- The document discusses blind XML external entity (XXE) attacks against web applications. It provides background on the speaker and describes how XXE vulnerabilities can be exploited to read local files, scan internal networks, and access Windows network shares by abusing XML parser features. - Several examples are given of exploiting XXE vulnerabilities using document type definitions (DTDs) and XML schema definitions (XSDs) to conduct blind attacks and extract information from external XML files without direct output of file contents. Challenges with these approaches are also outlined. - Binary search techniques are proposed to more efficiently extract text from external files when only validation errors are returned. The document concludes by noting the relative rarity of XSD validation