
DEF CON Training
Dawid Czagan - Black Belt Pentesting / Bug Hunting Millionaire: Mastering Web Attacks with Full-Stack Exploitation $2,400
Trainer(s) bio:
Dawid Czagan is a recognized security researcher and trainer. He is listed among top hackers at HackerOne. Dawid Czagan has found security bugs in Apple, Google, Mozilla, Microsoft and many others. Due to the severity of many bugs, he received numerous awards for his findings.
Dawid Czagan shares his offensive security experience in his hands-on trainings. He delivered trainings at key industry conferences such as Hack In The Box (Amsterdam), CanSecWest (Vancouver), 44CON (London), Hack In Paris (Paris), NorthSec (Montreal), HITB+CyberWeek (Abu Dhabi), BruCON (Ghent) and for many corporate clients. His students include security specialists from Oracle, Adobe, ESET, ING, Red Hat, Trend Micro, Philips and government sector (references are attached to Dawid Czagan's LinkedIn profile (https://www.linkedin.com/in/dawid-czagan-85ba3666/). They can also be found here: https://silesiasecuritylab.com/services/training/#opinions).
Dawid Czagan is the founder and CEO at Silesia Security Lab. To find out about the latest in his work, you are invited to subscribe to his newsletter (https://silesiasecuritylab.com/newsletter) and follow him on Twitter (@dawidczagan) and LinkedIn (https://www.linkedin.com/in/dawid-czagan-85ba3666/).
Trainer(s) social media links:
YouTube: https://www.youtube.com/channel/UCG-sIlaM1xXmetFtEfqtOqg
LinkedIn: https://www.linkedin.com/in/dawid-czagan-85ba3666/
Twitter: https://twitter.com/dawidczagan
Training description:
- - Exploiting Race Conditions: https://www.youtube.com/watch?v=lLd9Y1r2dhM
- - Token Hijacking via PDF File: https://www.youtube.com/watch?v=AWplef1CyQs
- - Bypassing Content Security Policy: https://www.youtube.com/watch?v=tTK4SZXB734
Key learning objectives:
After completing this training, you will have learned about:
- browser-dependent exploitation
- DOM-based exploitation
- exploiting race conditions
- remote cookie tampering
- bypassing Content Security Policy
- exploiting type confusion
- exploiting parameter pollution
- hijacking tokens via PDF
- exploiting DB truncation
- exploiting NoSQL injection
- using wrappers to launch RCE
- RCE via serialization/deserialization
- exploiting path-relative stylesheet import
- exploiting reflected file download (various browsers)
- AngularJS-based application hacking
- non-standard XSS attacks
- hacking with polyglot
- subdomain takeover
- REST API hacking
- XML attacks
- advanced clickjacking in modern browsers
- advanced SSRF with gopher protocol
- protection bypass with Shift_JIS encoding
- and more …
Outline:
DAY 1
- SSRF: reading the SecretAccessKey of the application hosted on AWS
- SSRF: Jenkins shutdown
- SSRF: deleting ElasticSearch database
- Bypassing authentication via type confusion
- DB truncation: changing the admin’s password
- AngularJS: Template injection and $scope hacking
- AngularJS: Going beyond the $scope
- AngularJS: Hacking a static template
- HTTP Parameter Pollution
- Bypassing XSS protection with Shift_JIS encoding
- Bypassing CSP via ajax.googleapis.com
- Bypassing CSP via Flash file
- Bypassing CSP via polyglot file
- Bypassing CSP via AngularJS
- User redirection via window.opener tabnabbing
- RCE via file upload
- LFI: reading the content of .php files
- From LFI to RCE
- NoSQL injection: MongoDB
- NoSQL injection: ElasticSearch
- Race condition: stealing money from a bank
DAY 2
- Race condition: reusing a one-time discount code
- Subdomain takeover
- Account takeover via clickjacking
- SSRF via XML DOCTYPE
- SSRF via XML XInclude
- SSRF via XML External Entity (XXE)
- DOM XSS via location.hash
- DOM XSS via JSON
- DOM XSS via cookie
- Reflected File Download (RFD) with callback
- Reflected File Download (RFD) with callback and JScript
- Reflected File Download (RFD) without callback
- RCE via deserialization (Python)
- RCE via deserialization (Java)
- Path traversal via deserialization (PHP)
- Token hijacking via PDF file
- XSS via Path-Relative Stylesheet Import Vulnerability (PRSSI)
Technical Level: Intermediate/Advanced
What students will receive:
Students will be handed in a VMware image with a specially prepared testing environment to play with all bugs presented in this training. When the training is over, students can take the complete lab environment home (after signing a non-disclosure agreement) to hack again at their own pace.
Special bonus:
The ticket price includes FREE access to Dawid Czagan's 6 online courses:
- Fuzzing with Burp Suite Intruder
- Exploiting Race Conditions with OWASP ZAP
- Case Studies of Award-Winning XSS Attacks: Part 1
- Case Studies of Award-Winning XSS Attacks: Part 2
- How Hackers Find SQL Injections in Minutes with Sqlmap
- Web Application Security Testing with Google Hacking
What students say about the training:
This hands-on training was attended by security specialists from Oracle, Adobe, ESET, ING, Red Hat, Trend Micro, Philips, government sector and it was very well-received. Recommendations are attached to Dawid Czagan's LinkedIn profile (https://www.linkedin.com/in/dawid-czagan-85ba3666/).
They can also be found here (https://silesiasecuritylab.com/services/training/#opinions).
What students should know:
To get the most of this training intermediate knowledge of web application security is needed. Students should be familiar with common web application vulnerabilities and have experience in using a proxy, such as Burp Suite Proxy, or similar, to analyze or modify the traffic.
What students should bring:
Students will need a laptop with 64-bit operating system, at least 8 GB RAM, 35 GB free hard drive space, administrative access, ability to turn off AV/firewall and VMware Player/Fusion installed (64-bit version). Prior to the training, make sure there are no problems with running 64-bit VMs (BIOS settings changes may be needed). Please also make sure that you have Internet Explorer 11 installed on your machine or bring an up-and-running VM with Internet Explorer 11.
DATE: August 14th-15th 2023
TIME: 8am to 5pm PDT
VENUE: Caesars Forum, Las Vegas, NV
TRAINER: Dawid Czagan
- 16 hours of training with a certificate of completion.
- 2 coffee breaks are provided per day
- Note: Food is not included
Registration terms and conditions:
Trainings are refundable before July 1st, the processing fee is $250.
Trainings are non-refundable after July 10th, 2023.
Training tickets may be transferred. Please email us for specifics.
Failure to attend the Training without prior written notification, will be considered a No-Show. No refund will be given.
By purchasing this ticket you agree to abide by the DCT Code of Conduct and the registration terms and conditions listed above.
DEF CON Communications, Inc.
1100 Bellevue way NE
8A-85
Bellevue, WA 98004