Abstract

Doing a source code review to exploit vulnerabilities like:

1- Type juggling
2- Advance 2nd order SQL Injection
3- Pass-the-hash
4- {{SSTI}} (Server Side Template Injection)
At the end creating a python script to automate the attack

Speaker

Raunak parmar

TY-BCOM student.
Doing AWAE.

Timing

Starts at Saturday November 09 2019, 10:45 AM. The sessions runs for about 1 hour.

Resources