| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
Developers Guide to Pen Testing (Hack Thyself First) OWASP/App Sec - Session #3 - Bill Sempf
For the last several months, Bill has taken his twenty years of web development experience to application pentesting. Although he didn't have a televised event to announce the decision,, he has gathered a vast collection of the real problems he has discovered in the majority of applications that he has tested. Reflected XSS, injection of all types, and privilege escalation are rampant, and that is only the beginning. What's more, he hasn't tested an application yet that had sufficient protection to keep him from breaking in and causing havoc. Come hear what they are, how they intersect with the OWASP Top 10, and what you can say to your developers to make the problems go away. Bio:
Bill Sempf is a software security architect. His breadth of experience includes business and technical analysis, software design, development, testing, server management and maintenance, and security. In his 20 years of professional experience he has participated in the creation of well over 300 applications for large and small companies, managed the software infrastructure of two Internet service providers, coded complex software happily in every environment imaginable, tested the security of all natures of applications and APs, and made mainframes talk to cell phones. He is the author of C# 5 All in One for Dummies and Windows 8 Programming with HTML5 For Dummies; a coauthor of Effective Visual Studio.NET and many other books, a frequent contributor to industry magazines; and has recently been an invited speaker for the ACM and IEEE, BlackHat, CodeMash, DerbyCon, BSides, DevEssentials, the International XML Web Services Expo and the Association of Information Technology Professionals. Bill also serves on the board of the Columbus branch of the Open Web Application Security Project, and is the Administrative Director of Locksport International.
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast