1 |
|
Securing Javascript - Douglas Crockford |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2500 |
None |
2 |
|
Cracking The Code Of Mobile Application |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2774 |
None |
3 |
|
Put Your Robots To Work: Security Automation At Twitter |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2195 |
None |
4 |
|
Incident Response: Security After Compromise |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2577 |
None |
5 |
|
Exploiting Internal Network Vulns Via The Browser Using Beef Bind |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2629 |
None |
6 |
|
Web App Crypto - A Study In Failure |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
1996 |
None |
7 |
|
Effective Approaches To Web Application Security |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2781 |
None |
8 |
|
Bug Bounty Programs |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2299 |
None |
9 |
|
Origin(Al) Sins |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2396 |
None |
10 |
|
Four Axes Of Evil |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2586 |
None |
11 |
|
Top Ten Web Defenses |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2727 |
None |
12 |
|
Building A Web Attacker Dashboard With Modsecurity And Beef |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
4062 |
None |
13 |
|
Gauntlt: Rugged By Example |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2311 |
None |
14 |
|
Xss And Csrf With Html5 - Attack, Exploit And Defense |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
3031 |
None |
15 |
|
Cross Site Port Scanning |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
3123 |
None |
16 |
|
Hack Your Way To A Degree: A New Direction In Teaching Application Security At Universities |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2732 |
1 |
17 |
|
Hacking With Web Sockets |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2736 |
None |
18 |
|
Mobile Applications &Amp; Proxy Shenanigans |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2308 |
None |
19 |
|
Web Framework Vulnerabilties |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2972 |
None |
20 |
|
Keynote-Infosec At Ludicrious Speed: Rugged Devops And More |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2185 |
None |
21 |
|
Counterintelligence Attack Theory |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2734 |
None |
22 |
|
Appsec Training, Securing The Sdlc, Webgoat.Net And The Meaning Of Life |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2148 |
None |
23 |
|
Blended Threats And Javascript: A Plan For Permanent Network Compromise |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2310 |
None |
24 |
|
Spin The Bottle: Coupling Technology And Se For One Awesome Hack |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2096 |
None |
25 |
|
Securing The Ssl Channel Against Man-In-The-Middle Attacks |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2470 |
None |
26 |
|
Get Off Your Amf And Don't Rest On Json |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2273 |
None |
27 |
|
Reverse Engineering Secure Http Api's With An Ssl Proxy |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
3069 |
None |
28 |
|
Using Interactive Static Analysis For Early Detection Of Software Vulnerabilities |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2375 |
None |
29 |
|
Devops Distilled: The Devops Panel |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
1881 |
None |
30 |
|
Keynote - Some Lessons From The Trenches |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2139 |
None |
31 |
|
Interactive Application Security Testing(Iast), Beyond Sast/Dast |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2872 |
None |
32 |
|
The Same-Origin Saga |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2117 |
None |
33 |
|
Real World Cloud Application Security |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2094 |
None |
34 |
|
Keynote- The State Of Owasp |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2066 |
None |
35 |
|
Analyzing And Fixing Password Protection Schemes |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2945 |
None |
36 |
|
Unraveling Some Of The Mysteries Around Dom-Based Xss |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2345 |
None |
37 |
|
Builders Vs. Breakers |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
1851 |
None |
38 |
|
Sql Server Exploitation, Escalation And Pilfering |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2550 |
None |
39 |
|
Secure Code Reviews Magic Or Art? A Simplified Approach To Secure Code Reviews |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
1812 |
None |
40 |
|
How We Tear Into That Little Green Man |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
1945 |
None |
41 |
|
Hacking .Net Applications: Reverse Engineering 101 |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
3086 |
None |
42 |
|
The 7 Qualities Of Highly Secure Software |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2159 |
None |
43 |
|
Iran's Real Life Cyberwar |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
3587 |
None |
44 |
|
Unbreakable Oracle Erps? Attacks On Siebel &Amp; Jd Edwards |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2413 |
None |
45 |
|
Demystifying Security In The Cloud: Aws Scout |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2044 |
None |
46 |
|
Nosql, No Security? |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2328 |
None |
47 |
|
Pining For The Fjords: The Role Of Rbac In Today's Applications |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
1782 |
None |
48 |
|
Doing The Unstuck: How Rugged Cultures Drive Biz And Appsec Value |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
1694 |
None |
49 |
|
Building Predictable Systems Using Behavioral Security Modeling: Functional Security Requirements |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
1970 |
None |
50 |
|
The Diviner - Digital Clairvoyance Breakthrough - Gaining Access To The Source Code And Server Side Memory Structure |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2101 |
None |
51 |
|
The Magic Of Symbiotic Security: Creating An Ecosystem Of Security Systems |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2116 |
None |
52 |
|
Wtf - Waf Testing Framework |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2523 |
None |
53 |
|
Top Strategies To Capture Security Intelligence For Applications |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
1854 |
None |
54 |
|
Static Analysis Of Java Class Files For Quickly And Accurately Detecting Web |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2330 |
None |