Ready to watch?

To access this and all other video sessions from our past events create your FREE account today!

Already have an account? Login
Antonio de Mello & Amine Abed - a month ago
The attacker's footprint
expand_more
Have you ever wonder how attacking web applications looks like? How would you retrace the attacker’s steps in order to identify what has been done? In this workshop, you will have the chance to understand everything from both the attacker’s and the defender’s perspective, allowing you to actively participate in the process, breaking down the reasoning behind the decisions that eventually, will lead the application to be compromised. The aftermath will be a detailed analysis through all the breadcrumbs left by the attacker, resulting in its footprint.
Featured jobs
supervisor_account Bosch-Gruppe Österreich
room Vienna, Austria
stars Senior
euro_symbol 40-70K
Embedded C
supervisor_account Bosch-Gruppe Österreich
room Vienna, Austria
stars Junior
euro_symbol 39-70K
Embedded C
supervisor_account IMMOFINANZ
room Vienna, Austria
room +7
stars Senior
euro_symbol 70-80K
Software Architecture