Antonio de Mello & Amine Abed
The attacker's footprint
#1about 10 minutes
Defining key cybersecurity tools and terminology
An overview of essential information security concepts and tools is provided, including nmap, Burp Suite, IDOR, LFI, and SIEM platforms.
#2about 16 minutes
Performing reconnaissance with an nmap port scan
The initial attack phase begins with an nmap scan to discover open ports and services, identifying potential web applications and an Apache server.
#3about 11 minutes
Gaining initial access with default credentials
After failed SQL injection attempts, access is gained by logging in with common default credentials and a path disclosure vulnerability is found via a malformed JSON.
#4about 13 minutes
Exploiting broken access control with cookie tampering
A base64-encoded cookie is manipulated to access another organization's data, and fuzzing reveals a hidden admin parameter to view sensitive information.
#5about 10 minutes
Reading sensitive files with a path traversal exploit
A known path traversal vulnerability in the Apache server is exploited to read the `/etc/passwd` file and a sensitive configuration file containing credentials.
#6about 1 minute
Achieving remote access via SSH with guessed credentials
Using the leaked username, the password from the configuration file is modified by incrementing the year to successfully log into the server via SSH.
#7about 21 minutes
Analyzing API logs to trace the attacker's steps
The defender analyzes API logs to identify failed SQL injection attempts, a successful login, parameter fuzzing, and cookie manipulation by observing response codes and body sizes.
#8about 15 minutes
Correlating web server and authentication logs
Apache and authentication logs are examined to find evidence of the nmap scan, the path traversal exploit, and the final successful SSH login after several failed attempts.
#9about 13 minutes
Demonstrating a SIEM for automated threat detection
A Security Information and Event Management (SIEM) tool is shown to automatically detect and flag suspicious activity, such as the nmap user agent, in real-time.
#10about 18 minutes
Summarizing vulnerabilities and key security recommendations
The workshop concludes with a summary of the attack chain and provides key recommendations for developers and defenders, such as patch management and maintaining high-quality logs.
Related jobs
Jobs that call for the skills explored in this talk.
Technoly GmbH
Berlin, Germany
€50-60K
Intermediate
Network Security
Security Architecture
+2
Eltemate
Amsterdam, Netherlands
Intermediate
Senior
TypeScript
Continuous Integration
+1
Matching moments
01:06 MIN
Malware campaigns, cloud latency, and government IT theft
Fake or News: Self-Driving Cars on Subscription, Crypto Attacks Rising and Working While You Sleep - Théodore Lefèvre
01:15 MIN
Crypto crime, EU regulation, and working while you sleep
Fake or News: Self-Driving Cars on Subscription, Crypto Attacks Rising and Working While You Sleep - Théodore Lefèvre
07:39 MIN
Prompt injection as an unsolved AI security problem
AI in the Open and in Browsers - Tarek Ziadé
03:45 MIN
Preventing exposed API keys in AI-assisted development
Slopquatting, API Keys, Fun with Fonts, Recruiters vs AI and more - The Best of LIVE 2025 - Part 2
03:16 MIN
Improving the developer feedback loop with specialized tools
Developer Time Is Valuable - Use the Right Tools - Kilian Valkhof
05:01 MIN
Comparing the security models of browsers and native apps
Developer Time Is Valuable - Use the Right Tools - Kilian Valkhof
03:17 MIN
Selecting strategic partners and essential event tools
Cat Herding with Lions and Tigers - Christian Heilmann
01:32 MIN
Organizing a developer conference for 15,000 attendees
Cat Herding with Lions and Tigers - Christian Heilmann
Featured Partners
Related Videos
Cracking the Code: Decoding Anti-Bot Systems!
Fabien Vauchelles
Getting under the skin: The Social Engineering techniques
Mauro Verderosa
Stranger Danger: Your Java Attack Surface Just Got Bigger
Vandana Verma Sehgal
Walking into the era of Supply Chain Risks
Vandana Verma
Hack-Proof The Node.js runtime: The Mechanics and Defense of Path Traversal Attacks
Sonya Moisset
Cyber Sleuth: Finding Hidden Connections in Cyber Data
Jennifer Reif
What The Hack is Web App Sec?
Jackie
Enabling automated 1-click customer deployments with built-in quality and security
Christoph Ruggenthaler
Related Articles
View all articles



From learning to earning
Jobs that call for the skills explored in this talk.

Integrity360
PHP
C++
Java
Unix
Ruby
+5

NEVERHACK Italy
Turin, Italy
Remote
Load Balancing
Network Security
Amazon Web Services (AWS)



aXite Security Tools
Amsterdam, Netherlands
Node.js
Angular
JavaScript

Rapid7
Belfast, United Kingdom
Intermediate

TryHackMe
Charing Cross, United Kingdom
Remote
£34K
Intermediate
PHP
Bash
Python
+1

Client Server
Charing Cross, United Kingdom
Remote
£35-50K
C++
Java
Python

RedTeam Pentesting GmbH
Aachen, Germany