Summary: Since you last performed work for Hackme Corp, their little company has been through rough times. The latest of which started when they hired the militant John Pepper to be their system admin. Those who respected John’s stern demeanor and unorthodox methods simply called him Sarge, firstly because he was once a drill sergeant… Read More »
Tonight we will be discussing various web application testing methodologies, vulnerabilities, and exploits. We will go over browser plugins, tools, as well as manual processes for identifying and exploiting vulnerabilities in web applications. Bring a Kali/Linux box/VM to practice and hone your techniques.
For those who attended the 10th Annual Rocky Mountain Information Security Conference in Denver last week, there will be a debrief of their experiences. We will discuss thoughts about the breakout sessions as well as the 8 hour pentest workshop that was taken with Georgia Weidman herself. We will go over the simulated pentest and… Read More »