Submit Search
Upload
Advanced applications-architecture-threats
•
1 like
•
2,788 views
B
Blueinfy Solutions
Follow
This presentation covers advanced architectures and threats
Read less
Read more
Technology
Report
Share
Report
Share
1 of 18
Recommended
Secure SDLC for Software
Secure SDLC for Software
Shreeraj Shah
Web Services Hacking and Security
Web Services Hacking and Security
Blueinfy Solutions
Next Generation Web Attacks – HTML 5, DOM(L3) and XHR(L2)
Next Generation Web Attacks – HTML 5, DOM(L3) and XHR(L2)
Shreeraj Shah
Application fuzzing
Application fuzzing
Blueinfy Solutions
HTML5 Top 10 Threats - Silent Attacks and Stealth Exploits
HTML5 Top 10 Threats - Silent Attacks and Stealth Exploits
Shreeraj Shah
FIND ME IF YOU CAN – SMART FUZZING AND DISCOVERY
FIND ME IF YOU CAN – SMART FUZZING AND DISCOVERY
Shreeraj Shah
Mobile security chess board - attacks & defense
Mobile security chess board - attacks & defense
Blueinfy Solutions
XSS and CSRF with HTML5
XSS and CSRF with HTML5
Shreeraj Shah
Recommended
Secure SDLC for Software
Secure SDLC for Software
Shreeraj Shah
Web Services Hacking and Security
Web Services Hacking and Security
Blueinfy Solutions
Next Generation Web Attacks – HTML 5, DOM(L3) and XHR(L2)
Next Generation Web Attacks – HTML 5, DOM(L3) and XHR(L2)
Shreeraj Shah
Application fuzzing
Application fuzzing
Blueinfy Solutions
HTML5 Top 10 Threats - Silent Attacks and Stealth Exploits
HTML5 Top 10 Threats - Silent Attacks and Stealth Exploits
Shreeraj Shah
FIND ME IF YOU CAN – SMART FUZZING AND DISCOVERY
FIND ME IF YOU CAN – SMART FUZZING AND DISCOVERY
Shreeraj Shah
Mobile security chess board - attacks & defense
Mobile security chess board - attacks & defense
Blueinfy Solutions
XSS and CSRF with HTML5
XSS and CSRF with HTML5
Shreeraj Shah
Hacking Ajax & Web Services - Next Generation Web Attacks on the Rise
Hacking Ajax & Web Services - Next Generation Web Attacks on the Rise
Shreeraj Shah
Assessment methodology and approach
Assessment methodology and approach
Blueinfy Solutions
[Infosecworld 08 Orlando] CSRF: The Biggest Little Vulnerability on the Web
[Infosecworld 08 Orlando] CSRF: The Biggest Little Vulnerability on the Web
Shreeraj Shah
Web Attacks - Top threats - 2010
Web Attacks - Top threats - 2010
Shreeraj Shah
[Infosecworld 08 Orlando] New Defenses for .NET Web Apps: IHttpModule in Prac...
[Infosecworld 08 Orlando] New Defenses for .NET Web Apps: IHttpModule in Prac...
Shreeraj Shah
Blackhat11 shreeraj reverse_engineering_browser
Blackhat11 shreeraj reverse_engineering_browser
Shreeraj Shah
AppSec 2007 - .NET Web Services Hacking
AppSec 2007 - .NET Web Services Hacking
Shreeraj Shah
Application Security TRENDS – Lessons Learnt- Firosh Ummer
Application Security TRENDS – Lessons Learnt- Firosh Ummer
OWASP-Qatar Chapter
Automation In Android & iOS Application Review