workshop
Hacking Your Web Applications: From Benign Reconnaissance to Code-Level Exploits
Vulnerabilities such as server-side request forgery (SSRF) and SQL injections still make it to the top of the OWASP Top 10. These vulnerabilities could allow a skilled attacker to gain access to unauthorized data and compromise your infrastructure. In this workshop, you will get the opportunity to think like an attacker by performing various attacks against a web application. You will also see, as a defender, how you can leverage Datadog Application Security Monitoring to identify which users are targeting your applications and which part of your code is impacted. By the end of this workshop, you will understand how to quickly detect and respond to threats by getting visibility into code-level exploits.
Information
TIME: 2025-03-04 | 13:30
workshop
Hacking Your Web Applications: From Benign Reconnaissance to Code-Level Exploits
Vulnerabilities such as server-side request forgery (SSRF) and SQL injections still make it to the top of the OWASP Top 10. These vulnerabilities could allow a skilled attacker to gain access to unauthorized data and compromise your infrastructure. In this workshop, you will get the opportunity to think like an attacker by performing various attacks against a web application. You will also see, as a defender, how you can leverage Datadog Application Security Monitoring to identify which users are targeting your applications and which part of your code is impacted. By the end of this workshop, you will understand how to quickly detect and respond to threats by getting visibility into code-level exploits.