Token Hijacking via PDF

PDF files are everywhere and they can be used to hack your web application. Imagine that the attacker prepares a malicious PDF file which steals sensitive data from a user. The PDF file is uploaded to the web application, the user reads this PDF file, and finally sensitive data is exfiltrated from the user’s browser. It’s scary, isn’t it?

In a free video Dawid Czagan (44CON Instructor) will show you-step-by step how this attack works and how you can check if your web application is vulnerable to this attack.

Watch this free video and feel the taste of Dawid Czagan’s Live Online Training ”Black Belt Pentesting / Bug Hunting Millionaire: Mastering Web Attacks with Full-Stack Exploitation” (44CON Live Online Training; 15-16 December 2020;