you all knows in Wireless Networks, there are so many encryption protocols are there i.e. WEP, WPA and WPA2 and out of that WEP is one of the most weakest protocol which uses 24-bit IV packets and other side, we have WPA2 protocol uses stronger encryption algorithm which is very difficult to crack.


Crack WPA2-PSK Wi-Fi with Automated Python Script – Fluxion Part 2

Author: Chetan Soni | Yeah Hub | 25th March, 2017.

As you all knows in Wireless Networks, there are so many encryption protocols are there i.e. WEP, WPA and WPA2 and out of that WEP is one of the most weakest protocol which uses 24-bit IV packets and other side, we have WPA2 protocol uses stronger encryption algorithm which is very difficult to crack.


Crack WPA2-PSK Wi-Fi with Automated Python Script – Fluxion Part 3

Author: Chetan Soni | Yeah Hub | 25th March, 2017.

As you all knows in Wireless Networks, there are so many encryption protocols are there i.e. WEP, WPA and WPA2 and out of that WEP is one of the most weakest protocol which uses 24-bit IV packets and other side, we have WPA2 protocol uses stronger encryption algorithm which is very difficult to crack.


Complete Htaccess Guide 2017 – Tips and Tricks

Author: Chetan Soni | Yeah Hub | 29th January, 2017.

As you all knows in Wireless Networks, there are so many encryption protocols are there i.e. WEP, WPA and WPA2 and out of that WEP is one of the most weakest protocol which uses 24-bit IV packets and other side, we have WPA2 protocol uses stronger encryption algorithm which is very difficult to crack.