Web Hacking Ninja: Mastering Advanced Exploitation Techniques

Back to the list of Speakers and Sessions
At HackingHub we believe that truly effective security testing goes beyond simply learning about common web vulnerabilities. We approach hacking with an adversary mindset, focusing on objectives rather than just identifying isolated issues. In the real world, vulnerabilities don't exist in a vacuum – they can often be chained together by skilled hackers to maximize impact and reach an end goal. That's why our training emphasizes the power of combining vulnerabilities to paint a full picture of an application's security posture. In this advanced course, you'll learn about a range of critical flaws that could allow a malicious hacker to gain access to a company's infrastructure and sensitive data, including personally identifiable information (PII). Through hands-on labs and exercises, you'll practice thinking like an adversary and get a feel for how vulnerabilities can be exploited in sequence to devastating effect. Click here for Training Syllabus

Ben Sadeghipour (NahamSec) ,

Ben Sadeghipour, widely known by his online alias NahamSec, is an ethical hacker, content creator, and keynote speaker. With a passion for cybersecurity that began in his teenage years, Ben's professional journey as a bug bounty hunter took off in 2014. He has played a role in helping organizations identify and remediate thousands of security vulnerabilities across a wide range of web and mobile applications in tech giants such as Amazon, Apple, Google, Airbnb, Snapchat, Zoom, and even the US Department of Defense. Through his YouTube and Twitch content, Ben helps others learn ethical hacking, bug bounty hunting, and reconnaissance techniques. He has also created training materials and content for conferences such as OWASP, DEFCON, and Bsides. Ben aims to inspire and empower aspiring cybersecurity professionals, bridging the gap between the hacking community and the organizations they protect.

John Hammond ,

John Hammond is a cybersecurity researcher, educator and content creator. As part of the Research & Development Threat Operations team at Huntress, John spends his days analyzing malware and making hackers earn their access. Previously, as a Department of Defense Cyber Training Academy instructor, he taught the Cyber Threat Emulation course, educating both civilian and military members on offensive Python, PowerShell, other scripting languages and the adversarial mindset. He has developed training material and information security challenges for events such as PicoCTF and competitions at DEFCON US. John speaks at security conferences such as BsidesNoVA, to students at colleges such as the US Naval Academy, and other online events including the SANS Holiday Hack Challenge/KringleCon. He is an online YouTube personality showcasing programming tutorials, CTF video walkthroughs and other cyber security content.

Adam Langley ,

Adam Langley has worked in the realms of web development and web application security for over 20 years. Through his experience he’s created educational content such as interactive labs, Capture The Flag (CTF) Events and gamified learning experiences.