Submit Search
Upload
WordPress Security @ Vienna WordPress + Drupal Meetup
•
Download as ODP, PDF
•
1 like
•
538 views
Veselin Nikolov
Follow
Software
Report
Share
Report
Share
1 of 45
Download now
Recommended
Memcache Injection (Hacktrick'15)
Memcache Injection (Hacktrick'15)
Memcache Injection (Hacktrick'15)
Ömer Çıtak
Top 10 OAuth 2 Implementation Vulnerabilities
Top X OAuth 2 Hacks
Top X OAuth 2 Hacks
Antonio Sanso
Practical Django Security
Practical django secuirty
Practical django secuirty
Andy Dai
Django Web Application Security
Django Web Application Security
levigross
Akademik Bilişim 2016 etkinliği kapsamında Aydın Adnan Menderes Üniversitesi'nde vermiş olduğum seminerin sunumu.
Web Uygulama Güvenliği (Akademik Bilişim 2016)
Web Uygulama Güvenliği (Akademik Bilişim 2016)
Ömer Çıtak
dawdawdawda
Ddddddd
Ddddddd
cupu125
JavaScript, as it is today, is an insecure language. We need to understand it's shortcomings to improve the security of our applications to protect our users.
JavaScript Security
JavaScript Security
Jason Harwig
Talk given at the Tri-Cities Javascript Developers Group, Johnson City, TN
Java script, security and you - Tri-Cities Javascript Developers Group
Java script, security and you - Tri-Cities Javascript Developers Group
Adam Caudill
Recommended
Memcache Injection (Hacktrick'15)
Memcache Injection (Hacktrick'15)
Memcache Injection (Hacktrick'15)
Ömer Çıtak
Top 10 OAuth 2 Implementation Vulnerabilities
Top X OAuth 2 Hacks
Top X OAuth 2 Hacks
Antonio Sanso
Practical Django Security
Practical django secuirty
Practical django secuirty
Andy Dai
Django Web Application Security
Django Web Application Security
levigross
Akademik Bilişim 2016 etkinliği kapsamında Aydın Adnan Menderes Üniversitesi'nde vermiş olduğum seminerin sunumu.
Web Uygulama Güvenliği (Akademik Bilişim 2016)
Web Uygulama Güvenliği (Akademik Bilişim 2016)
Ömer Çıtak
dawdawdawda
Ddddddd
Ddddddd
cupu125
JavaScript, as it is today, is an insecure language. We need to understand it's shortcomings to improve the security of our applications to protect our users.
JavaScript Security
JavaScript Security
Jason Harwig
Talk given at the Tri-Cities Javascript Developers Group, Johnson City, TN
Java script, security and you - Tri-Cities Javascript Developers Group
Java script, security and you - Tri-Cities Javascript Developers Group
Adam Caudill
Modern web applications depend on a lot of auxiliary scripts which are often hosted on third-party CDNs. Should an attacker be able to tamper with the files hosted on such a CDN, millions of sites could be compromised. Web developers need a way to guarantee the integrity of scripts hosted elsewhere. This is the motivation behind a new addition to the web platform being introduced by the W3C: sub-resource integrity (http://www.w3.org/TR/SRI/). Both Firefox and Chrome have initial implementations of this new specification and a few early adopters such as Github are currently evaluating this feature.
Integrity protection for third-party JavaScript
Integrity protection for third-party JavaScript
Francois Marier
Modern web applications depend on a lot of auxiliary scripts which are often hosted on third-party CDNs. Should an attacker be able to tamper with the files hosted on such a CDN, millions of sites could be compromised. Web developers need a way to guarantee the integrity of scripts hosted elsewhere. This is the motivation behind a new addition to the web platform being introduced by the W3C: sub-resource integrity. Both Firefox and Chrome have initial implementations of this new specification and a few early adopters are currently evaluating this feature.
Integrity protection for third-party JavaScript
Integrity protection for third-party JavaScript
Francois Marier
Presentation on securing PHP web applications given to Seattle PHP Users Group.
PHPUG Presentation
PHPUG Presentation
Damon Cortesi
A case study of security features inside the popular python-based web framework, Django. Made by Mohammed ALDOUB (@Voulnet)
Case Study of Django: Web Frameworks that are Secure by Default
Case Study of Django: Web Frameworks that are Secure by Default
Mohammed ALDOUB
What happens in between the time you type a URL in your browser and the time you see the fully rendered page.
URL to HTML
URL to HTML
Francois Marier
The is to accumulate the secret keys / secret materials related to various web frameworks, that are publicly available and potentially used by developers. These secrets will be utilized by the Blacklist3r tools to audit the target application and verify the usage of these pre-published keys.
