Join us to deep dive into exploitation methods and uncover what’s really possible when pentesters go beyond the basics.
3 Hidden Bugs
We Just Exposed
The Vulnerability Lab
W E B I N A R O N - D E M A N D
Strike’s hacking team walking through full disclosure of fresh attack vectors, step by step.
H O S T E D B Y
Javier Bernardo
Yesenia Trejo
Lead Striker
Head of Hacking Team
*This event was hold in Spanish
AI/LLM: Improper Output Handling – Account takeover through XSS in an AI chatbot.
👾
Ready to level up your offensive security skills?
In this technical session, Javier Bernardo and Yesenia Trejo — leaders of Strike’s Hacking Team — will walk you through three newly disclosed vulnerabilities that highlight the depth of manual pentesting techniques.
From AI hacking to bypassing CAPTCHA mechanisms and exploiting path traversal bugs, you’ll get an inside look at how these attack vectors were discovered and exploited in real environments.
What’s on the lab table?
👾
CAPTCHA bypass – Brute-forcing credentials without triggering account lockouts.
2nd Order Path traversal – Extracting source code, system files, and uploading webshells.
👾
This isn’t just another vulnerability rundown. It's a workshop-style session with detailed walkthroughs, hands-on thinking, and techniques that Strike's ethical hackers sharpen every day in the field.