Beware of the dark side, Luke!

Somehow you met the impossible deadline, your project is online and you now deserve some time to relax. Other than you and me though, the internet does not sleep and your application is under constant risk of attack. Even without having access to the source code, attackers have their ways to break into applications and steal or modify private information. Switch sides for a day and attack the demo blackbox application! Learn how attackers gather information, exploit vulnerabilities and hijack servers – and what to do to stop them.

Slide 1 von 49

PDF

About the speaker

Arne Blankerts
Arne Blankerts
Twitter LinkedIn Xing
Share presentation
Why the Tower of Pisa is Leaning Deployment == Annoyment?