by Bozidar Spirovski and Wekoslav Stefanovski


This hands-on 6-hour workshop equips developers with practical experience identifying,
exploiting, and remediating common injection vulnerabilities in local applications.
We will provide the same examples in three languages, so everyone can attack and fix their own
preferred platform: Python, JavaScript, and .NET


Learning Objectives

● Understand the mechanics of four critical injection vulnerability types ● Gain practical experience exploiting vulnerabilities in local applications ● Learn to identify vulnerable patterns in existing codebases ● Implement remediation and prevention techniques ● Develop secure coding habits that prevent injection attacks

Target Audience

Software developers, security engineers, QA specialists, and technical team leads seeking to strengthen application security through practical exercises.

Prerequisites

● Familiarity with Python, JavaScript, and/or .NET ● Basic understanding of web applications development (backend) ● Laptop with the relevant language platform set up (Python, JavaScript or .NET), favorite Development IDE, web browser (at least chrome and firefox) and Postman. ● Workshop repository cloned (will be provided before the session) ● Running Docker and ability to build up the docker infrastructure of the workshop (will be sent several days before the workshop)