Day 1
Day 2 Agenda
Note: This session “Parsing & Visualizing Log Files | By: Amr Amin” has been Cancelled. We apologize for any inconvenience.
Capture the Flag Competitions. How to play? And How to win | By: Adham Fahmy
Room B
10:00 am till 5:00 pm
Capture The Flag hacking games or competitions are one of the best ways to discover , enhance and boost your security skills. Through this workshop, We will describe strategies and methods of solving various challenges, examples based on real previous CTFs and a guide on how to be a good CTF player.
Basic knowledge in information security and Networking field.
Your own laptops with 10 G free space available
A virtual box or vmware player including xp with .NET framework 3.5 installed and kali.
Web Applications Security Researching and Bug Hunting | By: Ebrahim Hegazy
Room B
10:00 am till 5:00 pm
In this Web Applications Security Researching and Bug Hunting Session, We are going to put our hands on:
1- Bug Bounty Programs
2- GHDB(Google Hacking Database)
3- XSS(Cross Site Scripting)
4- Remote Code/Command Execution
5- SQL Injection
6- Open Redirections
Because in this session we will:
1- Go into this vulnerabilities in depth
2- Use it to join Bug Bounty Programs “Live”
1- Laptop with any aspects but with Firefox browser installed.
2- Burp Suite (Free or Commercial)
3- Below FireFox Plugins:
Wappalyzer
Web Developer
Live Http Headers
Now get yourself ready to hunt for vulnerabilities in BBP and let’s get you some cash 😀