Skip to content

Details

Modern web applications are complex, fast-moving, and often assumed to be “secure by design.” In this session, we’ll break that assumption by walking through how real attackers approach modern web apps — from reconnaissance to exploitation.
💡 What we’ll cover:

  • How attackers perform effective recon before touching any tools
  • Common authentication, authorization, and logic flaws in modern apps
  • A practical exploit chain walkthrough (real-world mindset)
  • What defenders should be doing to detect and prevent these issues

This session is designed for:

  • Students and beginners transitioning from labs to real-world security
  • Pentesters and AppSec engineers sharpening their methodology
  • Developers who want to understand how their apps are actually attacked

The goal remains the same: learning by doing, sharing real experiences, and growing the local cybersecurity community together.

Related topics

Web Security
Web Technology

You may also like