Live Hacking like a MVH – A walkthrough on methodology and strategies to win big A story of the passive aggressive sysadmin of AEM OWASP AppSecEU 2018 – Attacking "Modern" Web Technologies DNS hijacking using cloud providers – No verification needed Time based CAPTCHA protected SQL injection through SOAP-webservice The Secret Life of a Bug Bounty Hunter – Frans Rosén @ Security Fest 2016 How to steal and modify data using Business Logic flaws - Insecure Direct Object References