Hacking the Hackers!

Join us as we dive into a series of interactive hands-on labs where we apply our knowledge of common web application vulnerabilities (e.g. SQLi, XSS, CSRF, etc…) and binary Reverse Engineering (e.g. ida, windbg, etc…) techniques to research and develop exploits for malicious C2 servers commonly used by Black hat hackers to manage their botnets of zombie computers.