Get into the mindset of bad actors and what it looks like when they view your applications. Through a series of live demonstrations, the presenter will walk you through his thought process as he hacks a real application on stage. By examining different attack scenarios, including injection attacks, cross-site scripting and privilege escalation, you’ll recognize how an attacker can exploit Find out the most common mistakes by developers that make it easier for bad actors to infiltrate a system.
Learning Objectives:
Recognize how bad actors view your applications.
Assess the security of your applications.
Demonstrate how to use open-source tools to test applications.