Ben Sadeghipour
Hacker & Content Creator
Ben Sadeghipour
Hacker & Content Creator
Ben Sadeghipour, also known as NahamSec, is an ethical hacker, content creator, and keynote speaker. With a passion for cybersecurity that began in his teenage years, Ben's professional journey as a bug bounty hunter took off in 2014. He has played a role in helping organizations identify and remediate thousands of security vulnerabilities across a wide range of web and mobile applications in tech giants such as Amazon, Apple, Google, Airbnb, Snapchat, Zoom, and even the US Department of Defense. Through his YouTube and Twitch content, Ben helps others learn ethical hacking, bug bounty hunting, and reconnaissance techniques. He has also created training materials and content for conferences such as OWASP, DEFCON, and BSides.
Upcoming masterclasses featuring Ben Sadeghipour
From Dev to Defense: Understanding Server-Side Vulnerabilities
This intensive one-day masterclass bridges the gap between developers and hackers, offering a deep dive into server-side vulnerabilities from an adversarial perspective. Tailored for developers eager to learn more about how to secure their application, this master course provides an insight into the hacker's methodology. Participants will gain hands-on experience on exploiting server-side vulnerabilities through example web applications and different services.
Learning Objectives
By the end of this intensive one-day masterclass, participants will be able to:
- Exploit SSRF Vulnerabilities Like a Hacker: Demonstrate the ability to identify and leverage Server-Side Request Forgery vulnerabilities in web applications, gaining unauthorized access to internal resources and manipulating server-side operations.
- Execute Advanced Remote Command Injection Attacks: Craft and deploy sophisticated Remote Code Execution payloads across various platforms, understanding how seemingly innocuous input can be weaponized to take control of server systems.
- Weaponize XXE for Data Exfiltration: Manipulate XML parsing processes to execute XML External Entity attacks, extracting sensitive data and compromising system integrity through real-world scenarios.
- Art of SQL Injection: Perform SQL Injection techniques to bypass authentication, extract database contents, and manipulate backend data, gaining a deep understanding of how attackers exploit poor input sanitization.
- Exploit DevOps Tools for Maximum Impact: Identify and leverage common misconfigurations in DevOps infrastructure, including GitLab, Jenkins, and other CI/CD tools, to gain unauthorized access, extract sensitive information, and potentially achieve full system compromise.
Target Audience
- Tech Leads
- Software Engineers
- Security Analysts
- Ethical Hackers
- DevOps Engineers
- Cloud Architects
Prerequisites & Equipment
- A working laptop with wifi/internet capabilities for remote desktop access
- A high level understanding of web technologies including HTTP requests, DNS queries, and basic TCP/IP
Reserve your spot now
Upcoming conference sessions featuring Ben Sadeghipour
AI Powered Bug Hunting
This session will give you a glimpse into the world offensive security and ethical hacking, using real-world examples from bug bounty hunting. We will explore critical vulnerabilities in modern web applications that threaten a company infrastructure or attacks the company by leveraging customer PII.
Additionally, we’ll discuss how AI can serve as a valuable companion in the hacking process, helping to generate ideas and solutions for identifying and addressing security flaws effectively.
Get conference pass
AI Powered Bug Hunting
This session will give you a glimpse into the world offensive security and ethical hacking, using real-world examples from bug bounty hunting. We will explore critical vulnerabilities in modern web applications that threaten a company infrastructure or attacks the company by leveraging customer PII.
Additionally, we’ll discuss how AI can serve as a valuable companion in the hacking process, helping to generate ideas and solutions for identifying and addressing security flaws effectively.
Get conference pass
AI Powered Bug Hunting
This session will give you a glimpse into the world offensive security and ethical hacking, using real-world examples from bug bounty hunting. We will explore critical vulnerabilities in modern web applications that threaten a company infrastructure or attacks the company by leveraging customer PII.
Additionally, we’ll discuss how AI can serve as a valuable companion in the hacking process, helping to generate ideas and solutions for identifying and addressing security flaws effectively.
Get conference pass
Content featuring Ben Sadeghipour
What the Hack?
How The Hack?
Hack Like a Pro: Bug Bounties, Web Vulnerabilities & More!
Past masterclasses featuring Ben Sadeghipour
Intro to Bug Bounty Hunting and Web Application Hacking | GOTO Amsterdam 2023
Intro to Bug Bounty Hunting and Web Application Hacking | GOTO Copenhagen 2022
Browse all experts
Here