by Bozidar Spirovski and Wekoslav Stefanovski
This hands-on 6-hour workshop equips developers with practical experience identifying,
exploiting, and remediating common injection vulnerabilities in local applications.
We will provide the same examples in three languages, so everyone can attack and fix their own
preferred platform: Python, JavaScript, and .NET
Learning Objectives
● Understand the mechanics of four critical injection vulnerability types
● Gain practical experience exploiting vulnerabilities in local applications
● Learn to identify vulnerable patterns in existing codebases
● Implement remediation and prevention techniques
● Develop secure coding habits that prevent injection attacks
Target Audience
Software developers, security engineers, QA specialists, and technical team leads seeking to
strengthen application security through practical exercises.
Prerequisites
● Familiarity with Python, JavaScript, and/or .NET
● Basic understanding of web applications development (backend)
● Laptop with the relevant language platform set up (Python, JavaScript or .NET), favorite
Development IDE, web browser (at least chrome and firefox) and Postman.
● Workshop repository cloned (will be provided before the session)
● Running Docker and ability to build up the docker infrastructure of the workshop (will be
sent several days before the workshop)