Home
Explore
Submit Search
Upload
Login
Signup
Check these out next
HTTP Parameter Pollution Vulnerabilities in Web Applications (Black Hat EU 2011)
Marco Balduzzi
議題二:Web應用程式安全防護
Nicolas su
WAF Bypass Techniques - Using HTTP Standard and Web Servers’ Behaviour
Soroush Dalili
XSS and CSRF with HTML5
Shreeraj Shah
SSRF For Bug Bounties
OWASP Nagpur
Waf bypassing Techniques
Avinash Thapa
Format string Attack
icchy
Introduction to Web Application Penetration Testing
Anurag Srivastava
1
of
57
Top clipped slide
窺探職場上所需之資安專業技術與能力 Tdohconf
Dec. 20, 2016
•
0 likes
27 likes
×
Be the first to like this
Show More
•
4,184 views
views
×
Total views
0
On Slideshare
0
From embeds
0
Number of embeds
0
Download Now
Download to read offline
Report
Presentations & Public Speaking
TDOH CONF
jack51706
Follow
Recommended
資訊安全入門
Tyler Chen
9.3K views
•
160 slides
Got Your PW - 一場入門資安的微旅行
Allen Chou
2K views
•
35 slides
台科大網路鑑識課程 封包分析及中繼站追蹤
jack51706
3.2K views
•
59 slides
Become A Security Master
Chong-Kuan Chen
5.6K views
•
52 slides
Advanced Topics On Sql Injection Protection
amiable_indian
8.5K views
•
64 slides
Dos attack
Manjushree Mashal
1.4K views
•
5 slides
More Related Content
Slideshows for you
(20)
HTTP Parameter Pollution Vulnerabilities in Web Applications (Black Hat EU 2011)
Marco Balduzzi
•
11.5K views
議題二:Web應用程式安全防護
Nicolas su
•
4.2K views
WAF Bypass Techniques - Using HTTP Standard and Web Servers’ Behaviour
Soroush Dalili
•
51.8K views
XSS and CSRF with HTML5
Shreeraj Shah
•
45K views
SSRF For Bug Bounties
OWASP Nagpur
•
373 views
Waf bypassing Techniques
Avinash Thapa
•
26.3K views
Format string Attack
icchy
•
4.2K views
Introduction to Web Application Penetration Testing
Anurag Srivastava
•
2K views
Building Advanced XSS Vectors
Rodolfo Assis (Brute)
•
7.6K views
XXE - XML External Entity Attack
Cysinfo Cyber Security Community
•
3.7K views
Proxy War
zaki4649
•
14.6K views
Cross Site Request Forgery
Tony Bibbs
•
4.6K views
Presentation on Web Attacks
Vivek Sinha Anurag
•
1.2K views
Basics of Server Side Template Injection
Vandana Verma
•
374 views
XSSフィルターを利用したXSS攻撃 by Masato Kinugawa
CODE BLUE
•
7.6K views
Learn to pen-test with OWASP ZAP
Paul Ionescu
•
2K views
Slides do Treinamento - OWASP TOP 10 (Em português)
Julio Cesar Stefanutto
•
2.9K views
外部キー制約に伴うロックの小話
ichirin2501
•
32K views
SQLインジェクション再考
Hiroshi Tokumaru
•
1.1K views
sqlmap internals
Miroslav Stampar
•
2.4K views
Similar to 窺探職場上所需之資安專業技術與能力 Tdohconf
(20)
OWASP Poland Day 2018 - Andrzej Dyjak - Zero Trust Theorem
OWASP
•
188 views
淺談 Startup 公司的軟體開發流程 v2
Wen-Tien Chang
•
38.7K views
Agile startup company management and operation
Jiang Zhu
•
870 views
Next Generation Memory Forensics
Andrew Case
•
2K views
Simon Bennetts - Automating ZAP
DevSecCon
•
1.4K views
Automating OWASP ZAP - DevCSecCon talk
Simon Bennetts
•
8K views
ITT 2015 - Vincent Garrigues - Continuous Integration at SoundCloud
Istanbul Tech Talks
•
592 views
2017 Codemotion OWASP ZAP in CI/CD
Simon Bennetts
•
2.4K views
15年前に作ったアプリを現在に蘇らせてみた話
Naoki Nagazumi
•
2.4K views
EclipseCon France 2018 report
Akira Tanaka
•
772 views
Hacking Adobe Experience Manager sites
Mikhail Egorov
•
12.8K views
Доклад Михаила Егорова на PHDays
ru_Parallels
•
314 views
Security research over Windows #defcon china
Peter Hlavaty
•
369 views
Introduction to red team operations
Sunny Neo
•
1.2K views
Barcamp Bangkhen :: Robot Framework
Somkiat Puisungnoen
•
2.4K views
Security Vulnerabilities in Mobile Applications (Kristaps Felzenbergs)
TestDevLab
•
809 views
Security Testing with OWASP ZAP in CI/CD - Simon Bennetts - Codemotion Amster...
