YoVDO

Shameful Secrets of Proprietary Network Protocols

Offered By: OWASP Foundation via YouTube

Tags

Network Security Courses Cryptography Courses Embedded Systems Courses Reverse Engineering Courses Penetration Testing Courses Security Vulnerabilities Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the hidden vulnerabilities in proprietary network protocols through this insightful conference talk from AppSecEU 2014. Delve into the challenges of penetration testing specialized embedded software and thick clients with undocumented protocols. Learn a step-by-step approach to reverse engineering proprietary protocols, uncovering common security flaws like weak cryptography implementations, reversible hash algorithms, and lack of user authentication. Examine five real-world case studies from the financial industry that exemplify "security by obscurity," including home automation systems, embedded printing software, remote desktop protocols, and FOREX trading applications. Gain valuable insights from experienced IT security consultants on how to assess and improve the security of systems using proprietary protocols.

Syllabus

Jakub Kauny Slawomir Jasek - Shameful Secrets of Proprietary Network Protocols


Taught by

OWASP Foundation

Related Courses

Applied Cryptography
University of Virginia via Udacity
Cryptography II
Stanford University via Coursera
Coding the Matrix: Linear Algebra through Computer Science Applications
Brown University via Coursera
Cryptography I
Stanford University via Coursera
Unpredictable? Randomness, Chance and Free Will
National University of Singapore via Coursera