[prev in list] [next in list] [prev in thread] [next in thread] 

List:       owasp-dotnet
Subject:    [Owasp-dotnet] DeveloperDeveloperDeveloper Day 2
From:       Dinis Cruz <dinis () ddplus ! net>
Date:       2005-09-12 20:55:33
Message-ID: 4325EB45.6080505 () ddplus ! net
[Download RAW message or body]

I'm doing the following presentation on the next DDD conference 
(http://www.developerday.co.uk/ddd/default.asp) in Reading (UK)

*"Attacking Web and Windows Applications*
In this session multiple attack vectors will be shown covering a wide 
variety of vulnerabilities and exploits: Sql Injection (basic and 
advanced), XSS (session hijacking and remote command execution), 
Elevation of Privilege, Web Services exploitation, AJAX exploitation, 
Rootkits (user and kernel level), attacking fat-clients by hooking into 
windows functions (and patching applications in real time), dynamically 
manipulating .Net client applications, exploiting buffer overflows, 
exploiting IE vulnerabilities, exploiting Full Trust Asp.Net, attacking 
IIS, and,  using MetaSploit to automate attacks (and exploit generation)."

If you are going to attend, you can vote for the ones you want to see 
here:  http://www.developerday.co.uk/ddd/votesessions.asp

Thanks

Dinis

[Attachment #3 (text/html)]

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
  <meta content="text/html;charset=ISO-8859-1" http-equiv="Content-Type">
</head>
<body bgcolor="#ffffff" text="#000000">
<br>
<font face="Times New Roman, Times, serif" size="2">I'm doing the
following presentation on the next DDD conference
(<a class="moz-txt-link-freetext" \
href="http://www.developerday.co.uk/ddd/default.asp">http://www.developerday.co.uk/ddd/default.asp</a>) \
in Reading (UK)<br> <br>
<b>"Attacking Web and Windows Applications</b><br>
In this session multiple attack vectors will be shown covering a wide
variety of vulnerabilities and exploits: Sql Injection (basic and
advanced), XSS (session hijacking and remote command execution),
Elevation of Privilege, Web Services exploitation, AJAX exploitation,
Rootkits (user and kernel level), attacking fat-clients by hooking into
windows functions (and patching applications in real time), dynamically
manipulating .Net client applications, exploiting buffer overflows,
exploiting IE vulnerabilities, exploiting Full Trust Asp.Net, attacking
IIS, and,&nbsp; using MetaSploit to automate attacks (and exploit
generation)."<br>
<br>
If you are going to attend, you can vote for the ones you want to see
here:&nbsp; <a class="moz-txt-link-freetext" \
href="http://www.developerday.co.uk/ddd/votesessions.asp">http://www.developerday.co.uk/ddd/votesessions.asp</a><br>
 <br>
Thanks<br>
<br>
Dinis<br>
</font><font face="Times New Roman, Times, serif" size="2"></font>
</body>
</html>


-------------------------------------------------------
SF.Net email is Sponsored by the Better Software Conference & EXPO
September 19-22, 2005 * San Francisco, CA * Development Lifecycle Practices
Agile & Plan-Driven Development * Managing Projects & Teams * Testing & QA
Security * Process Improvement & Measurement * http://www.sqe.com/bsce5sf
_______________________________________________
Owasp-dotnet mailing list
Owasp-dotnet@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/owasp-dotnet

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic