Authentication/Authorization – is there anyone who implements it correctly? ;-)
Short Description of presentation
During the presentation I’ll cover about 20 interesting cases of vulnerabilities concerning authentication/authorization in web applications. JWT/OAuth2/Bypassing 2FA/flawed password reset flow – this are only a couple of examples which will be covered during the lecture.
Short Biographical Note of Speaker
Michał Sajdak, founder of sekurak.pl and IT security consultant in Securitum. He has over 10 years of experience in issues related to technical IT security. He performs security tests. He conducts trainings. The holder of certificates: CISSP, CEH, CTT +.