lt;pgt;Have you ever thought of hacking web applications for fun and profit? How about playing with authentic, award-winning security bugs identified in some of the greatest companies? If that sounds interesting, join this unique 100% hands-on training!lt;/pgt;lt;pgt;I will discuss security bugs found in a number of bug bounty programs (including Google, Yahoo, Mozilla, Twitter and others). You will learn how bug hunters think and how to hunt for security bugs effectively.lt;/pgt;lt;pgt;To be successful in bug hunting, you need to go beyond automated scanners. If you are not afraid of going into detail and diving into full-stack exploitation, then this 100% hands-on training is for you. There is a lab exercise for each attack presented in this training + students can take the complete lab environment home after the training session.lt;/pgt;lt;pgt;Watch 3 exclusive videos (~1 hour) to feel the taste of this training:lt;/pgt;lt;ulgt;lt;ligt;lt;ugt;lt;stronggt;lt;a href="https://www.youtube.com/watch?v=lLd9Y1r2dhM"gt;Exploiting Race Conditionslt;/agt;lt;/stronggt;lt;/ugt;lt;/ligt;lt;ligt;lt;a href="https://www.youtube.com/watch?v=AWplef1CyQs"gt;lt;ugt;lt;stronggt;Token Hijacking via PDF File lt;/stronggt;lt;/ugt;lt;/agt;lt;/ligt;lt;ligt;lt;a href="https://www.youtube.com/watch?v=tTK4SZXB734"gt;lt;ugt;lt;stronggt;Bypassing Content Security Policylt;/stronggt;lt;/ugt;lt;/agt;lt;/ligt;lt;/ulgt;lt;pgt; lt;/pgt;