Kamil Vavra | @vavkamil

Offensive Web Application Security | Ethical Hacking | Security Research

📖Blog 📢Talks 💰Bug bounty 🕵️Whoami 📩Contact | 💻GitHub 🏆LinkedIn

vavkamil@localhost:~/Public talks$

15+ talks. 13+ years. Mostly offensive web security, bug bounty, and security research:



Hacking a Pharmacy for Fun and Drugs

Hacking a Pharmacy for Fun and Drugs

OWASP Czech Chapter Meeting

(Brno, Czechia)

Do you like using loyalty cards when you shop? After all, they promise discounts on selected items. But what happens when a pharmacy chain forces an ethical hacker to sign up for one? In this talk, you will see how a simple loyalty card opened the door to finding critical vulnerabilities.



SSRF Adventures: Chaining Your Way Through the Network

SSRF Adventures: Chaining Your Way Through the Network

OWASP Czech Chapter Meeting

(Brno)

Explore the journey of transforming rendering trouble into a critical security vulnerability. This talk will unravel how combining creative offensive techniques, strategic exploit chaining, and leveraging third-party services beyond the edge can lead to significant breakthroughs in application security defenses. Attendees will gain practical insights into using automation and DAST tools to uncover similar issues in real-world scenarios. This short talk promises valuable takeaways for penetration testers and eye-opening lessons for those dedicated to securing web applications and sensitive internal data.



Hacking a Cruise Ship

Hacking a Cruise Ship

OWASP Czech Chapter Meeting

(Brno, Czechia)

PraSec.Cz

(Prague, Czechia)

Have you ever wondered what happens in international waters? It’s not just the waves that can be unpredictable, especially when an ethical hacker decides to spend a vacation on board. Cruising the high seas with curiosity and little to do, just a laptop, the majestic Norwegian fjords as the backdrop, and time on his hands, what possibly could go wrong?



Solving CAPTCHAs for Fun

Solving CAPTCHAs for Fun

OWASP Czech Chapter Meeting

(Brno)

We will explore how traditional Captchas work and look at their evolution into the modern solutions we encounter daily. Let’s compare a variety of vendors and the unique features they offer. But the question remains: are these CAPTCHAs sufficient in protecting your web applications against attackers and bots? And what about artificial intelligence?



Compromised Keys

Compromised Keys

OWASP Czech Chapter Meeting

(Brno, Czechia)

Kiwi Security Meetup

(Brno, Czechia)

What would you do if you found random keys without knowing whom they belong to or where they grant access? A red team exercise applied in a real-world, social experiment with a twist.



WordPress Supply Chain Attack

WordPress Supply Chain Attack

OWASP Czech Chapter Meeting

(Prague, Czechia)

Novel attack vector affecting WordPress websites. This talk will focus on the research from the beginning, explaining the motivation and exploration phase. A new scanner tool will be released, along with the Docker container for local testing. Lastly, you will get a chance to see the redacted results from the bug bounty hunting, recon process, and struggle with triage of the reports. TBU, currently still a 0day :)



I know where you live

I know where you live

OWASP Czech Chapter Meeting

(Brno, Czechia)

An introduction into the KARMA attack, exploiting the behavior of some Wi-Fi devices, where vulnerable clients broadcast a “preferred network list” (PNL), which contains the SSIDs of access points to which they have previously connected. We will revisit the old technique, current defenses applied by vendors and build a custom access point using Raspberry Pi & Python.



Ethical Hacking (web security)

Ethical Hacking (web security)

Private online event

(Remote)

Private event

(Prague, Czechia)

Private event

(Prague, Czechia)

Private event

(Brno, Czechia)

Private event

(Brno, Czechia)

Private event

(Brno, Czechia)

Private event

(Brno, Czechia)

An intensive, hands-on security workshop covering real-world web application attacks and defenses. Participants explore the OWASP Top 10, practice exploitation with Burp Suite and OWASP Juice Shop, and learn secure code review, phishing techniques, and common attack workflows. The training also provides insight into data breaches, bug bounty methods, and modern attacker tooling.



An introduction to the router exploit kits

An introduction to the router exploit kits

OWASP Czech Chapter Meeting

(Brno, Czechia)

Most of the security-oriented people already know about the risks of WPE/WPA/WPA2 attacks and how to crack (in)secured Wi-Fi passwords, stuff we won’t talk about. Instead, this talk will be focused on the JavaScript client-side attacks. XSS is overrated and CSRF is dead (SameSite cookie), but malicious actors are infecting hundreds of thousands of SOHO routers and turning them into powerful botnets almost daily. How hard is getting a foothold into the internal network with just a few JavaScript lines and why nobody is talking about it?



Burp Suite & OWASP Top 10 workshop

Burp Suite & OWASP Top 10 workshop

OWASP Czech Chapter Meeting

(Prague, Czechia)

Tomas Bata University

(Zlin, Czechia)

Tomas Bata University

(Zlin, Czechia)

SABO Bootcamp

(Olomouc, Czechia)

An intensive, hands-on security workshop covering real-world web application attacks and defenses. Participants explore the OWASP Top 10, practice exploitation with Burp Suite and OWASP Juice Shop, and learn secure code review, phishing techniques, and common attack workflows.



Bug Bounty ~ Work Smarter, Not Harder

Bug Bounty ~ Work Smarter, Not Harder

CTJB Hacker Camp

(Slovakia)

A practical introduction to bug bounty hunting focused on efficiency, mindset, and methodology. The talk covers major platforms, learning resources, automation, and open-source tools, with real-world tips on reconnaissance, reporting, and avoiding common mistakes—showing how to hunt smarter, improve skills faster, and maximize results without burnout.



Ethical Hacking

Ethical Hacking

CEVRO Institut

(Prague, Czechia)

An introductory ethical hacking talk showcasing real-world attack and defense concepts through live demonstrations. The session highlights common web vulnerabilities, attacker workflows, and tooling, offering a practical glimpse into how modern web applications are tested—serving as a foundation for the follow-up hands-on workshop.



Infecting Google Chrome from PowerShell

Infecting Google Chrome from PowerShell

CTJB Hacker Camp

(Slovakia)

In this talk, you will see how easy it is to use PowerShell on Windows 7 to bypass antivirus software and completely take control of a limited-privilege user’s web browser.



Kali Pwn Pad - armed with a tablet is a danger to society

Kali Pwn Pad - armed with a tablet is a danger to society

HackerFest

(Prague, Czechia)

Hacking & Security Konference

(Prague, Czechia)

From this talk, you will gain a comprehensive overview of security tools from the Kali Linux and Android ecosystems. We will demonstrate the practical use of a modified Google Nexus 7 tablet together with a customized smartphone. You will see how easy it is for an attacker to test and evaluate network security from a mobile device, break authentication mechanisms, map and exploit running network services, perform man-in-the-middle attacks, or leave behind a portable miniature computer such as a Raspberry Pi that can be easily accessed later.