{"id":492,"date":"2019-03-19T10:15:53","date_gmt":"2019-03-19T10:15:53","guid":{"rendered":"http:\/\/eunis.org\/eunis2019\/?page_id=492"},"modified":"2019-04-08T08:52:43","modified_gmt":"2019-04-08T08:52:43","slug":"gdpr-information-security-sig","status":"publish","type":"page","link":"https:\/\/eunis.org\/eunis2019\/gdpr-information-security-sig\/","title":{"rendered":"How to hack a web application"},"content":{"rendered":"<p>[vc_row][vc_column width=&#8221;3\/4&#8243;][vc_column_text]<\/p>\n<h2>How to hack a Web Application: &#8220;To protect against hackers, you have to think as one!&#8221;<\/h2>\n<p><em>Tuesday 4 June, 12:30\u201316:30<\/em><\/p>\n<p>Limited to 30 participants<\/p>\n<p>Asbj\u00f8rn Reglund Thorsen and Matija Puzar from Unit \u2013 The Norwegian Directorate for ICT and Joint Services in Higher Education and Research in Norway, are inviting the 30 first participants to sign up to this workshop to do some hands-on web application hacking.<\/p>\n<p>Who is this course for:<\/p>\n<ul>\n<li>Developers who want to build secure web applications<\/li>\n<li>Testers who want to find security holes in web applications<\/li>\n<li>People who are curious how hackers can compromise a web application<\/li>\n<\/ul>\n<p>Duration: 3h<\/p>\n<p>What to bring:<\/p>\n<ul>\n<li>Laptop installed with vmware or virtualbox.<\/li>\n<li>The laptop should have more than 50 GB available disk space.<\/li>\n<li>The laptop should have 8GB or more RAM<\/li>\n<\/ul>\n<p>You will learn:<\/p>\n<ul>\n<li>how to intercept and manipulate web traffic travelling in and out of your computer.<\/li>\n<li>Cross Site Scripting (XSS)<\/li>\n<li>SQL injection SQLi<\/li>\n<li>Much more<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>For more information about this training session contact Asbj\u00f8rn Reglund Thorsen <a href=\"mailto:asbjorn.reglund.thorsen@unit.no\">asbjorn.reglund.thorsen@unit.no<\/a>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243;][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column width=&#8221;3\/4&#8243;][vc_column_text] How to hack a Web Application: &#8220;To protect against hackers, you have to think as one!&#8221; Tuesday 4 June, 12:30\u201316:30 Limited to 30 participants Asbj\u00f8rn Reglund Thorsen and Matija Puzar from Unit \u2013 The Norwegian Directorate for ICT and Joint Services in Higher Education and Research in Norway, are inviting the 30 first [&hellip;]<\/p>\n","protected":false},"author":123,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-492","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/eunis.org\/eunis2019\/wp-json\/wp\/v2\/pages\/492","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eunis.org\/eunis2019\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/eunis.org\/eunis2019\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/eunis.org\/eunis2019\/wp-json\/wp\/v2\/users\/123"}],"replies":[{"embeddable":true,"href":"https:\/\/eunis.org\/eunis2019\/wp-json\/wp\/v2\/comments?post=492"}],"version-history":[{"count":6,"href":"https:\/\/eunis.org\/eunis2019\/wp-json\/wp\/v2\/pages\/492\/revisions"}],"predecessor-version":[{"id":526,"href":"https:\/\/eunis.org\/eunis2019\/wp-json\/wp\/v2\/pages\/492\/revisions\/526"}],"wp:attachment":[{"href":"https:\/\/eunis.org\/eunis2019\/wp-json\/wp\/v2\/media?parent=492"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}