2 Day Pre-Conference Training: The Art of Exploiting Injection Flaws

Presented at AppSec USA 2013, Nov. 19, 2013, 9 a.m. (480 minutes)

PROMOTION: All attendees of my class will receive FREE 1 month access to on-line labs after the class allowing them more time to practice the concepts taught in the class. 2 Day Class running Monday Nov 18 and Tuesday Nov 19 Overview OWASP rates injection flaws as the most critical vulnerability within the Top 10 most Critical Web Application Security Risks under the OWASP Top 10 project. http://www.owasp.org/index.php/Top_10_2010-A1  (even the 2013 Relese Candidate for Top 10 has retained injection flaw as top flaw)  This hands-on session will only focus on the injection flaws and the attendees will get an in-depth understanding of the flaws arising from this vulnerability. The topics covered in the class are:  SQL Injection XPATH Injection LDAP Injection Hibernate Query Language Injection Direct OS Code Injection XML Entity Injection  During the 2 days course, the attendees will have access to a number of challenges for each flaw and they will learn a variety of exploitation techniques used by the attackers in the wild. Identify, extract, escalate, execute; we have got it all covered. The following are the objectives of the course:  Understand the problem of Injection Flaws Learn a variety of advanced exploitation techniques which hackers use. learn how to fix these problems?  WHAT STUDENTS WILL BE PROVIDED Student hand-outs Tools/scripts (some public and some not so public) WHO SHOULD ATTEND Web Application Developers Web Application Security Consultants Penetration Testers Anyone who wants to take their skills to next level WHAT TO EXPECT Shells popping Advanced data ex-filtration techniques. Advanced exploitation (some neat, new and ridiculous hacks). Some insane examples of code which appears secure but it's not. WHAT STUDENTS SHOULD BRING Students must bring their own laptop with Windows Operating System installed (either natively or running in a VM). Further, students must have administrative access to perform tasks like install software, disable antivirus etc. Devices which don't have ethernet connection (e.g. macbook Air, tablets etc) are not supported. A prior knowledge of Database systems and SQL language will be an added advantage but it's not a strict requirement.

Presenters:

Links:

Similar Presentations: