The security flaws seem to be unrelated, yet altogether could cause a catastrophe? Vulnerabilities already patched, yet your website is still constantly hacked? Let the cybersecurity consultant with years of real-world experience from CHT Security share with you. Common website offensive techniques and countermeasures will be explained. You will also learn how to uncover root cause and block hackers from the defensive web via hands-on lab.
(Suitable for: website administrator/system developer/those interested in information security)
In this lesson, participants will learn the design concept and application of OWASP Top 10. Through practical experience, you will understand the cause and threat of vulnerabilities, how the attackers remain control, and how we correspond.
This lesson includes/introduces common OWASP and website intrusion techniques and paired with meticulously designed lab environment. Besides learning vulnerability exploitation, we will further discuss how the attackers gain control even after the vulnerabilities have been patched.
1. Laptop memory: 4G+ RAM
2. OS: Windows 7 (incl.) or higher
3. Browser: Chrome or Firefox
4. Able to connect to Wi-Fi
1. Basic knowledge of computer networking.
2. Basic hands-on experience in Linux and Bash.
CHT Security Cybersecurity Researcher
WANG, Kai-Ching is a cybersecurity researcher from CHT Security. He specializes in red teaming and penetration testing.
With enthusiasm, WANG has rich experiences in security testing and educational training. He has served governmental institutions, financial institutions, and listed companies.
Oftentimes, WANG can be found coaching students on security skills in Advanced Information Security Summer School (AIS3) and 台灣好厲駭 related programs, with an aspiration to integrate cybersecurity into daily lives.