Hands on web hacking
2k13 - Version 0.36 - Last change on 01 September 2013 10:30:00
(Difference between revisions)
Administrator (Talk | contribs)
(Created page with " ''by 1van ;Web applications are the new frontier of hacking. With this is mind, we create playground for testing and exploiting common and not very common application vu...")
(Created page with " ''by 1van ;Web applications are the new frontier of hacking. With this is mind, we create playground for testing and exploiting common and not very common application vu...")
Latest revision as of 21:42, 24 August 2013
by 1van
- Web applications are the new frontier of hacking. With this is mind, we create playground for testing and exploiting common and not very common application vulnerabilites. If you wish to understand what really happens whenever an attac is perpetrated to any web architecture component this workshop is right place for that. We will setup web infrastructure with vulnerable applications and analize it with tools from hackers community. We will demonstrate and clarify attacks from OWASP Top 10 and attacks like blind sql injection, http parameter pollution and upload forms misconfiguration. Also, we will demonstrate what really happens when some bot find vulnerable shared hosting or cross site scripting on yours website.