YoVDO

HTML5 Top 10 Threats - Stealth Attacks & Silent Exploits

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Web Development Courses Cybersecurity Courses Vulnerability Scanning Courses

Course Description

Overview

Explore the emerging security challenges posed by HTML5 in this comprehensive Black Hat USA 2012 conference talk. Delve into the enhanced browser capabilities and Rich Internet Application features of HTML5, including its implementation on mobile devices. Examine the complex technology stack comprising XMLHttpRequest, Document Object Model, Cross Origin Resource Sharing, and advanced HTML/Browser rendering. Discover new browser technologies such as localstorage, webSQL, websocket, and webworkers, which expand the attack surface for malicious actors. Learn about the top 10 HTML5 threats, including CORS attacks, ClickJacking, XSS vulnerabilities, web storage exploitation, SQL injection, web messaging injections, DOM-based attacks, third-party widget risks, WebSocket vulnerabilities, and protocol/schema/API attacks. Gain insights into stealth attack techniques and silent exploits that are difficult to detect yet highly effective in compromising systems. Understand the importance of addressing these new attack vectors in today's cybersecurity landscape and explore emerging tools and techniques for HTML5 vulnerability scanning.

Syllabus

Black Hat USA 2012 - HTML5 Top 10 Threats: Stealth Attacks & Silent Exploits


Taught by

Black Hat

Related Courses

Penetration Testing - Discovering Vulnerabilities
New York University (NYU) via edX
The Complete Cyber Security Course : Network Security!
Udemy
Certified Ethical Hacker دورة إعداد الـ
Udemy
The Ethical Hacking Starter Kit: 12 Techniques
Udemy
Technical Weakness Identification with Nikto
Pluralsight