MarkDoom: How I Hacked Every Major IDE in 2 Weeks
Offered By: OWASP Foundation via YouTube
Course Description
Overview
Explore the security vulnerabilities in popular Integrated Development Environments (IDEs) through this eye-opening conference talk from APPSEC Cali 2018. Delve into the world of "Desktop Web" applications, where embedded browsers are increasingly used to create user-friendly interfaces. Discover how Matt Austin, Director of Security Research at Contrast Security, uncovered arbitrary code execution vulnerabilities in major IDEs such as Visual Studio Code, GitHub Atom Editor, Sublime Text, Adobe Brackets Editor, and all JetBrains products. Learn about the intersection of web application and desktop security, understand the implementation flaws in these editors, and gain insights into safer development practices. This 40-minute presentation covers the research that led to 5 CVEs and significant bug bounties, highlighting the potential risks in the evolving landscape of desktop applications built with web technologies.
Syllabus
APPSEC Cali 2018 - MarkDoom: How I Hacked Every Major IDE in 2 Weeks
Taught by
OWASP Foundation
Related Courses
Ethical Hacking in 15 Hours - 2023 Edition - Learn to HackCyber Mentor via YouTube Contextomy - Let's Debug Together
nullcon via YouTube macOS Security Features Bypasses by Example
nullcon via YouTube Exploiting Android Messengers with WebRTC
nullcon via YouTube XNU Heap Exploitation - From Kernel Bug to Kernel Control
nullcon via YouTube