Codemotion
•
4.8K views
Java platform
Universidade de São Paulo
•
799 views
Silent web app testing by example - BerlinSides 2011
Abraham Aranguren
•
8.4K views
Practical Security Testing for Developers using OWASP ZAP at Dot Net Bangalor...
gmaran23
•
2.5K views
Recently uploaded
(20)
GYNAE TOACS A7-A12.pptx
HassanIlyas33
•
1 view
Prototyping Cards
peter williams
•
17 views
Kazuko Kotaki_Japan digital PR best practices‗how to run hybrid media relatio...
Edelman Japan
•
1 view
SURGICAL INSTRUMENTS surgery.pptx
HassanIlyas33
•
2 views
Skilling .pdf
ManasKumar451951
•
2 views
The Cornerstone of Media - ABS CBN Reporter (Jervis Manahan).pdf
JohnChristianAgustin
•
2 views
LANDMARKS AND MONUMENTS OF NIGERIA
Basil Achie
•
3 views
Near Miss.pptx
Dineshpal82
•
3 views
11.1_Katleen Bell-Bonjean.pdf
Katleen Bell-Bonjean
•
48 views
Mapping the landscape of service robots in hospitality: A bibliometric analysis
Selcen Ozturkcan
•
18 views
Critical L&D Elements to Achieve Success for Small and Growing Biotechs
Seuss+
•
2 views
IKWUEZE UCHENNA HUMPHREY.pptx
UchennaIkwueze2
•
2 views
presentation on geological structure.pptx
AlMamun560346
•
1 view
Walter Vargas - eCommerce Day Paraguay Blended Professional Experience 2023
eCommerce Institute
•
6 views
business-models.pdf
ImadRiaz2
•
1 view
Assessment3_22026986_Dinh Tuan Tran.pdf
accountvsro
•
3 views
paragraphs.ppt
AsifIqbalAsifIqbal
•
1 view
Presentation - Poverty -Updated.Anas.pptx
Shah G
•
2 views
Resisting Assimilation: The Synthesis of tradition and Modernity in Tibetan e...
TibetMuseum
•
3 views
An Ocean of Glaciers Tibet from top to bottom
TibetMuseum
•
4 views
窺探職場上所需之資安專業技術與能力 Tdohconf
Jack 1
... • • • • • 2
Agenda • Whoami • • & • • •
FAQ 3
4
( ) • TCP/IP •
OWASP 5
-VA & WEBVA •
OWASP • Vulnerability Assessment • ..... • 6
Exploit Development • http://securityalley.blogspot.tw/2014/06/buffer-overflow-windows.html
( EXPLOIT ) • https://www.corelan.be/index.php/category/security/exploit-writing-tutorials/ (CORELAN ) • http://expdev-kiuhnm.rhcloud.com/2015/05/11/contents/ ( EXPLOIT ) • https://github.com/enddo/awesome-windows-exploitation • https://github.com/riusksk/vul_war 7
8
9
- / • • 10
- • • • AD • • • 11
( ) • WEBPT •
IR • Coding • Certification 12
- • OWASP Testing
Guide • Open Source Security Testing Methodology Manual (OSSTMM) • • 13
Web Application Hacker’s
Methodology 14
SQLMAP • ..... • 1 •
2 code • 3 code 15
-1 • https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project • http://drops.wooyun.org/(
....) • http://www.freebuf.com/ • https://www.91ri.org/ • https://support.portswigger.net/customer/portal/topics/792273-burp-testing- methodologies/articles?page=1 • https://kennel209.gitbooks.io/owasp-testing-guide-v4/content/en/ 16
17
- • ERS? (WHAT) •
? (WHO) • ? (WHERE) • ? (HOW) • 18
ATTACK LIFECYCLE ..... 19
- • 20
IR Toolkit • 21
- • • • • 22
• Hash (
) • (.NET JAVA ) • Import ( • Strings • Tools Installed on REMnux • Reverse-Engineering Wiki 23
• F5 ( • •
( ?) 24
• .... • • —— 25
26
• Anti VM •
Anti OD • Anti Forensic • Anti XXX …… • • ANTI TECH github 27
• • 28
• http://bbs.pediy.com/ (
) • http://www.52pojie.cn/forum.php ( ) • http://adr.horse/ ( ) • https://github.com/gasgas4/APT_CyberCriminal_Campagin ( ) • http://blog.malwaremustdie.org/ • http://www.malware-traffic-analysis.net/ 29
30
Malware Source /
Code • https://github.com/gasgas4/Leaked_Malware_SourceCode • https://github.com/ytisf/theZoo • https://github.com/krmaxwell/maltrieve 31
- • • • • • 32
• • • ?! • • 33
34
35
36
IDA OD ... 37
Google Drive • OAuth 38
DropBox • token 39
40
XX •A B •B C
D E • ... 41
XXX • • • 42
43
( ! 44
• Office • 45
... 46
• 47
! ! ! 48
! ! ! 49
50
• https://github.com/hackedteam?tab=repositories (
HACKING TEAM) • https://www.blackhat.com/html/archives.html • https://www.defcon.org/html/links/dc-archives.html • https://github.com/RichardLitt/awesome-conferences • RSA , Zeronight , Hitcon , cansecwest , CONFidence , HITB , nullcon , recon , syscan ... 51
FAQ: CTF • • Bug
Bounty • http://ppt.cc/7xaGu • https://bugcrowd.com/ programs • https://h1.sintheticlabs.com/ 52
FAQ Certification • 53
54
55
... 56
& 57