Home GOTO Experts Ben Sadeghipour

Ben Sadeghipour, also known as NahamSec, is an ethical hacker, content creator, and keynote speaker. With a passion for cybersecurity that began in his teenage years, Ben's professional journey as a bug bounty hunter took off in 2014. He has played a role in helping organizations identify and remediate thousands of security vulnerabilities across a wide range of web and mobile applications in tech giants such as Amazon, Apple, Google, Airbnb, Snapchat, Zoom, and even the US Department of Defense. Through his YouTube and Twitch content, Ben helps others learn ethical hacking, bug bounty hunting, and reconnaissance techniques. He has also created training materials and content for conferences such as OWASP, DEFCON, and BSides.

Upcoming masterclasses featuring Ben Sadeghipour

From Dev to Defense: Understanding Server-Side Vulnerabilities

This intensive one-day masterclass bridges the gap between developers and hackers, offering a deep dive into server-side vulnerabilities from an adversarial perspective. Tailored for developers eager to learn more about how to secure their application, this master course provides an insight into the hacker's methodology. Participants will gain hands-on experience on exploiting server-side vulnerabilities through example web applications and different services.

Learning Objectives

By the end of this intensive one-day masterclass, participants will be able to:

  1. Exploit SSRF Vulnerabilities Like a Hacker: Demonstrate the ability to identify and leverage Server-Side Request Forgery vulnerabilities in web applications, gaining unauthorized access to internal resources and manipulating server-side operations.
  2. Execute Advanced Remote Command Injection Attacks: Craft and deploy sophisticated Remote Code Execution payloads across various platforms, understanding how seemingly innocuous input can be weaponized to take control of server systems.
  3. Weaponize XXE for Data Exfiltration: Manipulate XML parsing processes to execute XML External Entity attacks, extracting sensitive data and compromising system integrity through real-world scenarios.
  4. Art of SQL Injection: Perform SQL Injection techniques to bypass authentication, extract database contents, and manipulate backend data, gaining a deep understanding of how attackers exploit poor input sanitization.
  5. Exploit DevOps Tools for Maximum Impact: Identify and leverage common misconfigurations in DevOps infrastructure, including GitLab, Jenkins, and other CI/CD tools, to gain unauthorized access, extract sensitive information, and potentially achieve full system compromise.

Target Audience

  • Tech Leads
  • Software Engineers
  • Security Analysts
  • Ethical Hackers
  • DevOps Engineers
  • Cloud Architects

Prerequisites & Equipment

  • A working laptop with wifi/internet capabilities for remote desktop access
  • A high level understanding of web technologies including HTTP requests, DNS queries, and basic TCP/IP
Wednesday Dec 4 @ 09:00 | Melbourne, Australia

Reserve your spot now

Upcoming conference sessions featuring Ben Sadeghipour

AI Powered Bug Hunting

This session will give you a glimpse into the world offensive security and ethical hacking, using real-world examples from bug bounty hunting. We will explore critical vulnerabilities in modern web applications that threaten a company infrastructure or attacks the company by leveraging customer PII.

Additionally, we’ll discuss how AI can serve as a valuable companion in the hacking process, helping to generate ideas and solutions for identifying and addressing security flaws effectively.

Friday Dec 13 @ 15:30 @ YOW! Sydney 2024

Get conference pass

AI Powered Bug Hunting

This session will give you a glimpse into the world offensive security and ethical hacking, using real-world examples from bug bounty hunting. We will explore critical vulnerabilities in modern web applications that threaten a company infrastructure or attacks the company by leveraging customer PII.

Additionally, we’ll discuss how AI can serve as a valuable companion in the hacking process, helping to generate ideas and solutions for identifying and addressing security flaws effectively.

Tuesday Dec 10 @ 09:00 @ YOW! Brisbane 2024

Get conference pass

AI Powered Bug Hunting

This session will give you a glimpse into the world offensive security and ethical hacking, using real-world examples from bug bounty hunting. We will explore critical vulnerabilities in modern web applications that threaten a company infrastructure or attacks the company by leveraging customer PII.

Additionally, we’ll discuss how AI can serve as a valuable companion in the hacking process, helping to generate ideas and solutions for identifying and addressing security flaws effectively.

Thursday Dec 5 @ 16:45 @ YOW! Melbourne 2024

Get conference pass

Content featuring Ben Sadeghipour

40:50
What the Hack?
What the Hack?
GOTO Copenhagen 2022
42:48
How The Hack?
How The Hack?
GOTO Amsterdam 2023
Hack Like a Pro: Bug Bounties, Web Vulnerabilities & More!
Hack Like a Pro: Bug Bounties, Web Vulnerabilities & More!
GOTO Unscripted

Past masterclasses featuring Ben Sadeghipour

Intro to Bug Bounty Hunting and Web Application Hacking | GOTO Amsterdam 2023

Intro to Bug Bounty Hunting and Web Application Hacking | GOTO Copenhagen 2022

Browse all experts

Here