Abstract

Abstract:
1. Basic understanding of the approach to follow while reviewing the source code.
2. Find vulnerabilities by reviewing source code.
3. Channing the vulnerabilities to get RCE.
4. Automate exploitation phase by python.

Prerequisites:
1. Basic understanding of
a --> php
b --> mysql querys.
c --> python
2. Use of Burp suite

Bring your laptop with python and burp suite installed in your OS.

Speaker

Raunak parmar

Raunak Parmar is an information security professional whose areas of interest include web penetration testing, Azure/AWS security, source code review, scripting, and development.

He has 2+ years of experience in information security. Raunak likes to research new attack methodologies and create open-source tools that can be used during Cloud Security assessments. He has worked extensively on Azure and AWS.

He is the author of Vajra an offensive cloud security tool. He has spoken at multiple conferences like Blackhat, Defcon, and Nullcon.

Timing

Starts at Saturday February 22 2020, 10:15 AM. The sessions runs for about 4 hours.

Resources