< Forrige nyhet Neste nyhet >
How to Bypass Authentication and Authorization

How to Bypass Authentication and Authorization

19, November 2017

At HackCon this year, listed among one of the Bug Bounty program top 10 Security Researchers in 2016 (BugCrowd and Synack Leaderboards), Sarwar Jahan, will cover real vulnerabilities found and reported to various reputed and large organizations. He will also explain step by step the different Technique of finding Authentication and Authorization related security vulnerabilities. [Public Disclosure links will also be provided].

He will systematically go through different scenarios of how to check for authentication and authorization vulnerabilities so you are able to protect your systems and secure your critical values.

 

Sarwar Jahan is an Application Security Engineer and are listed among top 10 Security Researchers in 2016 (BugCrowd and Synack Leaderboards). He is dedicated to the security field and internationally recognized within the security community.  

 

If you want to secure systems and learn about how to reduce authentication and authorization vulnerabilities, you should not miss this session! 

 

Meld deg på: https://hackcon.org/aktiviteter/hackcon13.