February 18-20, 2015
Montreal, Canada

Deconstructing PHP Application Exploits for Good, not Evil

If your web application exists on the public Internet, someone *will* try to exploit it.
Many of these are un-targeted & scripted, their authors hoping that their target will fall to one of the hundreds of un-patched vulnerabilities in frameworks, blog engines or storefronts. Let's go through some common and uncommon exploits in the wild, starting from their traces in server logs, and see how we can detect them and better protect ourselves.

View all 141 sessions

Joël Perras

Fictive Kin

Hi! My name is Joël, and I'm an ex-physicist turned web developer. Life is weird like that.

My days are spent building infrastructure and applications with the rest of the fine folk at Fictive Kin, and trying to lift heavy weights over my head on a regular basis. I've authored a book on application development in Python, Flask Blueprints, and blog about math and computer science at nerderati.com.

If you can program it, then I want to know more about it.

Read More


Please remain courteous and constructive. Comments will be moderated.

Montreal 2015 sponsored by