The most important conference on Hacking & Information Security in Central Eastern Europe, bringing hands-
The purpose of this workshop is to give participants a strong understanding of the most common web application vulnerabilities and their associated risks.
We will discuss in detail each type of vulnerability from the OWASP Top 10 project and we will be practicing manual discovery and exploitation techniques. Furthermore, a set of useful security testing tools will be presented and used during the workshop.
This will be a (very) hands-
Discover SQL injection and exploit it to extract information from the database ; Find OS command injection and exploit it to execute arbitrary commands on the target server ; Discover Cross-