TWC | Why a Hacker Can Own Your Web Servers in a Day!

Play TWC | Why a Hacker Can Own Your Web Servers in a Day!
Sign in to queue

Description

Everything in the OWASP TOP 10 is covered in this session, including: Injections, Broken Authentication and Session Management, Cross-Site Scripting (XSS), Insecure Direct Object References, Security Misconfiguration, Sensitive Data Exposure, Missing Function Level Access Control, Cross-Site Request Forgery (CSRF), Using Components with Known Vulnerabilities, Unvalidated Redirects and Forwards.

Embed

Download

The Discussion

Add Your 2 Cents