Developer’s Guide to Pentesting


For the last several years, Bill has taken his twenty years of web development experience to application pentesting. Although he didn’t have a televised event to announce ‘the decision,’ he has gathered a vast collection of the real problems he has discovered in the majority of applications that he has tested. Reflected XSS, injection of all types, and privilege escalation are rampant, and that is only the beginning. What’s more, he hasn’t tested an application yet that had sufficient protection to keep him from breaking in and causing havoc. Come hear what they are, how they intersect with the OWASP Top 10, and what you can say to your developers to make the problems go away.

Speaker – Bill Sempf

Bill Sempf is a software security architect. His breadth of experience includes business and technical analysis, software design, development, testing, server management and maintenance, and security. In his 20 years of professional experience he has participated in the creation of well over 200 applications for large and small companies, managed the software infrastructure of two Internet service providers, coded complex software happily in every environment imaginable, tested the security of all natures of applications and APs, and made mainframes talk to cell phones. He is the author of C# 5 All in One for Dummies and Windows 8 Programming with HTML5 For Dummies; a coauthor of Effective Visual Studio.NET and many other books, a frequent contributor to industry magazines; and has recently been an invited speaker for the ACM and IEEE, BlackHat, CodeMash, DerbyCon, BSides, DevEssentials, the International XML Web Services Expo and the Association of Information Technology Professionals. Bill also serves on the board of the Columbus branch of the Open Web Application Security Project, and is the Administrative Director of Locksport International.