PUNCH
We will use web applications to collect user data and users will use our applications to complete their important transactions. It is our responsiblity (as developers) to ensure that our web application is safe
WIIFY
See how easy it is to attack a web application and learn to adopt some security measures in your own
Agenda
Demonstration of how to attack a web application
Famous examples of XSS
How to prevent XSS
Why you should start looking out for vulnerabilities in your own/other web applications
Key Points
Don't assume your web applications are safe by default
Think about the security aspect when developing your web applications
Be on the lookout for security vulnerabilities
Impact
Know: How easy it is for someone to attack your web application
Believe: Your application is not safe by default, you need to make a concious effort to make it secure
Call to Action: Start looking for such vulnerabilties now
PUNCH We will use web applications to collect user data and users will use our applications to complete their important transactions. It is our responsiblity (as developers) to ensure that our web application is safe
WIIFY See how easy it is to attack a web application and learn to adopt some security measures in your own
Agenda
Key Points
Impact Know: How easy it is for someone to attack your web application Believe: Your application is not safe by default, you need to make a concious effort to make it secure Call to Action: Start looking for such vulnerabilties now
Slides