OWASP AppSec DC 2012/Python Basics for Web App Pentesters Part 2

Revision as of 19:54, 11 March 2012 by Mark.bristow (talk | contribs)

Jump to: navigation, search


Registration Now OPEN! | Hotel | Schedule | Convention Center | AppSecDC.org

The Presentation

Join me again and take a break from those talks that overstimulate your brain with cool technical details but provide little use to your day to day job. Part two of this talk STILL has none of that. We are going to continue your lessons in python and teach you more python skills to use in your pentests. Join one of the SamuraiWTF project leads and learn how to interact with websites using python scripts and python shells. This time we'll be building on the various HTTP requests you learned the first round and be focusing one how you can effectively use those requests in your own custom python tools. We'll cover more regular expresses, cover the ins and outs of multi-threaded operations, and discuss the best ways to analyze all those results. We'll also revisit the PyCIT and the new templates that have been added.
By the way, don't forget your laptop if you want to follow along.  ;-)

The Speakers

Justin Searle

Owasp logo normal.jpg

Gold Sponsors

Aspect logo owasp.jpg AppSecDC2009-Sponsor-securicon.gif AppSecDC2009-Sponsor-mandiant.gif AppSecDC2012-ISC2.gif

Silver Sponsors


Small Business

AppSecDC2012-Sponsor-sideas.gif BayShoreNetworks.png


link=http://www.codenomicon.com/ Codenomicon WhiteHat Logo.png AppSecDC2012-HP.jpg WSI - Logo.jpg