For tomorrow’s Mission Control, we will be going over two common web application vulnerabilities (including some live examples, Demo God willing) and their mitigations.
In the process, you will learn a little bit about cookies, sessions, password storage, and several web development and debugging tools that can make your life easier as a developer, or form part of your arsenal as an attacker.
The talk is rather unlikely to be recorded. Parts of the presentation containing personal information that was magically obtained may be omitted due to their sensitive nature.
Update: If you attended yesterday’s Mission Control session, you might be interested in these links: http://qxcg.net/how-websites-are-broken-resources.html.