YoVDO

MarkDoom: How I Hacked Every Major IDE in 2 Weeks

Offered By: OWASP Foundation via YouTube

Tags

Application Security Courses Software Development Courses Bug Bounty Courses Web Application Security Courses Vulnerability Research Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the security vulnerabilities in popular Integrated Development Environments (IDEs) through this eye-opening conference talk from APPSEC Cali 2018. Delve into the world of "Desktop Web" applications, where embedded browsers are increasingly used to create user-friendly interfaces. Discover how Matt Austin, Director of Security Research at Contrast Security, uncovered arbitrary code execution vulnerabilities in major IDEs such as Visual Studio Code, GitHub Atom Editor, Sublime Text, Adobe Brackets Editor, and all JetBrains products. Learn about the intersection of web application and desktop security, understand the implementation flaws in these editors, and gain insights into safer development practices. This 40-minute presentation covers the research that led to 5 CVEs and significant bug bounties, highlighting the potential risks in the evolving landscape of desktop applications built with web technologies.

Syllabus

APPSEC Cali 2018 - MarkDoom: How I Hacked Every Major IDE in 2 Weeks


Taught by

OWASP Foundation

Related Courses

Authentication & Authorization: OAuth
Udacity
Desarrollo de Aplicaciones Web: Seguridad
University of New Mexico via Coursera
Web Application Development: Security
University of New Mexico via Coursera
Hacking and Patching
University of Colorado System via Coursera
Fundamentals of Computer Network Security
University of Colorado System via Coursera