Web Application (In)Security
This is a cutting-edge, hands-on course aimed at hackers who want to exploit web applications, and developers who want to know how to defend them. The course is presented by the authors of the critically-acclaimed Web Application Hacker's Handbook, and covers the entire process of hacking a web application, from initial mapping and analysis, probing for common vulnerabilities, through to advanced exploitation techniques. This year, the course contains more than 300 brand new lab examples, containing virtually every vulnerability that has ever been found in web applications. Even the most capable hackers will be challenged and find plenty to take away. The course also demonstrates the very latest hacking techniques developed over the past year. Some highlights include:
- Exploiting SQL injection using second-order attacks, filter bypasses, query chaining and fully blind exploitation
- Breaking authentication and access control mechanisms
- Reverse engineering Java, Flash and Silverlight to bypass client-side controls
- Exploiting cross-site scripting to log keystrokes, port scan the victim's computer and network, and execute custom payloads
- Exploiting LDAP, XPath and command injection; and uncovering common logic flaws found in web applications.