2 Day Pre-Conference Training: The Art of Exploiting Injection Flaws presented at AppSec USA 2013

by Sumit "sid" Siddharth,

Summary : Overview
OWASP rates injection flaws as the most critical vulnerability within the Top 10 most Critical Web Application Security Risks under the OWASP Top 10 project. http://www.owasp.org/index.php/Top_10_2010-A1
(even the 2013 Relese Candidate for Top 10 has retained injection flaw as top flaw)
This hands-on session will only focus on the injection flaws and the attendees will get an in-depth understanding of the flaws arising from this vulnerability. The topics covered in the class are:
SQL Injection
XPATH Injection
LDAP Injection
Hibernate Query Language Injection
Direct OS Code Injection
XML Entity Injection
During the 2 days course, the attendees will have access to a number of challenges for each flaw and they will learn a variety of exploitation techniques used by the attackers in the wild. Identify, extract, escalate, execute; we have got it all covered. The following are the objectives of the course:
Understand the problem of Injection Flaws
Learn a variety of advanced exploitation techniques which hackers use.
learn how to fix these problems?
Student hand-outs
Tools/scripts (some public and some not so public)
Web Application Developers
Web Application Security Consultants
Penetration Testers
Anyone who wants to take their skills to next level
Shells popping
Advanced data ex-filtration techniques.
Advanced exploitation (some neat, new and ridiculous hacks).
Some insane examples of code which appears secure but it's not.
Students must bring their own laptop with Windows Operating System installed (either natively or running in a VM). Further, students must have administrative access to perform tasks like install software, disable antivirus etc. Devices which don't have ethernet connection (e.g. macbook Air, tablets etc) are not supported. A prior knowledge of Database systems and SQL language will be an added advantage but it's not a strict requirement.