Abstract

  • Introduction - Web Application Firewall (WAF)
  • Attacking an application in absence of WAF
  • Attacking the same application in presence of WAF

Speaker

Sarwar Jahan M

I'm an eThicaL hAckeR, passionate about learning new technologies and sharing knowledge with others.
I'm working @ Broadridge with expertise in Vulnerability Assessment(VA/PT) & Secure Code Review(SCR).

Timing

Starts at Sunday September 27 2015, 10:15 AM. The sessions runs for about 1 hour.

Resources