Abstract

Abstract:
1. Basic understanding of the approach to follow while reviewing the source code.
2. Find vulnerabilities by reviewing source code.
3. Channing the vulnerabilities to get RCE.
4. Automate exploitation phase by python.

Prerequisites:
1. Basic understanding of
a --> php
b --> mysql querys.
c --> python
2. Use of Burp suite

Bring your laptop with python and burp suite installed in your OS.

Speaker

Raunak parmar

College Student
Twitter- @trouble1_raunak

Timing

Starts at Saturday February 22 2020, 10:15 AM. The sessions runs for about 4 hours.

Resources