Appsec DFIR 201


Posted on in Presentations

This guided Learning Lab will introduce attendees to a vulnerable website which has already been compromised where they will find the flaws, figure out the path of exploitation, and fix the issues before the adversary comes back to pillage more PII. Join as an individual or a team and beat the clock, outsmart the adversary and protect the PII!

This session will follow Chatham House Rule to allow for free exchange of information and learning. We look forward to participants actively engaging in the discussion, and remind attendees that no comment attribution or recording of any sort should take place.


Pre-Requisites:
This workshop is web-based and requires a Kali Linux (or similar) workstation with internet access, web browser and built-in Linux tools. To be successful at this training, familiarity to mastery of web vulnerabilities, Metasploit and the LAMP stack will be advantageous.


This is a capacity-controlled session. If added to your schedule and your availability changes, please remove this session from your schedule to allow others to participate.

 

Participants
Serge Borso

Facilitator

CEO, SpyderSec

Analytics Intelligence & Response DevSecOps & Application Security Protecting Data & the Supply Chain Ecosystem

application security forensics & e-discovery hackers & threats incident response PII


Topic

Subtopic


Share With Your Community