YoVDO

Bug Hunting on the Dark Side

Offered By: OWASP Foundation via YouTube

Tags

Conference Talks Courses Cybersecurity Courses SQL Injection Courses Buffer Overflow Courses Ransomware Courses Symmetric Cryptography Courses Stuxnet Courses Bug Hunting Courses AES Encryption Courses

Course Description

Overview

Explore bug hunting techniques in malware and cybercrime during this conference talk from AppSecEU 2016 in Rome. Delve into various examples and comparisons, including Stuxnet, Helios, and the Storm Botnet. Learn about symmetric cryptography, AES encryption, and ransomware. Examine security vulnerabilities in PHP MyAdmin, SQL injection, and XML parsing. Discover insights on botnets, IP random number generation, and the OWASP Top 10. Gain valuable knowledge on identifying and understanding malicious software, enhancing your cybersecurity skills in the process.

Syllabus

Felix Leder
Conclusion
Examples
Comparisons
Rent
Stuxnet
The problem
Examples to get started
What is problem
Helios
Energy Sector
Symmetric Cryptography
Storm Botnet
Sickpot
Ransomware
AES symmetric encryption
Zeus
PHP MyAdmin
CP Users
Loodle
DanDroid
Sequel Injection
Prepared Statements
Secure Methods
Botnets
Relay Node
XML
XML parser
AES encryption
Download command
Naked truth
IP random number generation
MaxMind GUIP database
Summary
OS Top 10
Buffer Overflows


Taught by

OWASP Foundation

Related Courses

Protecting PII and PHI Data in Data Lakes with Column-Level Encryption
Databricks via YouTube
AES and ISA Extensions
TheIACR via YouTube
Cryptography All-in-One Tutorial Series
Caleb Curry via YouTube
My Quest for Privileged Identity to Own Your Domain
BSidesLV via YouTube
Crafting the Unavoidable - DefCamp - 2016
DefCamp via YouTube