Hands on Hacking The OWASP TOP 10 and beyond

Hands on Hacking The OWASP TOP 10 and beyond

Have you ever wanted to learn how attackers break into websites and mobile apps?

At this BSides workshop, we explore a purposefully vulnerable web application and show you 15 common ways that attackers try to cause harm.

The workshop includes hunting techniques, exploit techniques, self directed vulnerability hunting and team based vulnerability hunting.

Some of the vulnerabilities are simple to find while others are much more difficult.

This event is open to participants with all skill-sets including people with non-technical backgrounds, developers, DEVOPS admins, Quality Assurance professionals, pen-testers, and more.

Presented by