Hack the hacker is fair game at conferences, especially when some ethic and a formative objective is mixed in. If you red the last post you know “who”, “when”, “where” and “why”. Now it’s time for “what”.
This post is about developers who will code the applications of tomorrow, full of bugs of yesterday, injections and logical bugs, wide open to attacks. This is a post about users, who will fill such application’s backends with any sort of personal information. In the meantime somebody enjoyed exploiting the developers of today with last century attack vectors in order to save the unaware users of tomorrow’s available applications. Perhaps.