Difference between revisions of "OWASP AppSec DC 2012/Python Basics for Web App Pentesters Part 2"

From OWASP
Jump to: navigation, search
(Created page with "<noinclude>{{:OWASP AppSec DC 2012 Header}}</noinclude> __NOTOC__ == The Presentation == rightJoin me again and take a break from those talks ...")
 
Line 2: Line 2:
 
__NOTOC__
 
__NOTOC__
 
== The Presentation  ==
 
== The Presentation  ==
[[Image:Owasp_logo_normal.jpg|right]]Join me again and take a break from those talks that overstimulate your brain with cool technical details but provide little use to your day to day job.  Part two of this talk STILL has none of that.  We are going to continue your lessons in python and teach you more python skills to use in your pentests.  Join one of the SamuraiWTF project leads and learn how to interact with websites using python scripts and python shells.  This time we'll be building on the various HTTP requests you learned the first round and be focusing one how you can effectively use those requests in your own custom python tools.  We'll cover more regular expresses, cover the ins and outs of multi-threaded operations, and discuss the best ways to analyze all those results.  We'll also revisit the PyCIT and the new templates that have been added.<br>By the way, don't forget your laptop if you want to follow along.  ;-)
+
Join me again and take a break from those talks that overstimulate your brain with cool technical details but provide little use to your day to day job.  Part two of this talk STILL has none of that.  We are going to continue your lessons in python and teach you more python skills to use in your pentests.  Join one of the SamuraiWTF project leads and learn how to interact with websites using python scripts and python shells.  This time we'll be building on the various HTTP requests you learned the first round and be focusing one how you can effectively use those requests in your own custom python tools.  We'll cover more regular expresses, cover the ins and outs of multi-threaded operations, and discuss the best ways to analyze all those results.  We'll also revisit the PyCIT and the new templates that have been added.<br>By the way, don't forget your laptop if you want to follow along.  ;-)
 
== The Speakers  ==
 
== The Speakers  ==
Justin Searle
+
<table>
 +
<tr>
 +
<td>
 +
===Justin Searle===
 +
[[Image:Owasp_logo_normal.jpg|left]]Bio TBA
 +
</td>
 +
</tr>
 +
</table>
 
<noinclude>{{:OWASP AppSec DC 2012 Footer}}</noinclude>
 
<noinclude>{{:OWASP AppSec DC 2012 Footer}}</noinclude>

Revision as of 19:54, 11 March 2012

AppSecDC-468x60-banner-2012.jpg

Registration Now OPEN! | Hotel | Schedule | Convention Center | AppSecDC.org

The Presentation

Join me again and take a break from those talks that overstimulate your brain with cool technical details but provide little use to your day to day job. Part two of this talk STILL has none of that. We are going to continue your lessons in python and teach you more python skills to use in your pentests. Join one of the SamuraiWTF project leads and learn how to interact with websites using python scripts and python shells. This time we'll be building on the various HTTP requests you learned the first round and be focusing one how you can effectively use those requests in your own custom python tools. We'll cover more regular expresses, cover the ins and outs of multi-threaded operations, and discuss the best ways to analyze all those results. We'll also revisit the PyCIT and the new templates that have been added.
By the way, don't forget your laptop if you want to follow along.  ;-)

The Speakers

Justin Searle

Owasp logo normal.jpg
Bio TBA

Gold Sponsors

Aspect logo owasp.jpg AppSecDC2009-Sponsor-securicon.gif AppSecDC2009-Sponsor-mandiant.gif AppSecDC2012-ISC2.gif

Silver Sponsors

SPL-LOGO-MED.png

Small Business

AppSecDC2012-Sponsor-sideas.gif BayShoreNetworks.png

Exhibitors

link=http://www.codenomicon.com/ Codenomicon WhiteHat Logo.png AppSecDC2012-HP.jpg WSI - Logo.jpg