El Documento de Idoneidad Técnica - DIT - es un documento de carácter voluntario expedido por el Instituto de Ciencias de la Construcción Eduardo Torroja - IETcc-, que contiene una apreciación técnica favorable de la idoneidad de empleo en edificación y/u obra civil de materiales, sistemas o procedimientos constructivos no tradicionales o innovadores.
How to Hijack a Pizza Delivery Robot with Injection FlawsSecurity Innovation
Welcome to the lighter side of the software security world!
We’ll explain complex topics like injection flaws, configuration errors, and parameter tampering with real-world analogies, like breaking into your house through your shed, or sneaking into a Coldplay concert using a reflective yellow vest, a walkie talkie toy, and your bravado. If you’ve ever struggled to remember exactly how these issues work or struggled to explain them to someone outside of the security field, this presentation will help (and probably make you laugh).
Topics covered include:
- Injection Flaws
- XSS
- SQL Injection
- Broken Authentication
- Privilege Escalation
- Information Disclosure
- Parameter Tampering
- Configuration Errors
This webinar is ideal for anyone who wants to understand core Application Security concepts so they can apply risk mitigation strategies with better context.
El Documento de Idoneidad Técnica - DIT - es un documento de carácter voluntario expedido por el Instituto de Ciencias de la Construcción Eduardo Torroja - IETcc-, que contiene una apreciación técnica favorable de la idoneidad de empleo en edificación y/u obra civil de materiales, sistemas o procedimientos constructivos no tradicionales o innovadores.
How to Hijack a Pizza Delivery Robot with Injection FlawsSecurity Innovation
Welcome to the lighter side of the software security world!
We’ll explain complex topics like injection flaws, configuration errors, and parameter tampering with real-world analogies, like breaking into your house through your shed, or sneaking into a Coldplay concert using a reflective yellow vest, a walkie talkie toy, and your bravado. If you’ve ever struggled to remember exactly how these issues work or struggled to explain them to someone outside of the security field, this presentation will help (and probably make you laugh).
Topics covered include:
- Injection Flaws
- XSS
- SQL Injection
- Broken Authentication
- Privilege Escalation
- Information Disclosure
- Parameter Tampering
- Configuration Errors
This webinar is ideal for anyone who wants to understand core Application Security concepts so they can apply risk mitigation strategies with better context.