Your web browser is out of date. Update your browser for more security, speed and the best experience on this site.
The Hacker Methodology: How Hackers Work
Cyber Security is becoming a very
important topic for a lot of companies.
Nobody wants to see the name of their
company on the front-page news
because they got hacked. This session
aims to give developers an introduction
on how hackers work and
The main topics of the session are information gathering, operational security, enumeration, exploitation, and persistence. We will discuss different weaknesses hackers look for and try to exploit. All with a focus on how developers make these mistakes and how they can solve them. We will also take a look at the consequences of being hacked, and what to do when, not if, this happens. During the talk, we take a look at three examples of exploits: Log poisoning, Sensitive Information Leaks, and privilege escalation. At the end of the talk, I also introduce other learning resources which can be used to learn hacking yourself.
Vraag een axxes speaker aan
Bent u op zoek naar een spreker?
Heeft u een interessant topic gezien op onze website?
Benieuwd naar onze spreker formules?
Aarzel niet om ons te contacteren via deze form, wij proberen zo spoedig mogelijk uw vraag te beantwoorden.