1 |
|
Securing Javascript - Douglas Crockford |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2475 |
None |
2 |
|
Cracking The Code Of Mobile Application |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2747 |
None |
3 |
|
Put Your Robots To Work: Security Automation At Twitter |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2171 |
None |
4 |
|
Incident Response: Security After Compromise |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2550 |
None |
5 |
|
Exploiting Internal Network Vulns Via The Browser Using Beef Bind |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2606 |
None |
6 |
|
Web App Crypto - A Study In Failure |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
1974 |
None |
7 |
|
Effective Approaches To Web Application Security |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2760 |
None |
8 |
|
Bug Bounty Programs |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2276 |
None |
9 |
|
Origin(Al) Sins |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2374 |
None |
10 |
|
Four Axes Of Evil |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2563 |
None |
11 |
|
Top Ten Web Defenses |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2704 |
None |
12 |
|
Building A Web Attacker Dashboard With Modsecurity And Beef |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
4041 |
None |
13 |
|
Gauntlt: Rugged By Example |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2288 |
None |
14 |
|
Xss And Csrf With Html5 - Attack, Exploit And Defense |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
3011 |
None |
15 |
|
Cross Site Port Scanning |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
3098 |
None |
16 |
|
Hack Your Way To A Degree: A New Direction In Teaching Application Security At Universities |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2709 |
1 |
17 |
|
Hacking With Web Sockets |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2714 |
None |
18 |
|
Mobile Applications &Amp; Proxy Shenanigans |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2283 |
None |
19 |
|
Web Framework Vulnerabilties |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2946 |
None |
20 |
|
Keynote-Infosec At Ludicrious Speed: Rugged Devops And More |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2162 |
None |
21 |
|
Counterintelligence Attack Theory |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2709 |
None |
22 |
|
Appsec Training, Securing The Sdlc, Webgoat.Net And The Meaning Of Life |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2123 |
None |
23 |
|
Blended Threats And Javascript: A Plan For Permanent Network Compromise |
11 years, 2 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2289 |
None |
24 |
|
Spin The Bottle: Coupling Technology And Se For One Awesome Hack |
11 years, 2 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2072 |
None |
25 |
|
Securing The Ssl Channel Against Man-In-The-Middle Attacks |
11 years, 2 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2445 |
None |
26 |
|
Get Off Your Amf And Don't Rest On Json |
11 years, 2 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2248 |
None |
27 |
|
Reverse Engineering Secure Http Api's With An Ssl Proxy |
11 years, 2 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
3043 |
None |
28 |
|
Using Interactive Static Analysis For Early Detection Of Software Vulnerabilities |
11 years, 2 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2351 |
None |
29 |
|
Devops Distilled: The Devops Panel |
11 years, 2 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
1858 |
None |
30 |
|
Keynote - Some Lessons From The Trenches |
11 years, 2 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2112 |
None |
31 |
|
Interactive Application Security Testing(Iast), Beyond Sast/Dast |
11 years, 2 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2850 |
None |
32 |
|
The Same-Origin Saga |
11 years, 2 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2096 |
None |
33 |
|
Real World Cloud Application Security |
11 years, 2 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2069 |
None |
34 |
|
Keynote- The State Of Owasp |
11 years, 2 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2032 |
None |
35 |
|
Analyzing And Fixing Password Protection Schemes |
11 years, 2 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2922 |
None |
36 |
|
Unraveling Some Of The Mysteries Around Dom-Based Xss |
11 years, 2 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2317 |
None |
37 |
|
Builders Vs. Breakers |
11 years, 2 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
1830 |
None |
38 |
|
Sql Server Exploitation, Escalation And Pilfering |
11 years, 2 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2528 |
None |
39 |
|
Secure Code Reviews Magic Or Art? A Simplified Approach To Secure Code Reviews |
11 years, 2 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
1789 |
None |
40 |
|
How We Tear Into That Little Green Man |
11 years, 2 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
1921 |
None |
41 |
|
Hacking .Net Applications: Reverse Engineering 101 |
11 years, 2 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
3061 |
None |
42 |
|
The 7 Qualities Of Highly Secure Software |
11 years, 2 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2133 |
None |
43 |
|
Iran's Real Life Cyberwar |
11 years, 2 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
3563 |
None |
44 |
|
Unbreakable Oracle Erps? Attacks On Siebel &Amp; Jd Edwards |
11 years, 2 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2389 |
None |
45 |
|
Demystifying Security In The Cloud: Aws Scout |
11 years, 2 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2022 |
None |
46 |
|
Nosql, No Security? |
11 years, 2 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2307 |
None |
47 |
|
Pining For The Fjords: The Role Of Rbac In Today's Applications |
11 years, 2 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
1761 |
None |
48 |
|
Doing The Unstuck: How Rugged Cultures Drive Biz And Appsec Value |
11 years, 2 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
1672 |
None |
49 |
|
Building Predictable Systems Using Behavioral Security Modeling: Functional Security Requirements |
11 years, 2 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
1947 |
None |
50 |
|
The Diviner - Digital Clairvoyance Breakthrough - Gaining Access To The Source Code And Server Side Memory Structure |
11 years, 2 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2081 |
None |
51 |
|
The Magic Of Symbiotic Security: Creating An Ecosystem Of Security Systems |
11 years, 2 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2091 |
None |
52 |
|
Wtf - Waf Testing Framework |
11 years, 2 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2500 |
None |
53 |
|
Top Strategies To Capture Security Intelligence For Applications |
11 years, 2 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
1833 |
None |
54 |
|
Static Analysis Of Java Class Files For Quickly And Accurately Detecting Web |
11 years, 2 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2307 |
None |