YoVDO

Pose a Threat - How Perceptual Analysis Helps Bug Hunters

Offered By: OWASP Foundation via YouTube

Tags

Conference Talks Courses Machine Learning Courses Penetration Testing Courses Vulnerability Scanning Courses Security Vulnerabilities Courses

Course Description

Overview

Explore innovative techniques for optimizing bug hunting and security exposure detection in this 48-minute conference talk from AppSecCali 2019. Learn how perceptual analysis, unlimited storage, scalable serverless infrastructure, and machine learning can revolutionize attack surface visibility. Discover methods for distributing requests, organizing screenshots by visual similarity, and automating exposure identification using collaborative filtering. Gain insights into applying these techniques for various analysis use cases, including penetration testing, bug bounty hunting, and vulnerability scanning. Presented by Rob Ragan and Oscar Salazar from Bishop Fox, this talk offers valuable strategies for security professionals seeking to enhance their threat detection capabilities and streamline the process of identifying potential vulnerabilities at scale.

Syllabus

Introduction
New Automation
Screenshot Chaos
Elastic Beanstalk
Worcester Buster
Inconsistency
Reducing Time and Labor
Automation
Target Discovery
Distributed Attack
Perceptual Analysis
Use Cases
Proprietary or Open Source
Smallest Project
Rendering


Taught by

OWASP Foundation

Related Courses

Blockchain Scalability and its Foundations in Distributed Systems
The University of Sydney via Coursera
Don's Introduction to Ethical Hacking for Beginners
Udemy
Hacking und Netzwerkanalyse mit Wireshark - Der Komplettkurs
Udemy
Penetration Testing of Identity, Authentication and Authorization Mechanism
Pluralsight
ASP.NET MVC 5 Identity: Authentication and Authorization
LinkedIn Learning