SEARCH
TOOLBOX
LANGUAGES
Difference between revisions of "Training Injection"

Difference between revisions of "Training Injection"

From BruCON 2017

Jump to: navigation, search
(Created page with "=The Art of Exploiting Injection Flaws by Sumit Siddharth= OWASP rates injection flaws as [http://www.owasp.org/index.php/Top_10_2010-A1 the most critical vulnerability] withi...")
(No difference)

Revision as of 13:38, 18 April 2013

The Art of Exploiting Injection Flaws by Sumit Siddharth

OWASP rates injection flaws as the most critical vulnerability within the Top 10 most Critical Web Application Security Risks under the OWASP Top 10 project.

This hands-on session will only focus on the injection flaws and the attendees will get an in-depth understanding of the flaws arising from this vulnerability. The topics covered in the class are:

  • SQL Injection
  • XPATH Injection
  • LDAP Injection
  • Hibernate Query Language Injection
  • Direct OS Code Injection
  • XML Entity Injection

During the 2 days course, the attendees will have access to a number of challenges for each flaw and they will learn a variety of exploitation techniques used by the attackers in the wild. Identify, extract, escalate, execute; we have got it all covered. The following are the objectives of the course:

  1. Understand the problem of Injection Flaws
  2. Learn a variety of advanced exploitation techniques which hackers use.
  3. Learn how to fix these problems?

What Students Will Be Provided

  • Student hand-outs
  • Tools/scripts (some public and some not so public)

Who should attend

  • Web Application Developers
  • Web Application Security Consultants
  • Penetration Testers
  • Anyone who wants to take their skills to next level

What to Expect

  • Shells popping
  • Advanced data ex-filtration techniques.
  • Advanced exploitation (some neat, new and ridiculous hacks).
  • Some insane examples of code which appears secure but it's not.

What Students Should Bring

Students must bring their own laptop with Windows Operating System installed (either natively or running in a VM). Further, students must have administrative access to perform tasks like install software, disable antivirus etc. Devices which don't have ethernet connection (e.g. macbook Air, tablets etc) are not supported. A prior knowledge of Database systems and SQL language will be an added advantage but it's not a strict requirement.

Trainer Biography

Sumit "sid" Siddharth works as a Head of Penetration testing for 7Safe Limited in the UK. He specializes in the application and database security and has more than 8 years of experience in Penetration Testing. Sid has authored a number of whitepapers and tools. He has been a Speaker/Trainer at many security conferences including Black Hat, DEF CON, OWASP Appsec, HITB etc. He also runs the popular IT security blog: www.notsosecure.com. Sid is also a co-author of the book SQL Injection: Attacks and Defence (2nd edition).

More information is available on nososecure blog












24 & 25 September (09:00 - 17:00)

Register.jpg

Back to Training Overview