workshop
Hacking Your Web Applications: From Benign Reconnaissance to Code-Level Exploits
Vulnerabilities such as server-side request forgery (SSRF) and SQL injections still make it to the top of the OWASP Top 10. These vulnerabilities could allow a skilled attacker to gain access to unauthorized data and compromise your infrastructure.
In this course, you will get the opportunity to think like an attacker by performing various attacks against a web application. You will also see, as a defender, how you can leverage Datadog Application Security Management to identify which users are targeting your applications and which part of your code is impacted.
Learning Objectives
By the end of this course, you will be able to:
- Enable ASM on a sample application.
- Set up the appropriate options on the Datadog agent.
- Instrument the application to collect trace data.
- Observe how Datadog ASM can detect security attack vectors.
Information
TIME: 2024-03-26 | 13:45
ROOM: James Watt
workshop
Hacking Your Web Applications: From Benign Reconnaissance to Code-Level Exploits
Vulnerabilities such as server-side request forgery (SSRF) and SQL injections still make it to the top of the OWASP Top 10. These vulnerabilities could allow a skilled attacker to gain access to unauthorized data and compromise your infrastructure.
In this course, you will get the opportunity to think like an attacker by performing various attacks against a web application. You will also see, as a defender, how you can leverage Datadog Application Security Management to identify which users are targeting your applications and which part of your code is impacted.
Learning Objectives
By the end of this course, you will be able to:
- Enable ASM on a sample application.
- Set up the appropriate options on the Datadog agent.
- Instrument the application to collect trace data.
- Observe how Datadog ASM can detect security attack vectors.