Cenzic 232 Patent
Paid Advertising
sla.ckers.org is
ha.ckers sla.cking
Sla.ckers.org
How do you completely compromise a machine given a text box or badly validated input box? This is a place to talk about code issues (PHP includes, null byte injection, backticks, pipe, etc...) as well as how to properly construct an SQL injection attack. 
Go to Topic: PreviousNext
Go to: Forum ListMessage ListNew TopicSearchLog In
The Art of Exploiting Injection Flaws
Posted by: notsosecure
Date: March 10, 2012 01:19PM

There are still a few seats left in the upcoming course on exploiting injection flaws at Appsec DC. The course will take place on April 2nd and 3rd.

The abstract of the course is:

OWASP rates injection flaws as the most critical vulnerability within the Top 10 most Critical Web Application Security Risks under the OWASP Top 10 project. http://www.owasp.org/index.php/Top_10_2010-A1. This hands-on session will only focus on the injection flaws and the attendees will get an “in-depth” understanding of the flaws arising from this vulnerability. The topics covered in the class are, SQL Injection, XPATH Injection, LDAP Injection, Hibernate Query Language Injection, Direct OS Code Injection, and XML Entity Injection. The workshop covers classical issues such as SQL Injection, which is an oldie yet very relevant in today’s scenario as well as some lesser known injection flaws such as LDAP, XPATH and XML Injection. During the 2 days course, the attendees will have access to a number of challenges for each flaw and they will learn a variety of exploitation techniques used by the attackers in the wild. Identify, extract, escalate, execute; we have got it all covered.

Please register here:
http://www.regonline.com/builder/site/Default.aspx?EventID=1021433

Course page:
http://appsecdc.org/training/

For more info contact me at:
sid-at-notsosecure(dot)com

Options: ReplyQuote


Sorry, only registered users may post in this forum.