Slide 1

Slide 1 text

S C E N A R I O D R I V E N WA R G A M E F O R W E B P E N T E S T E R S

Slide 2

Slide 2 text

– S O M E O N E O N T H E I N T E R N E T A story can put the whole brain to work

Slide 3

Slide 3 text

“ F I N D B U G , W I L L H A C K ” • An instructor led scenario based training • You start as an attacker with a domain as the target • Chain multiple vulnerabilities and pwn the entire infrastructure • Gain shells, gain confidence and possibly bragging rights

Slide 4

Slide 4 text

– R E A D I T O N T H E I N T E R N E T ; M U S T B E T R U E War games are the best way to learn hacking

Slide 5

Slide 5 text

D E T E C T, I D E N T I F Y A N D E X P L O I T • XWH uses a time tested methodology to teach you the most deadliest of attacks against applications • Learn how to detect the vulnerable parts of an app • Learn how to identify the vulnerability • Learn how to exploit to read system data, explore and attack

Slide 6

Slide 6 text

- X W H F O U N D E R S What good is a bug that can’t give us a shell?

Slide 7

Slide 7 text

I N T H E F O G O F WA R T H E R E I S N O S I T U AT I O N A L AWA R E N E S S ✓ L E A R N T H E F U N D A M E N TA L S ✓ P R A C T I C E A G A I N S T R E A L I S T I C TA R G E T S ✓ G A I N I N S I G H T S W I T H S T O R I E S F R O M T H E F I E L D

Slide 8

Slide 8 text

9th and 10th March 2016 @ nullcon 2016 @makash & @riyazwalikar Register http://j.mp/xwh2016nullcon

Slide 9

Slide 9 text

P H O T O C R E D I T S • C R AT E R L A K E B Y A N D Y S P E A R I N G H T T P S : / / W W W. F L I C K R . C O M / P H O T O S / 4 1 0 4 0 5 3 8 @ N 0 5 / 3 7 8 2 4 8 3 1 7 7 • A L L T H E O T H E R P H O T O S U S E D W I T H P E R M I S S I O N F R O M K A R N I V 0 R E