From Theory to Practice: Live OWASP Top 10 Demonstrations


Details
This meeting will be in-person! Thank you to Kroger for hosting at their Kroger Blue Ash Technology Center. For security, RSVP by 2 days prior to the meeting is required.
Sponsored by WWT
Join us for an interactive cybersecurity session where we'll move beyond theoretical discussions to hands-on exploitation of the OWASP Top 10 vulnerabilities. This live demonstration will showcase real-world attack techniques using industry-standard tools in a safe, controlled environment.
What You'll Learn
- Practical exploitation techniques for each OWASP Top 10 vulnerability category
- Professional penetration testing methodology using Burp Suite
- How attackers think and operate in real scenarios
- Defensive strategies from an attacker's perspective
Session Format
This will be a live, step-by-step walkthrough using WebGoat (a deliberately vulnerable application) and Burp Suite. Attendees will witness actual vulnerability exploitation, from initial discovery through successful compromise, with clear explanations of each technique.
Audience
Perfect for security professionals, developers, and anyone looking to understand practical application security. No advanced penetration testing experience required - we'll explain each step clearly while demonstrating real attack scenarios.
Takeaways
Attendees will leave with a practical understanding of how these vulnerabilities are exploited in the wild, plus a complete methodology guide for conducting their own ethical security testing.
Bring your laptops if you want to follow along with your own WebGoat instance!
Approximate schedule:
4:00 - Doors open. Come for networking and refreshments!
4:15 - Presentation begins.
5:15 - Networking and refreshments resume!
6:00 EOE (End of Event)

From Theory to Practice: Live OWASP Top 10 Demonstrations