Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Automating and attacking complex HTTP processes with OWASP Raider #11

Open
3 of 5 tasks
danielonsecurity opened this issue Jun 9, 2023 · 0 comments
Open
3 of 5 tasks

Comments

@danielonsecurity
Copy link

Short description of the talk

Raider is a novel, LISP-based framework for web application security
testing that abstracts the client-server information exchange as a
finite state machine. Each step comprises one request with inputs, one
response with outputs, arbitrary actions to do on the response, and
conditional links to other stages, creating a graph-like
structure. This architecture works not only for authentication
purposes but can be used for any HTTP process that needs to keep track
of states. In this presentation, we'll cover the motivation behind
Raider, the key concepts of the framework, and demonstrate how it can
automate complex HTTP processess. We'll show how Raider's flexibility
enables easy customization of attacks and how its clear text
configuration makes reproducing, sharing, and modifying attacks easy.

Level

  • Beginner
  • Advanced
  • Everyone

Contact information
Your name and where to contact you for questions, comments, or in case the talk is not being voted for but someone want's to talk with you about your topic.

Possible days for the talk

  • Saturday
  • Sunday
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant