Adam Langley
For over 20 years, Adam has balanced the worlds of application security and web development. He currently serves as the CTO of HackingHub and the Director of BSides Exeter. Over the past five years, he has combined his expertise to create and deliver gamified educational content, aimed at teaching the next generation of ethical hackers and developers about web application security.
Upcoming masterclasses featuring Adam Langley
From Dev to Defense: Understanding Server-Side Vulnerabilities
This intensive one-day masterclass bridges the gap between developers and hackers, offering a deep dive into server-side vulnerabilities from an adversarial perspective. Tailored for developers eager to learn more about how to secure their application, this master course provides an insight into the hacker's methodology. Participants will gain hands-on experience on exploiting server-side vulnerabilities through example web applications and different services.
Learning Objectives
By the end of this intensive one-day masterclass, participants will be able to:
- Exploit SSRF Vulnerabilities Like a Hacker: Demonstrate the ability to identify and leverage Server-Side Request Forgery vulnerabilities in web applications, gaining unauthorized access to internal resources and manipulating server-side operations.
- Execute Advanced Remote Command Injection Attacks: Craft and deploy sophisticated Remote Code Execution payloads across various platforms, understanding how seemingly innocuous input can be weaponized to take control of server systems.
- Weaponize XXE for Data Exfiltration: Manipulate XML parsing processes to execute XML External Entity attacks, extracting sensitive data and compromising system integrity through real-world scenarios.
- Art of SQL Injection: Perform SQL Injection techniques to bypass authentication, extract database contents, and manipulate backend data, gaining a deep understanding of how attackers exploit poor input sanitization.
- Exploit DevOps Tools for Maximum Impact: Identify and leverage common misconfigurations in DevOps infrastructure, including GitLab, Jenkins, and other CI/CD tools, to gain unauthorized access, extract sensitive information, and potentially achieve full system compromise.
Target Audience
- Tech Leads
- Software Engineers
- Security Analysts
- Ethical Hackers
- DevOps Engineers
- Cloud Architects
Prerequisites & Equipment
- A working laptop with wifi/internet capabilities for remote desktop access
- A high level understanding of web technologies including HTTP requests, DNS queries, and basic TCP/IP
Reserve your spot now
Upcoming conference sessions featuring Adam Langley
Web App Security Isn’t Just XSS and SQL Injection!
Often frameworks can give a false sense of security only protecting from just XSS and SQL injection attacks but that’s just the tip of the iceberg. Hear about other commonly exploited vulnerabilities and how developers can learn more about security through gamification platforms.
Get conference pass
Web App Security Isn’t Just XSS and SQL Injection!
Often frameworks can give a false sense of security only protecting from just XSS and SQL injection attacks but that’s just the tip of the iceberg. Hear about other commonly exploited vulnerabilities and how developers can learn more about security through gamification platforms.
Get conference pass
Web App Security Isn’t Just XSS and SQL Injection!
Often frameworks can give a false sense of security only protecting from just XSS and SQL injection attacks but that’s just the tip of the iceberg. Hear about other commonly exploited vulnerabilities and how developers can learn more about security through gamification platforms.
Get conference pass
Browse all experts
Here