Главная
Study mode:
on
1
Introduction
2
Research Plan
3
Software Complexity
4
BottomUp Approach
5
Accessibility
6
Example
7
Methodology
8
Accessibility XSLT
9
Research
10
New XSLT
11
Altova
12
Who is impacted
13
Safari
14
Linux
15
iPhone
16
PHP
17
Google
18
XSLT Transformation
19
XMLSec
20
XSLT Engine
21
PHP GSP
22
JSP
23
Metasploit
24
Maccon
25
USB attacks
26
Vendors
Description:
Explore the security implications of XSLT engines in this 49-minute conference talk from Hack in Paris. Delve into the systematic and bottom-up approach to uncovering high-impact vulnerabilities in applications utilizing XSLT engines. Learn about the research plan, software complexity, and accessibility of XSLT functionalities. Examine real-world examples and methodologies, including impacts on various platforms like Safari, Linux, iPhone, and PHP. Discover how XSLT transformations can be exploited, and understand the potential for attacks through XML, SecXSLT, and other vectors. Gain insights into vendor responses and the broader implications for cybersecurity.

Offensive XSLT - Nicolas Gregoire - Hack in Paris

Hack in Paris
Add to list
00:00
-01:26