Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Cross-Site Request Forgery
“The Sleeping Giant of Website Vulnerabilities”
Jeremiah Grossman | WhiteHat Security | 04/09/0...
Jeremiah Grossman
  – WhiteHat Security Founder  CTO
  – Technology R and industry evangelist
    (Named to InfoWorld's CT...
Focus on “custom web applications”
                        Vulnerability Stack
WhiteHat
Security

“well-known”
vulnerabili...
CSRF_RSA_2008_Jeremiah_Grossman
CSRF_RSA_2008_Jeremiah_Grossman
CSRF_RSA_2008_Jeremiah_Grossman
CSRF_RSA_2008_Jeremiah_Grossman
CSRF_RSA_2008_Jeremiah_Grossman
CSRF_RSA_2008_Jeremiah_Grossman
CSRF_RSA_2008_Jeremiah_Grossman
CSRF_RSA_2008_Jeremiah_Grossman
CSRF_RSA_2008_Jeremiah_Grossman
CSRF_RSA_2008_Jeremiah_Grossman
CSRF_RSA_2008_Jeremiah_Grossman
CSRF_RSA_2008_Jeremiah_Grossman
CSRF_RSA_2008_Jeremiah_Grossman
CSRF_RSA_2008_Jeremiah_Grossman
CSRF_RSA_2008_Jeremiah_Grossman
CSRF_RSA_2008_Jeremiah_Grossman
CSRF_RSA_2008_Jeremiah_Grossman
CSRF_RSA_2008_Jeremiah_Grossman
CSRF_RSA_2008_Jeremiah_Grossman
CSRF_RSA_2008_Jeremiah_Grossman
CSRF_RSA_2008_Jeremiah_Grossman
CSRF_RSA_2008_Jeremiah_Grossman
CSRF_RSA_2008_Jeremiah_Grossman
CSRF_RSA_2008_Jeremiah_Grossman
Upcoming SlideShare
Loading in …5
×

CSRF_RSA_2008_Jeremiah_Grossman

8,323 views

Published on

Published in: Technology
  • Be the first to comment

CSRF_RSA_2008_Jeremiah_Grossman

  1. 1. Cross-Site Request Forgery “The Sleeping Giant of Website Vulnerabilities” Jeremiah Grossman | WhiteHat Security | 04/09/08 | Session Code: HT1-20304
  2. 2. Jeremiah Grossman – WhiteHat Security Founder CTO – Technology R and industry evangelist (Named to InfoWorld's CTO Top 25 for 2007) – Frequent international conference speaker – Co-founder of the Web Application Security Consortium – Co-author: Cross-Site Scripting Attacks – Former Yahoo! information security officer
  3. 3. Focus on “custom web applications” Vulnerability Stack WhiteHat Security “well-known” vulnerabilities Symantec Qualys Nessus nCircle

×