YoVDO

HTML5 Security Vulnerabilities and Attacks - Taking a Byte Out of HTML5

Offered By: YouTube

Tags

Web Security Courses HTML5 Courses Web Application Security Courses DDoS Attacks Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore HTML5 security vulnerabilities and attack vectors in this 50-minute conference talk from Derbycon 2012. Dive into client-side attacks, browser support for HTML5, and the most exploitable features. Learn about the SHARK repository, environment setup, and testing HTML5 capabilities. Discover advanced techniques like DDOS attacks and browser history tampering. Gain insights on mod_Security filtering rules and testing SHARK rules to enhance web application security.

Syllabus

Intro
Tony DeLaGrange
Jason Wood
Why Attack the Client?
HTML 5 Support in Browsers
Attacks with HTML5
Most Supported Features
HTML 5 "Cool" Features
Baaa-Dump... Baaaaa Dump...
SHARK Repository
SHFARK Environment Setup
Test Drive HTML 5 Features
Some "Cool" Features
But Wait, There's More!
DDOS Attack
Browser History Tampering
Mod_Security Filtering Rules
Testing SHARK Rules


Related Courses

Authentication & Authorization: OAuth
Udacity
Desarrollo de Aplicaciones Web: Seguridad
University of New Mexico via Coursera
Web Application Development: Security
University of New Mexico via Coursera
Hacking and Patching
University of Colorado System via Coursera
Fundamentals of Computer Network Security
University of Colorado System via Coursera