Do you want to stop web based attacks in real-time rather than finding a backdoor after you have been compromised? Do you want to protect your own web apps from advanced threats? Ever want to add active defenses with real-time response capabilities to your web applications? This course will teach you how to achieve all of these goals. News of web application hacks are reported on a daily basis. This is because developers often do not have the time or skills to focus on security. Although the defensive techniques covered in this course can be applied through various technical means, we will focus on implementing them using ModSecurity, the extremely popular open source web application firewall toolkit. This two-day boot-camp training is designed for people who want to quickly learn how to defend their web applications. The course will cover topics such as the powerful ModSecurity rules language, extending functionality via the embedded Lua engine, and managing suspicious events via AuditConsole. Documented hands-on labs help students understand the inner workings of ModSecurity and how to deploy it securely. By leveraging the flexibility within ModSecurity, attendees will be able to write effective rules to mitigate complex web vulnerabilities.
Josh Amishav-Zlatin leads the R&D team at Pure Hacking where he focuses on web application defensive research and develops customized ModSecurity rulesets to help customers reduce risk associated with their web applications. Josh specializes in web application penetration testing and FOSS based security solutions. He is an active member of the ModSecurity community and is currently involved with the OWASP Core Rule Set, AuditConsole and WASC Threat Classification projects. Josh has over 10 years of experience in the IT security industry, working with both financial and government clients to help secure their critical applications.