4 - 5 OCTOBER 2017 / EXCEL LONDON
AppCheck NG

AppCheck NG

Stand: BB22

AppCheck Ltd provides a leading web application and external infrastructure vulnerability scanning tool (automated penetration testing tool), that allows its users to automate the discovery of security flaws within their network perimeter quicker, easier and more accurately.

AppCheck bridges the gap between manual and automated penetration testing by offering a unique scripting solution which maps and tests user work flows, thus ultimately mapping a much larger attack surface and identifying more flaws. The solution also gives logical and easy to follow remedial steps.

Exhibitor Website

Twitter LinkedIn

AppCheck NG Seminars

  • Web Application Security – Why so hard? Wed 4th Oct 12:00 - 12:50

    Web Application Security – Why so hard?

    Due to their large and complex attack surface and the difficulty in ensuring they are secure, web applications continue to be a prime target in attacks. All it takes is a flaw in the application itself, its framework, the web server or proxy server configuration, or even some third-party component (e.g. such as a JavaScript library that is embedded on each web page) to lead to full compromise of a host or network.

    In this session we will talk both generally about the trends in web application security and look at specific examples of how key vulnerabilities arise (e.g. discussing how, without adequate sanitisation, tainted user input can reach dangerous functions within some layer of the system), paying particular attention to those more subtle cases that usually go under the radar, such as within HTML5 applications.

    Speaker

    Nick Blundell

    Nick BlundellMore

    Time / Place

    Wed 4th Oct 12:00 to 12:50

    Cyber Hack Theatre

  • Web Application Security – Why so hard? Thu 5th Oct 12:00 - 12:50

    Web Application Security – Why so hard?

    Due to their large and complex attack surface and the difficulty in ensuring they are secure, web applications continue to be a prime target in attacks. All it takes is a flaw in the application itself, its framework, the web server or proxy server configuration, or even some third-party component (e.g. such as a JavaScript library that is embedded on each web page) to lead to full compromise of a host or network.

    In this session we will talk both generally about the trends in web application security and look at specific examples of how key vulnerabilities arise (e.g. discussing how, without adequate sanitisation, tainted user input can reach dangerous functions within some layer of the system), paying particular attention to those more subtle cases that usually go under the radar, such as within HTML5 applications.

    Speaker

    Nick Blundell

    Nick BlundellMore

    Time / Place

    Thu 5th Oct 12:00 to 12:50

    Cyber Hack Theatre

Top