YoVDO

Pose a Threat - How Perceptual Analysis Helps Bug Hunters

Offered By: OWASP Foundation via YouTube

Tags

Conference Talks Courses Machine Learning Courses Penetration Testing Courses Vulnerability Scanning Courses Security Vulnerabilities Courses

Course Description

Overview

Explore innovative techniques for optimizing bug hunting and security exposure detection in this 48-minute conference talk from AppSecCali 2019. Learn how perceptual analysis, unlimited storage, scalable serverless infrastructure, and machine learning can revolutionize attack surface visibility. Discover methods for distributing requests, organizing screenshots by visual similarity, and automating exposure identification using collaborative filtering. Gain insights into applying these techniques for various analysis use cases, including penetration testing, bug bounty hunting, and vulnerability scanning. Presented by Rob Ragan and Oscar Salazar from Bishop Fox, this talk offers valuable strategies for security professionals seeking to enhance their threat detection capabilities and streamline the process of identifying potential vulnerabilities at scale.

Syllabus

Introduction
New Automation
Screenshot Chaos
Elastic Beanstalk
Worcester Buster
Inconsistency
Reducing Time and Labor
Automation
Target Discovery
Distributed Attack
Perceptual Analysis
Use Cases
Proprietary or Open Source
Smallest Project
Rendering


Taught by

OWASP Foundation

Related Courses

Introduction to Artificial Intelligence
Stanford University via Udacity
Natural Language Processing
Columbia University via Coursera
Probabilistic Graphical Models 1: Representation
Stanford University via Coursera
Computer Vision: The Fundamentals
University of California, Berkeley via Coursera
Learning from Data (Introductory Machine Learning course)
California Institute of Technology via Independent