YoVDO

Hunting Asynchronous Vulnerabilities

Offered By: 44CON Information Security Conference via YouTube

Tags

44CON Courses Cybersecurity Courses Penetration Testing Courses Cross-Site Scripting (XSS) Courses SQL Injection Courses XML External Entity (XXE) Injection Courses

Course Description

Overview

Explore advanced techniques for uncovering hidden vulnerabilities in blackbox testing scenarios during this 33-minute conference talk from the 44CON Information Security Conference. Delve into the world of exploit-induced callbacks, a powerful method for detecting issues that may not present visible symptoms, such as blind second-order SQL injection and shell command injection via background processes. Learn how to extend callback techniques beyond basic examples to identify blind and asynchronous vulnerabilities across various technologies, including XXE, (DOM)XSS, SQL injection, SMTP, and XML injection. Examine a range of strategies for triggering application callbacks, from simple approaches to complex cross-technology exploit chains. Gain insights into managing the infrastructure required for automating the discovery of these elusive vulnerabilities, along with practical advice for implementing these techniques safely in production environments.

Syllabus

Hunting Asynchronous Vulnerabilities Presented By James Kettle


Taught by

44CON Information Security Conference

Related Courses

Supply Chain Unchained - How To Be A Bad SaaS
44CON Information Security Conference via YouTube
Aviation Security 101
44CON Information Security Conference via YouTube
The Anti-Checklist Manifesto
44CON Information Security Conference via YouTube
Why Are We Still Doing Authentication Wrong?
44CON Information Security Conference via YouTube
What Do Hackers See When They Look at the Clouds
44CON Information Security Conference via YouTube