More and more web applications delegate business logic to the client.
terms that describe the contents of the modern web stack. But how does
the attack surface look for those? What if there’s not GET parameters
anymore that our scanner scan tamper with? Classic web-pentests are “so
nineties” in this realm. And keeping up the pace with progress is
getting harder and harder.
But there is hope. We’ll learn how to attack any web-application with
either unknown legacy features – or the half-baked results coming to
your browser from the labs of W3C, WHATWG and the ES2016 mailing lists.
Whether you want to attack modern web applications or shiny browser
extensions – we have that covered.
HTML is a living standard. And so is this workshop. The course material
will be provided on-site and via access to a private
Github repository so all attendees will be receive updated material even
months after the actual training.
You will find latest basic to advance web application exploitation to hunt the bugs in the application.