1 |
|
Securing Javascript - Douglas Crockford |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2528 |
None |
2 |
|
Cracking The Code Of Mobile Application |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2793 |
None |
3 |
|
Put Your Robots To Work: Security Automation At Twitter |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2220 |
None |
4 |
|
Incident Response: Security After Compromise |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2599 |
None |
5 |
|
Exploiting Internal Network Vulns Via The Browser Using Beef Bind |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2653 |
None |
6 |
|
Web App Crypto - A Study In Failure |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2016 |
None |
7 |
|
Effective Approaches To Web Application Security |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2804 |
None |
8 |
|
Bug Bounty Programs |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2320 |
None |
9 |
|
Origin(Al) Sins |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2418 |
None |
10 |
|
Four Axes Of Evil |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2606 |
None |
11 |
|
Top Ten Web Defenses |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2750 |
None |
12 |
|
Building A Web Attacker Dashboard With Modsecurity And Beef |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
4085 |
None |
13 |
|
Gauntlt: Rugged By Example |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2336 |
None |
14 |
|
Xss And Csrf With Html5 - Attack, Exploit And Defense |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
3052 |
None |
15 |
|
Cross Site Port Scanning |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
3147 |
None |
16 |
|
Hack Your Way To A Degree: A New Direction In Teaching Application Security At Universities |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2752 |
1 |
17 |
|
Hacking With Web Sockets |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2758 |
None |
18 |
|
Mobile Applications &Amp; Proxy Shenanigans |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2330 |
None |
19 |
|
Web Framework Vulnerabilties |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2995 |
None |
20 |
|
Keynote-Infosec At Ludicrious Speed: Rugged Devops And More |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2205 |
None |
21 |
|
Counterintelligence Attack Theory |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2754 |
None |
22 |
|
Appsec Training, Securing The Sdlc, Webgoat.Net And The Meaning Of Life |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2169 |
None |
23 |
|
Blended Threats And Javascript: A Plan For Permanent Network Compromise |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2334 |
None |
24 |
|
Spin The Bottle: Coupling Technology And Se For One Awesome Hack |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2120 |
None |
25 |
|
Securing The Ssl Channel Against Man-In-The-Middle Attacks |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2493 |
None |
26 |
|
Get Off Your Amf And Don't Rest On Json |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2293 |
None |
27 |
|
Reverse Engineering Secure Http Api's With An Ssl Proxy |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
3097 |
None |
28 |
|
Using Interactive Static Analysis For Early Detection Of Software Vulnerabilities |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2394 |
None |
29 |
|
Devops Distilled: The Devops Panel |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
1912 |
None |
30 |
|
Keynote - Some Lessons From The Trenches |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2162 |
None |
31 |
|
Interactive Application Security Testing(Iast), Beyond Sast/Dast |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2897 |
None |
32 |
|
The Same-Origin Saga |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2140 |
None |
33 |
|
Real World Cloud Application Security |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2118 |
None |
34 |
|
Keynote- The State Of Owasp |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2107 |
None |
35 |
|
Analyzing And Fixing Password Protection Schemes |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2972 |
None |
36 |
|
Unraveling Some Of The Mysteries Around Dom-Based Xss |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2372 |
None |
37 |
|
Builders Vs. Breakers |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
1876 |
None |
38 |
|
Sql Server Exploitation, Escalation And Pilfering |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2576 |
None |
39 |
|
Secure Code Reviews Magic Or Art? A Simplified Approach To Secure Code Reviews |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
1832 |
None |
40 |
|
How We Tear Into That Little Green Man |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
1969 |
None |
41 |
|
Hacking .Net Applications: Reverse Engineering 101 |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
3111 |
None |
42 |
|
The 7 Qualities Of Highly Secure Software |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2185 |
None |
43 |
|
Iran's Real Life Cyberwar |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
3606 |
None |
44 |
|
Unbreakable Oracle Erps? Attacks On Siebel &Amp; Jd Edwards |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2437 |
None |
45 |
|
Demystifying Security In The Cloud: Aws Scout |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2062 |
None |
46 |
|
Nosql, No Security? |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2350 |
None |
47 |
|
Pining For The Fjords: The Role Of Rbac In Today's Applications |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
1806 |
None |
48 |
|
Doing The Unstuck: How Rugged Cultures Drive Biz And Appsec Value |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
1715 |
None |
49 |
|
Building Predictable Systems Using Behavioral Security Modeling: Functional Security Requirements |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
1993 |
None |
50 |
|
The Diviner - Digital Clairvoyance Breakthrough - Gaining Access To The Source Code And Server Side Memory Structure |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2120 |
None |
51 |
|
The Magic Of Symbiotic Security: Creating An Ecosystem Of Security Systems |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2135 |
None |
52 |
|
Wtf - Waf Testing Framework |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2546 |
None |
53 |
|
Top Strategies To Capture Security Intelligence For Applications |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
1875 |
None |
54 |
|
Static Analysis Of Java Class Files For Quickly And Accurately Detecting Web |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2354 |
None |