Abstract

Doing a source code review to exploit vulnerabilities like:

1- Type juggling
2- Advance 2nd order SQL Injection
3- Pass-the-hash
4- {{SSTI}} (Server Side Template Injection)
At the end creating a python script to automate the attack

Speaker

Raunak parmar

Learning web security every day,
Bug Bounty Hunter
B.Com undergraduate Student,
Also interested in Networking, Red team

Timing

Starts at Saturday November 09 2019, 10:45 AM. The sessions runs for about 1 hour.

Resources