YoVDO

MarkDoom: How I Hacked Every Major IDE in 2 Weeks

Offered By: OWASP Foundation via YouTube

Tags

Application Security Courses Software Development Courses Bug Bounty Courses Web Application Security Courses Vulnerability Research Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the security vulnerabilities in popular Integrated Development Environments (IDEs) through this eye-opening conference talk from APPSEC Cali 2018. Delve into the world of "Desktop Web" applications, where embedded browsers are increasingly used to create user-friendly interfaces. Discover how Matt Austin, Director of Security Research at Contrast Security, uncovered arbitrary code execution vulnerabilities in major IDEs such as Visual Studio Code, GitHub Atom Editor, Sublime Text, Adobe Brackets Editor, and all JetBrains products. Learn about the intersection of web application and desktop security, understand the implementation flaws in these editors, and gain insights into safer development practices. This 40-minute presentation covers the research that led to 5 CVEs and significant bug bounties, highlighting the potential risks in the evolving landscape of desktop applications built with web technologies.

Syllabus

APPSEC Cali 2018 - MarkDoom: How I Hacked Every Major IDE in 2 Weeks


Taught by

OWASP Foundation

Related Courses

Ethical Hacking in 15 Hours - 2023 Edition - Learn to Hack
Cyber Mentor via YouTube
Contextomy - Let's Debug Together
nullcon via YouTube
macOS Security Features Bypasses by Example
nullcon via YouTube
Exploiting Android Messengers with WebRTC
nullcon via YouTube
XNU Heap Exploitation - From Kernel Bug to Kernel Control
nullcon via YouTube