Abstract

Abstract:
1. Basic understanding of the approach to follow while reviewing the source code.
2. Find vulnerabilities by reviewing source code.
3. Channing the vulnerabilities to get RCE.
4. Automate exploitation phase by python.

Prerequisites:
1. Basic understanding of
a --> php
b --> mysql querys.
c --> python
2. Use of Burp suite

Bring your laptop with python and burp suite installed in your OS.

Speaker

Raunak parmar

B.Com undergraduate Student,
Area of the interest web application,
Bug Bounty Hunter

Timing

Starts at Saturday February 22 2020, 10:15 AM. The sessions runs for about 4 hours.

Resources