Web Exploitation

About this event

Websites all around the world are programmed using various programming languages. While there are specific vulnerabilities in each programming language that the developer should be aware of, there are issues fundamental to the internet that can show up regardless of the chosen language or framework.

These vulnerabilities often show up in CTFs as web security challenges where the user needs to exploit a bug to gain some kind of higher-level privilege.

Common vulnerabilities to see in CTF challenges:

SQL Injection

Command Injection

Directory Traversal

Cross-Site Request Forgery

Cross-Site Scripting

Server-Side Request Forgery

Speaker

Facilitators


Organizers

Partner