YoVDO

Pose a Threat - How Perceptual Analysis Helps Bug Hunters

Offered By: OWASP Foundation via YouTube

Tags

Conference Talks Courses Machine Learning Courses Penetration Testing Courses Vulnerability Scanning Courses Security Vulnerabilities Courses

Course Description

Overview

Explore innovative techniques for optimizing bug hunting and security exposure detection in this 48-minute conference talk from AppSecCali 2019. Learn how perceptual analysis, unlimited storage, scalable serverless infrastructure, and machine learning can revolutionize attack surface visibility. Discover methods for distributing requests, organizing screenshots by visual similarity, and automating exposure identification using collaborative filtering. Gain insights into applying these techniques for various analysis use cases, including penetration testing, bug bounty hunting, and vulnerability scanning. Presented by Rob Ragan and Oscar Salazar from Bishop Fox, this talk offers valuable strategies for security professionals seeking to enhance their threat detection capabilities and streamline the process of identifying potential vulnerabilities at scale.

Syllabus

Introduction
New Automation
Screenshot Chaos
Elastic Beanstalk
Worcester Buster
Inconsistency
Reducing Time and Labor
Automation
Target Discovery
Distributed Attack
Perceptual Analysis
Use Cases
Proprietary or Open Source
Smallest Project
Rendering


Taught by

OWASP Foundation

Related Courses

Building Geospatial Apps on Postgres, PostGIS, & Citus at Large Scale
Microsoft via YouTube
Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube
Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube
What's New in Grails 2.0
ChariotSolutions via YouTube
Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube