Tonight we will be discussing various web application testing methodologies, vulnerabilities, and exploits. We will go over browser plugins, tools, as well as manual processes for identifying and exploiting vulnerabilities in web applications. Bring a Kali/Linux box/VM to practice and hone your techniques.
For those who attended the 10th Annual Rocky Mountain Information Security Conference in Denver last week, there will be a debrief of their experiences. We will discuss thoughts about the breakout sessions as well as the 8 hour pentest workshop that was taken with Georgia Weidman herself. We will go over the simulated pentest and… Read More »