Blacklist3r
Blacklist3r
Sanjay Gondaliya
อาชญากรรมคอมพิวเตอร์และกฎหมายที่เกี่ยวข้อง
อาชญากรรมคอมพิวเตอร์และกฎหมายที่เกี่ยวข้อง
Supaporn21
It's time to deprecate JavaScript. It's security model and the language itself are appalling. As data moves into the cloud the JavaScript threat is increasing and I believe the only way to fix this is to start all over again. The 14 year old language and security model aren't up to today's threats.
Javascript Security
Javascript Security
jgrahamc
This presentation was used in OWASP Taiwan Week 2017 at Taipei & Kaohsiung. It talks about what Cross Site Request Forgery is, what are different ways to prevent it. And how it can be mitigated with OWASP CSRF Protector with just two lines of codes.
Mitigating CSRF with two lines of codes
Mitigating CSRF with two lines of codes
Minhaz A V
Хватит усложнять и перебирать бессмысленные вектора для эксплуатации XSS. Все проще.
ZeroNights 2018 | I <"3 XSS
ZeroNights 2018 | I <"3 XSS
Дмитрий Бумов
Cyber Security & Defense is the emerging topic of the IT industry these days. A secure environment is no longer just a well-maintained firewall or a well-managed network. Rather, it is made up of several layers. However, most companies are „reactive“ instead of „proactive“, or neither, when it comes to securing their IT environments and detecting security breaches. In addition to this, the product portfolio and the security market is changing rapidly, and these changes make our jobs as IT Professionals significantly more difficult. But how can we deal with this challenge? In my session I will take a look into supposed “obvious“ security threats and how the Microsoft Cyber security stack can help to detect attackers and threats that have evaded our defenses.
ExpertsLiveEurope The New Era Of Endpoint Security
ExpertsLiveEurope The New Era Of Endpoint Security
Alexander Benoit
Basic of XSS with some of my POC.
XSS (Cross Site Scripting)
XSS (Cross Site Scripting)
Shubham Gupta
Automatically detecting client side JavaScript vulnerabilities using IBM Rational AppScan and JavaScript Security Analyzer (hybrid analysis)
Client-side JavaScript Vulnerabilities
Client-side JavaScript Vulnerabilities
Ory Segal
Meeting #6.
6.2. Hacking most popular websites
6.2. Hacking most popular websites
defconmoscow
BH TALK Mirror in Slideshare due credits to the owners
Owning the bad guys
Owning the bad guys
Santhosh Kumar
bitcoin mining free, free bitcoin mining, bitcoin mining software, bitcoinget, bitcoin mining online, free bitcoin mining, cloud mining bitcoin free, free bitcoin cloud mining, bitcoin solo mining, free bitcoin mining pool, bitcoin cloud mining calculator, free bitcoin cloud mining, free bitcoin mining online, bitcoin mining data center, bitcoin mining website, bitcoin cloud mining comparison, bitcoin mining graphics card comparison, bitcoin generator online, bitcoin mining server hosting, buy bitcoin with bank account, bitcoin earning sites, mining bitcoin gratis, earn bitcoin without mining, easy bitcoin mining pool, earn bitcoins instantly
Bitcoin Mining
Bitcoin Mining
Nathan Wynne
The arena of proper auth & data security standards is often some of the most misunderstood, confusing, and tricky aspects of building Node apps. Using open source auth techniques and proper data encryption standards, we’ll learn how to make intelligent decisions on creating a solid infrastructure to protect our users and data. We’ll dive into auth systems, data attack vectors, how to protect your systems, and common security pitfalls in Node.
Node.js Authentication and Data Security
Node.js Authentication and Data Security
Jonathan LeBlanc
How attacks works? Learn how XSS, CSRF and NoSQL injection are working and secure your app on MEAN (MongoDB, Express.js, Angular.js, Node,js) stack.
Javascript Security - Three main methods of defending your MEAN stack
Javascript Security - Three main methods of defending your MEAN stack
Ran Bar-Zik
#CSA #Dehradun XSS Video POC in Yahoo : https://www.youtube.com/watch?v=I2WKUJn8P7I Tapjacking bug poc in Android 6.0 Video : https://www.youtube.com/watch?v=8BcP3Q4ZWXQ
Bug Bounty - Play For Money
Bug Bounty - Play For Money
Shubham Gupta
* Django is a Web Application Framework, written in Python * Allows rapid, secure and agile web development. * Write better web applications in less time & effort.
Django (Web Applications that are Secure by Default )