Day 1

Day 2 Agenda

Note: This session “Parsing & Visualizing Log Files | By: Amr Amin” has been Cancelled. We apologize for any inconvenience.

Capture the Flag Competitions. How to play? And How to win | By: Adham Fahmy

Room B

10:00 am till 5:00 pm

Capture The Flag hacking games or competitions are one of the best ways to discover , enhance and boost your security skills. Through this workshop, We will describe strategies and methods of solving various challenges, examples based on real previous CTFs and a guide on how to be a good CTF player.

Basic knowledge in information security and Networking field.

Your own laptops with 10 G free space available

A virtual box or vmware player including xp with .NET framework 3.5 installed and kali.


Web Applications Security Researching and Bug Hunting | By: Ebrahim Hegazy

Room B

10:00 am till 5:00 pm

In this Web Applications Security Researching and Bug Hunting Session, We are going to put our hands on:

1- Bug Bounty Programs

2- GHDB(Google Hacking Database)

3- XSS(Cross Site Scripting)

4- Remote Code/Command Execution

5- SQL Injection

6- Open Redirections

Because in this session we will:

1- Go into this vulnerabilities in depth

2- Use it to join Bug Bounty Programs “Live”

1- Laptop with any aspects but with Firefox browser installed.

2- Burp Suite (Free or Commercial)

3- Below FireFox Plugins:


Web Developer

Live Http Headers

Now get yourself ready to hunt for vulnerabilities in BBP and let’s get you some cash 😀