Why spend all your time corrupting and controlling memory when you can type some text into your browser and get access to your target’s data? The growing complexity of web applications, the increasing data stored behind them, and the low awareness and understanding of web security vulnerabilities are creating a situation that is well-suited for exploitation. Joe Hemler will explain some of the most common vulnerabilities in web applications in this video.