Web Hacking Special Ops

March 18, 2014 (at 9 a.m.)

In the past a lot of different attacks on web applications were used and until now attackers developed more and more intelligent ways to reach their goals. These attacks are more or less known by all researchers nowadays. The majority of webhacking workshops and trainings cover standard methods like xss, sql injections, xsrf, etc. This workshop focuses on more advanced web application hacking techniques, such as object deserialisation flaws next to Cross-Origin-Resource-Sharing and other HTML 5 related attacks.

Agenda

Modern stuff

Things to bring

Laptop

Target Audience

Pentester, Webhacker, all kind of guys that want to improve in webhacking Basic knowledge in webdev/webhacking will be helpful.

Kevin Schaller

Kevin Schaller is an IT Security Consultant for ERNW with comprehensive experience in large company environments. He is working for the security provider ERNW, where his daily tasks concentrate on security evaluations and the associated quality assurance of applications and infrastructures. He regularly teaches trainings and courses and holds talks where he likes to share his knowledge with the audience. His research focus lies on the field of webapplication, webservice security and biometric authentication mechanisms. The following topics were already covered by Kevin within workshops or talks in different locations world wide: Advanced Network Security, Advanced Hacking Techniques, Webhacking, Security within IP Networks, Secure Webapplication Development, Secure Thick Client Development, Java Secure Coding, Code Reviews and Old Attacks meet Modern Technologies.

Timo Schmid

Timo Schmid is a pentester and researcher at ERNW with extensive experience in corporate environments. His daily work enfolds security evaluations, code reviews and penetration testings of (web-) applications and infrastructures. Besides of giving trainings in web application security, secure coding and general computer security, he is doing research and developments in web-technology and -security areas. In addition, he continuously develops and maintains different tools to improve testing methodologies and results.