As more and more companies are breached via the web, security professionals continue to focus their attention on the critical and high severity vulnerabilities. While this approach would seem to make sense, it overlooks the fact that attackers are getting in through a key attack vector: low to medium severity vulnerabilities. Chained together, these “low hanging fruit” vulnerabilities can own your web application.
This presentation will help security teams think more holistically about the attack landscape. It will illustrate how an attacker can chain together lower end vulnerabilities to own your web application, the tools and tactics they might use, and how to prevent this from happening to you.