YoVDO

Pose a Threat - How Perceptual Analysis Helps Bug Hunters

Offered By: OWASP Foundation via YouTube

Tags

Conference Talks Courses Machine Learning Courses Penetration Testing Courses Vulnerability Scanning Courses Security Vulnerabilities Courses

Course Description

Overview

Explore innovative techniques for optimizing bug hunting and security exposure detection in this 48-minute conference talk from AppSecCali 2019. Learn how perceptual analysis, unlimited storage, scalable serverless infrastructure, and machine learning can revolutionize attack surface visibility. Discover methods for distributing requests, organizing screenshots by visual similarity, and automating exposure identification using collaborative filtering. Gain insights into applying these techniques for various analysis use cases, including penetration testing, bug bounty hunting, and vulnerability scanning. Presented by Rob Ragan and Oscar Salazar from Bishop Fox, this talk offers valuable strategies for security professionals seeking to enhance their threat detection capabilities and streamline the process of identifying potential vulnerabilities at scale.

Syllabus

Introduction
New Automation
Screenshot Chaos
Elastic Beanstalk
Worcester Buster
Inconsistency
Reducing Time and Labor
Automation
Target Discovery
Distributed Attack
Perceptual Analysis
Use Cases
Proprietary or Open Source
Smallest Project
Rendering


Taught by

OWASP Foundation

Related Courses

Penetration Testing - Discovering Vulnerabilities
New York University (NYU) via edX
The Complete Cyber Security Course : Network Security!
Udemy
Certified Ethical Hacker دورة إعداد الـ
Udemy
The Ethical Hacking Starter Kit: 12 Techniques
Udemy
Technical Weakness Identification with Nikto
Pluralsight