CERN Computing Seminar

Web security / penetration testing: typical vulnerabilities (2/2)

by Sebastian Lopienski (CERN)

Webinar (CERN)





In order to protect computers and networks from malicious attacks, we need to find and fix any vulnerabilities before they are identified and exploited by the bad guys (Black Hats). One of the ways to achieve it is to do penetration (security) testing. To do this efficiently, the good guys (White Hats) have to think and act as the bad guys - but with the ultimate goal of securing the target rather than abusing it.

In this and the previous seminar, you will learn to think and act like a White Hat penetration tester. We will focus on web applications, as these are the most common targets in any organisation.

This second part of the training covers in more details the most common types of web application vulnerabilities, and the ways to detect and exploit them.

Hands-on exercises (try to do them BEFORE this seminar)

In order to access the hands-on exercises, please subscribe to whitehat-exercise-access egroup (available for CERN accounts owners only).

About the speaker

Sebastian Lopienski serves as CERN's deputy Computer Security Officer. He is also the director of the CERN School of Computing.

From the same series
Organized by

Stefan Lüders/CERN and Vincenzo Ciaschini‎/CNAF

Logistics: Miguel Angel Marquina - IT Department
CERN Computing Seminars and Colloquia

Videoconference Rooms
Computing Seminar: Web security series
Zoom Meeting ID
Sebastian Lopienski
Alternative hosts
John Cassar, Benoit Loyer, Miguel Marquina, Jonathan Coloigner, Ghislain Magdeleine, Stefan Lueders, Clement Montcharmont, Pascal Pignereau
Useful links
Join via phone
Zoom URL
There is a live webcast for this event